So, without further ado, here’s the chart of MS patches that affect Windows platforms in the past month.
Patch data provided by: |
|||||
Technology |
Products Affected |
Severity |
Reference |
Workaround/ Exploited / Publicly Disclosed |
Vulnerability Info |
Windows |
Windows 10, 11 Server 2008 SP2, 2008 R2 SP1, 2012, 2012 R2, 2016, 2019, 2022 including Server Core Installations |
Critical |
CVE-2024-21416 |
Workaround: No Exploited: Yes Public: Yes* |
Denial of Service Elevation of Privilege Information Disclosure Remote Code Execution |
Edge |
Chromium-based |
Moderate |
CVE-2024-38207 |
Workaround: No |
Elevation of Privilege |
Office |
365 Apps for Enterprise |
Important |
CVE-2024-38226 |
Workaround: No Exploited: Yes Public: No |
Elevation of Privilege |
SharePoint |
Enterprise Server 2016 |
Critical |
CVE-2024-38018 |
Workaround: No Exploited: No Public: No |
Denial of Service |
Dynamics 365 Business Central |
365 Business Central 2023 Release Wave 1 |
Important |
Workaround: No |
Elevation of Privilege Remote Code Execution Spoofing |
|
SQL Server |
2016 SP3 GDR |
Important |
CVE-2024-26186 |
Workaround: No |
Elevation of Privilege Information Disclosure Remote Code Execution |
Azure |
CycleCloud 8.0.0 - 8.6.3 |
Critical |
CVE-2024-38175 |
Workaround: No |
Elevation of Privilege |
Thanks as always for reading and best wishes on security,
Randy Franklin Smith
Click here to unsubscribeUltimate Windows Security is a division of Monterey Technology Group, Inc. ©2006-2024 Monterey Technology Group, All rights reserved. You may forward this email in its entirety but all other rights reserved.
9450 SW Gemini Drive #53822, Beaverton, OR 97008
Note: We do our best to provide quality information and expert commentary but use all information at your own risk.