{"id":3856,"date":"2024-07-12T13:44:33","date_gmt":"2024-07-12T18:44:33","guid":{"rendered":"https:\/\/cert.pa\/?p=3856"},"modified":"2024-07-12T13:44:35","modified_gmt":"2024-07-12T18:44:35","slug":"csirt-panama-aviso-2024-jul-11-microsoft-libera-su-paquete-de-actualizaciones","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=3856","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2024-Jul-11 Microsoft libera su paquete de actualizaciones"},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2024-Jul-11 Microsoft libera su paquete de actualizaciones<\/p>\n\n\n\n<p>Gravedad: Alta<br>Fecha de publicaci\u00f3n: Julio 12, 2024<br>\u00daltima revisi\u00f3n: Julio 12, 2024<br>https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2024-Jul<\/p>\n\n\n\n<p>Sistemas Afectados:<br>SQL Server<br>Windows CoreMessaging<br>Windows Secure Boot<br>Windows MultiPoint Services<br>Microsoft Dynamics<br>Windows Remote Access Connection Manager<br>Windows NTLM<br>Windows Cryptographic Services<br>.NET and Visual Studio<br>Microsoft Office SharePoint<br>Azure Network Watcher<br>Azure DevOps<br>Windows iSCSI<br>Windows Server Backup<br>Windows Remote Desktop<br>Windows Message Queuing<br>Windows Performance Monitor<br>Microsoft Office Outlook<br>Microsoft Office<br>Windows Image Acquisition<br>Line Printer Daemon Service (LPD)<br>Windows Themes<br>Windows Online Certificate Status Protocol (OCSP)<br>XBox Crypto Graphic Services<br>Windows PowerShell<br>Windows Filtering<br>Windows Kernel<br>Windows DHCP Server<br>NDIS<br>Windows Distributed Transaction Coordinator<br>Windows Workstation Service<br>Microsoft Graphics Component<br>Microsoft Streaming Service<br>Windows Internet Connection Sharing (ICS)<br>Microsoft Windows Codecs Library<br>Windows BitLocker<br>Windows Win32K &#8211; ICOMP<br>Role: Active Directory Certificate Services; Active Directory Domain Services<br>Windows Kernel-Mode Drivers<br>Windows TCP\/IP<br>Windows Win32K &#8211; GRFX<br>Windows Enroll Engine<br>Windows LockDown Policy (WLDP)<br>Windows Remote Desktop Licensing Service<br>Active Directory Federation Services<br>Role: Windows Hyper-V<br>Windows Win32 Kernel Subsystem<br>Azure Kinect SDK<br>Microsoft Defender for IoT<br>Microsoft WS-Discovery<br>Azure CycleCloud<br>Windows COM Session<br>Windows Fax and Scan Service<br>Windows MSHTML Platform<\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2024-Jul\">https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2024-Jul<\/a><\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>Microsoft liber\u00f3 su paquete de actualizaciones correspondientes al mes de Julio de 2024. Esto corrige 142 fallas y 4 dias cero.<br>II. Detalles<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>.NET and Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-30105\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-30105<\/a><\/td><td>.NET Core and Visual Studio Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>.NET and Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38081\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38081<\/a><\/td><td>.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>.NET and Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-35264\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-35264<\/a><\/td><td>.NET and Visual Studio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>.NET and Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38095\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38095<\/a><\/td><td>.NET and Visual Studio Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Active Directory Rights Management Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-39684\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-39684<\/a><\/td><td>Github: CVE-2024-39684 TenCent RapidJSON Elevation of Privilege Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Active Directory Rights Management Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38517\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38517<\/a><\/td><td>Github: CVE-2024-38517 TenCent RapidJSON Elevation of Privilege Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Azure CycleCloud<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38092\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38092<\/a><\/td><td>Azure CycleCloud Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure DevOps<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-35266\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-35266<\/a><\/td><td>Azure DevOps Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure DevOps<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-35267\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-35267<\/a><\/td><td>Azure DevOps Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Kinect SDK<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38086\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38086<\/a><\/td><td>Azure Kinect SDK Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Network Watcher<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-35261\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-35261<\/a><\/td><td>Azure Network Watcher VM Extension Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Intel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37985\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37985<\/a><\/td><td>Arm: CVE-2024-37985 Systematic Identification and Characterization of Proprietary Prefetchers<\/td><td>Important<\/td><\/tr><tr><td>Line Printer Daemon Service (LPD)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38027\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38027<\/a><\/td><td>Windows Line Printer Daemon Service Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Defender for IoT<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38089\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38089<\/a><\/td><td>Microsoft Defender for IoT Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-30061\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-30061<\/a><\/td><td>Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38079\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38079<\/a><\/td><td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38051\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38051<\/a><\/td><td>Windows Graphics Component Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38021\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38021<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Outlook<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38020\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38020<\/a><\/td><td>Microsoft Outlook Spoofing Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38024\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38024<\/a><\/td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38023\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38023<\/a><\/td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-32987\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-32987<\/a><\/td><td>Microsoft SharePoint Server Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38094\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38094<\/a><\/td><td>Microsoft SharePoint Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Streaming Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38057\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38057<\/a><\/td><td>Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Streaming Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38054\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38054<\/a><\/td><td>Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Streaming Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38052\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38052<\/a><\/td><td>Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38055\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38055<\/a><\/td><td>Microsoft Windows Codecs Library Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38056\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38056<\/a><\/td><td>Microsoft Windows Codecs Library Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft WS-Discovery<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38091\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38091<\/a><\/td><td>Microsoft WS-Discovery Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>NDIS<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38048\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38048<\/a><\/td><td>Windows Network Driver Interface Specification (NDIS) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>NPS RADIUS Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-3596\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-3596<\/a><\/td><td>CERT\/CC: CVE-2024-3596 RADIUS Protocol Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Active Directory Certificate Services; Active Directory Domain Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38061\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38061<\/a><\/td><td>DCOM Remote Cross-Session Activation Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Windows Hyper-V<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38080\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38080<\/a><\/td><td>Windows Hyper-V Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-28928\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-28928<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38088\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38088<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-20701\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-20701<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21317\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21317<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21331\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21331<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21308\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21308<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21333\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21333<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-35256\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-35256<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21303\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21303<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21335\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21335<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-35271\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-35271<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-35272\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-35272<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21332\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21332<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38087\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38087<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21425\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21425<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21449\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21449<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37324\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37324<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37330\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37330<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37326\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37326<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37329\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37329<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37328\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37328<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37327\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37327<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37334\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37334<\/a><\/td><td>Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37321\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37321<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37320\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37320<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37319\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37319<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37322\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37322<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37333\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37333<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37336\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37336<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37323\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37323<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37331\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37331<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21398\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21398<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21373\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21373<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37318\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37318<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21428\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21428<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21415\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21415<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37332\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37332<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21414\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21414<\/a><\/td><td>SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows BitLocker<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38058\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38058<\/a><\/td><td>BitLocker Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows COM Session<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38100\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38100<\/a><\/td><td>Windows File Explorer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows CoreMessaging<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21417\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-21417<\/a><\/td><td>Windows Text Services Framework Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Cryptographic Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-30098\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-30098<\/a><\/td><td>Windows Cryptographic Services Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DHCP Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38044\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38044<\/a><\/td><td>DHCP Server Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Distributed Transaction Coordinator<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38049\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38049<\/a><\/td><td>Windows Distributed Transaction Coordinator Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Enroll Engine<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38069\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38069<\/a><\/td><td>Windows Enroll Engine Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Fax and Scan Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38104\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38104<\/a><\/td><td>Windows Fax Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Filtering<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38034\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38034<\/a><\/td><td>Windows Filtering Platform Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Image Acquisition<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38022\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38022<\/a><\/td><td>Windows Image Acquisition Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Imaging Component<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38060\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38060<\/a><\/td><td>Windows Imaging Component Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Internet Connection Sharing (ICS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38105\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38105<\/a><\/td><td>Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Internet Connection Sharing (ICS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38053\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38053<\/a><\/td><td>Windows Layer-2 Bridge Network Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Internet Connection Sharing (ICS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38102\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38102<\/a><\/td><td>Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Internet Connection Sharing (ICS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38101\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38101<\/a><\/td><td>Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows iSCSI<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-35270\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-35270<\/a><\/td><td>Windows iSCSI Service Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38041\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38041<\/a><\/td><td>Windows Kernel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel-Mode Drivers<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38062\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38062<\/a><\/td><td>Windows Kernel-Mode Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows LockDown Policy (WLDP)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38070\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38070<\/a><\/td><td>Windows LockDown Policy (WLDP) Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Message Queuing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38017\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38017<\/a><\/td><td>Microsoft Message Queuing Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows MSHTML Platform<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38112\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38112<\/a><\/td><td>Windows MSHTML Platform Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows MultiPoint Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-30013\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-30013<\/a><\/td><td>Windows MultiPoint Services Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTLM<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-30081\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-30081<\/a><\/td><td>Windows NTLM Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Online Certificate Status Protocol (OCSP)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38068\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38068<\/a><\/td><td>Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Online Certificate Status Protocol (OCSP)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38067\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38067<\/a><\/td><td>Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Online Certificate Status Protocol (OCSP)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38031\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38031<\/a><\/td><td>Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Performance Monitor<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38028\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38028<\/a><\/td><td>Microsoft Windows Performance Data Helper Library Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Performance Monitor<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38019\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38019<\/a><\/td><td>Microsoft Windows Performance Data Helper Library Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Performance Monitor<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38025\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38025<\/a><\/td><td>Microsoft Windows Performance Data Helper Library Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows PowerShell<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38043\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38043<\/a><\/td><td>PowerShell Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows PowerShell<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38047\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38047<\/a><\/td><td>PowerShell Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows PowerShell<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38033\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38033<\/a><\/td><td>PowerShell Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Access Connection Manager<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-30071\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-30071<\/a><\/td><td>Windows Remote Access Connection Manager Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Access Connection Manager<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-30079\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-30079<\/a><\/td><td>Windows Remote Access Connection Manager Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Desktop<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38076\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38076<\/a><\/td><td>Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Remote Desktop<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38015\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38015<\/a><\/td><td>Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Desktop Licensing Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38071\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38071<\/a><\/td><td>Windows Remote Desktop Licensing Service Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Desktop Licensing Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38073\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38073<\/a><\/td><td>Windows Remote Desktop Licensing Service Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Desktop Licensing Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38074\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38074<\/a><\/td><td>Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Remote Desktop Licensing Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38072\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38072<\/a><\/td><td>Windows Remote Desktop Licensing Service Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Desktop Licensing Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38077\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38077<\/a><\/td><td>Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Remote Desktop Licensing Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38099\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38099<\/a><\/td><td>Windows Remote Desktop Licensing Service Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Boot<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38065\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38065<\/a><\/td><td>Secure Boot Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Boot<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37986\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37986<\/a><\/td><td>Secure Boot Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Boot<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37981\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37981<\/a><\/td><td>Secure Boot Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Boot<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37987\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37987<\/a><\/td><td>Secure Boot Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Boot<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-28899\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-28899<\/a><\/td><td>Secure Boot Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Boot<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-26184\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-26184<\/a><\/td><td>Secure Boot Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Boot<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38011\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38011<\/a><\/td><td>Secure Boot Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Boot<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37984\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37984<\/a><\/td><td>Secure Boot Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Boot<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37988\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37988<\/a><\/td><td>Secure Boot Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Boot<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37977\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37977<\/a><\/td><td>Secure Boot Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Boot<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37978\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37978<\/a><\/td><td>Secure Boot Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Boot<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37974\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37974<\/a><\/td><td>Secure Boot Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Boot<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38010\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38010<\/a><\/td><td>Secure Boot Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Boot<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37989\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37989<\/a><\/td><td>Secure Boot Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Boot<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37970\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37970<\/a><\/td><td>Secure Boot Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Boot<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37975\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37975<\/a><\/td><td>Secure Boot Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Boot<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37972\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37972<\/a><\/td><td>Secure Boot Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Boot<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37973\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37973<\/a><\/td><td>Secure Boot Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Boot<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37971\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37971<\/a><\/td><td>Secure Boot Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Boot<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37969\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37969<\/a><\/td><td>Secure Boot Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Server Backup<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38013\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38013<\/a><\/td><td>Microsoft Windows Server Backup Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows TCP\/IP<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38064\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38064<\/a><\/td><td>Windows TCP\/IP Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Themes<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38030\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38030<\/a><\/td><td>Windows Themes Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Win32 Kernel Subsystem<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38085\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38085<\/a><\/td><td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Win32K &#8211; GRFX<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38066\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38066<\/a><\/td><td>Windows Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Win32K &#8211; ICOMP<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38059\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38059<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Workstation Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38050\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38050<\/a><\/td><td>Windows Workstation Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>XBox Crypto Graphic Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38032\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38032<\/a><\/td><td>Microsoft Xbox Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>XBox Crypto Graphic Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38078\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38078<\/a><\/td><td>Xbox Wireless Adapter Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informacion<br>Se recomiendo actualizar con Widnows Update o herramientas de administracion de parches.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>CSIRT PANAMA<br>Computer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>E-Mail: info@cert.pa<br>Phone: +507 520-CERT (2378)<br>Web: https:\/\/cert.pa<br>Twitter: @CSIRTPanama<br>Key ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2024-Jul-11 Microsoft libera su paquete de actualizaciones Gravedad: AltaFecha de publicaci\u00f3n: Julio 12, 2024\u00daltima revisi\u00f3n: Julio 12, 2024https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2024-Jul Sistemas Afectados:SQL ServerWindows CoreMessagingWindows Secure BootWindows MultiPoint ServicesMicrosoft DynamicsWindows Remote Access Connection ManagerWindows NTLMWindows&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[66],"tags":[76,72,9,73,68,45,94],"class_list":["post-3856","post","type-post","status-publish","format-standard","hentry","category-csirt-panama","tag-actualizaciones","tag-avisos-de-seguridad","tag-microsoft","tag-parches","tag-vulnerabilidades","tag-windows","tag-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3856","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3856"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3856\/revisions"}],"predecessor-version":[{"id":3857,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3856\/revisions\/3857"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3856"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3856"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3856"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}