In July, Microsoft closed 142 holes, including four zero-day vulnerabilities

Carding Forum

Professional
Messages
2,788
Reaction score
1,223
Points
113
Microsoft's July patch package closed a total of 142 vulnerabilities, including two breaches that are actively used in real cyber attacks, and two more with a ready-made exploit.

Among the closed holes, there are five critical ones. If exploited, they can lead to remote code execution. The vulnerability classes were distributed this month as follows:
26 privilege escalation issues;
24 ways to bypass security features;
59 remote code execution vulnerabilities;
9 bugs leading to information disclosure;
17 DoS;
7 spoofing problems.

As for the four 0-days mentioned, they received the following IDs:
CVE-2024-38080 — The ability to increase rights in Windows Hyper-V gives the attacker SYSTEM-level privileges. Microsoft admits that this gap appears in real cyber attacks, but does not disclose any details.
CVE-2024-38112 — Windows MSHTML spoofing capability. Exploiting this bug requires some preparation: the attacker will have to send the victim a malicious file to open.
CVE-2024-35264 — problem with remote code execution in .NET and Visual Studio. Here, an attacker can trigger a "race condition" by sending an http/3 stream while the request body is being processed.
CVE-2024-37985 — this gap allows an attack to be carried out through third-party channels. Previously, Microsoft called it FetchBench and claimed that cybercriminals can use it to get "secret information."
 
Top