Carding Forum
Professional
- Messages
- 2,788
- Reaction score
- 1,223
- Points
- 113
Microsoft's July patch package closed a total of 142 vulnerabilities, including two breaches that are actively used in real cyber attacks, and two more with a ready-made exploit.
Among the closed holes, there are five critical ones. If exploited, they can lead to remote code execution. The vulnerability classes were distributed this month as follows:
26 privilege escalation issues;
24 ways to bypass security features;
59 remote code execution vulnerabilities;
9 bugs leading to information disclosure;
17 DoS;
7 spoofing problems.
As for the four 0-days mentioned, they received the following IDs:
CVE-2024-38080 — The ability to increase rights in Windows Hyper-V gives the attacker SYSTEM-level privileges. Microsoft admits that this gap appears in real cyber attacks, but does not disclose any details.
CVE-2024-38112 — Windows MSHTML spoofing capability. Exploiting this bug requires some preparation: the attacker will have to send the victim a malicious file to open.
CVE-2024-35264 — problem with remote code execution in .NET and Visual Studio. Here, an attacker can trigger a "race condition" by sending an http/3 stream while the request body is being processed.
CVE-2024-37985 — this gap allows an attack to be carried out through third-party channels. Previously, Microsoft called it FetchBench and claimed that cybercriminals can use it to get "secret information."
Among the closed holes, there are five critical ones. If exploited, they can lead to remote code execution. The vulnerability classes were distributed this month as follows:
26 privilege escalation issues;
24 ways to bypass security features;
59 remote code execution vulnerabilities;
9 bugs leading to information disclosure;
17 DoS;
7 spoofing problems.
As for the four 0-days mentioned, they received the following IDs:
CVE-2024-38080 — The ability to increase rights in Windows Hyper-V gives the attacker SYSTEM-level privileges. Microsoft admits that this gap appears in real cyber attacks, but does not disclose any details.
CVE-2024-38112 — Windows MSHTML spoofing capability. Exploiting this bug requires some preparation: the attacker will have to send the victim a malicious file to open.
CVE-2024-35264 — problem with remote code execution in .NET and Visual Studio. Here, an attacker can trigger a "race condition" by sending an http/3 stream while the request body is being processed.
CVE-2024-37985 — this gap allows an attack to be carried out through third-party channels. Previously, Microsoft called it FetchBench and claimed that cybercriminals can use it to get "secret information."