Microsoft December 2024 Patch Tuesday fixes 1 exploited zero-day, 71 flaws Cybernoz December 10, 2024 Posted in Bleeping ComputerShare: XFacebookPinterestRedditVKDiggLinkedinMix TagCVE IDCVE TitleSeverityGitHubCVE-2024-49063Microsoft/Muzic Remote Code Execution VulnerabilityImportantMicrosoft Defender for EndpointCVE-2024-49057Microsoft Defender for Endpoint on Android Spoofing VulnerabilityImportantMicrosoft Edge (Chromium-based)CVE-2024-12053Chromium: CVE-2024-12053 Type Confusion in V8UnknownMicrosoft Edge (Chromium-based)CVE-2024-49041Microsoft Edge (Chromium-based) Spoofing VulnerabilityModerateMicrosoft OfficeADV240002Microsoft Office Defense in Depth UpdateModerateMicrosoft OfficeCVE-2024-49059Microsoft Office Elevation of Privilege VulnerabilityImportantMicrosoft OfficeCVE-2024-43600Microsoft Office Elevation of Privilege VulnerabilityImportantMicrosoft Office AccessCVE-2024-49142Microsoft Access Remote Code Execution VulnerabilityImportantMicrosoft Office ExcelCVE-2024-49069Microsoft Excel Remote Code Execution VulnerabilityImportantMicrosoft Office PublisherCVE-2024-49079Input Method Editor (IME) Remote Code Execution VulnerabilityImportantMicrosoft Office SharePointCVE-2024-49064Microsoft SharePoint Information Disclosure VulnerabilityImportantMicrosoft Office SharePointCVE-2024-49062Microsoft SharePoint Information Disclosure VulnerabilityImportantMicrosoft Office SharePointCVE-2024-49068Microsoft SharePoint Elevation of Privilege VulnerabilityImportantMicrosoft Office SharePointCVE-2024-49070Microsoft SharePoint Remote Code Execution VulnerabilityImportantMicrosoft Office WordCVE-2024-49065Microsoft Office Remote Code Execution VulnerabilityImportantRole: DNS ServerCVE-2024-49091Windows Domain Name Service Remote Code Execution VulnerabilityImportantRole: Windows Hyper-VCVE-2024-49117Windows Hyper-V Remote Code Execution VulnerabilityCriticalSystem Center Operations ManagerCVE-2024-43594System Center Operations Manager Elevation of Privilege VulnerabilityImportantWindows Cloud Files Mini Filter DriverCVE-2024-49114Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilityImportantWindows Common Log File System DriverCVE-2024-49088Windows Common Log File System Driver Elevation of Privilege VulnerabilityImportantWindows Common Log File System DriverCVE-2024-49138Windows Common Log File System Driver Elevation of Privilege VulnerabilityImportantWindows Common Log File System DriverCVE-2024-49090Windows Common Log File System Driver Elevation of Privilege VulnerabilityImportantWindows File ExplorerCVE-2024-49082Windows File Explorer Information Disclosure VulnerabilityImportantWindows IP Routing Management SnapinCVE-2024-49080Windows IP Routing Management Snapin Remote Code Execution VulnerabilityImportantWindows KernelCVE-2024-49084Windows Kernel Elevation of Privilege VulnerabilityImportantWindows Kernel-Mode DriversCVE-2024-49074Windows Kernel-Mode Driver Elevation of Privilege VulnerabilityImportantWindows LDAP – Lightweight Directory Access ProtocolCVE-2024-49121Windows Lightweight Directory Access Protocol (LDAP) Denial of Service VulnerabilityImportantWindows LDAP – Lightweight Directory Access ProtocolCVE-2024-49124Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution VulnerabilityCriticalWindows LDAP – Lightweight Directory Access ProtocolCVE-2024-49112Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution VulnerabilityCriticalWindows LDAP – Lightweight Directory Access ProtocolCVE-2024-49113Windows Lightweight Directory Access Protocol (LDAP) Denial of Service VulnerabilityImportantWindows LDAP – Lightweight Directory Access ProtocolCVE-2024-49127Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution VulnerabilityCriticalWindows Local Security Authority Subsystem Service (LSASS)CVE-2024-49126Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution VulnerabilityCriticalWindows Message QueuingCVE-2024-49118Microsoft Message Queuing (MSMQ) Remote Code Execution VulnerabilityCriticalWindows Message QueuingCVE-2024-49122Microsoft Message Queuing (MSMQ) Remote Code Execution VulnerabilityCriticalWindows Message QueuingCVE-2024-49096Microsoft Message Queuing (MSMQ) Denial of Service VulnerabilityImportantWindows Mobile BroadbandCVE-2024-49073Windows Mobile Broadband Driver Elevation of Privilege VulnerabilityImportantWindows Mobile BroadbandCVE-2024-49077Windows Mobile Broadband Driver Elevation of Privilege VulnerabilityImportantWindows Mobile BroadbandCVE-2024-49083Windows Mobile Broadband Driver Elevation of Privilege VulnerabilityImportantWindows Mobile BroadbandCVE-2024-49092Windows Mobile Broadband Driver Elevation of Privilege VulnerabilityImportantWindows Mobile BroadbandCVE-2024-49087Windows Mobile Broadband Driver Information Disclosure VulnerabilityImportantWindows Mobile BroadbandCVE-2024-49110Windows Mobile Broadband Driver Elevation of Privilege VulnerabilityImportantWindows Mobile BroadbandCVE-2024-49078Windows Mobile Broadband Driver Elevation of Privilege VulnerabilityImportantWindows PrintWorkflowUserSvcCVE-2024-49095Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportantWindows PrintWorkflowUserSvcCVE-2024-49097Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportantWindows Remote DesktopCVE-2024-49132Windows Remote Desktop Services Remote Code Execution VulnerabilityCriticalWindows Remote Desktop ServicesCVE-2024-49115Windows Remote Desktop Services Remote Code Execution VulnerabilityCriticalWindows Remote Desktop ServicesCVE-2024-49116Windows Remote Desktop Services Remote Code Execution VulnerabilityCriticalWindows Remote Desktop ServicesCVE-2024-49123Windows Remote Desktop Services Remote Code Execution VulnerabilityCriticalWindows Remote Desktop ServicesCVE-2024-49129Windows Remote Desktop Gateway (RD Gateway) Denial of Service VulnerabilityImportantWindows Remote Desktop ServicesCVE-2024-49075Windows Remote Desktop Services Denial of Service VulnerabilityImportantWindows Remote Desktop ServicesCVE-2024-49128Windows Remote Desktop Services Remote Code Execution VulnerabilityCriticalWindows Remote Desktop ServicesCVE-2024-49106Windows Remote Desktop Services Remote Code Execution VulnerabilityCriticalWindows Remote Desktop ServicesCVE-2024-49108Windows Remote Desktop Services Remote Code Execution VulnerabilityCriticalWindows Remote Desktop ServicesCVE-2024-49119Windows Remote Desktop Services Remote Code Execution VulnerabilityCriticalWindows Remote Desktop ServicesCVE-2024-49120Windows Remote Desktop Services Remote Code Execution VulnerabilityCriticalWindows Resilient File System (ReFS)CVE-2024-49093Windows Resilient File System (ReFS) Elevation of Privilege VulnerabilityImportantWindows Routing and Remote Access Service (RRAS)CVE-2024-49085Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityImportantWindows Routing and Remote Access Service (RRAS)CVE-2024-49086Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityImportantWindows Routing and Remote Access Service (RRAS)CVE-2024-49089Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityImportantWindows Routing and Remote Access Service (RRAS)CVE-2024-49125Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityImportantWindows Routing and Remote Access Service (RRAS)CVE-2024-49104Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityImportantWindows Routing and Remote Access Service (RRAS)CVE-2024-49102Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityImportantWindows Task SchedulerCVE-2024-49072Windows Task Scheduler Elevation of Privilege VulnerabilityImportantWindows Virtualization-Based Security (VBS) EnclaveCVE-2024-49076Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege VulnerabilityImportantWindows Wireless Wide Area Network ServiceCVE-2024-49081Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege VulnerabilityImportantWindows Wireless Wide Area Network ServiceCVE-2024-49103Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure VulnerabilityImportantWindows Wireless Wide Area Network ServiceCVE-2024-49111Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege VulnerabilityImportantWindows Wireless Wide Area Network ServiceCVE-2024-49109Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege VulnerabilityImportantWindows Wireless Wide Area Network ServiceCVE-2024-49101Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege VulnerabilityImportantWindows Wireless Wide Area Network ServiceCVE-2024-49094Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege VulnerabilityImportantWindows Wireless Wide Area Network ServiceCVE-2024-49098Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure VulnerabilityImportantWindows Wireless Wide Area Network ServiceCVE-2024-49099Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure VulnerabilityImportantWmsRepair ServiceCVE-2024-49107WmsRepair Service Elevation of Privilege VulnerabilityImportant Source link Related Articles Critical Microsoft SharePoint bug now actively exploited Checkout.com snubs hackers after data breach, to donate ransom instead Chinese hackers use Quad7 botnet to steal credentials Twitter bug let legacy verified accounts get the blue check back