<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Microsoft Fixes 149 Flaws in Huge April Patch Release, Zero-Days Included in Threats</title>
    <link>https://community.isc2.org/t5/Threats/Microsoft-Fixes-149-Flaws-in-Huge-April-Patch-Release-Zero-Days/m-p/69434#M1174</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Microsoft has released security updates for the month of April 2024 to remediate a record &lt;A href="https://msrc.microsoft.com/update-guide/releaseNote/2024-Apr" target="_blank" rel="noopener"&gt;149 flaws&lt;/A&gt;, two of which have come under active exploitation in the wild.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Of the 149 flaws, three are rated Critical, 142 are rated Important, three are rated Moderate, and one is rated Low in severity. The update is aside from &lt;A href="https://learn.microsoft.com/en-us/deployedge/microsoft-edge-relnotes-security" target="_blank" rel="noopener"&gt;21 vulnerabilities&lt;/A&gt; that the company addressed in its Chromium-based Edge browser following the release of the &lt;A href="https://thehackernews.com/2024/03/microsofts-march-updates-fix-61.html" target="_blank" rel="noopener"&gt;March 2024 Patch Tuesday fixes&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;The two shortcomings that have come under active exploitation are below -&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;A href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26234" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;CVE-2024-26234&lt;/STRONG&gt;&lt;/A&gt; (CVSS score: 6.7) - Proxy Driver Spoofing Vulnerability&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29988" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;CVE-2024-29988&lt;/STRONG&gt;&lt;/A&gt; (CVSS score: 8.8) - SmartScreen Prompt Security Feature Bypass Vulnerability&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;A href="https://thehackernews.com/2024/04/microsoft-fixes-149-flaws-in-huge-april.html" target="_blank" rel="noopener"&gt;https://thehackernews.com/2024/04/microsoft-fixes-149-flaws-in-huge-april.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
    <pubDate>Fri, 12 Apr 2024 05:34:51 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2024-04-12T05:34:51Z</dc:date>
    <item>
      <title>Microsoft Fixes 149 Flaws in Huge April Patch Release, Zero-Days Included</title>
      <link>https://community.isc2.org/t5/Threats/Microsoft-Fixes-149-Flaws-in-Huge-April-Patch-Release-Zero-Days/m-p/69434#M1174</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Microsoft has released security updates for the month of April 2024 to remediate a record &lt;A href="https://msrc.microsoft.com/update-guide/releaseNote/2024-Apr" target="_blank" rel="noopener"&gt;149 flaws&lt;/A&gt;, two of which have come under active exploitation in the wild.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Of the 149 flaws, three are rated Critical, 142 are rated Important, three are rated Moderate, and one is rated Low in severity. The update is aside from &lt;A href="https://learn.microsoft.com/en-us/deployedge/microsoft-edge-relnotes-security" target="_blank" rel="noopener"&gt;21 vulnerabilities&lt;/A&gt; that the company addressed in its Chromium-based Edge browser following the release of the &lt;A href="https://thehackernews.com/2024/03/microsofts-march-updates-fix-61.html" target="_blank" rel="noopener"&gt;March 2024 Patch Tuesday fixes&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;The two shortcomings that have come under active exploitation are below -&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;A href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26234" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;CVE-2024-26234&lt;/STRONG&gt;&lt;/A&gt; (CVSS score: 6.7) - Proxy Driver Spoofing Vulnerability&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29988" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;CVE-2024-29988&lt;/STRONG&gt;&lt;/A&gt; (CVSS score: 8.8) - SmartScreen Prompt Security Feature Bypass Vulnerability&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;A href="https://thehackernews.com/2024/04/microsoft-fixes-149-flaws-in-huge-april.html" target="_blank" rel="noopener"&gt;https://thehackernews.com/2024/04/microsoft-fixes-149-flaws-in-huge-april.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 12 Apr 2024 05:34:51 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Microsoft-Fixes-149-Flaws-in-Huge-April-Patch-Release-Zero-Days/m-p/69434#M1174</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-04-12T05:34:51Z</dc:date>
    </item>
  </channel>
</rss>

