Microsoft on Tuesday shipped fixes to address a total of 90 security flaws, including 10 zero-days, of which six have come under active exploitation in the wild.
Of the 90 bugs, nine are rated Critical, 80 are rated Important, and one is rated Moderate in severity. This is also in addition to 36 vulnerabilities that the tech giant resolved in its Edge browser since last month.
The Patch Tuesday
A vulnerability was found in JetGridBuilder Plugin up to 1.1.2 on WordPress. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to file inclusion.
This vulnerability is handled as CVE-2024-43221. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability was found in Sheet to Table Live Sync for Google Sheet Plugin up to 1.0.1 on WordPress. It has been declared as problematic. Affected by this vulnerability is the function STWT_Sheet_Table of the component Shortcode Handler. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-6532. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in WP Search Analytics Plugin up to 1.4.9 on WordPress. It has been classified as critical. Affected is an unknown function. The manipulation leads to missing authorization.
This vulnerability is traded as CVE-2024-43229. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in myCred Plugin up to 2.7.2 on WordPress and classified as problematic. This issue affects some unknown processing. The manipulation leads to information disclosure.
The identification of this vulnerability is CVE-2024-43214. The attack may be initiated remotely. There is no exploit available.
A vulnerability has been found in Social Slider Feed Plugin up to 2.2.1 on WordPress and classified as critical. This vulnerability affects unknown code. The manipulation leads to missing authorization.
This vulnerability was named CVE-2024-43215. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in WpTravelly Plugin up to 1.7.7 on WordPress. This affects an unknown part. The manipulation leads to missing authorization.
This vulnerability is uniquely identified as CVE-2024-43212. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Send Emails with Mandrill Plugin up to 1.3.1 on WordPress. Affected by this issue is some unknown functionality. The manipulation leads to missing authorization.
This vulnerability is handled as CVE-2024-43208. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as critical was found in Bitly Plugin up to 2.7.2 on WordPress. Affected by this vulnerability is an unknown functionality. The manipulation leads to missing authorization.
This vulnerability is known as CVE-2024-43209. The attack can be launched remotely. There is no exploit available.
A vulnerability classified as problematic has been found in Meta Box Plugin up to 5.9.10 on WordPress. Affected is an unknown function. The manipulation leads to missing authorization.
This vulnerability is traded as CVE-2024-43235. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Ivanti Avalanche up to 6.4.3. It has been declared as critical. This vulnerability affects unknown code of the component SmartDeviceServer. The manipulation leads to xml external entity reference.
This vulnerability was named CVE-2024-38653. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Ivanti Avalanche up to 6.4.3. It has been classified as critical. This affects an unknown part of the component Skin Management. The manipulation leads to denial of service.
This vulnerability is uniquely identified as CVE-2024-38652. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.