{"id":1439116,"date":"2024-11-13T11:21:30","date_gmt":"2024-11-13T09:21:30","guid":{"rendered":"https:\/\/windowsreport.com\/?p=1439116"},"modified":"2024-11-13T14:54:01","modified_gmt":"2024-11-13T12:54:01","slug":"the-november-2024-patch-tuesday-adresses-91-vulnerabilities-including-4-zero-day-ones","status":"publish","type":"post","link":"https:\/\/windowsreport.com\/the-november-2024-patch-tuesday-adresses-91-vulnerabilities-including-4-zero-day-ones\/","title":{"rendered":"The November 2024 Patch Tuesday adresses 91 vulnerabilities, including 4 zero-day ones"},"content":{"rendered":"\n<p>The November 2024 Patch Tuesday security updates have fixed 91 flaws, which include 4 zero-day vulnerabilities. As with most Patch Tuesday releases, November&#8217;s updates include fixes for Windows, Office, .NET, Visual Studio, SQL Server, and more vulnerabilities.<\/p>\n\n\n\n<p>This month&#8217;s fixes list includes: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>26 elevations of privilege vulnerabilities <\/li>\n\n\n\n<li>2 security feature bypass vulnerabilities <\/li>\n\n\n\n<li>52 remote code execution vulnerabilities <\/li>\n\n\n\n<li>1 information disclosure vulnerability<\/li>\n\n\n\n<li>4 denial of service vulnerabilities<\/li>\n\n\n\n<li>3 spoofing vulnerabilities<\/li>\n<\/ul>\n\n\n\n<p>Two of the zero-days fixed today are actively exploited in attacks, and the third was publicly disclosed but not exploited.<\/p>\n\n\n\n<p><strong>CVE-2024-43451 &#8211; NTLM Hash Disclosure Spoofing Vulnerability<\/strong><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>This vulnerability discloses a user&#8217;s NTLMv2 hash to the attacker who could use this to authenticate as the user. Minimal interaction with a malicious file by a user such as selecting (single-click), inspecting (right-click), or performing an action other than opening or executing could trigger this vulnerability.<\/p>\n<\/blockquote>\n\n\n\n<p><strong>CVE-2024-49039 &#8211; Windows Task Scheduler Elevation of Privilege Vulnerability<\/strong><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>In this case, a successful attack could be performed from a low privilege AppContainer. The attacker could elevate their privileges and execute code or access resources at a higher integrity level than that of the AppContainer execution environment.<\/p>\n<\/blockquote>\n\n\n\n<p><strong>CVE-2024-49040 &#8211; Microsoft Exchange Server Spoofing Vulnerability<\/strong><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Microsoft is aware of a vulnerability (CVE-2024-49040) that allows attackers to run spoofing attacks against Microsoft Exchange Server. The vulnerability is caused by the current implementation of the P2 FROM header verification, which happens in transport.<\/p>\n<\/blockquote>\n\n\n\n<p><strong>CVE-2024-49019 &#8211; Active Directory Certificate Services Elevation of Privilege Vulnerability<\/strong><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Check if you have published any certificates created using a version 1 certificate template where the Source of subject name is set to &#8220;Supplied in the request&#8221; and the Enroll permissions are granted to a broader set of accounts, such as domain users or domain computers. An example is the built-in Web Server template, but it is not vulnerable by default due to its restricted Enroll permissions.<\/p>\n<\/blockquote>\n\n\n\n<p>Here&#8217;s the complete list of all the vulnerabilities Microsoft addresses with the November 2024 Patch Tuesday update.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>.NET and Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43499\">CVE-2024-43499<\/a><\/td><td>.NET and Visual Studio Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>.NET and Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43498\">CVE-2024-43498<\/a><\/td><td>.NET and Visual Studio Remote Code Execution Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Airlift.microsoft.com<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49056\">CVE-2024-49056<\/a><\/td><td>Airlift.microsoft.com Elevation of Privilege Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Azure CycleCloud<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43602\">CVE-2024-43602<\/a><\/td><td>Azure CycleCloud Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>LightGBM<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43598\">CVE-2024-43598<\/a><\/td><td>LightGBM Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Defender for Endpoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-5535\">CVE-2024-5535<\/a><\/td><td>OpenSSL: CVE-2024-5535 SSL_select_next_proto buffer overread<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-10826\">CVE-2024-10826<\/a><\/td><td>Chromium: CVE-2024-10826 Use after free in Family Experiences<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-10827\">CVE-2024-10827<\/a><\/td><td>Chromium: CVE-2024-10827 Use after free in Serial<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49040\">CVE-2024-49040<\/a><\/td><td>Microsoft Exchange Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49031\">CVE-2024-49031<\/a><\/td><td>Microsoft Office Graphics Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49032\">CVE-2024-49032<\/a><\/td><td>Microsoft Office Graphics Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49029\">CVE-2024-49029<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49026\">CVE-2024-49026<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49027\">CVE-2024-49027<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49028\">CVE-2024-49028<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49030\">CVE-2024-49030<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497ADV240001\">ADV240001<\/a><\/td><td>Microsoft SharePoint Server Defense in Depth Update<\/td><td>None<\/td><\/tr><tr><td>Microsoft Office Word<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49033\">CVE-2024-49033<\/a><\/td><td>Microsoft Word Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft PC Manager<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49051\">CVE-2024-49051<\/a><\/td><td>Microsoft PC Manager Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Virtual Hard Drive<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-38264\">CVE-2024-38264<\/a><\/td><td>Microsoft Virtual Hard Disk (VHDX) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows DNS<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43450\">CVE-2024-43450<\/a><\/td><td>Windows DNS Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Windows Active Directory Certificate Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49019\">CVE-2024-49019<\/a><\/td><td>Active Directory Certificate Services Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Windows Hyper-V<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43633\">CVE-2024-43633<\/a><\/td><td>Windows Hyper-V Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Windows Hyper-V<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43624\">CVE-2024-43624<\/a><\/td><td>Windows Hyper-V Shared Virtual Disk Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-48998\">CVE-2024-48998<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-48997\">CVE-2024-48997<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-48993\">CVE-2024-48993<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49001\">CVE-2024-49001<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49000\">CVE-2024-49000<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-48999\">CVE-2024-48999<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49043\">CVE-2024-49043<\/a><\/td><td>Microsoft.SqlServer.XEvent.Configuration.dll Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43462\">CVE-2024-43462<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-48995\">CVE-2024-48995<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-48994\">CVE-2024-48994<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-38255\">CVE-2024-38255<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-48996\">CVE-2024-48996<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43459\">CVE-2024-43459<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49002\">CVE-2024-49002<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49013\">CVE-2024-49013<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49014\">CVE-2024-49014<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49011\">CVE-2024-49011<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49012\">CVE-2024-49012<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49015\">CVE-2024-49015<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49018\">CVE-2024-49018<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49021\">CVE-2024-49021<\/a><\/td><td>Microsoft SQL Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49016\">CVE-2024-49016<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49017\">CVE-2024-49017<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49010\">CVE-2024-49010<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49005\">CVE-2024-49005<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49007\">CVE-2024-49007<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49003\">CVE-2024-49003<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49004\">CVE-2024-49004<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49006\">CVE-2024-49006<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49009\">CVE-2024-49009<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49008\">CVE-2024-49008<\/a><\/td><td>SQL Server Native Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>TorchGeo<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49048\">CVE-2024-49048<\/a><\/td><td>TorchGeo Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49044\">CVE-2024-49044<\/a><\/td><td>Visual Studio Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio Code<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49050\">CVE-2024-49050<\/a><\/td><td>Visual Studio Code Python Extension Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio Code<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49049\">CVE-2024-49049<\/a><\/td><td>Visual Studio Code Remote Extension Elevation of Privilege Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Windows CSC Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43644\">CVE-2024-43644<\/a><\/td><td>Windows Client-Side Caching Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Defender Application Control (WDAC)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43645\">CVE-2024-43645<\/a><\/td><td>Windows Defender Application Control (WDAC) Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DWM Core Library<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43636\">CVE-2024-43636<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DWM Core Library<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43629\">CVE-2024-43629<\/a><\/td><td>Windows DWM Core Library Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kerberos<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43639\">CVE-2024-43639<\/a><\/td><td>Windows Kerberos Remote Code Execution Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43630\">CVE-2024-43630<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NT OS Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43623\">CVE-2024-43623<\/a><\/td><td>Windows NT OS Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTLM<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43451\">CVE-2024-43451<\/a><\/td><td>NTLM Hash Disclosure Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Package Library Manager<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-38203\">CVE-2024-38203<\/a><\/td><td>Windows Package Library Manager Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Registry<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43641\">CVE-2024-43641<\/a><\/td><td>Windows Registry Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Registry<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43452\">CVE-2024-43452<\/a><\/td><td>Windows Registry Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Kernel Mode<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43631\">CVE-2024-43631<\/a><\/td><td>Windows Secure Kernel Mode Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Kernel Mode<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43646\">CVE-2024-43646<\/a><\/td><td>Windows Secure Kernel Mode Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Kernel Mode<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43640\">CVE-2024-43640<\/a><\/td><td>Windows Kernel-Mode Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows SMB<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43642\">CVE-2024-43642<\/a><\/td><td>Windows SMB Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows SMBv3 Client\/Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43447\">CVE-2024-43447<\/a><\/td><td>Windows SMBv3 Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Task Scheduler<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49039\">CVE-2024-49039<\/a><\/td><td>Windows Task Scheduler Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43628\">CVE-2024-43628<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43621\">CVE-2024-43621<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43620\">CVE-2024-43620<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43627\">CVE-2024-43627<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43635\">CVE-2024-43635<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43622\">CVE-2024-43622<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43626\">CVE-2024-43626<\/a><\/td><td>Windows Telephony Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Update Stack<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43530\">CVE-2024-43530<\/a><\/td><td>Windows Update Stack Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows USB Video Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43643\">CVE-2024-43643<\/a><\/td><td>Windows USB Video Class System Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows USB Video Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43449\">CVE-2024-43449<\/a><\/td><td>Windows USB Video Class System Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows USB Video Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43637\">CVE-2024-43637<\/a><\/td><td>Windows USB Video Class System Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows USB Video Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43634\">CVE-2024-43634<\/a><\/td><td>Windows USB Video Class System Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows USB Video Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43638\">CVE-2024-43638<\/a><\/td><td>Windows USB Video Class System Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows VMSwitch<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-43625\">CVE-2024-43625<\/a><\/td><td>Microsoft Windows VMSwitch Elevation of Privilege Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Windows Win32 Kernel Subsystem<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497CVE-2024-49046\">CVE-2024-49046<\/a><\/td><td>Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>In addition to the above vulnerabilities, Microsoft has also fixed a bug in Windows that caused blue screens on Windows Server 2025 devices. The problem would occur during backups or deduplication jobs.<\/p>\n\n\n\n<p>Furthermore, a new update for Microsoft Exchange Server 2025 adds a warning to emails that could be abusing the CVE-2024-49040 vulnerability.<\/p>\n\n\n\n<p>Microsoft released the November 2024 Patch Tuesday updates for <a href=\"https:\/\/windowsreport.com\/windows-10s-latest-kb5046613-fixes-the-bug-that-caused-apps-to-not-work-unless-you-accessed-them-with-admin-rights\/\">Windows 10<\/a> and <a href=\"https:\/\/windowsreport.com\/patch-tuesdays-kb5046617-patch-for-windows-11-fixed-this-annoying-wsl-bug\/\">Windows 11<\/a>, managing to fix some frustrating issues on these operating systems.<\/p>\n\n\n\n<p>Windows users can get the November 2024 Patch Tuesday updates via Windows Update, Microsoft Update, or downloading them from the Microsoft Update Catalog website.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The November 2024 Patch Tuesday security updates have fixed 91 flaws, which include 4 zero-day vulnerabilities. As with most Patch Tuesday releases, November&#8217;s updates include fixes for Windows, Office, .NET, Visual Studio, SQL Server, and more vulnerabilities. This month&#8217;s fixes list includes: Two of the zero-days fixed today are actively exploited in attacks, and the [&hellip;]<\/p>\n","protected":false},"author":2271,"featured_media":1439135,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_enabled_clarity":"","footnotes":""},"categories":[4],"tags":[181,170,135431],"work":[],"class_list":["post-1439116","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-patch-tuesday","tag-windows-10","tag-windows-11"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.8 (Yoast SEO v23.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Get the latest Patch Tuesday updates as soon as possible otherwise your PC might be in danger<\/title>\n<meta name=\"description\" content=\"The Patch Tuesday updates for November 2024 are here and you should get them as soon as possible otherwise your PC might be in danger.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/windowsreport.com\/the-november-2024-patch-tuesday-adresses-91-vulnerabilities-including-4-zero-day-ones\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The November 2024 Patch Tuesday adresses 91 vulnerabilities, including 4 zero-day ones\" \/>\n<meta property=\"og:description\" content=\"The Patch Tuesday updates for November 2024 are here and you should get them as soon as possible otherwise your PC might be in danger.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/windowsreport.com\/the-november-2024-patch-tuesday-adresses-91-vulnerabilities-including-4-zero-day-ones\/\" \/>\n<meta property=\"og:site_name\" content=\"Windows Report\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/WindowsReport\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-13T09:21:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-13T12:54:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/windowsreport.com\/wp-content\/uploads\/2024\/11\/400-million-2024-11-13T111443.224.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Flavius Floare\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@flaviuszs\" \/>\n<meta name=\"twitter:site\" content=\"@WindowsRep\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Flavius Floare\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/windowsreport.com\/the-november-2024-patch-tuesday-adresses-91-vulnerabilities-including-4-zero-day-ones\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/windowsreport.com\/the-november-2024-patch-tuesday-adresses-91-vulnerabilities-including-4-zero-day-ones\/\"},\"author\":{\"name\":\"Flavius Floare\",\"@id\":\"https:\/\/windowsreport.com\/#\/schema\/person\/3789cb53e54cc1c0a7ca0a6ee016820b\"},\"headline\":\"The November 2024 Patch Tuesday adresses 91 vulnerabilities, including 4 zero-day ones\",\"datePublished\":\"2024-11-13T09:21:30+00:00\",\"dateModified\":\"2024-11-13T12:54:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/windowsreport.com\/the-november-2024-patch-tuesday-adresses-91-vulnerabilities-including-4-zero-day-ones\/\"},\"wordCount\":1640,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/windowsreport.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/windowsreport.com\/the-november-2024-patch-tuesday-adresses-91-vulnerabilities-including-4-zero-day-ones\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/windowsreport.com\/wp-content\/uploads\/2024\/11\/400-million-2024-11-13T111443.224.jpg\",\"keywords\":[\"patch tuesday\",\"windows 10\",\"Windows 11\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/windowsreport.com\/the-november-2024-patch-tuesday-adresses-91-vulnerabilities-including-4-zero-day-ones\/#respond\"]}],\"copyrightYear\":\"2024\",\"copyrightHolder\":{\"@id\":\"https:\/\/windowsreport.com\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/windowsreport.com\/the-november-2024-patch-tuesday-adresses-91-vulnerabilities-including-4-zero-day-ones\/\",\"url\":\"https:\/\/windowsreport.com\/the-november-2024-patch-tuesday-adresses-91-vulnerabilities-including-4-zero-day-ones\/\",\"name\":\"Get the latest Patch Tuesday updates as soon as possible otherwise your PC might be in danger\",\"isPartOf\":{\"@id\":\"https:\/\/windowsreport.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/windowsreport.com\/the-november-2024-patch-tuesday-adresses-91-vulnerabilities-including-4-zero-day-ones\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/windowsreport.com\/the-november-2024-patch-tuesday-adresses-91-vulnerabilities-including-4-zero-day-ones\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/windowsreport.com\/wp-content\/uploads\/2024\/11\/400-million-2024-11-13T111443.224.jpg\",\"datePublished\":\"2024-11-13T09:21:30+00:00\",\"dateModified\":\"2024-11-13T12:54:01+00:00\",\"description\":\"The Patch Tuesday updates for November 2024 are here and you should get them as soon as possible otherwise your PC might be in danger.\",\"breadcrumb\":{\"@id\":\"https:\/\/windowsreport.com\/the-november-2024-patch-tuesday-adresses-91-vulnerabilities-including-4-zero-day-ones\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/windowsreport.com\/the-november-2024-patch-tuesday-adresses-91-vulnerabilities-including-4-zero-day-ones\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/windowsreport.com\/the-november-2024-patch-tuesday-adresses-91-vulnerabilities-including-4-zero-day-ones\/#primaryimage\",\"url\":\"https:\/\/windowsreport.com\/wp-content\/uploads\/2024\/11\/400-million-2024-11-13T111443.224.jpg\",\"contentUrl\":\"https:\/\/windowsreport.com\/wp-content\/uploads\/2024\/11\/400-million-2024-11-13T111443.224.jpg\",\"width\":1536,\"height\":1024,\"caption\":\"Patch Tuesday November 2024\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/windowsreport.com\/the-november-2024-patch-tuesday-adresses-91-vulnerabilities-including-4-zero-day-ones\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"News\",\"item\":\"https:\/\/windowsreport.com\/category\/news\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The November 2024 Patch Tuesday adresses 91 vulnerabilities, including 4 zero-day ones\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/windowsreport.com\/#website\",\"url\":\"https:\/\/windowsreport.com\/\",\"name\":\"Windows Report\",\"description\":\"Time-saving software and hardware expertise that helped 500MM+ PC users. Guiding you with how-to advice, news and tips to upgrade your tech life.\",\"publisher\":{\"@id\":\"https:\/\/windowsreport.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/windowsreport.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/windowsreport.com\/#organization\",\"name\":\"WindowsReport\",\"url\":\"https:\/\/windowsreport.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/windowsreport.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/windowsreport.com\/wp-content\/uploads\/2020\/05\/windowsreport-logo-quantcast.png\",\"contentUrl\":\"https:\/\/windowsreport.com\/wp-content\/uploads\/2020\/05\/windowsreport-logo-quantcast.png\",\"width\":170,\"height\":28,\"caption\":\"WindowsReport\"},\"image\":{\"@id\":\"https:\/\/windowsreport.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/WindowsReport\",\"https:\/\/x.com\/WindowsRep\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/windowsreport.com\/#\/schema\/person\/3789cb53e54cc1c0a7ca0a6ee016820b\",\"name\":\"Flavius Floare\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/windowsreport.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e27a21d4c990881c8f2ef8b45ed42bd5?s=96&d=https%3A%2F%2Fwindowsreport.com%2Fwp-content%2Fuploads%2F2024%2F01%2Fwricon.png&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e27a21d4c990881c8f2ef8b45ed42bd5?s=96&d=https%3A%2F%2Fwindowsreport.com%2Fwp-content%2Fuploads%2F2024%2F01%2Fwricon.png&r=g\",\"caption\":\"Flavius Floare\"},\"description\":\"Flavius is a writer and a media content producer with a particular interest in technology, gaming, media, film and storytelling. He's always curious and ready to take on everything new in the tech world, covering Microsoft's products on a daily basis. The passion for gaming and hardware feeds his journalistic approach, making him a great researcher and news writer that's always ready to bring you the bleeding edge!\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/flavius-floare-6b5b04148\/\",\"https:\/\/x.com\/flaviuszs\"],\"url\":\"https:\/\/windowsreport.com\/author\/flaviusfloare\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Get the latest Patch Tuesday updates as soon as possible otherwise your PC might be in danger","description":"The Patch Tuesday updates for November 2024 are here and you should get them as soon as possible otherwise your PC might be in danger.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/windowsreport.com\/the-november-2024-patch-tuesday-adresses-91-vulnerabilities-including-4-zero-day-ones\/","og_locale":"en_US","og_type":"article","og_title":"The November 2024 Patch Tuesday adresses 91 vulnerabilities, including 4 zero-day ones","og_description":"The Patch Tuesday updates for November 2024 are here and you should get them as soon as possible otherwise your PC might be in danger.","og_url":"https:\/\/windowsreport.com\/the-november-2024-patch-tuesday-adresses-91-vulnerabilities-including-4-zero-day-ones\/","og_site_name":"Windows Report","article_publisher":"https:\/\/www.facebook.com\/WindowsReport","article_published_time":"2024-11-13T09:21:30+00:00","article_modified_time":"2024-11-13T12:54:01+00:00","og_image":[{"width":1536,"height":1024,"url":"https:\/\/windowsreport.com\/wp-content\/uploads\/2024\/11\/400-million-2024-11-13T111443.224.jpg","type":"image\/jpeg"}],"author":"Flavius Floare","twitter_card":"summary_large_image","twitter_creator":"@flaviuszs","twitter_site":"@WindowsRep","twitter_misc":{"Written by":"Flavius Floare","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/windowsreport.com\/the-november-2024-patch-tuesday-adresses-91-vulnerabilities-including-4-zero-day-ones\/#article","isPartOf":{"@id":"https:\/\/windowsreport.com\/the-november-2024-patch-tuesday-adresses-91-vulnerabilities-including-4-zero-day-ones\/"},"author":{"name":"Flavius Floare","@id":"https:\/\/windowsreport.com\/#\/schema\/person\/3789cb53e54cc1c0a7ca0a6ee016820b"},"headline":"The November 2024 Patch Tuesday adresses 91 vulnerabilities, including 4 zero-day ones","datePublished":"2024-11-13T09:21:30+00:00","dateModified":"2024-11-13T12:54:01+00:00","mainEntityOfPage":{"@id":"https:\/\/windowsreport.com\/the-november-2024-patch-tuesday-adresses-91-vulnerabilities-including-4-zero-day-ones\/"},"wordCount":1640,"commentCount":0,"publisher":{"@id":"https:\/\/windowsreport.com\/#organization"},"image":{"@id":"https:\/\/windowsreport.com\/the-november-2024-patch-tuesday-adresses-91-vulnerabilities-including-4-zero-day-ones\/#primaryimage"},"thumbnailUrl":"https:\/\/windowsreport.com\/wp-content\/uploads\/2024\/11\/400-million-2024-11-13T111443.224.jpg","keywords":["patch tuesday","windows 10","Windows 11"],"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/windowsreport.com\/the-november-2024-patch-tuesday-adresses-91-vulnerabilities-including-4-zero-day-ones\/#respond"]}],"copyrightYear":"2024","copyrightHolder":{"@id":"https:\/\/windowsreport.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/windowsreport.com\/the-november-2024-patch-tuesday-adresses-91-vulnerabilities-including-4-zero-day-ones\/","url":"https:\/\/windowsreport.com\/the-november-2024-patch-tuesday-adresses-91-vulnerabilities-including-4-zero-day-ones\/","name":"Get the latest Patch Tuesday updates as soon as possible otherwise your PC might be in danger","isPartOf":{"@id":"https:\/\/windowsreport.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/windowsreport.com\/the-november-2024-patch-tuesday-adresses-91-vulnerabilities-including-4-zero-day-ones\/#primaryimage"},"image":{"@id":"https:\/\/windowsreport.com\/the-november-2024-patch-tuesday-adresses-91-vulnerabilities-including-4-zero-day-ones\/#primaryimage"},"thumbnailUrl":"https:\/\/windowsreport.com\/wp-content\/uploads\/2024\/11\/400-million-2024-11-13T111443.224.jpg","datePublished":"2024-11-13T09:21:30+00:00","dateModified":"2024-11-13T12:54:01+00:00","description":"The Patch Tuesday updates for November 2024 are here and you should get them as soon as possible otherwise your PC might be in danger.","breadcrumb":{"@id":"https:\/\/windowsreport.com\/the-november-2024-patch-tuesday-adresses-91-vulnerabilities-including-4-zero-day-ones\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/windowsreport.com\/the-november-2024-patch-tuesday-adresses-91-vulnerabilities-including-4-zero-day-ones\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/windowsreport.com\/the-november-2024-patch-tuesday-adresses-91-vulnerabilities-including-4-zero-day-ones\/#primaryimage","url":"https:\/\/windowsreport.com\/wp-content\/uploads\/2024\/11\/400-million-2024-11-13T111443.224.jpg","contentUrl":"https:\/\/windowsreport.com\/wp-content\/uploads\/2024\/11\/400-million-2024-11-13T111443.224.jpg","width":1536,"height":1024,"caption":"Patch Tuesday November 2024"},{"@type":"BreadcrumbList","@id":"https:\/\/windowsreport.com\/the-november-2024-patch-tuesday-adresses-91-vulnerabilities-including-4-zero-day-ones\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"News","item":"https:\/\/windowsreport.com\/category\/news\/"},{"@type":"ListItem","position":2,"name":"The November 2024 Patch Tuesday adresses 91 vulnerabilities, including 4 zero-day ones"}]},{"@type":"WebSite","@id":"https:\/\/windowsreport.com\/#website","url":"https:\/\/windowsreport.com\/","name":"Windows Report","description":"Time-saving software and hardware expertise that helped 500MM+ PC users. Guiding you with how-to advice, news and tips to upgrade your tech life.","publisher":{"@id":"https:\/\/windowsreport.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/windowsreport.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/windowsreport.com\/#organization","name":"WindowsReport","url":"https:\/\/windowsreport.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/windowsreport.com\/#\/schema\/logo\/image\/","url":"https:\/\/windowsreport.com\/wp-content\/uploads\/2020\/05\/windowsreport-logo-quantcast.png","contentUrl":"https:\/\/windowsreport.com\/wp-content\/uploads\/2020\/05\/windowsreport-logo-quantcast.png","width":170,"height":28,"caption":"WindowsReport"},"image":{"@id":"https:\/\/windowsreport.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/WindowsReport","https:\/\/x.com\/WindowsRep"]},{"@type":"Person","@id":"https:\/\/windowsreport.com\/#\/schema\/person\/3789cb53e54cc1c0a7ca0a6ee016820b","name":"Flavius Floare","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/windowsreport.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e27a21d4c990881c8f2ef8b45ed42bd5?s=96&d=https%3A%2F%2Fwindowsreport.com%2Fwp-content%2Fuploads%2F2024%2F01%2Fwricon.png&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e27a21d4c990881c8f2ef8b45ed42bd5?s=96&d=https%3A%2F%2Fwindowsreport.com%2Fwp-content%2Fuploads%2F2024%2F01%2Fwricon.png&r=g","caption":"Flavius Floare"},"description":"Flavius is a writer and a media content producer with a particular interest in technology, gaming, media, film and storytelling. He's always curious and ready to take on everything new in the tech world, covering Microsoft's products on a daily basis. The passion for gaming and hardware feeds his journalistic approach, making him a great researcher and news writer that's always ready to bring you the bleeding edge!","sameAs":["https:\/\/www.linkedin.com\/in\/flavius-floare-6b5b04148\/","https:\/\/x.com\/flaviuszs"],"url":"https:\/\/windowsreport.com\/author\/flaviusfloare\/"}]}},"_links":{"self":[{"href":"https:\/\/windowsreport.com\/wp-json\/wp\/v2\/posts\/1439116","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/windowsreport.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/windowsreport.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/windowsreport.com\/wp-json\/wp\/v2\/users\/2271"}],"replies":[{"embeddable":true,"href":"https:\/\/windowsreport.com\/wp-json\/wp\/v2\/comments?post=1439116"}],"version-history":[{"count":6,"href":"https:\/\/windowsreport.com\/wp-json\/wp\/v2\/posts\/1439116\/revisions"}],"predecessor-version":[{"id":1439211,"href":"https:\/\/windowsreport.com\/wp-json\/wp\/v2\/posts\/1439116\/revisions\/1439211"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/windowsreport.com\/wp-json\/wp\/v2\/media\/1439135"}],"wp:attachment":[{"href":"https:\/\/windowsreport.com\/wp-json\/wp\/v2\/media?parent=1439116"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/windowsreport.com\/wp-json\/wp\/v2\/categories?post=1439116"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/windowsreport.com\/wp-json\/wp\/v2\/tags?post=1439116"},{"taxonomy":"work","embeddable":true,"href":"https:\/\/windowsreport.com\/wp-json\/wp\/v2\/work?post=1439116"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}