Microsoft patches six actively exploited vulnerabilities
Briefly

The proximity to Black Hat and DEF CON may have played a part in the reported vulnerabilities. Though disclosed at the conferences, they weren't severe enough for out-of-band fixes from Microsoft.
Actively exploited vulnerabilities should be prioritized for patching. Microsoft does not disclose details on attacks using zero-day flaws, so enterprises lack insight on their severity and scope.
CVE-2024-38178 is a memory corruption issue in the scripting engine, typically critical for unauthenticated remote code execution but rated important due to specific usage conditions.
Microsoft's advisories don't provide details about zero-day attacks, which obscures their sophistication and distribution from organizations, making it hard to assess the threat landscape.
Read at CSO Online
[
]
[
|
]