Microsoft July 2017 Patch Tuesday addresses 51 security vulnerabilities in addition to 3 vulnerabilities for Adobe Flash Player. 19 vulnerabilities are rated as Critical, 32 are rated as Important and 3 are rated as Moderate. 12 Critical vulnerabilities affect Microsoft Scripting Engine which can result in Remote Code Execution. The other critical vulnerabilities affect Internet Explorer, Edge, and Windows. […]

Read More →

Microsoft June 2017 Patch Tuesday addressing 97 security vulnerabilities including fixing two critical vulnerabilities Windows Search Remote Code Execution (CVE-2017-8543) and LNK Remote Code Execution (CVE-2017-8464), are being actively exploited in the wild. The most dangerous vulnerability exists in Windows Search Service (WSS), a feature in Windows that allows users to search across multiple Windows […]

Read More →

Apple fixed 141 vulnerabilities across multiple products including macOS Sierra, iOS, watchOS, tvOS, iCloud, Safari, and iTunes. Most of the vulnerabilities exist in some instances with root privileges (41 in iOS 41, 37 in macOS Sierra, 23 in tvOS and 12 in watchOS) and could lead to arbitrary code execution. Apple also fixed 26 vulnerabilities in Safari browser, which could lead to […]

Read More →

Microsoft May 2017 Patch Tuesday addressing 56 security vulnerabilities in addition to 7 vulnerabilities for Adobe Flash Player. The May security release consists of security updates for the following software: Internet Explorer Microsoft Edge Microsoft Windows Microsoft Office and Microsoft Office Services and Web Apps NET Framework Adobe Flash Player Three Windows Zero-day vulnerabilities have […]

Read More →

The Model-View-Framework Apache Struts2, an open source and free framework for simplifying the creation of web applications in Java has been recently patched to mitigate a zero day vulnerability. Apache Struts2 is been affected with a new vulnerability which is being actively exploited in the wild. The vulnerability is a possible Remote Code Execution which […]

Read More →

(Image source: WordPress ) WordPress the easiest, one of the most powerful blogging and website content management system has silently fixed a dangerous vulnerability in WordPress REST API Endpoint which was recently added to WordPress version 4.7.0 and enabled by default. The REST API has been affected by an unauthenticated privilege escalation vulnerability, that could possibly lead to […]

Read More →