No Image

MS16-069 – Critical: Cumulative Security Update for JScript and VBScript (3163640) – Version: 1.0

2016-06-15 KENNETH 0

MS16-069 – Critical: Cumulative Security Update for JScript and VBScript (3163640) – Version: 1.0 Severity Rating: CriticalRevision Note: V1.0 (June 14, 2016): Bulletin published.Summary: This security update resolves vulnerabilities in the JScript and VBScript scripting engines in Microsoft Windows. The vulnerabilities could allow remote code execution if a user visits a specially crafted website. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited these vulnerabilities could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Source: MS16-069 – Critical: Cumulative Security Update for JScript and VBScript (3163640) – Version: 1.0

No Image

MS16-075 – Important: Security Update for Windows SMB Server (3164038) – Version: 1.0

2016-06-15 KENNETH 0

MS16-075 – Important: Security Update for Windows SMB Server (3164038) – Version: 1.0 Severity Rating: ImportantRevision Note: V1.0 (June 14, 2016): Bulletin published.Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. Source: MS16-075 – Important: Security Update for Windows SMB Server (3164038) – Version: 1.0

No Image

MS16-081 – Important: Security Update for Active Directory (3160352) – Version: 1.0

2016-06-15 KENNETH 0

MS16-081 – Important: Security Update for Active Directory (3160352) – Version: 1.0 Severity Rating: ImportantRevision Note: V1.0 (June 14, 2016): Bulletin published.Summary: This security update resolves a vulnerability in Active Directory. The vulnerability could allow denial of service if an authenticated attacker creates multiple machine accounts. To exploit the vulnerability an attacker must have an account that has privileges to join machines to the domain. Source: MS16-081 – Important: Security Update for Active Directory (3160352) – Version: 1.0

No Image

MS15-JUL – Microsoft Security Bulletin Summary for July 2015 – Version: 3.1

2016-05-26 KENNETH 0

MS15-JUL – Microsoft Security Bulletin Summary for July 2015 – Version: 3.1 Revision Note: V3.1 (May 25, 2016): For MS15-076, added a Known Issues reference to the Executive Summaries table. For more information, see Microsoft Knowledge Base Article 3067505. For information about the solution for this Known Issue, see Microsoft Knowledge Base Article 3155218. Summary: This bulletin summary lists security bulletins released for July 2015. Source: MS15-JUL – Microsoft Security Bulletin Summary for July 2015 – Version: 3.1

No Image

2880823 – Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program – Version: 2.0

2016-05-19 KENNETH 0

2880823 – Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program – Version: 2.0 Revision Note: V2.0 (May 18, 2016): Advisory updated to provide links to the current information regarding the use of the SHA1 hashing algorithm for the purposes of SSL and code signing. For more information, see Windows Enforcement of Authenticode Code Signing and Timestamping.Summary: Microsoft is announcing a policy change to the Microsoft Root Certificate Program. The new policy will no longer allow root certificate authorities to issue X.509 certificates using the SHA-1 hashing algorithm for the purposes of SSL and code signing after January 1, 2016. Using the SHA-1 hashing algorithm in digital certificates could allow an attacker to spoof content, perform phishing attacks, or perform man-in-the-middle attacks. Source: 2880823 – Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program – Version: 2.0