Microsoft Windows could allow a remote authenticated malicious user to execute arbitrary code on the system, caused by improper input validation by the host server in Hyper-V. By execute a specially-crafted program, an attacker could exploit this vulnerability to execute arbitrary code on the system.
This month the vendor has patched 88 vulnerabilities, 20 of which are rated Critical.
Posted: 12 Jun, 201931 Min ReadThreat Intelligence SubscribeFollowtwitterfacebooklinkedinMicrosoft Patch Tuesday – June 2019This month the vendor has patched 88 vulnerabilities, 20 of which are rated Critical.As always, customers are advised to follow these security best practices:
Install vendor patches as soon as they are available.
Run all software with the least privileges required while still mainta...
And Google drops a zero-day on Windows after deadline miss
Patch Tuesday Microsoft, Adobe, Intel, and SAP have all emitted their latest Patch Tuesday batch of security fixes. Users and admins are encouraged to test and install the updates as soon as humanly possible.
For those running Windows and Windows Server, you'll be interested in as many as 88 CVE-listed flaws that need addressing in Microsoft's products.
According to analysts at the Zero Day Initiative, a priority for admins should be a collection of four elevation-of-privilege vulner...
Microsoft patched four Windows operating system bugs – all of which are already publicly known or have proof of concept exploits – as part of its June Patch Tuesday security bulletin. Each of the vulnerabilities are rated important and there are no reports of public exploitation for the flaws.
The four bugs are part of a total of 88 vulnerabilities that were patched by Microsoft this month, 21 of which are rated critical, 66 rated important and one moderate.
Raising the most conc...