Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Vulnerabilities
  • Tripwire Patch Priority Index for August 2021
  • Vulnerabilities

Tripwire Patch Priority Index for August 2021

4 years ago Lane Thames
Tripwire Patch Priority Index for May 2021

Tripwire’s August 2021 Patch Priority Index (PPI) brings together important vulnerabilities from Microsoft.

First on the patch priority list this month are patches for Microsoft Exchange Server (CVE-2021-34523, CVE-2021-34473, CVE-2021-31207). These vulnerabilities have seen active exploitation. Also, exploits for these vulnerabilities have been recently added to the Metasploit Exploit Framework. These systems should be patched as soon as possible.

Following Exchange, there is a patch available for a Windows LSA spoofing vulnerability. This vulnerability has been publicly disclosed with various research available explaining how to exploit this vulnerability. More details can be found at https://support.microsoft.com/en-us/topic/kb5005413-mitigating-ntlm-relay-attacks-on-active-directory-certificate-services-ad-cs-3612b773-4043-4aa9-b23d-b87910cd3429

Next is a patch for Microsoft Scripting Engine, which resolves a memory corruption vulnerability.

Up next are patches for Microsoft Edge that resolves user after free, heap buffer overflow, and out-of-bounds write vulnerabilities.

Next are patches that affect components of the Windows operating systems. These patches resolve over 25 vulnerabilities, including elevation of privilege, information disclosure, and remote code execution vulnerabilities. These vulnerabilities affect core Windows, print spooler, bluetooth, MPEG-4 video decoder, event tracing, NFS, remote desktop client, TCP/IP, graphics and others.

Lastly, administrators should focus on server-side patches for Microsoft SharePoint and Dynamics. These patches resolve several issues including cross-site scripting, spoofing, and remote code execution vulnerabilities.

BULLETIN CVE
Exploit Framework – Metasploit CVE-2021-34523, CVE-2021-34473, CVE-2021-31207
Windows LSA Spoofing Vulnerability CVE-2021-36942
Microsoft Scripting Engine CVE-2021-34480
Microsoft Edge CVE-2021-30594, CVE-2021-30596, CVE-2021-30597, CVE-2021-30590, CVE-2021-30591, CVE-2021-30592, CVE-2021-30593
Microsoft Windows CVE-2021-36937, CVE-2021-34537, CVE-2021-34483, CVE-2021-36936, CVE-2021-36947, CVE-2021-34486, CVE-2021-34487, CVE-2021-26425, CVE-2021-34534, CVE-2021-36948, CVE-2021-36945, CVE-2021-26431, CVE-2021-34533, CVE-2021-34530, CVE-2021-36938, CVE-2021-36926, CVE-2021-36932, CVE-2021-36933, CVE-2021-26433, CVE-2021-26432, CVE-2021-34535, CVE-2021-36927, CVE-2021-34536, CVE-2021-26426, CVE-2021-34484, CVE-2021-26424
Microsoft Office SharePoint CVE-2021-36940
Microsoft Dynamics CVE-2021-36950, CVE-2021-34524, CVE-2021-36946

The post ” Tripwire Patch Priority Index for August 2021″ appeared first on TripWire

Source:TripWire – Lane Thames

Tags: Exploit, Microsoft, TripWire, Vulnerability

Continue Reading

Previous WhatsApp Photo Filter Bug Could Have Exposed Your Data to Remote Attackers
Next Comcast RF Attack Leveraged Remotes for Surveillance

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

12 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

15 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

19 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign

20 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files

1 day ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns

1 day ago [email protected] (The Hacker News)

Recent Posts

  • AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack
  • ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories
  • The Buyer’s Guide to AI Usage Control
  • Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends
  • Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT