Notes v4.5 iOS – Arbitrary File Upload Vulnerability

Posted by Vulnerability Lab on May 10

Document Title:
===============
Notes v4.5 iOS – Arbitrary File Upload Vulnerability

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1832

Release Date:
=============
2016-04-25

Vulnerability Laboratory ID (VL-ID):
====================================
1832

Common Vulnerability Scoring System:
====================================
6.4

Product & Service Introduction:…

Skype Manager – (Email Change) Filter Bypass Vulnerability

Posted by Vulnerability Lab on May 10

Document Title:
===============
Skype Manager – (Email Change) Filter Bypass Vulnerability

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1672

MSRC Case 32353 TRK:0001002845

Release Date:
=============
2016-05-09

Vulnerability Laboratory ID (VL-ID):
====================================
1672

Common Vulnerability Scoring System:
====================================
5.2

Product & Service…

MS16-051 – Critical: Cumulative Security Update for Internet Explorer (3155533) – Version: 1.0

Severity Rating: Critical
Revision Note: V1.0 (May 10, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

MS16-052 – Critical: Cumulative Security Update for Microsoft Edge (3155538) – Version: 1.0

Severity Rating: Critical
Revision Note: V1.0 (May 10, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users with administrative user rights.

MS16-057 – Critical: Security Update for Windows Shell (3156987) – Version: 1.0

Severity Rating: Critical
Revision Note: V1.0 (May 10, 2016): Click here to enter text.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website that accepts user-provided online content, or convinces a user to open specially crafted content. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

MS16-059 – Important: Security Update for Windows Media Center (3150220) – Version: 1.0

Severity Rating: Important
Revision Note: V1.0 (May 10, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if Windows Media Center opens a specially crafted Media Center link (.mcl) file that references malicious code. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

MS16-054 – Critical: Security Update for Microsoft Office (3155544) – Version: 1.0

Severity Rating: Critical
Revision Note: V1.0 (May 10, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.