Severity Rating: Critical
Revision Note: V1.0 (April 12, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user clicks a specially crafted link that could allow an attacker to run malicious code remotely to take control of the user’s system. However, in all cases an attacker would have no way to force a user to click a specially crafted link. An attacker would have to convince a user to click the link, typically by way of an enticement in an email or Instant Messenger message.
Category Archives: Microsft
Microsoft
MS16-050 – Critical: Security Update for Adobe Flash Player (3154132) – Version: 1.0
Severity Rating: Critical
Revision Note: V1.0 (April 12, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Adobe Flash Player when installed on all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, and Windows 10.
MS16-044 – Important: Security Update for Windows OLE (3146706) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (April 12, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if Windows OLE fails to properly validate user input. An attacker could exploit the vulnerability to execute malicious code. However, an attacker must first convince a user to open either a specially crafted file or a program from either a webpage or an email message.
MS16-APR – Microsoft Security Bulletin Summary for April 2016 – Version: 1.0
Revision Note: V1.0 (April 12, 2016): Click here to enter text.
Summary: This bulletin summary lists security bulletins released for April 2016.
MS16-048 – Important: Security Update for CSRSS (3148528) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (April 12, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass if an attacker logs on to a target system and runs a specially crafted application.
3152550 – Update to Improve Wireless Mouse Input Filtering – Version: 1.0
Revision Note: V1.0 (April 12, 2016): Advisory published.
Summary: Microsoft is announcing the availability of an update to improve input filtering for certain Microsoft wireless mouse devices. The update enhances security by filtering out QWERTY key packets in keystroke communications issued from receiving USB wireless dongles to wireless mouse devices. This improvement is part of ongoing efforts to improve the effectiveness of security in Windows and Microsoft devices. For more information, see Microsoft Knowledge Base Article 3152550.
MS16-037 – Critical: Cumulative Security Update for Internet Explorer (3148531) – Version: 1.0
Severity Rating: Critical
Revision Note: V1.0 (April 12, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
MS16-046 – Important: Security Update for Secondary Logon (3148538) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (April 12, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. An attacker who successfully exploited this vulnerability could run arbitrary code as an administrator.
MS16-038 – Critical: Cumulative Security Update for Microsoft Edge (3148532) – Version: 1.0
Severity Rating: Critical
Revision Note: V1.0 (April 12, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Edge. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
MS16-047 – Important: Security Update for SAM and LSAD Remote Protocols (3148527) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (April 12, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker launches a man-in-the-middle (MiTM) attack. An attacker could then force a downgrade of the authentication level of the SAM and LSAD channels and impersonate an authenticated user.