Microsoft fixes four critical vulnerabilities, none exploite

Microsoft fixes four critical vulnerabilities, none exploited in the wild


Microsoft fixed four critical vulnerabilities Tuesday, none of which to date are being exploited in the wild.
Products affected by the Microsoft vulnerabilities include Hyper-V, Internet Explorer, Windows Server, and Windows 10. All four critical vulnerabilities announced by Microsoft are new, and security pros are advised to patch in the first 72 hours to reduce risk in safeguarding both data and infrastructure.
Here’s a breakdown of the four Microsoft vulnerabilities:
CVE-2021-26419: Scripting engine memory corruption vulnerability
According to Eric Feldman, senior product marketing manager at Automox, this one operates as a critical remote code execution (RCE) vulnerability that impacts Internet Explorer 11 and 9 running on multiple versions of Microsoft Windows and Windows Server. In a web-based attack scenario, an attacker could host a specially crafted website designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website. The attacker could also take advantage of compromised websites and other websites that accept or host user-provided content or advertisements. These websites could contain specially-crafted content that could exploit the vulnerability. Feldman recommends that security pros prioritize this patch, or upgrade to a more modern browser if possible.

Related Keywords

Automox Feldman , Justin Knapp , Eric Feldman , Automox Knapp , Microsoft , Internet Explorer , Windows Server , Microsoft Windows , Microsoft Windows Object Linking , Microsoft Windows Hyper V , ஜஸ்டின் ந்யாப் , எரிக் ஃபெல்ட்மந் , மைக்ரோசாஃப்ட் , இணையதளம் ஆய்வுப்பணி , ஜன்னல்கள் சேவையகம் , மைக்ரோசாஃப்ட் ஜன்னல்கள் ,

© 2025 Vimarsana