Microsoft has released a pair of emergency patches, one for a remote code execution zero-day in Internet Explorer, and one for a denial of service vulnerability in Windows Defender. In the case of Internet Explorer, the security flaw -- discovered by Clément Lecigne from Google's Threat Analysis Group -- is being actively exploited. Microsoft describes it as a "scripting engine memory corruption vulnerability", and has assigned it CVE-2019-1367. See also: Microsoft promises to provide security updates for federally certified voting Windows 7 systems Microsoft suggests fixes for Windows 10 1903 game audio problems caused by KB4515384 Microsoft acknowledges that KB4515384…
[Continue Reading]
Aucun commentaire:
Enregistrer un commentaire