Tuesday, April 20, 2021
  • 6 Stages of Risk and Compliance Program Maturity and the Opportunities for Automation
  • Breaking the Phishing Kill Chain
  • Taking Steps Toward an Impactful SASE Architecture
  • Log Data is Not Effective as a Foundation for Prevention, Detection, Remediation or Analytics
  • Monero Cryptominer Attack Exploits Exchange Server Flaw

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming
    • On-Demand
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library
  • Related Sites
    • MediaOps Inc.
    • DevOps.com
    • Container Journal
    • Digital Anarchist
    • SweetCode.io
  • Media Kit

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Security Bloggers Network 

Home » Security Bloggers Network » Tripwire Patch Priority Index for May 2018

Tripwire Patch Priority Index for May 2018

by Lane Thames on May 30, 2018

Tripwire’s May 2018 Patch Priority Index (PPI) brings together the top vulnerabilities from Microsoft and Adobe.

First on the patch priority list this month are patches for Microsoft Browsers and Scripting Engine. The patches for Internet Explorer resolve a security feature bypass vulnerability and the patches for Edge resolve memory corruption, information disclosure, and security feature bypass vulnerabilities. The patches for Microsoft Scripting Engine address 16 memory corruption vulnerabilities.

Next on the patch priority list this month are patches for Adobe Flash Player for Windows, Macintosh, Linux, and Chrome OS. These Adobe Flash patches address a type confusion vulnerability, which if exploited can lead to arbitrary code execution.

Up next are patches for Microsoft Windows. These patches address 20 vulnerabilities, including security feature bypass, information disclosure, denial of service, elevation of privilege, and remote code execution vulnerabilities.

Next, administrators should focus on the patches available for Microsoft Office, Microsoft Excel, Microsoft InfoPath, Microsoft Outlook, and Microsoft Developer Tools. These patches fix information disclosure, remote code execution, and security feature bypass, and denial of service vulnerabilities.

Last but not least for this month, administrators should focus on patches available for Microsoft SharePoint and Exchange Server. These patches resolve elevation of privilege, memory corruption, and spoofing vulnerabilities.

To learn more about Tripwire’s Vulnerability and Exposure Research Team (VERT), click here.

BULLETIN
CVE
Microsoft Browser
CVE-2018-8126, CVE-2018-1025, CVE-2018-8178, CVE-2018-1021, CVE-2018-8123, CVE-2018-8179, CVE-2018-8112
Microsoft Scripting Engine
CVE-2018-8145, CVE-2018-0943, CVE-2018-8130, CVE-2018-8133, CVE-2018-8128, CVE-2018-8122, CVE-2018-1022, CVE-2018-0951, CVE-2018-8139, CVE-2018-0945, CVE-2018-0946, CVE-2018-8137, CVE-2018-8114, CVE-2018-0953, CVE-2018-0954, CVE-2018-0955
Adobe Flash APSB18-16
CVE-2018-4944
Windows
CVE-2018-8165, CVE-2018-0959, CVE-2018-0961, CVE-2018-0824, CVE-2018-8166, CVE-2018-8120, CVE-2018-8124, CVE-2018-8164, CVE-2018-8167, CVE-2018-8134, CVE-2018-8170, CVE-2018-8897, CVE-2018-8141, CVE-2018-8127, CVE-2018-8136, CVE-2018-8129, CVE-2018-8132, CVE-2018-0854, CVE-2018-0958, CVE-2018-8174
Microsoft Excel
CVE-2018-8163, CVE-2018-8162, CVE-2018-8147, CVE-2018-8148
Microsoft InfoPath
CVE-2018-8173
Microsoft Office
CVE-2018-8161, CVE-2018-8158, CVE-2018-8157
Microsoft Outlook
CVE-2018-8160
.NET
CVE-2018-1039, CVE-2018-0765
Microsoft SharePoint
CVE-2018-8168, CVE-2018-8149, CVE-2018-8155, CVE-2018-8156
Exchange (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Lane Thames. Read the original post at: https://www.tripwire.com/state-of-security/vert/ppi-may2018/

May 30, 2018May 30, 2018 Lane Thames VERT
  • ← Azure Active Directory Administrative Units
  • XKCD, Business Update →

TechStrong TV – Live

Watch latest episodes and shows

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy

Most Read on the Boulevard

Wordsmithing: Cybersecurity or Cyber Safety?
U.S. Fingers Putin’s Cozy Bear for SolarWinds Attacks
Emotet Takedown: Time to Celebrate?
New Federal Data Privacy Legislation Proposed
Clubhouse Exclusivity Applies to Membership, Not Data
Securing APIs: Empowering Security
Cloud Identity and Access Management Alphabet Soup: A Definitive Guide
Phishing 101: How It Works & What to Look For
A Look at Digital Attacks on Gaming Resources During the Pandemic
CISO Stories Podcast: Is There a Magic Security Control List?

Upcoming Webinars

Wed 21

Managing Open Policy Agent at Scale

April 21 @ 3:00 pm - 4:00 pm
Thu 22

A New Approach to Secure Web Gateways

April 22 @ 11:00 am - 12:00 pm
Mon 26

The Kubernetes Network (Security) Effect

April 26 @ 9:00 am - 10:00 am
Mon 26

Application Security: Moving at the Speed of DevOps

April 26 @ 1:00 pm - 2:00 pm
Wed 28

Cyber Attacks From the Open Source Perspective

April 28 @ 1:00 pm - 2:00 pm
Thu 29

Hack My Java Application: How Snyk and Red Hat Help Developers Stay Performant and Secure

April 29 @ 11:00 am - 12:00 pm
May 05

Managing Permissions and Entitlements is at the Core of a Zero Trust Model in the Cloud

May 5 @ 3:00 pm - 4:00 pm
May 17

Are We There Yet? The State of Cloud Native Application Security

May 17 @ 9:00 am - 10:00 am

More Webinars

Download Free eBook

The State of Cloud Native Security 2020

Recent Security Boulevard Chats

  • Cloud, DevSecOps and Network Security, All Together?
  • Security-as-Code with Tim Jefferson, Barracuda Networks
  • ASRTM with Rohit Sethi, Security Compass
  • Deception: Art or Science, Ofer Israeli, Illusive Networks
  • Tips to Secure IoT and Connected Systems w/ DigiCert

Industry Spotlight

Taking Steps Toward an Impactful SASE Architecture
Cybersecurity Data Security Endpoint Industry Spotlight Network Security Security Boulevard (Original) 

Taking Steps Toward an Impactful SASE Architecture

April 20, 2021 Mike Spanbauer | 4 hours ago 0
Online Ed is the New Corporate Threat Vector
Cybersecurity Governance, Risk & Compliance Industry Spotlight Malware Security Boulevard (Original) Threats & Breaches 

Online Ed is the New Corporate Threat Vector

April 19, 2021 Curtis Simpson | Yesterday 0
Three Wishes to Revitalize SIEM and Your SOC
Cybersecurity Data Security Endpoint Industry Spotlight Network Security Security Boulevard (Original) 

Three Wishes to Revitalize SIEM and Your SOC

April 16, 2021 Albert Zhichun Li | 4 days ago 0

Top Stories

U.S. Fingers Putin’s Cozy Bear for SolarWinds Attacks
Analytics & Intelligence Application Security Cloud Security Cyberlaw Cybersecurity Data Security Endpoint Featured Governance, Risk & Compliance Incident Response IoT & ICS Security Malware Network Security News Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

U.S. Fingers Putin’s Cozy Bear for SolarWinds Attacks

April 16, 2021 Richi Jennings | 3 days ago 0
YT$AW: FBI Cleans Up Exchange Servers, NSA Tips Microsoft 4 More Bugs
Analytics & Intelligence Cloud Security Cyberlaw Cybersecurity Data Security Endpoint Featured Governance, Risk & Compliance Incident Response Malware Network Security News Security Awareness Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

YT$AW: FBI Cleans Up Exchange Servers, NSA Tips Microsoft 4 More Bugs

April 14, 2021 Richi Jennings | Apr 14 0
Son of Stuxnet? Iran Nuke Site Hacked ‘by Israel’ (Again)
Analytics & Intelligence Application Security AppSec Cyberlaw Cybersecurity Deep Fake and Other Social Engineering Tactics Endpoint Featured Governance, Risk & Compliance Identity & Access Identity and Access Management Incident Response IoT & ICS Security Malware Network Security News Securing the Edge Security Awareness Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Son of Stuxnet? Iran Nuke Site Hacked ‘by Israel’ (Again)

April 12, 2021 Richi Jennings | Apr 12 0

Security Humor

via   the respected information security capabilities of   Robert M. Lee     & the superlative illustration talents of   Jeff Haas   at   Little Bobby Comics

Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 325’

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: info@securityboulevard.com

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy
  • DMCA Compliance Statement

Other Mediaops Sites

  • Container Journal
  • DevOps.com
  • DevOps Connect
  • DevOps Institute
Copyright © 2021 MediaOps Inc. All rights reserved.
Our website uses cookies. By continuing to browse the website you are agreeing to our use of cookies. For more information on how we use cookies and how you can disable them, please read our Privacy Policy.