Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
Fixes for 50 Microsoft vulnerabilities are available, out of which six are under attack, and three were publicly known at the time of disclosure.
This bug could allow an attacker to execute code on a target system if a user views specially crafted web content. Since the vulnerability is in the Trident (MSHTML) engine itself, many different applications are impacted – not just Internet Explorer. The vulnerability is being exploited in the wild.
These two bugs are elevation of privilege vulnerabilities in the Microsoft Enhanced Cryptographic Provider. Microsoft CVE-2021-31201 and CVE-2021-31199 address vulnerabilities that are related to Adobe’s CVE-2021-28550. The vulnerability is being exploited in the wild.
This vulnerability is subject to a local escalation of privilege attack. The attacker would most likely arrange to run an executable or script on the local computer. An attacker could gain access to the computer through a variety of methods, such as via a phishing attack where a user clicks an executable file that is attached to an email. The vulnerability is being exploited in the wild.
This Windows Kernel information disclosure vulnerability allows an attacker to read the contents of kernel memory from a user-mode process. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. The vulnerability is being exploited in the wild.
To exploit this Windows NTFS elevation of privilege vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.
Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. The vulnerability is being exploited in the wild.
Microsoft
For more information on affected products, patches, and updates refer to the vendor at https://msrc.microsoft.com/update-guide/vulnerability