CERT-In identifies multiple vulnerabilities in Microsoft products and Red Hat Linux Kernel
In Microsoft Products Microsoft products include Windows, Microsoft Office, Microsoft Exchange server, Azure, System Centre Operations Manager, and Visual Studio, which can be exploited by an attacker to access sensitive information, bypass security restriction, perform denial of services and spoofing attacks or execute arbitrary codes on the targeted systems. On Microsoft Windows and Office, the vulnerabilities can be used by remote attackers to gain elevated privileges, disclose information by bypassing security restrictions and cause denial of services. And while the vulnerabilities in System Centre Operations Manager can allow attackers to gain elevated privileges, in Visual Studio attackers can remotely execute codes to perform spoofing attacks. In Red Hat Linux Kernel The vulnerabilities with medium severity in Red Hat Linux Kernel exist due to information leak in scsiioctIO); use-after-free in to new tfilter) in net/sched/cls_api.c; Incomplete cleanup of multi-core shared buffers, microarchitectural fill buffers and specific special register write operations (aka DRP.
Discover Related

CERT-In alerts Microsoft Edge users of critical vulnerabilities: How to stay safe

Hackers exploit bug in Microsoft Outlook to hijack Exchange accounts

CERT-In issues alert against LuaDream info-stealing malware

CERT-In detects multiple vulnerabilities in Chrome, Edge browsers and Android OS

Microsoft server hack has victims hustling to stop intruders

Microsoft says Chinese hackers are exploiting mail server vulnerabilities

Microsoft Exchange server attacked by Hafnium, company says
