Skip to main content
MSRC

2013

Microsoft Releases Security Advisory 2847140

Friday, May 03, 2013

Today, we released Security Advisory 2847140 regarding an issue that impacts Internet Explorer 8. Internet Explorer 6, 7, 9 and 10 are not affected by the vulnerability. This issue allows remote code execution if users browse to a malicious website with an affected browser. This would typically occur by an attacker convincing someone to click a link in an email or instant message.

サイバーセキュリティ ポリシーとパフォーマンスのリンク: セキュリティ インテリジェンス レポート スペシャル エディションをリリース

Wednesday, May 01, 2013

本記事は、 Microsoft Trustworthy Computing のブログ “ *Linking Cybersecurity Policy and Performance: Microsoft Releases Special Edition Security Intelligence Report ” * (2013 年 * 2 月 * 6 日公開 *) を翻訳した記事です。 Trustworthy Computing

Defending Websites from XSS attacks with ModSecurity 2.7.3 and OWASP Core Rule Set 2.2.7

Sunday, April 28, 2013

Even though cross-site scripting vulnerabilities have a 15-year history, they remain a big problem in the web security space. According to our research, there are hundreds of new issues discovered each month, and at least a few of them are being used in high-severity attacks. The general problem of cross-site scripting has no easy solution.

New update available for MS13-036

Tuesday, April 23, 2013

Portuguese (Brazil), Русский Today we released a new update to replace KB2823324, which was originally made available through MS13-036. As we previously discussed, we stopped distributing this update when we learned some customers were having issues. The new update, KB2840149, still addresses the Moderate security issue described in MS13-036, and should not cause these issues.

Introducing EMET v4 Beta

Thursday, April 18, 2013

Great news! Today we are proud to announce a beta release of the next version of the Enhanced Mitigation Experience Toolkit (EMET) – EMET 4.0. Download it here: http://www.microsoft.com/en-us/download/details.aspx?id=38761 EMET is a free utility that helps prevent memory corruption vulnerabilities in software from being successfully exploited for code execution. It does so by opt-ing in software to the latest security mitigation techniques.