US-CERT: Top 30 Targeted High Risk Vulnerabilities

US-CERT: Top 30 Targeted High Risk Vulnerabilities

On April 29, 2015, the US-CERT released alert TA15-119A which describes the Top 30 targeted high risk vulnerabilities that are currently putting critical infrastructure within organisations at risk and therefore organisations should focus on because they are under attack all the time.

The list contains vulnerabilities from Windows, Internet Explorer, Adobe Software from Reader, Flash to Cold Fusion, Java from Oracle and others.

Below is the list of the vulnerabilities in the advisory. To ensure your organisation is protected fully ensure you have patched all your systems for the following.

  • Windows: MS14-060 for CVE-2014-4114
  • Internet Explorer: MS14-021 for CVE-2014-1776
  • MS14-012 for CVE-2014-0322
  • MS13-038 for CVE-2013-1347
  • MS13-008 for CVE-2012-4792
  • MS10-018 for CVE-2010-0806
  • MS09-072 for CVE-2002-3674
  • CVE-2006-3227
  • Adobe Reader: APSB13-15 for CVE-2013-2729
  • APSB11-30 for CVE-2011-2462
  • APSB11-07 for CVE-2011-0611
  • APSB10-21 for CVE-2010-2883
  • APSB10-07 for CVE-2010-0188
  • APSB10-02 for CVE-2009-3953
  • Adobe Flash: APSB14-22 for CVE-2014-0564
  • APSB11-08 for CVE-2011-0611
  • Oracle Java: CPU June 2013 for CVE-2013-2469
  • CPU June 2012 for CVE-2012-1723
  • Microsoft Office: MS14-017 for CVE-2014-1761
  • MS11-021 for CVE-2011-0101
  • MS10-087 for CVE-2010-3333
  • MS09-067 for CVE-2009-3129
  • MS08-042 for CVE-2008-2244
  • Microsoft Office: MS12-060 for CVE-2012-0158
  • Silverlight: MS13-022 for CVE-2013-0074
  • Adobe Cold Fusion: APSB13-27 for CVE-2013-5326
  • APSB13-13 for CVE-2013-3336
  • OpenSSL Heartbleed CVE-2014-0160
Previous Post
SHA1: the end of, what you need to know
Next Post
Building cyber security awareness with the board

Related Posts

No results found

Leave a Reply

Your email address will not be published.

Fill out this field
Fill out this field
Please enter a valid email address.

2 × 2 =

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Menu