
{"version":"1.0","provider_name":"OTAVA","provider_url":"https:\/\/www.otava.com","title":"May Microsoft Security Updates","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"98dvj7iUbx\"><a href=\"https:\/\/www.otava.com\/blog\/may-microsoft-security-updates\/\">May Microsoft Security Updates<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.otava.com\/blog\/may-microsoft-security-updates\/embed\/#?secret=98dvj7iUbx\" width=\"600\" height=\"338\" title=\"&#8220;May Microsoft Security Updates&#8221; &#8212; OTAVA\" data-secret=\"98dvj7iUbx\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.otava.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Last week Microsoft had ten different vulnerabilities patched, including another cumulative Internet Explorer update. Two of the patches are considered critical, with the other eight labelled \u2018Important\u2019. The patch for Internet Explorer is meant to resolve eleven different vulnerabilities found within the browser. These vulnerabilities could result in remote code execution if the user lands on a specially made web page using Internet Explorer, allowing the attacker to gain the same rights as the user. This affects Internet Explorer 6-10 on Windows clients. The other critical update resolves one vulnerability disclosed to take the place of a temporary fix Microsoft announced last week. It also allows remote code execution if a user views a malicious website within the browser. This vulnerability may only affect Internet Explorer 8, which is an older version of the browser, but it happens to currently be the most used version. An attacker that exploits this vulnerability could end up with the same rights as the user. Microsoft mentions that one way to lower the effect of remote code execution attacks is to configure user rights on a basis of need. If a user isn\u2019t dependent on certain administrative rights in order to fulfill their duties,..."}