- I've yet to find a retro stereo amp that delivers sound as accurately for various genres than this
- Use AI at work? You might be ruining your reputation, a new study finds
- Why Whoop's policy change has fans fuming
- Apple now sells refurbished iPhone 15 models at discounted prices (including the Pro Max)
- The best no-log VPNs of 2025: Expert tested and reviewed
Tripwire Patch Priority Index for September 2021 | The State of Security

Tripwire’s September 2021 Patch Priority Index (PPI) brings together important vulnerabilities from Microsoft, Adobe, Linux, and Confluence.
First on the patch priority list this month are patches for the Linux kernel (CVE-2021-3490) and Confluence Server and Data Center (CVE-2021-26084). Exploits for these vulnerabilities have been recently added to the Metasploit Exploit Framework. These systems should be patched as soon as possible.
Up next are patches for Microsoft Edge that resolve information disclosure and use after free vulnerabilities.
Next are patches for Microsoft Office, Excel, and Access. These patches resolve remote code execution and spoofing vulnerabilities.
Up next are patches for Adobe Reader and Acrobat that resolve type confusion, buffer overflow, information disclosure, out-of-bound read, out-of-bounds write, and user after free vulnerabilities.
Next are patches that affect components of the Windows operating systems. These patches resolve over 30 vulnerabilities, including elevation of privilege, information disclosure, security feature bypass, remote code execution, and remote code execution vulnerabilities. These vulnerabilities affect core Windows, print spooler, storage, installer, common log file system driver, authenticode, ancillary function driver, kernel, subsystem for Linux, SMB, update client, and others.
Lastly, administrators should focus on server-side patches for Microsoft SharePoint and Windows DNS. These patches resolve several issues including spoofing and elevation of privilege vulnerabilities.
BULLETIN | CVE |
Exploit Framework – Metasploit | CVE-2021-3490, CVE-2021-26084 |
Microsoft Edge | CVE-2021-37976, CVE-2021-37975, CVE-2021-37974 |
Microsoft Office Excel | CVE-2021-38655, CVE-2021-38660 |
Microsoft Office | CVE-2021-38658, CVE-2021-38650 |
Microsoft Office Access | CVE-2021-38646 |
APSB21-55 Adobe Reader and Acrobat | CVE-2021-39841, CVE-2021-39863, CVE-2021-39857, CVE-2021-39856, CVE-2021-39855, CVE-2021-39844, CVE-2021-39861, CVE-2021-39858, CVE-2021-39843, CVE-2021-39846, CVE-2021-39845, CVE-2021-35982, CVE-2021-39859, CVE-2021-39840, CVE-2021-39842, CVE-2021-39839, CVE-2021-39838, CVE-2021-39837, CVE-2021-39836, CVE-2021-39860, CVE-2021-39852, CVE-2021-39854, CVE-2021-39853, CVE-2021-39850, CVE-2021-39849, CVE-2021-39851 |
Microsoft Windows | CVE-2021-38637, CVE-2021-38624, CVE-2021-36961, CVE-2021-36962, CVE-2021-36963, CVE-2021-36955, CVE-2021-38633, CVE-2021-36959, CVE-2021-36969, CVE-2021-38635, CVE-2021-38636, CVE-2021-36973, CVE-2021-38628, CVE-2021-38638, CVE-2021-36964, CVE-2021-38630, CVE-2021-38626, CVE-2021-38625, CVE-2021-38629, CVE-2021-36954, CVE-2021-36966, CVE-2021-40444, CVE-2021-26435, CVE-2021-38639, CVE-2021-36975, CVE-2021-40447, CVE-2021-38671, CVE-2021-38667, CVE-2021-38632, CVE-2021-36967, CVE-2021-36965, CVE-2021-36974, CVE-2021-36960, CVE-2021-36972, CVE-2021-38634 |
Microsoft Office SharePoint | CVE-2021-38652, CVE-2021-38651 |
Microsoft Windows DNS | CVE-2021-36968 |