Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Microsoft Windows IIS Remote Code Execution Vulnerability

A remote code execution vulnerability exists when Microsoft Windows fails to properly validate input before loading certain libraries. An attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or...
Last Update Date: 12 May 2016 Release Date: 11 May 2016 3251 Views

RISK: High Risk

High Risk

Microsoft Windows Shell Remote Code Execution Vulnerability

A remote code execution vulnerability exists when Windows Shell improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code and take control of the affected system. An attacker could then install programs; view, change, or delete data; or...
Last Update Date: 12 May 2016 Release Date: 11 May 2016 3255 Views

RISK: High Risk

High Risk

Microsoft Windows Journal Memory Corruption Vulnerability

A remote code execution vulnerability exists in Microsoft Windows when a specially crafted Journal file is opened in Windows Journal. An attacker who successfully exploited this vulnerability could cause arbitrary code to execute in the context of the current user. If a user is logged on with administrative...
Last Update Date: 12 May 2016 Release Date: 11 May 2016 3297 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Graphics Component Multiple Vulnerabilities

Information disclosure vulnerabilities exist when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerabilities could obtain information to further compromise the user’s system.   There are multiple ways an attacker could exploit the vulnerabilities, such as by...
Last Update Date: 12 May 2016 Release Date: 11 May 2016 3196 Views

RISK: High Risk

High Risk

Microsoft Office Multiple Vulnerabilities

Multiple remote code execution vulnerabilities exist in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative...
Last Update Date: 12 May 2016 Release Date: 11 May 2016 3222 Views

RISK: High Risk

High Risk

Microsoft JScript and VBScript Cumulative Security Update

Multiple remote code execution vulnerabilities exist in the way that the JScript and VBScript engines render when handling objects in memory in Internet Explorer. The vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An...
Last Update Date: 12 May 2016 Release Date: 11 May 2016 3203 Views

RISK: High Risk

High Risk

Microsoft Edge Cumulative Security Update

Multiple remote code execution vulnerabilities exist in the way that the Chakra JavaScript engine renders when handling objects in memory in Microsoft Edge. The vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker...
Last Update Date: 12 May 2016 Release Date: 11 May 2016 3142 Views

RISK: High Risk

High Risk

Microsoft Internet Explorer Cumulative Security Update

A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same...
Last Update Date: 12 May 2016 Release Date: 11 May 2016 3228 Views

RISK: Medium Risk

Medium Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system.
Last Update Date: 12 May 2016 09:54 Release Date: 12 May 2016 3179 Views

RISK: Medium Risk

Medium Risk

WordPress Security Update

Two vulnerabilities were identified in WordPress,  which can be exploited by malicious people to conduct cross-site scripting attacks or allow a remote attacker to take control of an affected system.
Last Update Date: 11 May 2016 10:36 Release Date: 11 May 2016 3210 Views