Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Microsoft Windows Hyper-V Multiple Vulnerabilties

Hyper-V Remote Code Execution VulnerabilityA remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on...
Last Update Date: 13 Apr 2016 12:03 Release Date: 13 Apr 2016 3185 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows OLE Remote Code Execution Vulnerability

A remote code execution vulnerability exists when Microsoft Windows OLE fails to properly validate user input. An attacker could exploit the vulnerability to execute malicious code.
Last Update Date: 13 Apr 2016 12:03 Release Date: 13 Apr 2016 3164 Views

RISK: High Risk

High Risk

Microsoft Office Multiple Vulnerabilities

Multiple remote code execution vulnerabilities exist in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative...
Last Update Date: 13 Apr 2016 12:00 Release Date: 13 Apr 2016 3125 Views

RISK: Medium Risk

Medium Risk

Microsoft .NET Framework Remote Code Execution Vulnerability

A remote code execution vulnerability exists when Microsoft .NET Framework fails to properly validate input before loading libraries. An attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; ...
Last Update Date: 13 Apr 2016 12:00 Release Date: 13 Apr 2016 3158 Views

RISK: Medium Risk

Medium Risk

Microsoft XML Core Services Remote Code Execution Vulnerability

A remote code execution vulnerability exists when the Microsoft XML Core Services (MSXML) parser processes user input. An attacker who successfully exploited the vulnerability could run malicious code remotely to take control of the user’s system.
Last Update Date: 13 Apr 2016 12:00 Release Date: 13 Apr 2016 3792 Views

RISK: High Risk

High Risk

Microsoft Internet Explorer Cumulative Security Update

Multiple Internet Explorer Memory Corruption VulnerabilitiesMultiple remote code execution vulnerabilities exist when Internet Explorer improperly accesses objects in memory. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. DLL Loading Remote Code Execution VulnerabilityA...
Last Update Date: 13 Apr 2016 11:59 Release Date: 13 Apr 2016 3426 Views

RISK: High Risk

High Risk

Microsoft Edge Cumulative Security Update

Multiple Microsoft Edge Memory Corruption VulnerabilitiesMultiple remote code execution vulnerabilities exist when Microsoft Edge improperly accesses objects in memory. The vulnerabilities could corrupt memory that enables an attacker to execute arbitrary code in the context of the current user. Microsoft Edge Elevation of PrivilegeAn elevation of privilege vulnerability...
Last Update Date: 13 Apr 2016 11:59 Release Date: 13 Apr 2016 3196 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Graphics Component Multiple Vulnerabilities

Multiple Win32k Elevation of Privilege VulnerabilitiesElevation of privilege vulnerabilities exist when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited the vulnerabilities could run arbitrary code in kernel mode. An attacker could then install programs; view, change...
Last Update Date: 13 Apr 2016 11:59 Release Date: 13 Apr 2016 3211 Views

RISK: High Risk

High Risk

Adobe Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Creative Cloud Desktop Application and RoboHelp Server, which could be exploited by remote attackers to execute arbitrary code and disclose sensitive information.
Last Update Date: 13 Apr 2016 11:26 Release Date: 13 Apr 2016 3434 Views

RISK: High Risk

High Risk

Samba 'Badlock' Vulnerabilities

Multiple vulnerabilities, known as Badlock, have been identified in Samba. Exploitation of these vulnerabilities may allow a remote attacker to take control of an affected system or create a denial-of-service condition.
Last Update Date: 13 Apr 2016 10:15 Release Date: 13 Apr 2016 3455 Views