Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Microsoft Office Remote Code Execution Vulnerabilities

Multiple Microsoft Office Memory Corruption VulnerabilitiesMultiple remote code execution vulnerabilities exist in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited these vulnerabilities could run arbitrary code in the context of the current user. If the current user...
Last Update Date: 15 Jan 2016 Release Date: 13 Jan 2016 3063 Views

RISK: Medium Risk

Medium Risk

Microsoft JScript and VBScript Cumulative Security Update

A remote code execution vulnerability exists in the way that the VBScript engine renders when handling objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
Last Update Date: 15 Jan 2016 Release Date: 13 Jan 2016 3058 Views

RISK: High Risk

High Risk

Microsoft Edge Cumulative Security Update

Microsoft Edge Memory Corruption VulnerabilityA remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Scripting Engine Memory Corruption VulnerabilityA remote code...
Last Update Date: 15 Jan 2016 Release Date: 13 Jan 2016 3061 Views

RISK: High Risk

High Risk

Microsoft Internet Explorer Cumulative Security Update

Scripting Engine Memory Corruption VulnerabilityA remote code execution vulnerability exists in the way that the VBScript engine renders when handling objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user...
Last Update Date: 15 Jan 2016 Release Date: 13 Jan 2016 3239 Views

RISK: High Risk

High Risk

Fortinet FortiGate/FortiOS Remote Users Access Vulnerability

A vulnerability has been identified in Fortinet FortiGate/FortiOS, a remote user can gain access to the target system via SSH using an undocumented account.
Last Update Date: 14 Jan 2016 12:05 Release Date: 14 Jan 2016 3417 Views

RISK: Medium Risk

Medium Risk

ISC DHCP UDP Payload Validation Vulnerability

A vulnerability has been identified in ISC Dynamic Host Configuration Protocol (DHCP) software. Exploitation of this vulnerability may allow a remote attacker to cause a denial-of-service condition.
Last Update Date: 13 Jan 2016 10:12 Release Date: 13 Jan 2016 3185 Views

RISK: High Risk

High Risk

Adobe Acrobat/Reader Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Acrobat/Reader. A remote user can cause arbitrary code to be executed, and bypass security controls on the target system.
Last Update Date: 13 Jan 2016 09:48 Release Date: 13 Jan 2016 3205 Views

RISK: High Risk

High Risk

Apple QuickTime Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple QuickTime. Exploitation of one of these vulnerabilities may allow an attacker to take control of an affected system.
Last Update Date: 11 Jan 2016 10:17 Release Date: 11 Jan 2016 2983 Views

RISK: High Risk

High Risk

Mozilla Firefox TLS ServerKeyExchange Vulnerability

A vulnerability has been identified in Mozilla Firefox. Exploitation of this vulnerability may allow a remote attacker to obtain sensitive information from an affected system.
Last Update Date: 11 Jan 2016 10:17 Release Date: 11 Jan 2016 3106 Views

RISK: Medium Risk

Medium Risk

PHP Multiple Vulnerabilities

 Multiple vulnerabilities were identified in PHP. A remote user can gain elevated privileges. A remote user can execute arbitrary code on the target system. A remote user can obtain potentially sensitive information on the target system.
Last Update Date: 8 Jan 2016 10:24 Release Date: 8 Jan 2016 3067 Views