Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Microsoft Office Multiple Vulnerabilities

Multiple Microsoft Office Memory Corruption VulnerabilitiesMultiple remote code execution vulnerabilities exist in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user...
Last Update Date: 15 Jun 2016 17:43 Release Date: 15 Jun 2016 3822 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Kernel-Mode Drivers Multiple Vulnerabilities

Multiple Win32k Elevation of Privilege VulnerabilitiesMultiple elevation of privilege vulnerabilities exist in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited the vulnerabilities could run arbitrary code in kernel mode. An attacker could then install programs; ...
Last Update Date: 15 Jun 2016 17:36 Release Date: 15 Jun 2016 3950 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows DNS Server Remote Code Execution Vulnerability

Windows DNS Server Use After Free VulnerabilityA remote code execution vulnerability exists in Windows Domain Name System (DNS) servers when they fail to properly handle requests. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the Local System Account. Windows...
Last Update Date: 15 Jun 2016 17:36 Release Date: 15 Jun 2016 3990 Views

RISK: Medium Risk

Medium Risk

Microsoft JScript and VBScript Cumulative Security Update

Multiple Scripting Engine Memory Corruption VulnerabilitiesMultiple remote code execution vulnerabilities exist in the way that the JScript 9, JScript, and VBScript engines render when handling objects in memory in Internet Explorer. The vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code...
Last Update Date: 15 Jun 2016 17:36 Release Date: 15 Jun 2016 4001 Views

RISK: High Risk

High Risk

Microsoft Internet Explorer Cumulative Security Update

Microsoft Internet Explorer Memory Corruption Vulnerabilities Remote code execution vulnerabilities exist when Internet Explorer improperly accesses objects in memory. The vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited...
Last Update Date: 15 Jun 2016 17:36 Release Date: 15 Jun 2016 3950 Views

RISK: High Risk

High Risk

Microsoft Edge Cumulative Security Update

Microsoft Edge Security Feature BypassA security feature bypass exists in Microsoft Edge when the Edge Content Security Policy (CSP) fails to properly validate certain specially crafted documents. An attacker who exploited the bypass could trick a user into loading a page containing malicious content. Multiple Scripting...
Last Update Date: 15 Jun 2016 17:29 Release Date: 15 Jun 2016 4020 Views

RISK: High Risk

High Risk

VMware NSX, vCNS and vRealize Log Insight Multiple Vulnerabilities

Multiple vulnerabilities were identified in VMware NSX, vCNS and vRealize Log Insight. Exploitation of one of these vulnerabilities could allow a remote attacker to take control of an affected system.
Last Update Date: 13 Jun 2016 10:41 Release Date: 13 Jun 2016 4151 Views

RISK: High Risk

High Risk

Mozilla Firefox Multiple vulnerabilities

Multiple vulnerabilities were identified in Mozilla Firefox, which may allow a remote attacker to take control of an affected system.
Last Update Date: 8 Jun 2016 12:14 Release Date: 8 Jun 2016 4538 Views

RISK: Extremely High Risk

Extremely High Risk

CryptXXX Ransomware Encrypts Victim Data

A ransomware known as CryptXXX has been spreading quickly through compromised websites. HKCERT has received several CryptXXX infection reports from victims since mid-May 2016.   How CryptXXX was spread Compromised website: Most victims were infected by visiting compromised websites. Those websites mainly targeted...
Last Update Date: 7 Jun 2016 Release Date: 3 Jun 2016 7928 Views

RISK: High Risk

High Risk

NTP Multiple Vulnerabilities

Multiple vulnerabilities have been identified in ntp, a remote attacker can exploit these vulnerabilities to cause denial of service and tampering in the targeted system.
Last Update Date: 7 Jun 2016 09:09 Release Date: 7 Jun 2016 4193 Views