Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

PHP Phar Extension Multiple Vulnerabilities

Multiple vulnerabilities were identified in PHP Phar Extension, which could lead to denial of service and information disclosure.
Last Update Date: 5 Nov 2015 Release Date: 28 Oct 2015 3130 Views

RISK: Medium Risk

Medium Risk

IBM Websphere Application Server Multiple Vulnerabilities

Multiple vulnerabilities were identified in IBM Websphere Application Server, which could allow elevation of privilege, unauthorized access and information disclosure.
Last Update Date: 4 Nov 2015 09:24 Release Date: 4 Nov 2015 3108 Views

RISK: High Risk

High Risk

Joomla Multiple SQL injection vulnerabilities

Multiple vulnerabilities were identified in Joomla, which can be exploited by unauthorized remote user to gain administrator privileges by hijacking the administrator session. Following exploitation of the vulnerability, the attacker may gain full control of the web site and execute additional attacks.
Last Update Date: 27 Oct 2015 09:57 Release Date: 27 Oct 2015 3098 Views

RISK: High Risk

High Risk

Apple Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple products. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system.
Last Update Date: 22 Oct 2015 17:34 Release Date: 22 Oct 2015 3253 Views

RISK: High Risk

High Risk

Oracle Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Oracle products. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system.
Last Update Date: 22 Oct 2015 17:34 Release Date: 22 Oct 2015 3410 Views

RISK: Medium Risk

Medium Risk

Apple Keynote, Apple Pages, Apple Numbers and Apple iWork Multiple vulnerabilities

Multiple vulnerabilities have been identified in Apple Keynote, Apple Pages, Apple Numbers and Apple iWork, which can be exploited by remote attacker to execute arbitrary code and obtain potentially sensitive information on the target system.
Last Update Date: 19 Oct 2015 17:28 Release Date: 19 Oct 2015 3144 Views

RISK: High Risk

High Risk

Adobe Flash Player Execute Arbitrary Code Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Flash Player, which can be exploited by remote attacker to execute arbitrary code on the target user's system. A remote user can create specially crafted content that, when loaded by the target user, will trigger a type...
Last Update Date: 19 Oct 2015 17:28 Release Date: 19 Oct 2015 3277 Views

RISK: High Risk

High Risk

Mozilla Firefox Cross-Origin Resource Sharing (CORS) Implementation Vulnerability

A vulnerability has identified in  Mozilla Firefox, a user can exploit this vulnerability to allow a malicious page to access private data from other origins.
Last Update Date: 16 Oct 2015 09:24 Release Date: 16 Oct 2015 3584 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Kernel Elevation of Privilege Vulnerabilities

Multiple Windows Kernel Elevation of Privilege VulnerabilitiesMultiple elevation of privilege vulnerabilities exist in the way the Windows kernel handles objects in memory. An attacker who successfully exploited the vulnerabilities could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or...
Last Update Date: 14 Oct 2015 10:22 Release Date: 14 Oct 2015 3290 Views

RISK: High Risk

High Risk

Microsoft Office Remote Code Execution Vulnerabilities

Multiple Microsoft Office Memory Corruption VulnerabilitiesRemote code execution vulnerabilities exist in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited these vulnerabilities could run arbitrary code in the context of the current user. If the current user is...
Last Update Date: 14 Oct 2015 10:21 Release Date: 14 Oct 2015 3230 Views