Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Microsoft Office Multiple Vulnerabilities

Multiple remote code execution vulnerabilities exist in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative...
Last Update Date: 12 May 2016 Release Date: 11 May 2016 4007 Views

RISK: High Risk

High Risk

Microsoft JScript and VBScript Cumulative Security Update

Multiple remote code execution vulnerabilities exist in the way that the JScript and VBScript engines render when handling objects in memory in Internet Explorer. The vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An...
Last Update Date: 12 May 2016 Release Date: 11 May 2016 4028 Views

RISK: High Risk

High Risk

Microsoft Edge Cumulative Security Update

Multiple remote code execution vulnerabilities exist in the way that the Chakra JavaScript engine renders when handling objects in memory in Microsoft Edge. The vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker...
Last Update Date: 12 May 2016 Release Date: 11 May 2016 3923 Views

RISK: High Risk

High Risk

Microsoft Internet Explorer Cumulative Security Update

A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same...
Last Update Date: 12 May 2016 Release Date: 11 May 2016 4029 Views

RISK: Medium Risk

Medium Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system.
Last Update Date: 12 May 2016 09:54 Release Date: 12 May 2016 3963 Views

RISK: Medium Risk

Medium Risk

WordPress Security Update

Two vulnerabilities were identified in WordPress,  which can be exploited by malicious people to conduct cross-site scripting attacks or allow a remote attacker to take control of an affected system.
Last Update Date: 11 May 2016 10:36 Release Date: 11 May 2016 4000 Views

RISK: Extremely High Risk

Extremely High Risk

ImageMagick Input Validation Vulnerability (ImageTragick)

An input validation vulnerability has been identified in ImageMagick, which could be exploited by remoter attacker to execute arbitrary code on target system.   The vulnerability could affect web server since a common vulnerable configuration would be a web server that allows image uploads that are subsequently processed with...
Last Update Date: 5 May 2016 09:59 Release Date: 5 May 2016 4398 Views

RISK: High Risk

High Risk

OpenSSL Multiple Vulnerabilities

Multiple vulnerabilities were identified in OpenSSL. Attackers can decrypt data in certain cases, cause denial of service conditions, obtain potentially sensitive information and execute arbitrary code on the target system.
Last Update Date: 5 May 2016 Release Date: 4 May 2016 4373 Views

RISK: Medium Risk

Medium Risk

Apple Xcode Multiple Vulnerabilities

Multiple vulnerabilities were identified in Apple Xcode. Exploitation of either of these vulnerabilities may allow a remote attacker to take control of an affected system.
Last Update Date: 5 May 2016 Release Date: 4 May 2016 3883 Views

RISK: Medium Risk

Medium Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system.
Last Update Date: 3 May 2016 09:28 Release Date: 3 May 2016 3889 Views