Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

BIOS Implementations Multiple Vulnerabilities

Multiple BIOS implementations fail to properly set write protections after waking from sleep, leading to the possibility of an arbitrary BIOS image reflash.
Last Update Date: 31 Jul 2015 10:39 Release Date: 31 Jul 2015 3651 Views

RISK: High Risk

High Risk

Microsoft Internet Explorer Mobile Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Internet Explorer Mobile. which can be exploited by remote attackers to execute arbitrary code on the target user's system. A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code...
Last Update Date: 31 Jul 2015 Release Date: 27 Jul 2015 3384 Views

RISK: Medium Risk

Medium Risk

Cisco ASR 1000 Series Routers Denial of Service Vulnerability

A vulnerability was identified in Cisco ASR 1000 series routers. A remote user can cause the target device to reload.
Last Update Date: 31 Jul 2015 10:34 Release Date: 31 Jul 2015 3383 Views

RISK: High Risk

High Risk

Microsoft SQL Server Remote Code Execution Vulnerabilities

SQL Server Elevation of Privilege Vulnerability An elevation of privilege vulnerability exists in Microsoft SQL Server when it improperly casts pointers to an incorrect class. An attacker could exploit the vulnerability if their credentials allow access to an affected SQL server database. An attacker who successfully exploited...
Last Update Date: 31 Jul 2015 Release Date: 15 Jul 2015 6277 Views

RISK: Extremely High Risk

Extremely High Risk

Android Stagefright Media Library Remote Code Execution Vulnerabilities

Multiple vulnerabilities have been identified in Android Stagefright Media Library. By sending crafted MMS or media files to target system, remote attackers can exploit the vulnerabilities by to execute arbitrary code on the target system.   Note: Proof of concept or exploit code may be available in...
Last Update Date: 29 Jul 2015 11:09 Release Date: 29 Jul 2015 6026 Views

RISK: Medium Risk

Medium Risk

Microsoft OLE Elevation of Privilege Vulnerabilities

Elevation of privilege vulnerabilities exists in Microsoft Windows OLE when it fails to properly validate user input. The vulnerabilities by themselves do not allow arbitrary code to be run. The vulnerabilities would have to be used in conjunction with another vulnerability that allows remote code execution. An...
Last Update Date: 28 Jul 2015 Release Date: 15 Jul 2015 3383 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by remote attackers to execute arbitrary code, bypass security controls, obtain potentially sensitive information, spoof URLs and conduct cross-site scripting attacks.
Last Update Date: 24 Jul 2015 Release Date: 23 Jul 2015 3349 Views

RISK: Medium Risk

Medium Risk

Cisco Products Denial of Service Vulnerabilities

A vulnerability was identified in Cisco ASR 9000 Series Routers. A remote user can cause the target service to reload. A vulnerability was identified in Cisco IOS and IOS XE. A remote user can cause the target system to crash.
Last Update Date: 24 Jul 2015 10:16 Release Date: 24 Jul 2015 3241 Views

RISK: Extremely High Risk

Extremely High Risk

Microsoft Font Driver Remote Code Execution Vulnerability

A vulnerability was found in the Windows Adobe Type Manager Library. A remote user can trigger arbitrary code execution on the target system.A remote user can create a specially crafted OpenType font file that, when loaded by the target user, will trigger a flaw in...
Last Update Date: 22 Jul 2015 Release Date: 21 Jul 2015 3889 Views

RISK: Medium Risk

Medium Risk

Microsoft Malicious Software Removal Tool Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists in the Microsoft Malicious Software Removal Tool (MSRT) when it fails to properly handle a race condition involving a DLL-planting scenario. An authenticated attacker who successfully exploited this vulnerability could elevate privileges on a target system. An attacker...
Last Update Date: 21 Jul 2015 Release Date: 15 Jul 2015 3424 Views