Skip to main content

Security Bulletin

Filter by:

RISK: Extremely High Risk

Extremely High Risk

Adobe Flash Player Use-After-Free Memory Vulnerability

A vulnerability has been identified in Adobe Flash Player, which can be exploited by remote attackers to execute arbitrary code.   Note: The vulnerability is being exploited in the wild.
Last Update Date: 16 Jul 2015 Release Date: 15 Jul 2015 3494 Views

RISK: High Risk

High Risk

Oracle Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Oracle products, which can be exploited by remote attackers to execute arbitrary code.
Last Update Date: 15 Jul 2015 16:37 Release Date: 15 Jul 2015 3422 Views

RISK: High Risk

High Risk

Adobe Acrobat/Reader Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Acrobat/Reader, which can be exploited by remote attackers to disclose sensitive information, gain elevated privilege, cause denial of service and execute arbitrary code.
Last Update Date: 15 Jul 2015 16:35 Release Date: 15 Jul 2015 3367 Views

RISK: High Risk

High Risk

Adobe Shockwave Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Shockwave Player, which can be exploited by remote attackers to execute arbitrary code.
Last Update Date: 15 Jul 2015 16:34 Release Date: 15 Jul 2015 3285 Views

RISK: High Risk

High Risk

Microsoft Windows Remote Code Execution Vulnerabilities

Windows DLL Remote Code Execution VulnerabilityA remote code execution vulnerability exists when Microsoft Windows improperly handles the loading of dynamic link library (DLL) files. An attacker who successfully exploited the vulnerability could take complete control of an affected system. An attacker could then install programs; ...
Last Update Date: 15 Jul 2015 15:11 Release Date: 15 Jul 2015 3269 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Remote Procedure Call Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists in the Microsoft Remote Procedure Call (RPC) that could allow an attacker to elevate privileges on a targeted system. The vulnerability is caused when Windows RPC inadvertently allows DCE/RPC connection reflection.
Last Update Date: 15 Jul 2015 15:02 Release Date: 15 Jul 2015 3362 Views

RISK: High Risk

High Risk

Microsoft Office Remote Code Execution Vulnerabilities

Multiple Microsoft Office Memory Corruption VulnerabilitiesRemote code execution vulnerabilities exist in Microsoft Office software when the Office software fails to properly handle objects in memory. Microsoft Excel ASLR Bypass VulnerabilityA security feature bypass vulnerability exists in Microsoft Excel when memory is released in an unintended manner. The vulnerability...
Last Update Date: 15 Jul 2015 15:00 Release Date: 15 Jul 2015 3171 Views

RISK: High Risk

High Risk

OpenSSL Alternative Certificate Chain Validation Vulnerability

A vulnerability was identified in OpenSSL. A remote user can bypass certificate validation on the target system. When the validation of a certificate chain fails, the system attempts to validate an alternate certificate chain but does not check the CA flag of untrusted certificates. As a...
Last Update Date: 10 Jul 2015 10:42 Release Date: 10 Jul 2015 3651 Views

RISK: Medium Risk

Medium Risk

Joomla Multiple Vulnerabilities

Multiple vulnerabilities were identified in Joomla!. A remote user can redirect the target user's browser to an arbitrary site. A remote user can conduct cross-site request forgery attacks.
Last Update Date: 8 Jul 2015 10:26 Release Date: 8 Jul 2015 3360 Views

RISK: Medium Risk

Medium Risk

ISC BIND DNSSEC Denial of Service Vulnerability

A vulnerability was identified in ISC BIND. A remote user can cause the target service to crash. A remote user can send a query to the target service for a DNS zone that contains specially crafted zone data to cause the target recursive resolver to crash. Recursive...
Last Update Date: 8 Jul 2015 10:25 Release Date: 8 Jul 2015 3443 Views