Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Microsoft Office Remote Code Execution Vulnerabilities

Microsoft Office Uninitialized Memory Use Vulnerability A remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could use a specially crafted file to perform actions in the security context of...
Last Update Date: 10 Jun 2015 09:50 Release Date: 10 Jun 2015 3095 Views

RISK: High Risk

High Risk

Microsoft Windows Media Player Remote Code Execution Vulnerability

A remote code execution vulnerability exists in the way that Windows Media Player handles specially crafted DataObjects. An attacker who successfully exploited this vulnerability could take complete control of an affected system remotely. An attacker could then install programs; view, change, or...
Last Update Date: 10 Jun 2015 09:49 Release Date: 10 Jun 2015 3137 Views

RISK: High Risk

High Risk

Microsoft Internet Explorer Cumulative Security Update

Internet Explorer Information Disclosure Vulnerability An information disclosure vulnerability exists in Internet Explorer that could allow an attacker who successfully exploited this vulnerability to gain access to a user's browser history. Multiple Elevation of Privilege Vulnerabilities Elevation of privilege vulnerabilities exist when Internet Explorer does...
Last Update Date: 10 Jun 2015 09:48 Release Date: 10 Jun 2015 3026 Views

RISK: Medium Risk

Medium Risk

OpenSSL Double Free Memory Vulnerability

A vulnerability was identified in OpenSSL. The impact was not specified.A remote server can return a specially crafted NewSessionTicket message to a connected multi-threaded client.It may cause a double free memory error.
Last Update Date: 5 Jun 2015 09:30 Release Date: 5 Jun 2015 3406 Views

RISK: Medium Risk

Medium Risk

PHP Multiple Vulnerabilities

Multiple vulnerabilities were identified in PHP. A remote user can bypass security controls, cause denial of service conditions, and execute arbitrary code on the target system.The set_include_path(), tempnam(), rmdir(), and readlink() functions accept a null value ('/') in a...
Last Update Date: 2 Jun 2015 09:50 Release Date: 2 Jun 2015 3130 Views

RISK: Extremely High Risk

Extremely High Risk

Apple iOS Notification Unicode Character Processing Vulnerability

A vulnerability has been identified in Apple iOS, which can be exploited by a remote user to cause denial of service conditions on the target system.   A remote user can send a specially crafted string of Unicode characters to trigger a flaw in the Springboard component and cause...
Last Update Date: 28 May 2015 10:07 Release Date: 28 May 2015 4708 Views

RISK: Medium Risk

Medium Risk

PostgreSQL Multiple Vulnerabilities

Multiples vulnerabilities were identified in PostgreSQL, which can be exploited to cause remote crash, information exposure and possible side-channel key exposure.
Last Update Date: 26 May 2015 09:45 Release Date: 26 May 2015 3220 Views

RISK: Medium Risk

Medium Risk

Diffie-Hellman Key Exchange "Logjam" Vulnerability

A vulnerability has been identified in Diffie-Hellman Key Exchange (DH). The vulnerability allows attackers to intercept protocols that rely on DH and force them to use ‘export-grade’ cryptography, which can then be decrypted or altered.
Last Update Date: 22 May 2015 12:14 Release Date: 22 May 2015 3420 Views

RISK: Medium Risk

Medium Risk

Cisco ASA Denial of Service Vulnerability

A vunlerability was identified in Cisco ASA. A remote user can cause denial of service conditions on the target system.A remote user can disrupt the multicast forwarding feature on the target system.   Note: No official solution is currently available.
Last Update Date: 22 May 2015 10:34 Release Date: 22 May 2015 3196 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by remote attackers to conduct spoofing and execute arbitrary code.
Last Update Date: 21 May 2015 09:34 Release Date: 21 May 2015 3129 Views