Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Microsoft Windows Kernel-Mode Drivers Elevation of Privilege Vulnerabilities

Multiple Microsoft Windows Kernel Memory Disclosure VulnerabilitiesInformation disclosure vulnerabilities exist when the Windows kernel-mode driver leaks private address information during a function call, which could allow the disclosure of kernel memory contents revealing information about the system to an attacker. The information disclosure vulnerabilities by themselves...
Last Update Date: 13 May 2015 14:37 Release Date: 13 May 2015 3259 Views

RISK: Medium Risk

Medium Risk

Microsoft Kernel Security Feature Bypass Vulnerability

A security feature bypass vulnerability exists when the Windows kernel fails to properly validate a memory address, allowing an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (KASLR) bypass. An attacker who successfully exploited this vulnerability...
Last Update Date: 13 May 2015 14:37 Release Date: 13 May 2015 3042 Views

RISK: Medium Risk

Medium Risk

Microsoft JScript and VBScript Scripting Engines Security Feature Bypass Vulnerabilities

VBScript ASLR BypassA security feature bypass exists when the VBScript engine fails to use the Address Space Layout Randomization (ASLR) security feature, allowing an attacker to more reliably predict the memory offsets of specific instructions in a given call stack. The security feature bypass by itself...
Last Update Date: 13 May 2015 14:36 Release Date: 13 May 2015 3271 Views

RISK: Medium Risk

Medium Risk

Microsoft Management Console File Format Denial of Service Vulnerability

A denial of service vulnerability exists when Windows attempts to access a specially crafted .msc file to retrieve the icon information, and then fails to properly validate a destination buffer, resulting in a denial of service. An unauthenticated attacker could exploit this ...
Last Update Date: 13 May 2015 14:36 Release Date: 13 May 2015 3131 Views

RISK: High Risk

High Risk

Adobe Reader and Acrobat Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Reader and Acrobat, which can be exploited by remote attacker to execute arbitrary code, bypass security restriction, cause denial of service condition, and disclose sensitive information.
Last Update Date: 13 May 2015 09:37 Release Date: 13 May 2015 3418 Views

RISK: High Risk

High Risk

Adobe Flash Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Flash Player, which can be exploited by remote attacker to run arbitrary code, bypass security restriction and disclose sensitive information.
Last Update Date: 13 May 2015 09:37 Release Date: 13 May 2015 3257 Views

RISK: High Risk

High Risk

Mozilla Firefox and Thunderbird Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox, Firefox ESR and Thunderbird. Remote attacker can exploit the vulnerabilities to cause denial of service and sensitive information disclosure.
Last Update Date: 13 May 2015 09:37 Release Date: 13 May 2015 3340 Views

RISK: Medium Risk

Medium Risk

Cisco Wireless LAN Controller Denial of Service Vulnerability

A vulnerability has been identified in Cisco Wireless LAN Controller (WLC). A remote user on the adjacent network can cause denial of service conditions on the target system. A remote user can send specially crafted data to trigger a flaw in the wireless web authentication subsystem...
Last Update Date: 12 May 2015 11:14 Release Date: 12 May 2015 3272 Views

RISK: Medium Risk

Medium Risk

Huawei Ethernet Switch Denial of Service Vulnerability

A vulnerability has been identified in multiple Huawei Ethernet Switches, which can be exploited by malicious people to cause a DoS (Denial of Service).
Last Update Date: 8 May 2015 10:24 Release Date: 8 May 2015 3272 Views

RISK: High Risk

High Risk

Apple Safari Multiple Vulnerabilities

Multiple vulnerabilities were identified in Apple Safari. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially sensitive information on the target system. A remote user can spoof user interface elements.
Last Update Date: 8 May 2015 10:24 Release Date: 8 May 2015 2966 Views