Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Microsoft Office Remote Code Execution Vulnerabilities

Microsoft Office Memory Corruption VulnerabilityA remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle rich text format files in memory. Multiple Microsoft Office Component Use After Free VulnerabilitiesRemote code execution vulnerabilities exist in Microsoft Office software that are caused when the...
Last Update Date: 15 Apr 2015 14:58 Release Date: 15 Apr 2015 3173 Views

RISK: High Risk

High Risk

Microsoft Internet Explorer Cumulative Security Update

Multiple Memory Corruption Vulnerabilities in Internet Explorer Remote code execution vulnerabilities exist when Internet Explorer improperly accesses objects in memory. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The update addresses the...
Last Update Date: 15 Apr 2015 14:58 Release Date: 15 Apr 2015 3157 Views

RISK: Medium Risk

Medium Risk

IBM WebSphere Application Server SSL/TLS RC4 Vulnerability

The RC4 algorithm, as used in the TLS protocol and SSL protocol, could allow a remote attacker to obtain sensitive information. An attacker could exploit this vulnerability to remotely expose account credentials without requiring an active man-in-the-middle session.
Last Update Date: 15 Apr 2015 11:43 Release Date: 15 Apr 2015 3368 Views

RISK: Medium Risk

Medium Risk

Oracle Database Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Oracle Database. A remote authenticated user can gain full control of the target system, cause denial of service conditions, and access and modify data on the target system.
Last Update Date: 15 Apr 2015 11:04 Release Date: 15 Apr 2015 3138 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows NTLM Information Disclosure Vulnerability

Many software products use HTTP requests for various features such as software update checking. A malicious user can intercept such requests (such as with a MITM proxy) and use HTTP Redirect to redirect the victim a malicious SMB server. If the redirect is a file:// ...
Last Update Date: 14 Apr 2015 10:14 Release Date: 14 Apr 2015 3484 Views

RISK: High Risk

High Risk

Apple Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple products (OS X, Safari, iOS, Apple TV, Xcode), which can be exploited by remote attackers to conduct remote code execution, denial of service, sensitive information disclosure, tampering and security restriction bypass.
Last Update Date: 9 Apr 2015 10:58 Release Date: 9 Apr 2015 3318 Views

RISK: Medium Risk

Medium Risk

Mozilla Firefox Multiple Vulnerabilities

Multiple vulnerabilities were identified in Mozilla Firefox, which could be exploited by a remote user to obtain potentially sensitive information on the target system, and bypass certificate verification.A remote user can create specially crafted HTML that, when loaded by the target user, will invoke...
Last Update Date: 9 Apr 2015 Release Date: 8 Apr 2015 3092 Views

RISK: Medium Risk

Medium Risk

Network Time Protocol daemon (ntpd) Multiple Vulnerabilities

Multiple vulnerabilities were identified in ntpd, which could be exploited by a remote user to cause denial of service conditions and bypass authentication on the target system. A remote user with knowledge of a symmetric association between two hosts can periodically send a specially crafted packet to one...
Last Update Date: 9 Apr 2015 Release Date: 8 Apr 2015 3214 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited to conduct remote code execution.
Last Update Date: 2 Apr 2015 15:30 Release Date: 2 Apr 2015 3119 Views

RISK: High Risk

High Risk

Mozilla Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox, Firefox ESR and Thunderbird, which can be exploited by malicious people to disclose potentially sensitive information, conduct clickjacking and cross-site request forgery attacks, bypass certain security restrictions, and compromise a user'...
Last Update Date: 1 Apr 2015 17:47 Release Date: 1 Apr 2015 3315 Views