Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Apple Keynote, Apple Pages, Apple Numbers and Apple iWork Multiple vulnerabilities

Multiple vulnerabilities have been identified in Apple Keynote, Apple Pages, Apple Numbers and Apple iWork, which can be exploited by remote attacker to execute arbitrary code and obtain potentially sensitive information on the target system.
Last Update Date: 19 Oct 2015 17:28 Release Date: 19 Oct 2015 3894 Views

RISK: High Risk

High Risk

Adobe Flash Player Execute Arbitrary Code Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Flash Player, which can be exploited by remote attacker to execute arbitrary code on the target user's system. A remote user can create specially crafted content that, when loaded by the target user, will trigger a type...
Last Update Date: 19 Oct 2015 17:28 Release Date: 19 Oct 2015 4053 Views

RISK: High Risk

High Risk

Mozilla Firefox Cross-Origin Resource Sharing (CORS) Implementation Vulnerability

A vulnerability has identified in  Mozilla Firefox, a user can exploit this vulnerability to allow a malicious page to access private data from other origins.
Last Update Date: 16 Oct 2015 09:24 Release Date: 16 Oct 2015 4362 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Kernel Elevation of Privilege Vulnerabilities

Multiple Windows Kernel Elevation of Privilege VulnerabilitiesMultiple elevation of privilege vulnerabilities exist in the way the Windows kernel handles objects in memory. An attacker who successfully exploited the vulnerabilities could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or...
Last Update Date: 14 Oct 2015 10:22 Release Date: 14 Oct 2015 4077 Views

RISK: High Risk

High Risk

Microsoft Office Remote Code Execution Vulnerabilities

Multiple Microsoft Office Memory Corruption VulnerabilitiesRemote code execution vulnerabilities exist in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited these vulnerabilities could run arbitrary code in the context of the current user. If the current user is...
Last Update Date: 14 Oct 2015 10:21 Release Date: 14 Oct 2015 4006 Views

RISK: High Risk

High Risk

Microsoft Windows Shell Remote Code Execution Vulnerabilities

Toolbar Use After Free VulnerabilityA remote code execution vulnerability exists when Windows Shell improperly handles objects in memory. An attacker who successfully exploited this vulnerability could cause arbitrary code to execute in the context of the current user. If a user is logged on with administrative user rights...
Last Update Date: 14 Oct 2015 10:21 Release Date: 14 Oct 2015 3976 Views

RISK: Medium Risk

Medium Risk

Microsoft JScript and VBScript Multiple Vulnerabilities

Multiple Scripting Engine Memory Corruption VulnerabilitiesRemote code execution vulnerabilities exist in the way that the VBScript and JScript engines, when handling objects in memory in Internet Explorer, render. In a web-based attack scenario, an attacker could host a specially crafted website that is designed...
Last Update Date: 14 Oct 2015 10:21 Release Date: 14 Oct 2015 4001 Views

RISK: High Risk

High Risk

Microsoft Edge Cumulative Security Update

Microsoft Edge Information Disclosure VulnerabilityAn information disclosure vulnerability exists when Microsoft Edge improperly discloses the contents of its memory, which could provide an attacker with information to further compromise the user's computer. Microsoft Edge XSS Filter BypassA cross-site scripting (XSS) filter bypass...
Last Update Date: 14 Oct 2015 10:20 Release Date: 14 Oct 2015 4042 Views

RISK: High Risk

High Risk

Microsoft Internet Explorer Cumulative Security Update

Multiple Internet Explorer Memory Corruption VulnerabilitiesRemote code execution vulnerabilities exist when Internet Explorer improperly accesses objects in memory. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Multiple Scripting Engine Memory Corruption VulnerabilitiesRemote code...
Last Update Date: 14 Oct 2015 10:20 Release Date: 14 Oct 2015 3960 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by remote attacker to execute arbitrary code and disclose sensitive information.
Last Update Date: 14 Oct 2015 09:38 Release Date: 14 Oct 2015 3896 Views