Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Apple iOS Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple iOS. A remote user can cause arbitrary code execution, obtain potentially sensitive information and denial of service on the target system. A local user can bypass security restrictions. An application can gain elevated privileges.
Last Update Date: 20 Aug 2015 Release Date: 17 Aug 2015 4300 Views

RISK: Extremely High Risk

Extremely High Risk

Microsoft Internet Explorer Object Access Vulnerability

A vulnerability has been identified in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system.   A remote user can create a specially crafted web page that, when loaded by the target user, will trigger a...
Last Update Date: 20 Aug 2015 Release Date: 19 Aug 2015 4526 Views

RISK: High Risk

High Risk

Apple OS X Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple OS X, which can be exploited by remote attacker to conduct remote code execution, obtain potentially sensitive information, denial of service attack and unauthorized file modification.   A local user can gain system privileges on the target system....
Last Update Date: 20 Aug 2015 Release Date: 17 Aug 2015 4005 Views

RISK: Medium Risk

Medium Risk

IBM WebSphere Application Server Multiple vulnerabilities

Multiple vulnerabilities have been identified in IBM WebSphere Application Server, which can be exploited by remoter attackers to conduct elevation of privilege, disclose sensitive information and provide spoof information.
Last Update Date: 20 Aug 2015 09:16 Release Date: 20 Aug 2015 3891 Views

RISK: High Risk

High Risk

Safari Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Safari. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system.
Last Update Date: 14 Aug 2015 15:40 Release Date: 14 Aug 2015 4020 Views

RISK: Medium Risk

Medium Risk

Microsoft .NET Framework Elevation of Privilege Vulnerabilities

Multiple RyuJIT Optimization Elevation of Privilege VulnerabilitiesElevation of privilege vulnerabilities exist in Microsoft .NET Framework when the RyuJIT compiler improperly optimizes certain parameters resulting in a code generation error. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could...
Last Update Date: 14 Aug 2015 Release Date: 12 Aug 2015 4093 Views

RISK: Medium Risk

Medium Risk

Microsoft Edge Cumulative Security Update

Multiple Memory Corruption VulnerabilitiesRemote code execution vulnerabilities exist when Microsoft Edge improperly accesses objects in memory. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. ASLR BypassA security feature bypass vulnerability exists when Microsoft...
Last Update Date: 14 Aug 2015 Release Date: 12 Aug 2015 3905 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Elevation of Privilege Vulnerabilities

Windows Object Manager Elevation of Privilege VulnerabilityAn elevation of privilege vulnerability exists in Windows Object Manager when it fails to properly validate and enforce impersonation levels. An attacker who successfully exploited this vulnerability could bypass impersonation-level security and gain elevated privileges on a targeted system. Windows...
Last Update Date: 14 Aug 2015 Release Date: 12 Aug 2015 3986 Views

RISK: Medium Risk

Medium Risk

Microsoft WebDAV Information Disclosure Vulnerability

An information disclosure vulnerability exists in the Microsoft Web Distributed Authoring and Versioning (WebDAV) client that is caused when it explicitly allows the use of Secure Socket Layer (SSL) 2.. An attacker who successfully exploited this vulnerability could decrypt portions of encrypted traffic.
Last Update Date: 14 Aug 2015 Release Date: 12 Aug 2015 3880 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Unsafe Command Line Parameter Passing Vulnerability

An information disclosure vulnerability exists in Microsoft Windows, Internet Explorer, and Microsoft Office when files at a medium integrity level become accessible to Internet Explorer running in Enhanced Protection Mode (EPM).
Last Update Date: 14 Aug 2015 Release Date: 12 Aug 2015 4006 Views