1-888-595-0672[email protected]

Posts on Jan 1970

Vulnerability in Google Chrome

Google Chrome prior to 44.0.2403.89 contains a vulnerability that makes it easier for remote attackers to execute arbitrary code by using a crafted file and a user’s previous “always open files of this type” option. Please review CVE-2015-1274 for more information.

“Bulletin (CVE-2015-1274).” US-CERT. Department of Homeland Security, 22 July 2015. Web. 27 July 2015. <https://www.us-cert.gov/ncas/bulletins/SB15-208>.

 

Read More
Vulnerability in Chrysler automobiles

A computer feature that is internet-connected called Uconnect in several Fiat Chrysler cars, SUVs, and trucks has a vulnerability that will let anyone who knows the car’s IP address to gain access, even anywhere from the country using Uconnect’s cellular connection. Read the following article for more details: http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/

“Hackers Remotely Kill a Jeep on the Highway-With Me in It.” Wired. Conde Nast Digital, 21 July 2015. Web. 24 July 2015.

 

Read More
Vulnerability in Internet Explorer 8 & 9

Remote attackers can execute arbitrary codes or cause a denial of service due to a vulnerability in Microsoft Internet Explorer 8 and 9 via a crafted web site. Please review CVE-2015-1738 for more information.

“Bulletin (CVE-2015-1738).” US-CERT. Department of Homeland Security, 14 July 2015. Web. 20 July 2015.

Read More
Vulnerability in Mozilla Firefox

Several unspecified vulnerabilities  in Mozilla Firefox in version 39.0 and earlier allows remote attackers to cause memory corruption and possible application crash. There is even a possibility of attackers possibly executing arbitrary code through unspecified vectors. Please review CVE-2015-2726 for more information.

“Bulletin (CVE-2015-2726).” US-CERT. Department of Homeland Security, 5 July 2015. Web. 13 July 2015. <https://www.us-cert.gov/ncas/bulletins/SB15-194>.

Read More
Vulnerability in Adobe Flash

Adobe Flash Player 18.0.0.194 and earlier versions for Windows, Macintosh and Linux have a critical vulnerability. Exploitation of this vulnerability could cause a remote attacker to take control of the affected system. Please review the following patch for more information.

“Adobe Security Bulletin.” US-CERT. Department of Homeland Security, 8 July 2015. Web. 13 July 2015. https://helpx.adobe.com/security/products/flash-player/apsa15-03.html.

Read More
Vulnerability in Cisco Headend System Release

Remote attackers can cause a denial of service (memory consumption) via unspecified vectors in the Cisco Headend System Release, which is also known as the Bug ID CSCus91838. Please review CVE-2015-4227CISCO.

“Bulletin (CVE-2015-4227).” US-CERT. Department of Homeland Security, 30 June 2015. Web. 06 July 2015. <https://www.us-cert.gov/ncas/bulletins/SB15-187>.

Read More
Vulnerability in Adobe Photoshop

A vulnerability in Adobe Photoshop versions 16.0 and earlier allows attackers to cause a memory corruption or conduct arbitrary code through undefined vectors. Please review CVE-2015-3109CONFIRM for more information.

“Bulletin ( CVE-2015-3109).” US-CERT. Department of Homeland Security, 24 June 2015. Web. 30 June 2015.

Read More