1-888-595-0672[email protected]

Posts on Jan 1970

MS Office Vulnerability

A vulnerability in Office 2010 SP2, Word 2010 SP2, Microsoft Word 2007 SP3,  and Office for Mac 2011 allows remote attackers to execute arbitrary code through a well constructed document also known as “Microsoft Office Memory Corruption Vulnerability.” Please review CVE-2015f-2469 for more information.

“Bulletin (CVE-2015-2469).” US-CERT. Department of Homeland Security, 14 Aug. 2015. Web. 27 Aug. 2015.

 

Read More
Vulnerability in Internet Explorer

Versions 7 through 11 for Microsoft Internet Explorer allows remote attackers to cause a memory corruption also known as a “Memory Corruption Vulnerability”. Please review CVE-2015-2441 for more information.

“Bulletin (CVE-2015-2441).” US-CERT. Department of Homeland Security, 14 Aug. 2015. Web. 17 Aug. 2015.

Read More
Vulnerability in WordPress

WordPress versions prior to 4.2.3 does not properly authenticate the “edit_posts” functionality which allows authenticated users to bypass access restrictions and create drafts by using the Subscriber role. Please review CVE-2015-5623 for more information.

“Bulletin (CVE-2015-5623).” US-CERT. Department of Homeland Security, 3 Aug. 2015. Web. 12 Aug. 2015.

Read More
Cisco Vulnerability

On Firepower 9000 devices, Cisco Firepower Extensible Operating System 1.1 allows remote attackers to bypass access restrictions and collect confidential information by visiting an unspecified web page. Please review CVE-2015 for more information.

“Bulletin (CVE-2015).” US-CERT. Department of Homeland Security, 28 July 2015. Web. 05 Aug. 2015. <https://www.us-cert.gov/ncas/bulletins/SB15-215>.

Read More