1-888-595-0672[email protected]

Posts on Jan 1970

Vulnerability in iPhone

A GasGauge vulnerability in Apple iOS before 9.1 allows attackers to execute arbitrary code in a privileged context or cause a memory corruption.

“Bulletin (CVE-2015-6979).” US-CERT. Department of Homeland Security, 23 Oct. 2015. Web. 27 Oct. 2015. <https://www.us-cert.gov/ncas/bulletins/SB15-299>.

Read More
Windows 10 Vulnerability

A vulnerability called “use-after-free” in Windows Shell in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows RT Gold and 8.1, and Windows 10 allows remote attackers to execute arbitrary code via a crafted toolbar object.

“Bulletin (CVE-2015-2515).” US-CERT. Department of Homeland Security, 13 Oct. 2015. Web. 20 Oct. 2015. <https://www.us-cert.gov/ncas/bulletins/SB15-292>.

Read More
Android Vulnerability

In Android through 5.1.1, libutils allows remote attackers to execute arbitrary code via crafted metadata in a MP3 or MP4 file, as demonstrated by an attack against use of libutils by libstagefright in Android 5.x.

“Bulletin (CVE-2015-6602).” US-CERT. Department of Homeland Security, 1 Oct. 2015. Web. 05 Oct. 2015. <https://www.us-cert.gov/ncas/bulletins/SB15-278>.

Read More
Vulnerability in Mozilla Firefox

Several vulnerabilities in versions prior to 41.0 of Mozilla Firefox allow remote attackers to cause memory corruption through unknown vectors.

“Bulletin (CVE-2015-4501).” US-CERT. Department of Homeland Security, 24 Sept. 2015. Web. 01 Oct. 2015. <https://www.us-cert.gov/ncas/bulletins/SB15-271>.

Read More