×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

Secure Your Organization


Secure Specific Platforms


U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

Secure Your Organization


Learn


Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



Multiple vulnerabilities have been discovered in Apple MAC OS X.



Multiple vulnerabilities have been discovered in Microsoft Windows that could allow for remote code execution.



This security update resolves five privately reported vulnerabilities in Microsoft Office.



Multiple vulnerabilities in Adobe Font Driver could allow remote code execution.



Multiple vulnerabilities have been discovered in Microsoft Windows that could allow for remote code execution.



A vulnerability exists in the VBScript scripting engine in Microsoft Windows which could allow for remote code execution if a user visits a specially crafted website.



Multiple vulnerabilities have been discovered in Microsoft's web browser, Internet Explorer, which could allow an attacker to take complete control of an affected system.



This security update resolves three privately reported vulnerabilities in Microsoft Office.



Multiple vulnerabilities have been discovered in Google Chrome that could result in remote code execution.



A memory corruption vulnerability has been discovered in Microsoft Word that could allow for remote code execution.



Multiple vulnerabilities have been identified in Mozilla Firefox and Thunderbird which could allow for remote code execution.



A vulnerability has been discovered in PHP which could allow an attacker to remotely disclose source code and potentially execute arbitrary code.



A vulnerability has been discovered in WordPress CMS, which could allow an attacker to take control of the affected system.



A vulnerability has been discovered in the PHP which could allow an attacker to remotely disclose source code and potentially execute arbitrary code.



Multiple vulnerabilities have been discovered in Microsoft Windows Kernel-Mode drivers that could allow for remote code execution.



1 151 152 153 154