CIS Logo
tagline: Confidence in the Connected World


Multiple vulnerabilities have been discovered in Microsoft Windows that could allow for remote code execution.



Multiple vulnerabilities have been discovered in Apple MAC OS X.



Multiple vulnerabilities have been discovered in Google Chrome that could result in remote code execution.



A memory corruption vulnerability has been discovered in Microsoft Word that could allow for remote code execution.



Multiple vulnerabilities have been identified in Mozilla Firefox and Thunderbird which could allow for remote code execution.



A vulnerability has been discovered in PHP which could allow an attacker to remotely disclose source code and potentially execute arbitrary code.



A vulnerability has been discovered in WordPress CMS, which could allow an attacker to take control of the affected system.



Multiple vulnerabilities have been discovered in Microsoft's web browser, Internet Explorer, which could allow an attacker to take complete control of an affected system.



Multiple vulnerabilities have been discovered in Microsoft Windows Kernel-Mode drivers that could allow for remote code execution.



A vulnerability has been discovered in the PHP which could allow an attacker to remotely disclose source code and potentially execute arbitrary code.



Multiple vulnerabilities have been discovered in Ektron's Enterprise Web Content Management System that can lead to remote code execution.



Multiple vulnerabilities in Adobe Flash Player could allow remote code execution.



A zero-day vulnerability has been discovered in Adobe Flash Player, which could allow remote code execution.



A vulnerability has been discovered in the GNU C Library (glibc) which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Apple iOS Prior to iOS 8 and TV Prior to TV 7.



1 45 46 47 48