Latest Security Advisories & Notable Vulnerabilities

Adobe Flash Player Vulnerability (CVE-2015-5123)
 Severity:    
 Advisory Date:  12 Jul 2015
This is the third zero-day vulnerability disclosed from the Hacking Team leak. It affects all versions of Flash Player for Windows, Mac, and Linux. Once successfully exploited, it could cause a crash and may possibly lead an attacker from taking control of the affected system thus compromising its security. Trend Micro detects this as SWF_EKSPLOYT.EDF.
A certificate forgery security bypass has been reported in OpenSSL. This is due to incorrectly implemented certificate verification in OpenSSL. An attacker could use a crafted certificate to bypass certain checks. Successful exploitation could allow a remote attacker to bypass intended access restrictions.
Adobe Flash Player Remote Code Execution Vulnerability (CVE-2015-0349)
 Severity:    
 Advisory Date:  08 Jul 2015
Adobe Flash Player is prone to an unspecified remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition.
Adobe Flash Player contains a vulnerability in the ActionScript 3 ByteArray class, which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. Ref: http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/
Adobe Flash Player Heap Buffer Overflow Vulnerability (CVE-2015-3113)
 Severity:    
 Advisory Date:  23 Jun 2015
A remote code execution vulnerability exists in Adobe Flash Player. The vulnerability is due to an unspecified error. A remote attacker can exploit this vulnerability by enticing a target user to open a crafted file. A successful attack could result in arbitrary code execution in the security context of the target user.
Vulnerability in Adobe Flash Player Could Allow Remote Code Execution
 Severity:    
 Advisory Date:  23 Jun 2015
This Adobe update address a critical vulnerability (CVE-2015-3113), and Adobe recommends users update their product installations to the latest versions using the instructions referenced in the security bulletin.
Adobe Flash Player Memory Corruption Vulnerability (CVE-2015-3043)
 Severity:    
 Advisory Date:  23 Jun 2015
Adobe Flash Player is prone to an unspecified memory-corruption vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions.
Samsung Swiftkey Vulnerability (CVE-2015-4641)
 Severity:    
 Advisory Date:  19 Jun 2015

The Samsung Swiftkey vulnerability could allow execution of malicious code on the affected Samsung devices via man-in-the-middle attacks. These man-in-the-middle attacks occur when a remote attacker changes the downloaded files by the keyboard. As such, remote code is executed and consequently, the attacker has control of the affected devices.

Note that the vulnerability designated with CVE-2015-4640 can be exploited together with the vulnerability covered in CVE-2015-4641 for man-in-the-middle code execution.

Samsung SwiftKey Vulnerability (CVE-2015-4640)
 Severity:    
 Advisory Date:  19 Jun 2015

The Samsung Swiftkey vulnerability could allow execution of malicious code on the affected Samsung devices via man-in-the-middle attacks. These man-in-the-middle attacks occur when a remote attacker changes the downloaded files by the keyboard. As such, remote code is executed and consequently, the attacker has control of the affected devices.

Note that the vulnerability designated with CVE-2015-4640 can be exploited together with the vulnerability covered in CVE-2015-4641 for man-in-the-middle code execution.

Adobe Flash Player Out Of Bound Write Vulnerability (CVE-2015-3105)
 Severity:    
 Advisory Date:  10 Jun 2015
Out of bound write in Adobe Flash Player allows attackers to execute arbitrary code via unspecified vectors. Successful exploitation could result in denial of service within the security context of the currently logged on user.