Security Vulnerabilities for IE, Chrome, and Flash

Three serious vulnerabilities have been discovered recently that demand your attention to patch ASAP.

Successful exploitation of these vulnerabilities could result in an attacker gaining the same privileges as the logged on user. Depending on the privileges associated with the user, an attacker could install programs; view, change, or delete data; or create new accounts with full user rights.

  1. Vulnerability in Internet Explorer Could Allow Remote Code Execution
    A vulnerability has been discovered in Microsoft's web browser, Internet Explorer, which could allow an attacker to take complete control of an affected system.

    Read more: https://msisac.cisecurity.org/advisories/2014/2014-039.cfm

  2. Multiple Vulnerabilities in Google Chrome Could Allow Remote Code Execution
    Multiple vulnerabilities have been discovered in Google Chrome that could result in remote code execution. These vulnerabilities can be exploited if a user visits, or is redirected to, a specially crafted web page.

    Read more: https://msisac.cisecurity.org/advisories/2014/2014-040.cfm

  3. Vulnerability in Adobe Flash Player Could Allow Remote Code Execution
    A vulnerability has been discovered in Adobe Flash Player. Failed exploit attempts will likely cause denial-of-service conditions.

    Read more: https://msisac.cisecurity.org/advisories/2014/2014-041.cfm

Last Updated: August 06, 2014