Further security updates from Microsoft, Oracle and Adobe

Microsoft has released 14 security bulletins regarding vulnerabilities in various Microsoft software and in the Windows system itself. Four of them are marked as critical and 10 as important.

MS15-065 removes a vulnerability in Internet Explorer that could allow remote code execution if a user viewed a specially crafted page using Internet Explorer. An attacker who successfully exploited the vulnerability could execute remote code with the same privileges as the logged-on user.

In turn, bulletins MS15-066, MS15-067 and MS15-068 remove vulnerabilities in the VBScript Scripting Engine, Remote Desktop Protocol (RDP) and Hyper-V, respectively. Most of them allowed the attacker to remotely execute dangerous code in the system.

Updates marked as "important" patch gaps in Microsoft Office products, OLE, RPC and other integral components of Windows. Updates are already available in the Windows Update service.


Adobe also provided its products with the release of new versions of its products for Windows and Macintosh. Updates for Adobe Acrobat and Reader patch 46 vulnerabilities, most of which allowed an attacker to execute arbitrary code with different attack vectors.

On the other hand, updates for Adobe Shockwave Player, version and earlier for Windows and Macintosh, patch vulnerabilities CVE-2015-5120 and CVE-2015-5121. Adobe recommends upgrading to version

We also remind you about yesterday's updates for Adobe Flash Player.


Another company that provides security patches for its products is Oracle . Updates patch a total of 193 holes. Several of them have already been used in numerous APT attacks on computers and company servers.

Learn more about our offer

If you sell security solutions, are a distributor, authorized partner or developer and would like to share your portfolio with a group of potential customers, advertise an event, software, hardware or other services on AVLab - simply write to us. Or maybe you had to deal with ransomware? We can also help you decrypt your files.
Read more

We use Google Cloud Translation and Gengo API’s to translate articles with exception of our comparative tests.