Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

PostgreSQL Multiple Vulnerabilities

Two vulnerabilities have been identified in PostgreSQL. A remote authenticated user can cause the target service to crash or gain elevated privileges on the target system.
Last Update Date: 15 Aug 2016 10:34 Release Date: 15 Aug 2016 3129 Views

RISK: Medium Risk

Medium Risk

D-Link routers Remote Code Execution Vulnerability

D-Link DIR routers contain a stack-based buffer overflow vulnerability, which may allow a remote attacker to execute arbitrary code.
Last Update Date: 12 Aug 2016 09:09 Release Date: 12 Aug 2016 3353 Views

RISK: High Risk

High Risk

Microsoft Monthly Security Update (Aug 2016)

Microsoft has released monthly security update for their products:   Vulnerable Product Severity Impacts Notes Details (including CVE) Internet Explorer Highly Critical Remote Code ExecutionInformation Disclosure   MS16-095 Edge Highly Critical Remote Code ExecutionInformation Disclosure   MS16...
Last Update Date: 10 Aug 2016 15:23 Release Date: 10 Aug 2016 3586 Views

RISK: High Risk

High Risk

Adobe Monthly Security Update (Aug 2016)

Adobe has released monthly security update for their products:   Vulnerable Product Severity Impacts Notes Details (including CVE) Experience Manager Highly Critical Remote Code ExecutionInformation DisclosureCross-site Scripting   APSB16-27   Number of 'Extremely Critical' product(...
Last Update Date: 10 Aug 2016 14:12 Release Date: 10 Aug 2016 3385 Views

RISK: Medium Risk

Medium Risk

Foxit Reader Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Foxit Reader. A remote user can cause arbitrary code to be executed, the target application to crash and obtain potentially sensitive information on the target system.
Last Update Date: 10 Aug 2016 09:40 Release Date: 10 Aug 2016 3239 Views

RISK: Medium Risk

Medium Risk

VMware Multiple Vulnerabilities

Multiple vulnerabilities were identified in VMware vCenter Server, vSphere Hypervisor (ESXi), Workstation Pro, Workstation Player, Fusion, and Tools. Exploitation of one of these vulnerabilities could allow a remote attacker to take control of an affected system.
Last Update Date: 8 Aug 2016 09:52 Release Date: 8 Aug 2016 3471 Views

RISK: Medium Risk

Medium Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities were identified in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass security controls on the target system. A remote user can spoof URLs.
Last Update Date: 8 Aug 2016 09:52 Release Date: 8 Aug 2016 3103 Views

RISK: Medium Risk

Medium Risk

Joolma! Multiple Vulnerabilities

Multiple vulnerabilities were identified in Joomla!. A remote user can conduct cross-site request forgery attacks. A remote user can access data on the target system. A remote user can conduct cross-site scripting attacks.
Last Update Date: 8 Aug 2016 09:52 Release Date: 8 Aug 2016 3180 Views

RISK: Medium Risk

Medium Risk

Apple iOS Elevation of Privilege Vulnerability

A vulnerability was identified in Apple iOS. An application can gain elevated privileges on the target system. 
Last Update Date: 8 Aug 2016 09:52 Release Date: 8 Aug 2016 3521 Views

RISK: High Risk

High Risk

OpenSSH multiple vulnerabilities

Multiple vulnerabilities have been identified in OpenSSH, a remote attacker can exploit these vulnerabilities to cause denial of service condition on the targeted system. A local user can obtain elevated privileges on the target system. A remote or local user can obtain potentially sensitive information on...
Last Update Date: 2 Aug 2016 14:55 Release Date: 2 Aug 2016 3707 Views