Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Microsoft Internet Explorer Cumulative Security Update

Multiple Internet Explorer Memory Corruption VulnerabilitiesMultiple remote code execution vulnerabilities exist when Internet Explorer improperly accesses objects in memory. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Multiple Microsoft Browser XSS Filter Bypass...
Last Update Date: 9 Dec 2015 13:54 Release Date: 9 Dec 2015 3104 Views

RISK: High Risk

High Risk

Apple Multiple OS and Applications Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple iOS, tvOS, OS X, watchOS, Safari and Xcode, which can be exploited by remote attacker to execute arbitrary code.
Last Update Date: 9 Dec 2015 12:42 Release Date: 9 Dec 2015 3448 Views

RISK: Medium Risk

Medium Risk

OpenSSL Multiple Vulnerabilities

Multiple vulnerabilities have been identified in OpenSSL. A remote user can cause the target service to crash and obtain potentially sensitive information on the target system.A remote server can send a specially crafted ServerKeyExchange for an anonymous DH ciphersuite with the value of p set to to...
Last Update Date: 9 Dec 2015 Release Date: 7 Dec 2015 3310 Views

RISK: High Risk

High Risk

Apache OpenOffice Remote Code Execution Vulnerabilities

Multiple vulnerabilities have been identified in Apache OpenOffice, which can be exploited by remote attacker to execute arbitrary code on the target system.A remote user can create a specially crafted document that, when loaded by the target user, will trigger a bug in the handling...
Last Update Date: 7 Dec 2015 Release Date: 9 Nov 2015 3156 Views

RISK: Medium Risk

Medium Risk

Dell eDellRoot Certificate Spoofing Vulnerability

A vulnerability was identified in Dell Foundation Services of Dell systems. It installs the eDellRoot certificate that includes a private key on Microsoft Windows systems. This allows attackers to create trusted certificates and perform impersonation, man-in-the-middle (MiTM), and passive...
Last Update Date: 7 Dec 2015 Release Date: 25 Nov 2015 3391 Views

RISK: High Risk

High Risk

Google Chrome Multiple vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome.Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system.
Last Update Date: 3 Dec 2015 09:23 Release Date: 3 Dec 2015 3133 Views

RISK: High Risk

High Risk

Adobe Products Multiple Vulnerabilities

Multiple vulnerabilities has been identified in Adobe ColdFusion, LiveCycle Data Services, and Adobe Premiere Clip.A remote attacker may exploit these vulnerabilities to take control on the targeted system.
Last Update Date: 18 Nov 2015 11:11 Release Date: 18 Nov 2015 3467 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Schannel Spoofing Vulnerability

A spoofing vulnerability exists in Microsoft Windows that is caused by a weakness in all supported versions of the TLS protocol. An attacker who successfully exploited this vulnerability could impersonate a victim on any other server that uses the same credentials as those used between the client and server...
Last Update Date: 17 Nov 2015 Release Date: 11 Nov 2015 3334 Views

RISK: High Risk

High Risk

ntp multiple vulnerabilities

 Multiple vulnearabilities were found in ntp, which can be exploited by malicious remote users to crash the ntp daemon.
Last Update Date: 17 Nov 2015 Release Date: 3 Nov 2015 3291 Views

RISK: High Risk

High Risk

Cisco IOS Software Tunnel Interfaces Security Bypass Vulnerability

A vulnerability was identified in Cisco IOS. A remote user can bypass access controls on the target system. A remote user connected to a tunnel interface can bypass the access control lists (ACLs) when the physical interface ACLs permit the traffic to pass.
Last Update Date: 17 Nov 2015 Release Date: 16 Nov 2015 3522 Views