Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Mozilla Firefox Bypass Security Restrictions Vulnerability

A vulnerability has been identified in Mozilla Firefox, exploitation of this vulnerability could allow a remote attacker bypass security controls on the target system.
Last Update Date: 15 Feb 2016 10:25 Release Date: 15 Feb 2016 4145 Views

RISK: Medium Risk

Medium Risk

Cisco ASA Internet Key Exchange Buffer Overflow Vulnerability

A vulnerability has been identified in Cisco ASA software. Exploitation of this vulnerability could allow a remote attacker to take control of an affected system.
Last Update Date: 12 Feb 2016 Release Date: 11 Feb 2016 4363 Views

RISK: High Risk

High Risk

Microsoft NPS RADIUS Server Denial of Service Vulnerabilty

A denial of service vulnerability exists when a Network Policy Server (NPS) improperly handles a Remote Authentication Dial-In User Service (RADIUS) authentication request. An unauthenticated attacker who successfully exploited this vulnerability could send specially crafted username strings to a Network Policy Server (...
Last Update Date: 11 Feb 2016 12:26 Release Date: 11 Feb 2016 4270 Views

RISK: Medium Risk

Medium Risk

Microsoft Active Directory Federation Services Denial of Service Vulnerability

A denial of service vulnerability exists when Active Directory Federation Services (ADFS) attempts to process certain input during forms-based authentication. An attacker who successfully exploits this vulnerability by sending certain input during forms-based authentication could cause the server...
Last Update Date: 11 Feb 2016 12:26 Release Date: 11 Feb 2016 4002 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Kernel-Mode Drivers Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or...
Last Update Date: 11 Feb 2016 12:25 Release Date: 11 Feb 2016 3893 Views

RISK: Medium Risk

Medium Risk

Microsoft Remote Desktop Protocol Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists in Remote Desktop Protocol (RDP) when an attacker logs on to the target system using RDP and sends specially crafted data over the authenticated connection. An attacker who successfully exploited this vulnerability could execute code with elevated privileges. An attacker...
Last Update Date: 11 Feb 2016 12:25 Release Date: 11 Feb 2016 3993 Views

RISK: Medium Risk

Medium Risk

Microsoft WebDAV Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists in the Microsoft Web Distributed Authoring and Versioning (WebDAV) client when WebDAV improperly validates input. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated permissions.
Last Update Date: 11 Feb 2016 12:24 Release Date: 11 Feb 2016 3882 Views

RISK: High Risk

High Risk

Microsoft Office Remote Code Execution Vulnerabilities

Multiple Microsoft Office Memory Corruption Vulnerabilities Multiple remote code execution vulnerabilities exist in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the...
Last Update Date: 11 Feb 2016 12:24 Release Date: 11 Feb 2016 3926 Views

RISK: High Risk

High Risk

Microsoft Windows Remote Code Execution Vulnerabilities

Windows Elevation of Privilege VulnerabilityAn elevation of privilege vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; ...
Last Update Date: 11 Feb 2016 12:24 Release Date: 11 Feb 2016 3848 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Journal Remote Code Execution Vulnerability

A remote code execution vulnerability exists in Microsoft Windows when a specially crafted Journal file is opened in Windows Journal. An attacker who successfully exploited this vulnerability could cause arbitrary code to execute in the context of the current user. If a user is...
Last Update Date: 11 Feb 2016 12:24 Release Date: 11 Feb 2016 3825 Views