Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Google Chrome Multiple vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome.Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system.
Last Update Date: 3 Dec 2015 09:23 Release Date: 3 Dec 2015 3895 Views

RISK: High Risk

High Risk

Adobe Products Multiple Vulnerabilities

Multiple vulnerabilities has been identified in Adobe ColdFusion, LiveCycle Data Services, and Adobe Premiere Clip.A remote attacker may exploit these vulnerabilities to take control on the targeted system.
Last Update Date: 18 Nov 2015 11:11 Release Date: 18 Nov 2015 4258 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Schannel Spoofing Vulnerability

A spoofing vulnerability exists in Microsoft Windows that is caused by a weakness in all supported versions of the TLS protocol. An attacker who successfully exploited this vulnerability could impersonate a victim on any other server that uses the same credentials as those used between the client and server...
Last Update Date: 17 Nov 2015 Release Date: 11 Nov 2015 4107 Views

RISK: High Risk

High Risk

ntp multiple vulnerabilities

 Multiple vulnearabilities were found in ntp, which can be exploited by malicious remote users to crash the ntp daemon.
Last Update Date: 17 Nov 2015 Release Date: 3 Nov 2015 4073 Views

RISK: High Risk

High Risk

Cisco IOS Software Tunnel Interfaces Security Bypass Vulnerability

A vulnerability was identified in Cisco IOS. A remote user can bypass access controls on the target system. A remote user connected to a tunnel interface can bypass the access control lists (ACLs) when the physical interface ACLs permit the traffic to pass.
Last Update Date: 17 Nov 2015 Release Date: 16 Nov 2015 4299 Views

RISK: Medium Risk

Medium Risk

Xen Denial of Service Vulnerabilities

 Multiple vulnerabilities have been identified in Xen, which can be exploited by malicious HVM guest administors to cause a denial of services.
Last Update Date: 17 Nov 2015 09:50 Release Date: 17 Nov 2015 4122 Views

RISK: High Risk

High Risk

Google Chrome Multiple vulnerabilities

Multiple vulnerabilities in Google Chrome and Chrome OS. Exploitation of one of these vulnerabilities may allow a remote attacker to take control of an affected system.
Last Update Date: 12 Nov 2015 10:25 Release Date: 12 Nov 2015 4114 Views

RISK: Medium Risk

Medium Risk

Microsoft Skype for Business Server and Microsoft Lync Information Dislcosure Vulnerability

An information disclosure vulnerability exists when Skype for Business and Microsoft Lync clients improperly sanitize specially crafted content. An attacker who successfully exploited the vulnerability could execute HTML and JavaScript content in the Skype for Business or Lync context. The attacker could use this vulnerability to open a...
Last Update Date: 11 Nov 2015 16:51 Release Date: 11 Nov 2015 4170 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Kerberos Security Feature Bypass Vulnerability

A security feature bypass exists in Windows when Kerberos fails to check the password change of a user signing into a workstation. An attacker could bypass Kerberos authentication on a target machine and decrypt drives protected by BitLocker.
Last Update Date: 11 Nov 2015 16:50 Release Date: 11 Nov 2015 4331 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows IPSec Denial of Service Vulnerability

A denial of service vulnerability exists in Windows when the Internet Protocol Security (IPSec) service improperly handles encryption negotiation. An attacker who successfully exploited the vulnerability could cause the system to become nonresponsive.
Last Update Date: 11 Nov 2015 16:50 Release Date: 11 Nov 2015 4042 Views