Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Diffie-Hellman Key Exchange "Logjam" Vulnerability

A vulnerability has been identified in Diffie-Hellman Key Exchange (DH). The vulnerability allows attackers to intercept protocols that rely on DH and force them to use ‘export-grade’ cryptography, which can then be decrypted or altered.
Last Update Date: 22 May 2015 12:14 Release Date: 22 May 2015 4193 Views

RISK: Medium Risk

Medium Risk

Cisco ASA Denial of Service Vulnerability

A vunlerability was identified in Cisco ASA. A remote user can cause denial of service conditions on the target system.A remote user can disrupt the multicast forwarding feature on the target system.   Note: No official solution is currently available.
Last Update Date: 22 May 2015 10:34 Release Date: 22 May 2015 3967 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by remote attackers to conduct spoofing and execute arbitrary code.
Last Update Date: 21 May 2015 09:34 Release Date: 21 May 2015 3888 Views

RISK: Medium Risk

Medium Risk

Moodle Multiple Vulnerabilities

Multiple vulnerabilities were idenitifed in Moodle. A remote authenticated user can obtain potentially sensitive information. A remote user can conduct cross-site scripting attacks and bypass security controls on the target system.
Last Update Date: 20 May 2015 09:13 Release Date: 20 May 2015 3962 Views

RISK: Medium Risk

Medium Risk

Microsoft Schannel Information Disclosure Vulnerability

An information disclosure vulnerability exists in Secure Channel (Schannel) when it allows the use of a weak Diffie-Hellman ephemeral (DFE) key length of 512 bits in an encrypted TLS session. Allowing 512-bit DHE keys makes DHE key exchanges weak...
Last Update Date: 19 May 2015 Release Date: 13 May 2015 4096 Views

RISK: High Risk

High Risk

Microsoft Internet Explorer Cumulative Security Update

VBScript ASLR Bypass A security feature bypass exists when the VBScript engine fails to use the Address Space Layout Randomization (ASLR) security feature, allowing an attacker to more reliably predict the memory offsets of specific instructions in a given call stack. The security feature bypass...
Last Update Date: 15 May 2015 Release Date: 13 May 2015 3902 Views

RISK: High Risk

High Risk

Microsoft Windows Journal Remote Code Execution Vulnerability

A remote code execution vulnerability exists in Microsoft Windows when a specially crafted Journal file is opened in Windows Journal. An attacker who successfully exploited this vulnerability could cause arbitrary code to execute in the context of the current user. If a user is logged on with administrative...
Last Update Date: 13 May 2015 14:41 Release Date: 13 May 2015 3905 Views

RISK: High Risk

High Risk

Microsoft Font Drivers Remote Code Execution Vulnerabilities

OpenType Font Parsing VulnerabilityAn information disclosure vulnerability exists in Microsoft Windows when the Windows DirectWrite library improperly handles OpenType fonts. An attacker who successfully exploited this vulnerability could potentially read data which was not intended to be disclosed. Note that this vulnerability would not allow an attacker to...
Last Update Date: 13 May 2015 14:41 Release Date: 13 May 2015 3986 Views

RISK: Medium Risk

Medium Risk

Microsoft SharePoint Server Remote Code Execution Vulnerabilities

Remote code execution vulnerabilities exist when SharePoint Server improperly sanitizes specially crafted page content. An authenticated attacker could attempt to exploit these vulnerabilities by sending specially crafted page content to a SharePoint server. The attacker who successfully exploited these vulnerabilities could run arbitrary code...
Last Update Date: 13 May 2015 14:41 Release Date: 13 May 2015 4064 Views

RISK: Medium Risk

Medium Risk

Microsoft Office Remote Code Execution Vulnerabilities

Remote code execution vulnerabilities exist in Microsoft Office software when the Office software fails to properly handle objects in memory.  Exploitation of these vulnerabilities requires that a user open a specially crafted file with an affected version of Microsoft Office software. In an email...
Last Update Date: 13 May 2015 14:41 Release Date: 13 May 2015 3956 Views