Never Ending Security

It starts all here

Top 10 Internal Vulnerabilities: February 2015

Top 10 Vulnerabilities

The Top 10 External and Top 10 Internal Vulnerabilities are dynamic lists of the most prevalent and critical security vulnerabilities in the real world. Based on the Laws of Vulnerabilities, this information is computed anonymously from over 1 billion IP audits per year. The Top 10 External Vulnerabilities are the most prevalent and critical vulnerabilities which have been identified on Internet facing systems. The Top 10 Internal Vulnerabilities show this information for systems and networks inside the firewall.

The two Top 10 lists exclude vulnerabilities that do not have patches, even if workarounds are available, because these lists are tools to help prioritize remediation.

Top 10 Internal Vulnerabilities: February 2015

Title QualysID Ext. Reference
Microsoft Internet Explorer Cumulative Security Update (MS15-009)

100220 MS15-009
Oracle Java SE Critical Patch Update – July 2014

122362 Oracle Java SE CPU July 2014
Adobe Flash Player and AIR Multiple Vulnerabilities (APSB14-24)

122827 APSB14-024
MMicrosoft .Net Framework Elevation of Privilege Vulnerability (MS14-072)

90997 MS14-072
Microsoft Windows Network Location Awareness Service Security Bypass Vulnerability (MS15-005)

91007 MS15-005
Adobe Reader and Acrobat Multiple Vulnerabilities (APSB14-20)

122663 APSB14-20
Microsoft Windows Application Compatibility Cache Elevation of Privilege Vulnerability (MS15-001)

91005 MS15-001
Microsoft Windows Components Directory Traversal Information Disclosure Vulnerability (MS15-004)

91012 MS15-004
Microsoft Windows Kerberos Elevation of Privilege Vulnerability (MS14-068)

90998 MS14-068
Microsoft Word and Office Web Apps Remote Code Execution Vulnerability (MS14-081)

110244 MS14-081

Top 10 External Vulnerabilities: February 2015

Title QualysID Ext. Reference
OpenSSL Multiple Remote Security Vulnerabilities

38602 OpenSSL Security Advisory [05 Jun 2014]
Cisco IOS Malformed IPV4 Packet Denial of Service Vulnerability

43051 No Reference
Apache HTTP Server Multiple Cross-Site Scripting Vulnerabilities

12260 RHSA-2008-0004
SSL Server Allows Anonymous Authentication Vulnerability

38142 No Reference
OpenSSH Signal Handling Vulnerability

38560 No Reference
Microsoft ASP.NET Denial of Service Vulnerability (KB2659883 and MS11-100)

90764 KB2659883
SSH Protocol Version 1 Supported

38304 No Reference
Internet Information Services (IIS) Could Allow Elevation of Privilege (MS09-020)

86837 MS09-020
SSL Server Allows Cleartext Communication Vulnerability

38143 No Reference
OpenSSL Memory Leak Vulnerability (Heartbleed Bug)

42430 OpenSSL vulnerabilities

One response to “Top 10 Internal Vulnerabilities: February 2015

  1. 25 May 2015 at 04:37

    Hello Web Admin, I noticed that your On-Page SEO is is missing a few factors, for one you do not use all three H tags in your post, also I notice that you are not using bold or italics properly in your SEO optimization. On-Page SEO means more now than ever since the new Google update: Panda. No longer are backlinks and simply pinging or sending out a RSS feed the key to getting Google PageRank or Alexa Rankings, You now NEED On-Page SEO. So what is good On-Page SEO?First your keyword must appear in the title.Then it must appear in the URL.You have to optimize your keyword and make sure that it has a nice keyword density of 3-5% in your article with relevant LSI (Latent Semantic Indexing). Then you should spread all H1,H2,H3 tags in your article.Your Keyword should appear in your first paragraph and in the last sentence of the page. You should have relevant usage of Bold and italics of your keyword.There should be one internal link to a page on your blog and you should have one image with an alt tag that has your keyword….wait there’s even more Now what if i told you there was a simple WordPress plugin that does all the On-Page SEO, and automatically for you? That’s right AUTOMATICALLY, just watch this 4minute video for more information at. Seo Plugin

Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s