Skip to main content
ExLibris

Knowledge Assistant

BETA
Cross-Product

 

Ex Libris Knowledge Center
  1. Search site
    Go back to previous article
    1. Sign in
      • Sign in
      • Forgot password
  1. Home
  2. Cross-Product
  3. Security
  4. Statements
  5. Policy Previous Versions

Policy Previous Versions

  1. Last updated
  2. Save as PDF
  3. Share
    1. Share
    2. Tweet
    3. Share
No headers
  • Ex Libris Security And Privacy Incident Response Policy_2.1
    Version 2.1
  • Ex Libris Security And Privacy Incident Response v2.5
    Version 2.5
  • Security Advisory– Google Chrome Browser version 80 Updates and Ex Libris products and services
    On February 4, 2020 Google will roll out a new version of Google Chrome (80) that will implement a secure-by-default model for cookies using the SameSite attribute, enabled by a new cookie classification system. As of February 2020, only cookies with the SameSite set to "None" and tagged as Secure will be able to send cross-sites and will require encrypted HTTPS connection access.
    • Security Advisory – Google Chrome Browser version 80 Updates and Ex Libris products and services - January 30, 2020
  • Security Update - A potential misuse of the "Send To Email" functionality
    Ex Libris was notified of an issue regarding the potential to misuse the multiple recipient mail functionality in Primo.    A potential misuse of the "Send To Email" functionality can result in multiple e-mails being sent from Primo to a long list of recipients.
    • Security Update - Primo's "send email" functionality – Updated October 20, 2016
  • Security Update - Ex Libris Patron Directory Services (PDS) Security Vulnerability
    A Critical ranked vulnerability has been discovered in Ex Libris PDS component. PDS is used to integrated Ex Libris products with the institutional identity management systems (LDAP, Shibboleth, etc.). The vulnerability, if exploit by an attacker, may compromise the security level of PDS.
  • Security Update - “Shellshock” - Security Vulnerability Update
    Ex Libris has been made aware of a recently discovered serious vulnerability that called “Shellshock” All Unix/Linux systems that use the Bash shell (a popular command-line shell) are vulnerable to the 'shellshock' exploit. This vulnerability allows remote attackers to remotely issue commands, start/stop processes or install code.
View article in the Exlibris Knowledge Center
  1. Back to top
    • Ex Libris’ Response to COVID-19
    • Ex Libris Security And Privacy Incident Response Policy_2.1
  • Was this article helpful?

Recommended articles

  1. Article type
    Guide
    Content Type
    Documentation
    Language
    English
  2. Tags
    This page has no tags.
  1. © Copyright 2025 Ex Libris Knowledge Center
  2. Powered by CXone Expert ®
  • Term of Use
  • Privacy Policy
  • Contact Us
2025 Ex Libris. All rights reserved