Skip to main content

Security Bulletin

Filter by:

RISK: Extremely High Risk

Extremely High Risk

ImageMagick Input Validation Vulnerability (ImageTragick)

An input validation vulnerability has been identified in ImageMagick, which could be exploited by remoter attacker to execute arbitrary code on target system.   The vulnerability could affect web server since a common vulnerable configuration would be a web server that allows image uploads that are subsequently processed with...
Last Update Date: 5 May 2016 09:59 Release Date: 5 May 2016 3593 Views

RISK: High Risk

High Risk

OpenSSL Multiple Vulnerabilities

Multiple vulnerabilities were identified in OpenSSL. Attackers can decrypt data in certain cases, cause denial of service conditions, obtain potentially sensitive information and execute arbitrary code on the target system.
Last Update Date: 5 May 2016 Release Date: 4 May 2016 3594 Views

RISK: Medium Risk

Medium Risk

Apple Xcode Multiple Vulnerabilities

Multiple vulnerabilities were identified in Apple Xcode. Exploitation of either of these vulnerabilities may allow a remote attacker to take control of an affected system.
Last Update Date: 5 May 2016 Release Date: 4 May 2016 3113 Views

RISK: Medium Risk

Medium Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system.
Last Update Date: 3 May 2016 09:28 Release Date: 3 May 2016 3122 Views

RISK: Medium Risk

Medium Risk

Wireshark Multiple Vulnerabilities

Multiple vulnerabilities has been identified in Wireshark, remote attacker can exploit these vulnerabilities to trigger denial of service condition in the targeted system.
Last Update Date: 29 Apr 2016 Release Date: 27 Apr 2016 3119 Views

RISK: High Risk

High Risk

Mozilla Firefox Multiple vulnerabilities

Multiple vulnerabilities were identified in Mozilla Firefox, which could allow a remote attacker to take control of an affected system.
Last Update Date: 29 Apr 2016 Release Date: 27 Apr 2016 3301 Views

RISK: High Risk

High Risk

NTP Multiple Vulnerabilities

Multiple vulnerabilities were identified in ntp. A remote or remote authenticated user can modify time on the target system. A remote user can cause denial of service conditions on the target system. A remote user can obtain potentially sensitive information on the target system.
Last Update Date: 29 Apr 2016 14:32 Release Date: 29 Apr 2016 3588 Views

RISK: Medium Risk

Medium Risk

PHP Multiple Vulnerabilities

Multiple vulnerabilities was identified in PHP. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can cause denial of service conditions on the target system.
Last Update Date: 29 Apr 2016 14:32 Release Date: 29 Apr 2016 3117 Views

RISK: Extremely High Risk

Extremely High Risk

Apache Struts 2 Dynamic Method Invocation (DMI) Input Validation Vulnerability

A vulnerability has been identified in Apache Struts 2, which could be exploited by remote attacker to execute arbitrary code on target server by passing a malicious expression when Dynamic Method Invocation (DMI) is enabled.   Note: From CNCERT/CC report, the exploit code...
Last Update Date: 28 Apr 2016 09:36 Release Date: 28 Apr 2016 4473 Views

RISK: Medium Risk

Medium Risk

Adobe Analytics AppMeasurement for Flash Library Cross-Site Scripting Vulnerability

A vulnerability was identified in Adobe Analytics AppMeasurement for Flash Library. A remote attacker can conduct cross-site scripting attacks.
Last Update Date: 25 Apr 2016 10:27 Release Date: 25 Apr 2016 3369 Views