Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

PHP Remote Code Execution Vulnerability

A vulnerability was identified in PHP. A remote user can cause arbitrary code to be executed on the target system. A remote user can create a specially crafted ZIP archive file that, when loaded by the target application, will trigger an integer overflow and potentially execute...
Last Update Date: 27 Mar 2015 12:47 Release Date: 27 Mar 2015 3120 Views

RISK: High Risk

High Risk

Cisco IOS & IOS-XE Multiple Vulnerabilities

Multiple vulnerabilities were identified in Cisco IOS, IOS-XE and ASR Series IOS-XE, which could be exploited by remote users to cause denial of service, arbitrary code execution and response spoofing on the target system.
Last Update Date: 26 Mar 2015 15:08 Release Date: 26 Mar 2015 3223 Views

RISK: High Risk

High Risk

OpenSSL Multiple Denial of Service Vulnerabilities

OpenSSL has released new updates addressing multiple vulnerabilities, one of which is classified as a high severity issue. Exploitation could allow a remote attacker to cause a Denial of Service attack against the server.
Last Update Date: 25 Mar 2015 Release Date: 20 Mar 2015 3378 Views

RISK: Medium Risk

Medium Risk

Cisco IOS Autonomic Networking Infrastructure Overwrite Vulnerability

A vulnerability has been identified in Cisco IOS, which could allow an unauthenticated, remote attacker to overwrite configuration information and cause a denial of service condition on an affected device.   A vulnerability in the Autonomic Networking Infrastructure (ANI) feature of Cisco IOS software could allow...
Last Update Date: 25 Mar 2015 Release Date: 24 Mar 2015 3136 Views

RISK: High Risk

High Risk

Mozilla Firefox Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox, which can be exploited by remote attackers to bypass certain security restrictions and compromise a user's system.A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a flaw...
Last Update Date: 25 Mar 2015 Release Date: 23 Mar 2015 3189 Views

RISK: High Risk

High Risk

PHP Multiple Remote Code Execution Vulnerabilities

Multiple vulnerabilities were identified in PHP.  A remote user can execute arbitrary code on the target system.A remote user can send specially crafted data to an application to trigger a use-after-free memory error in the unserialisation of objects in the DateTimeZone class....
Last Update Date: 20 Mar 2015 10:44 Release Date: 20 Mar 2015 3172 Views

RISK: High Risk

High Risk

Apple Safari Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple Safari, which can be exploited by remote attacker to execute arbitrary code or prevent users from discerning a phishing attack on an affected system.
Last Update Date: 19 Mar 2015 09:36 Release Date: 19 Mar 2015 3105 Views

RISK: Medium Risk

Medium Risk

D-Link DCS-93xL Model Family Unrestricted Upload Vulnerability

A vulnerability was identified in the D-Link DCS-93xL family of devices, which allows an attacker to upload arbitrary files from the attackers system. The attacker may specify the file location to write on the device. This could lead to data being created, ...
Last Update Date: 17 Mar 2015 09:45 Release Date: 17 Mar 2015 3181 Views

RISK: High Risk

High Risk

Adobe Flash Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Flash Player, which can be exploited by remote attacker to cause remote code execution and bypass security restrictions.A remote user can bypass same-origin domain policy.A remote user can bypass file upload restrictions.A remote user...
Last Update Date: 16 Mar 2015 10:50 Release Date: 16 Mar 2015 3217 Views

RISK: High Risk

High Risk

Microsoft Windows Schannel Security Feature Bypass Vulnerability

A security feature bypass vulnerability exists in Secure Channel (Schannel) that is caused by an issue in the TLS state machine whereby a client system accepts an RSA key with a shorter key length than the originally negotiated key length. The vulnerability facilitates exploitation of the publicly...
Last Update Date: 12 Mar 2015 Release Date: 11 Mar 2015 3319 Views