Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

TYPO3 Remote Users Bypass Authentication Vulnerability

A vulnerability was identified in TYPO3. A remote user can bypass authentication on the target system. A remote user can exploit a flaw in the rsaauth system extension to bypass authentication.
Last Update Date: 3 Mar 2015 09:45 Release Date: 3 Mar 2015 3370 Views

RISK: Medium Risk

Medium Risk

Mozilla Firefox Multiple Vulnerabilities

Multiple vulnerabilities were identified in Mozilla Firefox, which could be exploited by remote attackers to cause arbitrary code execution, denial of service, bypass security restrictions and disclose potentially sensitive information.A remote user can create specially crafted content that, when loaded by the target user...
Last Update Date: 27 Feb 2015 Release Date: 25 Feb 2015 3217 Views

RISK: Medium Risk

Medium Risk

Mozilla Thunderbird Multiple Vulnerabilities

Multiple vulnerabilities were identified in Mozilla Thunderbird, which could be exploited by remote attackers to cause arbitrary code execution, gain elevated privileges and disclose potentially sensitive information.A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary...
Last Update Date: 27 Feb 2015 Release Date: 25 Feb 2015 3196 Views

RISK: Medium Risk

Medium Risk

Cisco IOS XR Denial of Service Vulnerability

A vulnerability has been identified in Cisco IOS XR, which can be exploited by malicious people to cause a DoS (Denial of Service).The vulnerability is caused due to an error when parsing IPv6 packets and can be exploited to cause a reload of a line card...
Last Update Date: 24 Feb 2015 14:29 Release Date: 24 Feb 2015 3093 Views

RISK: Medium Risk

Medium Risk

Samba Remote Code Execution Vulnerability

A vulnerability was identified in Samba. A remote user can execute arbitrary code on the target system.A remote user can send specially crafted data followed by an anonymous netlogon packet to trigger an uninitialized memory error and execute arbitrary code on the target system. The code...
Last Update Date: 24 Feb 2015 14:28 Release Date: 24 Feb 2015 3104 Views

RISK: Medium Risk

Medium Risk

Lenovo Superfish Adware HTTPS Spoofing Vulnerability

Superfish adware installed on some Lenovo PCs install a non-unique trusted root certification authority (CA) certificate, allowing an attacker to spoof HTTPS traffic. A machine with Superfish VisualDiscovery installed will be vulnerable to SSL spoofing attacks without a warning from the browser.
Last Update Date: 23 Feb 2015 11:12 Release Date: 23 Feb 2015 3592 Views

RISK: High Risk

High Risk

Cisco ASR 5000 Series Software SNMP Processing Vulnerability

A vulnerability was identified in the Simple Network Management Protocol (SNMP) code of Cisco ASR 5500 System Architecture Evolution (SAE) Gateway could allow an unauthenticated, remote attacker to cause high CPU utilization and the SNMP process may stop responding. NOTE: ...
Last Update Date: 18 Feb 2015 09:27 Release Date: 18 Feb 2015 3215 Views

RISK: Medium Risk

Medium Risk

IBM Websphere Application Server Multiple Vulnerabilities

Multiple vulnerabilities were identified in IBM Websphere Application Server, which could be exploited by remote attackers to cause arbitrary code execution, denial of service, cross site scripting, sensitive information disclosure and unauthorised access.
Last Update Date: 17 Feb 2015 10:11 Release Date: 17 Feb 2015 3083 Views

RISK: Medium Risk

Medium Risk

Cisco ASA Deny of Service Vulnerability

A vulnerability was identified in Cisco ASA. A remote user can cause denial of service conditions. A remote user can send a large number of specially crafted HTTP requests to trigger a memory leak in the WebVPN service and cause the target device to stop accepting new SSL...
Last Update Date: 13 Feb 2015 09:28 Release Date: 13 Feb 2015 3136 Views

RISK: High Risk

High Risk

Adobe Reader Buffer Overflow Vulnerability

A vulnerability has been identified in Adobe Reader, which can be exploited by malicious people to compromise a user's system.The vulnerability is caused due to an error within CoolType.dll and can be exploited to cause a heap-based buffer overflow. Note...
Last Update Date: 11 Feb 2015 16:36 Release Date: 11 Feb 2015 3408 Views