Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

IBM Lotus Notes / Domino Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in IBM Lotus Notes and IBM Lotus Domino, which can be exploited by malicious people to disclose certain sensitive information, manipulate certain data, bypass certain security restrictions, and compromise a vulnerable system.
Last Update Date: 27 Oct 2014 12:05 Release Date: 27 Oct 2014 3483 Views

RISK: Extremely High Risk

Extremely High Risk

Adobe Flash Vulnerability being used by Ransomware in Malvertising

Security researchers at Proofpoint discovered CryptoWall 2. ransomware used malvertising# to infect the computers with outdated Adobe flash players running on Windows.   Without having to click on anything, visitors to the impacted websites which serve Adobe Flash enabled embedded advertisement may be stealthily infected with the...
Last Update Date: 24 Oct 2014 12:08 Release Date: 24 Oct 2014 5093 Views

RISK: Medium Risk

Medium Risk

Apple TV Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple TV, which can be exploited by malicious people to disclose potentially sensitive information and conduct spoofing attacks. An error exists in Human Interface Device-class Bluetooth. An error exists in the SSL 3. protocol.
Last Update Date: 24 Oct 2014 Release Date: 22 Oct 2014 3325 Views

RISK: Extremely High Risk

Extremely High Risk

Microsoft Windows OLE Object Handling Remote Code Execution Vulnerability

A vulnerability has been identified in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an unspecified error when handling OLE objects embedded within Microsoft Office files and can be exploited to...
Last Update Date: 23 Oct 2014 09:22 Release Date: 23 Oct 2014 4063 Views

RISK: High Risk

High Risk

Apple iTunes Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple iTunes, where some have an unknown impact and the others can be exploited by malicious people to disclose potentially sensitive information and compromise a user's system.
Last Update Date: 22 Oct 2014 Release Date: 20 Oct 2014 3352 Views

RISK: High Risk

High Risk

Apple OS X Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple OS X, which can be exploited by malicious users to disclose potentially sensitive information, bypass certain security restrictions, cause a DoS (Denial of Service), gain escalated privileges and compromise a vulnerable system.The product bundles a vulnerable...
Last Update Date: 22 Oct 2014 Release Date: 20 Oct 2014 3388 Views

RISK: High Risk

High Risk

Google Chrome Flash Player Multiple Vulnerabilities

Multiple vulnerabilities were identified in Google Chrome, which can be exploited by malicious people to compromise a user's system.The vulnerabilities are caused due to a bundled vulnerable version of the Adobe Flash Player.
Last Update Date: 19 Oct 2014 Release Date: 16 Oct 2014 3221 Views

RISK: High Risk

High Risk

Oracle Products Multiple vulnerabilities

Multiple vulnerabilities have been identified in various Oracle products and components, which could be exploited by attackers to denial of service, escalation of privilege, sensitive information disclosure and data tampering.
Last Update Date: 16 Oct 2014 14:37 Release Date: 16 Oct 2014 3504 Views

RISK: Medium Risk

Medium Risk

Apache mod_cache Denial of Service Vulnerability

A vulnerability was identified in Apache mod_cache. A remote user can cause denial of service conditions. A remote user can send a specially crafted Content-Type header value to trigger a null pointer dereference and cause the target service to crash.
Last Update Date: 16 Oct 2014 Release Date: 15 Oct 2014 3101 Views

RISK: High Risk

High Risk

Adobe ColdFusion Multiple Vulnerabilities

Several vulnerabilities were identified in Adobe ColdFusion.A local user can bypass access control restrictions.A remote user can conduct cross-site scripting attacks.A remote user can conduct cross-site request forgery attacks.
Last Update Date: 16 Oct 2014 Release Date: 15 Oct 2014 3167 Views