Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Python Multiple Integer Overflow Vulnerabilities

Some vulnerabilities have been identified in Python, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. Successful exploitation of these vulnerabilities may allow execution of arbitrary code.
Last Update Date: 15 Oct 2014 Release Date: 14 Oct 2014 3343 Views

RISK: Medium Risk

Medium Risk

Joomla Denial Of Service Vulnerability

A vulnerability has been identified in Joomla!, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an unspecified error. No further information is currently available.
Last Update Date: 13 Oct 2014 18:56 Release Date: 13 Oct 2014 3210 Views

RISK: Medium Risk

Medium Risk

Bugzilla Multiple Vulnerabilities

A security issue and some vulnerabilities have been identified in Bugzilla, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks and bypass certain security restrictions.An error within the flagmail email...
Last Update Date: 13 Oct 2014 18:55 Release Date: 13 Oct 2014 3257 Views

RISK: Medium Risk

Medium Risk

Cisco ASA Multiple vulnerabilities

Multiple vulnerabilities were identified in Cisco ASA. A remote authenticated user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. A remote user can conduct cross-site scripting attacks. A local user can gain elevated privileges.
Last Update Date: 10 Oct 2014 14:58 Release Date: 10 Oct 2014 3231 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, and compromise a vulnerable system. Some errors related to V8 and IPC can be exploited to execute arbitrary code outside the sandbox...
Last Update Date: 9 Oct 2014 10:08 Release Date: 9 Oct 2014 3402 Views

RISK: Medium Risk

Medium Risk

Apache HTTP Server mod_cache Denial of Service Vulnerability

A vulnerability has been identified in Apache HTTP Server, which can be exploited by malicious people to cause a DoS (Denial of Service).The vulnerability is caused due to a NULL pointer dereference error within the "cache_merge_headers_out()" function (modules/cache/cache_util....
Last Update Date: 7 Oct 2014 09:19 Release Date: 7 Oct 2014 3719 Views

RISK: Medium Risk

Medium Risk

Fake CODE4HK Mobile Application Attack

A fake mobile application named CODE4HK claiming to coordinating the Occupy Central pro-democracy movement has circulated online since 16 Sep 2014. Malicious behaviours were identified in a fake CODE4HK mobile application, which can cause information disclosure. [UPDATE 2014-10-03]A security...
Last Update Date: 3 Oct 2014 Release Date: 18 Sep 2014 4272 Views

RISK: Extremely High Risk

Extremely High Risk

Beware of Web defacement attacks targeting Hong Kong

1. Multiple Hong Kong websites were found defaced. They were injected with the logo and slogan of the attacker claimed to be from "OpHongKong hosted by Anonymous". These websites covered different small private businesses. 2. The attacks used security vulnerabilities of the web server...
Last Update Date: 2 Oct 2014 21:01 Release Date: 2 Oct 2014 6511 Views

RISK: Extremely High Risk

Extremely High Risk

GNU Bash "Shellshock" Vulnerability

A vulnerability has been identified in bash (GNU Bourne-Again Shell), related to how environment variables are processed. The vulnerability is now known as "Shellshock".   In many common configurations, this vulnerability is exploitable over the network, especially if bash has been configured...
Last Update Date: 30 Sep 2014 Release Date: 25 Sep 2014 5842 Views

RISK: Medium Risk

Medium Risk

Node.js V8 Stack Overflow Denial of Service Vulnerability

A vulnerability has been identified in Node.js, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error within the bundled V8 library when handling certain recursive work loads, which can be...
Last Update Date: 26 Sep 2014 Release Date: 5 Sep 2014 3403 Views