Skip to main content

Security Bulletin

Filter by:

RISK: Extremely High Risk

Extremely High Risk

Microsoft Internet Explorer 8 CMarkup use-after-free vulnerability

A vulnerability has been identified in Microsoft Internet Explorer 8, which can be exploited by remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Last Update Date: 26 May 2014 Release Date: 22 May 2014 3534 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to conduct spoofing and cross-site scripting attacks and compromise a user's system.A use-after-free error exists within styles.An integer overflow error exists within...
Last Update Date: 26 May 2014 Release Date: 22 May 2014 3121 Views

RISK: Medium Risk

Medium Risk

Cisco NX-OS Multiple Vulnerabilities

Multiple vulnerabilities were identified in Cisco NX-OS. A remote user can execute arbitrary code, obtain elevated privileges and cause denial of service conditions on the target system.
Last Update Date: 23 May 2014 09:39 Release Date: 23 May 2014 2950 Views

RISK: High Risk

High Risk

Apple Safari Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple Safari. A remote user can cause arbitrary code to be executed on the target user's system and bypass same origin policy restrictions.
Last Update Date: 23 May 2014 09:38 Release Date: 23 May 2014 3291 Views

RISK: Medium Risk

Medium Risk

Cisco Products Multiple Vulnerabilities

Multiple vulnerabilities were identified in Cisco IOS, IOS XE and Email Security Appliance. A remote user can cause denial of service conditions and bypass security restrictions.
Last Update Date: 21 May 2014 12:05 Release Date: 21 May 2014 3005 Views

RISK: High Risk

High Risk

Apple OS X Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple OS X, which can be exploited to execute arbitrary code, obtain sensitive information, and take control of the affected system.
Last Update Date: 19 May 2014 10:11 Release Date: 19 May 2014 2999 Views

RISK: High Risk

High Risk

Apple iTunes Credentials Access Vulnerability

A vulnerability has been identified in Apple iTunes, which can be exploited to obtain credentials.   An attacker could strip security settings from the cookie by forcing the connection to close before the security settings were sent, and then obtain the value of the unprotected cookie.
Last Update Date: 19 May 2014 10:11 Release Date: 19 May 2014 2947 Views

RISK: Medium Risk

Medium Risk

Cisco IOS Multiple Vulnerabilities

Multiple vulnerabilities were identified in Cisco IOS, IOS XE and IOS ScanSafe. A remote user can cause denial of service conditions.
Last Update Date: 16 May 2014 09:23 Release Date: 16 May 2014 3197 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. The application bundles a vulnerable version of the Adobe Flash Player.For detail, please read SA14051402 ...
Last Update Date: 14 May 2014 15:04 Release Date: 14 May 2014 3126 Views

RISK: High Risk

High Risk

Adobe Reader / Acrobat Multiple Vulnerabilities

Multiple vulnerabilities have been reported in Adobe Reader and Acrobat, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system. An unspecified error can be exploited to cause a heap-based buffer...
Last Update Date: 14 May 2014 15:01 Release Date: 14 May 2014 3585 Views