Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Cisco IOS SIP Processing Vulnerability

A vulnerability has been identified in Cisco IOS. A remote user can cause denial of service conditions.   A remote user can send specially crafted, valid SIP messages via IPv4 or IPv6 to the target device to trigger a memory leak, causing the system to become unstable...
Last Update Date: 8 Nov 2013 10:25 Release Date: 8 Nov 2013 3017 Views

RISK: Medium Risk

Medium Risk

ISC BIND Windows Netmask Processing Vulnerability

A vulnerability has been identified in BIND. A remote user on the local network can bypass access control restrictions.   On Windows-based systems, an all zero netmask may cause a match on any IPv4 address. A remote user on the local network may be able...
Last Update Date: 8 Nov 2013 10:24 Release Date: 8 Nov 2013 3128 Views

RISK: Medium Risk

Medium Risk

IBM Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in IBM Java, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a vulnerable system. Unspecified errors can be exploited...
Last Update Date: 8 Nov 2013 10:24 Release Date: 8 Nov 2013 3083 Views

RISK: Extremely High Risk

Extremely High Risk

Microsoft Graphics Component Remote Code Execution Vulnerability

A vulnerability was identified in Microsoft Office. A remote user can cause arbitrary code to be executed on the target user's system.   A remote user can create a specially crafted TIFF image file that, when loaded by the target user, will trigger a memory...
Last Update Date: 6 Nov 2013 09:35 Release Date: 6 Nov 2013 3456 Views

RISK: Medium Risk

Medium Risk

Wireshark Multiple Denial of Service Vulnerabilities

Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service).An error within the IEEE 802.15.4 dissector can be exploited to cause a crash.An error within the NBAP dissector can...
Last Update Date: 5 Nov 2013 10:17 Release Date: 5 Nov 2013 3133 Views

RISK: High Risk

High Risk

Mozilla Firefox / Thunderbird / SeaMonkey Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox, Thunderbird, and SeaMonkey, which can be exploited by malicious people to conduct spoofing attacks and compromise a user's system. Some unspecified errors and an error when handling workers with direct proxies within the JavaScript engine can...
Last Update Date: 31 Oct 2013 15:28 Release Date: 31 Oct 2013 3183 Views

RISK: Medium Risk

Medium Risk

Cisco IOS XE Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Cisco IOS XE. A remote user can cause denial of service conditions. A remote user can send specially crafted ICMP error packets through the target device to trigger a flaw in the Zone-Based Firewall (ZBFW) TCP or UDP...
Last Update Date: 31 Oct 2013 15:27 Release Date: 31 Oct 2013 3014 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been reported in Google Chrome, where two have an unknown impact and others can be exploited by malicious people to compromise a user's system.A use-after-free error exists in XHR.A use-after-free error exists...
Last Update Date: 30 Oct 2013 Release Date: 17 Oct 2013 3339 Views

RISK: Medium Risk

Medium Risk

Cisco Products Apache Struts 2 Command Execution Vulnerability

A vulnerability has been identified in multiple Cisco products, which include an implementation of Apache Struts 2 component that is affected by a remote command execution vulnerability.   The vulnerability is due to insufficient sanitization of user-supplied input. An attacker could exploit this vulnerability by sending...
Last Update Date: 25 Oct 2013 10:06 Release Date: 25 Oct 2013 3217 Views

RISK: Medium Risk

Medium Risk

Apple iTunes Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple iTunes, which can be exploited by malicious people to disclose certain sensitive information, cause a DoS (Denial of Service), and potentially compromise a user's system.
Last Update Date: 24 Oct 2013 11:29 Release Date: 24 Oct 2013 3144 Views