Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Apple Safari Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple Safari, which can be exploited by malicious people to disclose potentially sensitive information, conduct cross-site scripting attacks, and compromise a user's system.   The vulnerabilities are caused due to a bundled vulnerable version of WebKit.
Last Update Date: 24 Oct 2013 11:28 Release Date: 24 Oct 2013 3117 Views

RISK: Medium Risk

Medium Risk

Apple Remote Desktop Format String Vulnerability

A vulnerability has been identified in Apple Remote Desktop. A remote user can execute arbitrary code on the target system. A remote user can send specially crafted VNC username data to trigger a format string flaw and execute arbitrary code on the target system. The system may...
Last Update Date: 24 Oct 2013 10:48 Release Date: 24 Oct 2013 3216 Views

RISK: Medium Risk

Medium Risk

Cisco IOS XR Fragmented Packet Processing Vulnerability

A vulnerability has been identified in Cisco IOS XR. A remote user can cause denial of service conditions.   A remote user can send specially crafted fragmented packets to the target device to cause the target route processor to be unable to transmit packets to the fabric.
Last Update Date: 24 Oct 2013 10:42 Release Date: 24 Oct 2013 3243 Views

RISK: Medium Risk

Medium Risk

Apple iOS Passcode Lock Security Bypass Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple iOS, which can be exploited by malicious people with physical access to bypass certain security restrictions. A NULL pointer dereference error related to the emergency call button and the camera pane within the lock screen of the Passcode Lock component can...
Last Update Date: 24 Oct 2013 10:28 Release Date: 24 Oct 2013 3279 Views

RISK: High Risk

High Risk

Apple OS X and OS X Server Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple OS X and OS X Server, which can be exploited by remote attacker to conduct cross site scripting, denial of serverice, elevation of privilege, remote code execution and sensitive information disclosure   The following OS X components are found...
Last Update Date: 24 Oct 2013 10:06 Release Date: 24 Oct 2013 3329 Views

RISK: High Risk

High Risk

Node.js HTTP Server Deny Service Vulnerability

A vulnerability was identified in Node.js. A remote user can cause denial of service conditions. A remote user can send a large number of specially crafted pipelined requests to the target HTTP server component to cause excessive memory and CPU consumption on the target system.
Last Update Date: 22 Oct 2013 10:07 Release Date: 22 Oct 2013 3265 Views

RISK: Medium Risk

Medium Risk

VMware ESX/ESXi hostd-vmdb Deny Service Vulnerability

A vulnerability was identified in VMware ESX/ESXi. A remote user can cause denial of service conditions. A remote user with the ability to conduct a man-in-the-middle attack can modify management traffic to cause denial of service conditions on the hostd...
Last Update Date: 21 Oct 2013 09:59 Release Date: 21 Oct 2013 3401 Views

RISK: High Risk

High Risk

Oracle Java Multiple Vulnerabilities

Multiple vulnerabilities have been reported in Oracle Java, which can be exploited by malicious users to manipulate certain data and by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.
Last Update Date: 17 Oct 2013 14:28 Release Date: 17 Oct 2013 3551 Views

RISK: High Risk

High Risk

Oracle Products Multiple vulnerabilities

Multiple vulnerabilities have been identified in various Oracle products and components, which could be exploited by attackers to denial of service, escalation of privilege, remote code execution, sensitive information disclosure and tampering.
Last Update Date: 17 Oct 2013 14:27 Release Date: 17 Oct 2013 3658 Views

RISK: High Risk

High Risk

Microsoft Internet Explorer Memory Corruption Vulnerabilities

Remote code execution vulnerabilities exist when Internet Explorer improperly accesses an object in memory. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
Last Update Date: 16 Oct 2013 Release Date: 9 Oct 2013 3158 Views