Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Apache Struts "action:" Action Mapping Security Bypass Vulnerability

A vulnerability has been reported in Apache Struts, which can be exploited by malicious people to bypass certain security restrictions. The vulnerability is caused due to an error related to the action mapping "action:" prefix and can be exploited to gain access to otherwise restricted functionality...
Last Update Date: 24 Sep 2013 10:42 Release Date: 24 Sep 2013 3362 Views

RISK: Medium Risk

Medium Risk

Apple TV Multiple Vulnerabilities

Multiple vulnerabilities have been reported in Apple TV, which can be exploited by malicious people with physical access to bypass certain security restrictions and by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a vulnerable device.
Last Update Date: 24 Sep 2013 10:40 Release Date: 24 Sep 2013 3239 Views

RISK: Medium Risk

Medium Risk

Apple iOS Bypass Passcode Lock Vulnerability

A vulnerability has been identified in Apple iOS. A local user can bypass the passcode lock feature and access photos or make a phone call.A local user can invoke the Apple Control Center and bypass the passcode lock screen to access photos and related photo sharing applications...
Last Update Date: 23 Sep 2013 15:48 Release Date: 23 Sep 2013 3326 Views

RISK: High Risk

High Risk

Apple iTunes Memory Corruption Vulnerability

A vulnerability has been identified in Apple iTunes. A remote user can cause arbitrary code to be executed on the target user's system.   A remote user can create specially crafted HTML that, when loaded by the target user, will invoke the iTunes ActiveX...
Last Update Date: 19 Sep 2013 12:18 Release Date: 19 Sep 2013 3293 Views

RISK: Medium Risk

Medium Risk

Apple OS X Server Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple OS X Server, which can be exploited by malicious users to conduct brute force and script insertion attacks, bypass certain security restrictions, cause a DoS (Denial of Service), or potentially compromise a vulnerable system. ...
Last Update Date: 19 Sep 2013 12:17 Release Date: 19 Sep 2013 3268 Views

RISK: High Risk

High Risk

Mozilla Products Multiple Vulnerabilities

Multiple vulnerabilities were identified in Mozilla Firefox, Thunderbird and Seamonkey. A remote user can cause arbitrary code to be executed on the target user's system, cause denial of service conditions, and conduct cross-site scripting attacks. A local user can obtain elevated...
Last Update Date: 18 Sep 2013 09:24 Release Date: 18 Sep 2013 3181 Views

RISK: Extremely High Risk

Extremely High Risk

Microsoft Internet Explorer Object Access Memory Corruption Vulnerability

A vulnerability was identified in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error...
Last Update Date: 18 Sep 2013 09:24 Release Date: 18 Sep 2013 3534 Views

RISK: Medium Risk

Medium Risk

FFmpeg Multiple Vulnerabilities

Multiple vulnerabilities have been reported in FFmpeg, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system.An error within the "avpriv_dv_produce_packet()" function (libavformat/dv.c) can be...
Last Update Date: 17 Sep 2013 10:33 Release Date: 17 Sep 2013 3311 Views

RISK: High Risk

High Risk

Apple Mac OS X Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple OS X. Which can be exploited by attacker to denial of service conditions, spoof IPSec servers, bypass access controls and compromise the target user's system.Some errors exist due to a bundled vulnerable version of Apache....
Last Update Date: 16 Sep 2013 14:35 Release Date: 16 Sep 2013 3411 Views

RISK: High Risk

High Risk

Apple Safari for Mac OS X Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple Safari for Mac OS X, which can be exploited by malicious people to compromise a user's system.The vulnerabilities are reported in versions prior to 5.1.10 running on OS X Snow Leopard version 10....
Last Update Date: 16 Sep 2013 14:29 Release Date: 16 Sep 2013 3358 Views