Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Cisco Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Cisco products, which can be exploited by attackers to conduct cross-site scripting attacks, access the target database, execute commands without proper authorization, cause denial of service conditions, and gain elevated privileges on the target system.
Last Update Date: 29 Jan 2014 18:44 Release Date: 29 Jan 2014 3988 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome where some have an unknown impact and others can be exploited by malicious people to compromise a user's system.Some unspecified errors exist. No further information is currently available.A use-after-free error...
Last Update Date: 29 Jan 2014 18:44 Release Date: 29 Jan 2014 4085 Views

RISK: Medium Risk

Medium Risk

IBM WebSphere Application Server Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in IBM WebSphere Application Server, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a vulnerable system.   The...
Last Update Date: 29 Jan 2014 Release Date: 28 Jan 2014 3976 Views

RISK: High Risk

High Risk

Apple Pages Double Free Memory Vulnerability

A vulnerability was identified in Apple Pages. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted Microsoft Word file that, when loaded by the target user, will trigger a double...
Last Update Date: 29 Jan 2014 Release Date: 27 Jan 2014 4054 Views

RISK: High Risk

High Risk

Apple iTunes Multiple vulnerabilities

Multiple vulnerabilities have been identified in Apple iTunes. A remote user can execute arbitrary code on the target system. A remote authenticated user can write files outside of the target SMB directory. A local user can bypass security restrictions.
Last Update Date: 24 Jan 2014 12:29 Release Date: 24 Jan 2014 4652 Views

RISK: Medium Risk

Medium Risk

Drupal Multiple vulnerabilities

Multiple vulnerabilities have been identified in Drupal, which can be exploited by malicious users to bypass certain security restrictions and hijack another user's account.
Last Update Date: 23 Jan 2014 Release Date: 22 Jan 2014 3840 Views

RISK: Medium Risk

Medium Risk

JBoss Web Framework Kit Information Disclosure Vulnerabilities

Multiple vulnerabilities have been identified in Red Hat JBoss Web Framework Kit, which can be exploited by malicious users to disclose potentially sensitive information. An error related to the InterfaceGenerator handler within JBoss Seam Remoting can be exploited to gain knowledge of all classes and methods within...
Last Update Date: 22 Jan 2014 17:51 Release Date: 22 Jan 2014 3950 Views

RISK: Medium Risk

Medium Risk

VMware Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in various VMware products, which could be exploited by attackers to cause denial of service and cross site request forgery.
Last Update Date: 20 Jan 2014 11:01 Release Date: 20 Jan 2014 3931 Views

RISK: Medium Risk

Medium Risk

Microsoft Dynamics AX Query Filter DoS Vulnerability

A denial of service vulnerability exists in Microsoft Dynamics AX that could allow an attacker to cause an AOS instance to become unresponsive.
Last Update Date: 15 Jan 2014 17:46 Release Date: 15 Jan 2014 3846 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Win32k Window Handle Vulnerability

An elevation of privilege vulnerability exists when the Windows kernel-mode driver improperly uses window handle thread-owned objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated privileges.
Last Update Date: 15 Jan 2014 17:46 Release Date: 15 Jan 2014 3818 Views