Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Mozilla Firefox / Thunderbird / SeaMonkey Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox, Thunderbird and SeaMonkey, which be exploited by malicious people to disclose potentially sensitive information, conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system. Some unspecified errors exist, ...
Last Update Date: 11 Dec 2013 10:17 Release Date: 11 Dec 2013 3898 Views

RISK: Medium Risk

Medium Risk

Adobe Shockwave Player Multiple Memory Corruption Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Shockwave Player, which can be exploited by malicious people to compromise a user's system.   Unspecified errors can be exploited to cause memory corruption.   Successful exploitation of the vulnerabilities may allow execution of arbitrary code.
Last Update Date: 11 Dec 2013 10:00 Release Date: 11 Dec 2013 3786 Views

RISK: High Risk

High Risk

Adobe Flash Player / AIR Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Flash Player and Adobe AIR, which can be exploited by malicious people to compromise a user's system. A type confusion error exists. A use-after-free error when unloading the Flash Player module can be exploited...
Last Update Date: 11 Dec 2013 09:59 Release Date: 11 Dec 2013 3869 Views

RISK: High Risk

High Risk

Microsoft Windows Includes An Invalid Certificate Vulnerability

A vulnerability was reported in Microsoft Windows. A remote user may be able to spoof SSL certificates. The operating system includes an invalid subordinate certificate issued by Directorate General of the Treasury (DG Tresor), subordinate to the Government of France CA (ANSSI). The invalid...
Last Update Date: 10 Dec 2013 10:11 Release Date: 10 Dec 2013 4494 Views

RISK: Medium Risk

Medium Risk

HP-UX Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in HP-UX Java, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.
Last Update Date: 9 Dec 2013 09:47 Release Date: 9 Dec 2013 3722 Views

RISK: Medium Risk

Medium Risk

GIMP XWD Plugin "load_image()" Buffer Overflow Vulnerability

A vulnerability have been reported in GIMP, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error within the "load_image()" function (plug-ins/common/file-xwd....
Last Update Date: 6 Dec 2013 11:33 Release Date: 6 Dec 2013 3710 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to conduct spoofing and session fixation attacks and compromise a user's system.An error when handling the 302 HTTP status in sync can be...
Last Update Date: 6 Dec 2013 11:33 Release Date: 6 Dec 2013 3904 Views

RISK: Medium Risk

Medium Risk

JBoss Enterprise Application Platform Multiple Vulnerbilities

Multiple vulnerabilities have been identified in JBoss Enterprise Application Platform. A remote authenticated user can bypass security controls. A local user can obtain elevated privileges on the target system. The HawtJNI Library class writes native libraries to a predictable file name in the '/tmp' directory...
Last Update Date: 5 Dec 2013 10:01 Release Date: 5 Dec 2013 3837 Views

RISK: Medium Risk

Medium Risk

Ruby on Rails Multiple Vulnerability

Multiple vulnerabilities were identified in Ruby on Rails. A remote user can cause denial of service conditions, conduct cross-site scripting attacks, and generate unsafe queries. Several scripts do not properly filter HTML code from user-supplied input before displaying the input. A...
Last Update Date: 4 Dec 2013 09:30 Release Date: 4 Dec 2013 3864 Views

RISK: High Risk

High Risk

D-Link Router Authentication Bypass Backdoor Vulnerability

A vulnerability was reported in D-Link Routers. A remote user can gain administrative access on the target device.   A remote user can send a specially crafted HTTP request with the HTTP User-Agent set to 'xmlset_roodkcableoj28840ybtide' to bypass authentication and gain administrative access...
Last Update Date: 3 Dec 2013 Release Date: 15 Oct 2013 4334 Views