Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

ISC BIND Recursive Query Handling Denial of Service Vulnerability

A vulnerability has been identified in ISC BIND, which can be exploited by malicious people to cause a DoS (Denial of Service).   The vulnerability is caused due to an error when handling recursive query for zones, which can be exploited to cause a crash.
Last Update Date: 7 Jun 2013 Release Date: 6 Jun 2013 3568 Views

RISK: High Risk

High Risk

Apple Safari Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple Safari, which can be exploited by malicious people to conduct spoofing and cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system. Some vulnerabilities are caused due to a bundled vulnerable version of...
Last Update Date: 7 Jun 2013 Release Date: 6 Jun 2013 3493 Views

RISK: High Risk

High Risk

Apple Mac OS X Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple OS X. A remote user can execute arbitrary code on the target system. A remote authenticated user can write files outside of the target SMB directory. A local user can bypass security restrictions. A local user with access to...
Last Update Date: 6 Jun 2013 18:55 Release Date: 6 Jun 2013 3456 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to compromise a user's system. An unspecified error can be exploited to pass a bad handle to renderer. An unspecified error within dev tools API, Skia GPU handling and...
Last Update Date: 6 Jun 2013 18:55 Release Date: 6 Jun 2013 3514 Views

RISK: Medium Risk

Medium Risk

HP Data Protector Multiple Vulnerabilities

Multiple vulnerabilities have been identified in HP Data Protector, which can be exploited by malicious people to compromise a vulnerable system. The vulnerabilities are caused due to unspecified errors.
Last Update Date: 5 Jun 2013 10:09 Release Date: 5 Jun 2013 3393 Views

RISK: Medium Risk

Medium Risk

Linux Kernel iSCSI Heap Overflow Vulnerability

A vulnerability was identified in the Linux Kernel. A remote user can execute arbitrary code on the target system. On systems with an iSCSI target configured and listening on the network, a remote user can send specially crafted data to trigger a buffer overflow and execute arbitrary...
Last Update Date: 4 Jun 2013 10:22 Release Date: 4 Jun 2013 3506 Views

RISK: Medium Risk

Medium Risk

JBoss Enterprise Application Platform Multiple Vulnerabilities

Multiple vulnerabilities have been identified in JBoss Enterprise Application Platform. XML encryption backwards compatibility attacks were found against various frameworks, including Apache CXF. An attacker could force a server to use insecure, legacy cryptosystems, even when secure cryptosystems were enabled on endpoints...
Last Update Date: 31 May 2013 Release Date: 30 May 2013 3473 Views

RISK: Medium Risk

Medium Risk

Splunk Web Cross-Site Scripting Vulnerabilty

A vulnerability was identified in Splunk Web, which can be exploited by a remote user to conduct cross-site scripting attacks.
Last Update Date: 31 May 2013 16:59 Release Date: 31 May 2013 3546 Views

RISK: High Risk

High Risk

Cisco NX-OS Nexus 1000v Multiple Vulnerabilies

Multiple vulnerabilities have been identified in the Cisco Nexus 1000v, which can be exploited by a remote user to monitor or inject traffic, gain control of a target system, bypass security restrictions or cause denial of service conditions.   NOTE: Currently, there is no patch...
Last Update Date: 31 May 2013 16:56 Release Date: 31 May 2013 3471 Views

RISK: Medium Risk

Medium Risk

Apache HTTP Server mod_rewrite Vulnerability

A vulnerability has been identified in Apache HTTP Server, which can be exploited by malicious people to compromise a vulnerable system.  The "do_rewritelog()" function (modules/mappers/mod_rewrite.c) does not properly handle certain escape sequences when writing to the log file...
Last Update Date: 31 May 2013 16:52 Release Date: 31 May 2013 3676 Views