Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Apple iTunes Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple iTunes, which can be exploited by malicious people to conduct spoofing attacks and compromise a user's system.The application does not properly validate SSL server certificates, which can be exploited to conduct Man-in-the-...
Last Update Date: 20 May 2013 10:45 Release Date: 20 May 2013 3545 Views

RISK: Medium Risk

Medium Risk

BlackBerry Tablet OS Flash Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in BlackBerry Tablet OS, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.
Last Update Date: 20 May 2013 10:24 Release Date: 20 May 2013 3464 Views

RISK: Medium Risk

Medium Risk

Cisco Products Multiple Vulnerabilities

Multiple vulnerabilities has been identified in Cisco Products, which can be exploited by remote users to cause denial of service conditions.Cisco Unified Communications Manager does not properly throttle authentication requests. A remote user can send multiple authentication requests in a short period of time to...
Last Update Date: 16 May 2013 18:38 Release Date: 16 May 2013 3540 Views

RISK: High Risk

High Risk

Kerberos kpasswd UDP Processing Vulnerability

A vulnerability has been identifitied in MIT Kerberos. A remote user can cause denial of service conditions. A remote user can send spoofed UDP packets to a target kadmind server running kpasswd to cause kpasswd to pass the UDP packets to the spoofed address and reply to the...
Last Update Date: 16 May 2013 18:34 Release Date: 16 May 2013 4016 Views

RISK: Medium Risk

Medium Risk

Linux Kernel Array Bounds Checking Vulnerability

A vulnerability has been identified in the Linux Kernel. A local user can obtain elevated privileges on the target system. On systems compiled with PERF_EVENTS support, a local user can supply a specially crafted perf_event_open() call to execute arbitrary code on the target system with root...
Last Update Date: 16 May 2013 18:33 Release Date: 16 May 2013 3740 Views

RISK: Medium Risk

Medium Risk

Microsoft Malware Protection Engine File Parsing Vulnerability

A vulnerability has been identified in multiple Microsoft products, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to an unspecified error when parsing certain files and can be exploited to cause memory corruption. Successful exploitation may allow execution...
Last Update Date: 16 May 2013 17:49 Release Date: 16 May 2013 3680 Views

RISK: High Risk

High Risk

IBM Java Multiple Vulnerabilities

Multiple vulnerabilities has been identified in IBM Java, which can be exploited by malicious, local users to disclose certain sensitive information and gain escalated privileges and by malicious people to disclose certain sensitive information, manipulate certain data, bypass certain security restrictions, cause a...
Last Update Date: 16 May 2013 17:47 Release Date: 16 May 2013 3452 Views

RISK: High Risk

High Risk

Adobe Flash Player / AIR Memory Corruption Vulnerability

Multiple vulnerabilities have been identified in Adobe Flash Player and Adobe AIR. A remote user can cause arbitrary code to be executed on the target user's system.   A remote user can create specially crafted content that, when loaded by the target user...
Last Update Date: 16 May 2013 Release Date: 15 May 2013 3691 Views

RISK: High Risk

High Risk

Mozilla Firefox / Thunderbird Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox / Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system, conduct cross-site scripting attacks, and obtain potentially sensitive information. A local user can obtain elevated privileges on...
Last Update Date: 15 May 2013 15:06 Release Date: 15 May 2013 3377 Views

RISK: High Risk

High Risk

Adobe Acrobat/Reader Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Acrobat/Reader. A remote user can cause arbitrary code to be executed on the target user's system, obtain potentially sensitive information, and bypass operating system blacklist controls. A remote user can create a specially crafted PDF...
Last Update Date: 15 May 2013 14:56 Release Date: 15 May 2013 3283 Views