Skip to main content

Security Bulletin

Filter by:

RISK: Extremely High Risk

Extremely High Risk

Microsoft Internet Explorer Unspecified Use-After-Free Vulnerability

A vulnerability has been identified in Microsoft Internet Explorer, which can be exploited by malicious people to compromise a user's system.   The vulnerability is caused due to a use-after-free error and can be exploited to dereference already freed memory.   Successful exploitation...
Last Update Date: 15 May 2013 Release Date: 6 May 2013 4302 Views

RISK: High Risk

High Risk

Adobe ColdFusion "filename" Arbitrary File Disclosure Vulnerability

A vulnerabilities has been identified in Adobe ColdFusion, which can be exploited by an unauthorized user to remotely retrieve files stored on the server.   Input passed via the "filename" parameter to administrator/mail/download.cfm in the CFIDE/adminapi section is not...
Last Update Date: 15 May 2013 Release Date: 10 May 2013 3558 Views

RISK: Medium Risk

Medium Risk

Cisco Unified Customer Voice Portal Multiple Vulnerabilities

Multiple vulnerabilities has been identified in Cisco Unified Customer Voice Portal. A remote user can execute arbitrary applications on the target system, cause denial of service conditions, view and modify files on the target system, and gain administrator access.A remote user can send a...
Last Update Date: 9 May 2013 10:05 Release Date: 9 May 2013 3416 Views

RISK: Medium Risk

Medium Risk

nginx "ngx_http_parse_chunked()" Buffer Overflow Vulnerability

A vulnerability has been identified in nginx, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to an error within the "ngx_http_parse_chunked()" function (http/ngx_http_parse.c) when parsing an HTTP chunk and can be...
Last Update Date: 8 May 2013 10:41 Release Date: 8 May 2013 3643 Views

RISK: High Risk

High Risk

IBM WebSphere Products Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in IBM WebSphere products, which can be exploited by malicious people to disclose and manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.  The applications bundle a vulnerable version of IBM Java Runtime Environment.
Last Update Date: 8 May 2013 10:37 Release Date: 8 May 2013 3906 Views

RISK: High Risk

High Risk

IBM Notes PNG Integer Overflow Vulnerability

A vulnerability has been identified in IBM Notes, which can be exploited by malicious people to compromise a user's system.  The vulnerability is caused due to an integer overflow when viewing PNG images and can be exploited to execute arbitrary code by sending an e-...
Last Update Date: 8 May 2013 10:33 Release Date: 8 May 2013 3436 Views

RISK: Medium Risk

Medium Risk

Microsoft Internet Explorer Files and Folders Enumeration Vulnerabilities

Multiple vulnerabilities have been discovered in Microsoft Internet Explorer, which can be exploited by malicious people to disclose sensitive information. The vulnerabilities are caused due to MSXML returning different errors depending on whether or not a file or directory exists. This can be exploited to check the...
Last Update Date: 7 May 2013 10:12 Release Date: 7 May 2013 3600 Views

RISK: Medium Risk

Medium Risk

Cisco Webex Meetings Server Input Validation Vulnerability

A vulnerability has been identified in Cisco Webex Meetings Server. A remote user can view certain files on the target system. The system does not properly validate user-supplied input. A remote user can supply a specially crafted HTTP request to a target WebEx node to...
Last Update Date: 6 May 2013 15:28 Release Date: 6 May 2013 3411 Views

RISK: Medium Risk

Medium Risk

Cisco IOS XR SNMP Processing Vulnerability

A vulnerability has been identified in Cisco IOS XR. A remote authenticated user can cause denial of service conditions.   A remote authenticated user can send specially crafted SNMP packets to cause the target SNMP process to restart.
Last Update Date: 6 May 2013 15:26 Release Date: 6 May 2013 3447 Views

RISK: Medium Risk

Medium Risk

IBM WebSphere Message Broker Java Multiple Vulnerabilities

IBM has acknowledged multiple vulnerabilities in IBM WebSphere Message Broker, which can be exploited by malicious people to disclose certain sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.   The vulnerabilities exist in the...
Last Update Date: 6 May 2013 15:26 Release Date: 6 May 2013 3561 Views