Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Cisco ASA and FWSM Time-Range Object Access List Bypass Vulnerability

A vulnerability in the implementation of the time-range object could allow an unauthenticated, remote attacker to bypass access lists that are using the time-range option. The vulnerability is due to improper implementation of the code for the time-range object, ...
Last Update Date: 25 Apr 2013 10:54 Release Date: 25 Apr 2013 3856 Views

RISK: High Risk

High Risk

Oracle Java Reflection API Vulnerability

A vulnerability has been identified in Oracle Java. A remote user can cause arbitrary code to be executed on the target user's system.   A remote user can create a specially crafted Java application that, when loaded and approved by the target user, will trigger...
Last Update Date: 25 Apr 2013 10:41 Release Date: 25 Apr 2013 4009 Views

RISK: Medium Risk

Medium Risk

McAfee ePolicy Orchestrator Multiple Vulnerabilities

Multiple vulnerabilities was identifited in McAfee ePolicy Orchestrator, which can be exploited by malicious people to disclose certain sensitive information and compromise a user's system.
Last Update Date: 24 Apr 2013 10:13 Release Date: 24 Apr 2013 3645 Views

RISK: High Risk

High Risk

Hitachi Cosminexus Products Oracle Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in various Hitachi Cosminexus products, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to disclose certain sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable...
Last Update Date: 22 Apr 2013 09:58 Release Date: 22 Apr 2013 3856 Views

RISK: High Risk

High Risk

Apple Mac OS X Multiple Java Vulnerabilities

Multiple Java vulnerabilities has been identifitied in Mac OS X, which can be exploited by malicious people to disclose certain sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.
Last Update Date: 18 Apr 2013 16:24 Release Date: 18 Apr 2013 3587 Views

RISK: Medium Risk

Medium Risk

Cisco TelePresence H.264 Processing Vulnerability

A vulnerability was identified in Cisco TelePresence. A remote user can cause denial of service conditions. A remote user can send a specially crafted H.264 bit stream within a Real-Time Transport Protocol (RTP) packet to trigger a flaw in the digital signal...
Last Update Date: 18 Apr 2013 16:24 Release Date: 18 Apr 2013 3909 Views

RISK: High Risk

High Risk

HP-UX Multiple Java Vulnerabilities

Multiple Java vulnerabilities has been identified in HP-UX, which can be exploited by malicious people to disclose certain sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.
Last Update Date: 18 Apr 2013 16:24 Release Date: 18 Apr 2013 3523 Views

RISK: Medium Risk

Medium Risk

Oracle Products Multiple Vulnerabilities

Multiple vulnerabilities was identifited in Oracle Products, which can be exploited to execute arbitrary code on the target system, partially access and modify data, obtain elevated privileges on the target system, and cause denial of service conditions.
Last Update Date: 18 Apr 2013 16:24 Release Date: 18 Apr 2013 3880 Views

RISK: High Risk

High Risk

Apple Safari WebKit Type Confusion Vulnerability

A vulnerability has been identified in Apple Safari, which can be exploited by malicious people to compromise a user's system.
Last Update Date: 18 Apr 2013 16:24 Release Date: 18 Apr 2013 3540 Views

RISK: High Risk

High Risk

Oracle Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Oracle Java, which can be exploited by malicious people to elevation of privilege, cause a DoS (Denial of Service), and compromise a user's system. A remote user can create a specially crafted Java applet or Java Web...
Last Update Date: 17 Apr 2013 11:07 Release Date: 17 Apr 2013 4256 Views