Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Adobe Shockwave Player Multiple Vulnerabilities

Two vulnerabilities have been identified in Adobe Shockwave Player, which can be exploited by malicious people to compromise a user's system.An unspecified error can be exploited to cause memory corruption.Another unspecified error can be exploited to cause memory corruption.Successful exploitation of...
Last Update Date: 11 Sep 2013 14:34 Release Date: 11 Sep 2013 3917 Views

RISK: High Risk

High Risk

Adobe Reader / Acrobat Multiple Vulnerabilities

Multiple vulnerabilities have been reported in Adobe Reader and Adobe Acrobat, which can be exploited by malicious people to compromise a user's system.Some unspecified errors can be exploited to cause a stack overflow and execute arbitrary code.Some unspecified errors can be exploited to...
Last Update Date: 11 Sep 2013 14:33 Release Date: 11 Sep 2013 3948 Views

RISK: Medium Risk

Medium Risk

GOM Player Unspecified Buffer Overflow Vulnerability

A vulnerability has been identified in GOM Player, which can be exploited by malicious people to compromise a user's system.The vulnerability is caused due to an unspecified error and can be exploited to cause a buffer overflow.
Last Update Date: 11 Sep 2013 10:07 Release Date: 11 Sep 2013 4102 Views

RISK: Medium Risk

Medium Risk

IBM WebSphere Application Server for z/OS JAX-WS WS-Security Vulnerability

A vulnerability has been identified in IBM WebSphere Application Server for z/OS, which is caused due to an unspecified error when using JAX-WS WS-Security configured for XML Digital Signature. No further information is currently available.
Last Update Date: 6 Sep 2013 09:52 Release Date: 6 Sep 2013 4083 Views

RISK: High Risk

High Risk

Cisco Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in various Cisco products, which can be exploited by malicious people to conduct cross-site scripting attacks, cross-site request forgery attacks, cause denial of service conditions or compromise a vulnerable system.
Last Update Date: 5 Sep 2013 Release Date: 30 Aug 2013 4103 Views

RISK: High Risk

High Risk

Polaris Products DOCX Buffer Overflow Vulnerability

A DOCX buffer overflow vulnerability has been identified in Polaris Office for Android and Samsung Galaxy S4 Polaris Viewer, which can be exploited by malicious people to compromise a vulnerable device.   Note: Vendor patch is currenlty unavailable.
Last Update Date: 5 Sep 2013 09:46 Release Date: 5 Sep 2013 4076 Views

RISK: Medium Risk

Medium Risk

cPanel Multiple Vulnerabilities

Multiple vulnerabilities have been identified in cPanel, which can be exploited by malicious, local users to disclose potentially sensitive information, bypass certain security restrictions, manipulate certain data, and gain escalated privileges and by malicious users to conduct script insertion attacks, bypass certain security restrictions...
Last Update Date: 4 Sep 2013 09:49 Release Date: 4 Sep 2013 4084 Views

RISK: Medium Risk

Medium Risk

Asterisk Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Asterisk. A remote user can cause denial of service conditions. A remote user can send a SIP ACK with SDP that is received after the channel has been terminated to cause the target service to crash. A remote user can send...
Last Update Date: 29 Aug 2013 09:35 Release Date: 29 Aug 2013 4171 Views

RISK: Medium Risk

Medium Risk

Spring Framework Multiple XML Entity References Information Disclosure Vulnerabilities

Multiple vulnerabilities have been identified in Spring Framework, which can be exploited by malicious people to disclose potentially sensitive information. The vulnerabilities are caused due to an error when processing XML data, which can be exploited to e.g. disclose contents of certain local files...
Last Update Date: 28 Aug 2013 09:29 Release Date: 28 Aug 2013 4025 Views

RISK: Medium Risk

Medium Risk

RealPlayer Multiple Vulnerabilities

Two vulnerabilities have been identified in RealPlayer, which can be exploited by malicious people to compromise a user's system.An error when handling filenames in RMP can be exploited to cause a stack-based buffer overflow.An error when parsing RealMedia files can be...
Last Update Date: 27 Aug 2013 10:16 Release Date: 27 Aug 2013 4091 Views