Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

VMware Workstation and Player vmware-mount Command Vulnerability

A vulnerability has been identified in VMware Workstation and Player on Debian-based systems. which can be exploited by local user on the host operating system can obtain root privileges on the target system.On Debian-based host systens, a local user can exploit a...
Last Update Date: 26 Aug 2013 10:26 Release Date: 26 Aug 2013 4083 Views

RISK: Medium Risk

Medium Risk

Cisco Unified Communications Manager Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Cisco Unified Communications Manager. A remote authenticated user can execute arbitrary code on the target system, and cause denial of service conditions. A remote user can send a large number of TCP connections to ports 5060 or 5061 to trigger a...
Last Update Date: 22 Aug 2013 10:10 Release Date: 22 Aug 2013 4043 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to compromise a user's system. An error exists when handling file paths. The application creates certain shared memory files...
Last Update Date: 22 Aug 2013 09:57 Release Date: 22 Aug 2013 4090 Views

RISK: High Risk

High Risk

RedHat Linux Kernel Multiple Vulnerabilities

Multiple vulnerabilities have been identified in RedHat Linux Kernal, which can be exploited by malicious people to cause root compromise, access privileged data, and denial of service.A flaw was found in the way the Linux kernel's Stream Control Transmission Protocol (...
Last Update Date: 21 Aug 2013 18:50 Release Date: 21 Aug 2013 4282 Views

RISK: Medium Risk

Medium Risk

FFmpeg Multiple Vulnerabilities

Multiple vulnerabilities have been identified in FFmpeg, which can be exploited by malicious people to cause a DoS (Denial of Service).A NULL pointer dereference error within the "decode_frame()" function (libavcodec/dxa.c) can be exploited to cause a crash....
Last Update Date: 21 Aug 2013 18:49 Release Date: 21 Aug 2013 4012 Views

RISK: High Risk

High Risk

IBM HTTP Server Multiple Vulnerabilities

The vulnerabilities are identified in IBM HTTP Server versions 8... through 8...6, which can be exploited by malicious people to disclose certain sensitive information, cause a DoS (Denial of Service), and compromise a vulnerable system...
Last Update Date: 21 Aug 2013 18:38 Release Date: 21 Aug 2013 4150 Views

RISK: Medium Risk

Medium Risk

PHP SSL Client Certificate Verification and Session Fixation Vulnerabilities

Multiple vulnerabilities have been identified in PHP, which can be exploited by malicious people to conduct spoofing and session hijacking attacks.
Last Update Date: 20 Aug 2013 12:43 Release Date: 20 Aug 2013 4159 Views

RISK: High Risk

High Risk

Avant Browser Rendering Engines Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Avant Browser, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system.   For...
Last Update Date: 20 Aug 2013 12:41 Release Date: 20 Aug 2013 4491 Views

RISK: High Risk

High Risk

IBM Notes / Domino Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in IBM Notes and Domino, which can be exploited by malicious, local users to disclose certain sensitive data, manipulate certain data, and gain escalated privileges and by malicious people to conduct spoofing attacks, disclose certain sensitive information, manipulate certain...
Last Update Date: 20 Aug 2013 12:38 Release Date: 20 Aug 2013 4468 Views

RISK: High Risk

High Risk

Kingsoft Writer 2012 WPS file Buffer Overflow Vulnerability

A vulnerability has been identified in Kingsoft Writer 2012, which can be exploited by malicious people to compromise a user's system.The vulnerability is caused due to a boundary error in when handling font names and can be exploited to cause a stack-based buffer...
Last Update Date: 19 Aug 2013 09:39 Release Date: 19 Aug 2013 4145 Views