Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the...
Last Update Date: 21 Mar 2013 09:53 Release Date: 21 Mar 2013 3494 Views

RISK: Medium Risk

Medium Risk

Google Picasa Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Picasa, which can be exploited by malicious people to compromise a user's system. A sign extension error when processing the color table of a BMP image can be exploited to cause a heap-based buffer overflow via a...
Last Update Date: 21 Mar 2013 09:53 Release Date: 21 Mar 2013 3486 Views

RISK: Medium Risk

Medium Risk

Samba Active Directory Domain Controller File Permission Vulnerability

A vulnerability has been identified in Samba. A remote authenticated user can access files on certain shares. When additional CIFS file shares are created on the Samba Active Directory domain controller, the system uses world-writable permissions on non-default CIFS shares for the initial...
Last Update Date: 20 Mar 2013 14:58 Release Date: 20 Mar 2013 3483 Views

RISK: Medium Risk

Medium Risk

Apple iOS Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple iOS. A local user can obtain elevated privileges on the target system.A local user can exploit a flaw in the handling of Mach-O executable files with overlapping segments to execute unsigned code on the target system.A...
Last Update Date: 20 Mar 2013 14:58 Release Date: 20 Mar 2013 3686 Views

RISK: Medium Risk

Medium Risk

Ruby on Rails Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Ruby on Rails, which can be exploited by malicious people to conduct cross-site scripting attacks and cause a DoS (Denial of Service).An error when handling keys to a hash in Active Record can be exploited to potentially convert...
Last Update Date: 20 Mar 2013 14:57 Release Date: 20 Mar 2013 3496 Views

RISK: Medium Risk

Medium Risk

RealPlayer MP4 Processing Buffer Overflow Vulnerability

A vulnerability has been identified in RealPlayer, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an error when processing MP4 files and can be exploited to cause a heap-based buffer overflow via a specially...
Last Update Date: 19 Mar 2013 09:45 Release Date: 19 Mar 2013 3641 Views

RISK: Medium Risk

Medium Risk

Novell Messenger / Groupwise Messenger Client Unspecified Buffer Overflow Vulnerability

A vulnerability has been identified in Novell Messenger and Novell Groupwise Messenger Client, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an unspecified error within the client and can be exploited to cause a buffer overflow...
Last Update Date: 18 Mar 2013 11:39 Release Date: 18 Mar 2013 3729 Views

RISK: High Risk

High Risk

TP-LINK Router Administrative Web Interface Backdoor Vulnerability

A vulnerability has been identified in certain TP-LINK routers, which can be exploited by remote attackers to execute arbitrary code on target system.   Certain TP-LINK routers provide access to an administrative web interface which does not require authentication (start_art.html). Remote...
Last Update Date: 15 Mar 2013 10:54 Release Date: 15 Mar 2013 4504 Views

RISK: High Risk

High Risk

Apple Safari Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple Safari. A remote user can cause arbitrary code to be executed on the target user's system, and bypass authentication.  A remote user can create specially crafted HTML that, when loaded by the target user, will execute...
Last Update Date: 15 Mar 2013 10:18 Release Date: 15 Mar 2013 3526 Views

RISK: High Risk

High Risk

Apple Mac OS X Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mac OS X. A remote user can cause arbitrary code to be executed on the target user's system, and bypass authentication. A remote user may be able to bypass AppleID authentication when multiple users fail the AppleID certificate validation...
Last Update Date: 15 Mar 2013 10:18 Release Date: 15 Mar 2013 3572 Views