Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Microsoft Internet Explorer Cumulative Security Vulnerabilities

Internet Explorer Process Integrity Level Assignment VulnerabilityAn elevation of privilege vulnerability exists in the way that Internet Explorer handles process integrity level assignment in specific cases. An attacker who successfully exploited this vulnerability could allow arbitrary code to execute with elevated privileges.EUC-JP Character Encoding VulnerabilityAn...
Last Update Date: 14 Aug 2013 15:41 Release Date: 14 Aug 2013 4042 Views

RISK: High Risk

High Risk

HP, H3C and 3COM Products OSPF Vulnerability

A vulnerability has been identified in various HP networking products including H3C and 3COM routers and switches which can be exploited by a remote unauthenticated user to cause denial of service conditions or obtain potentially sensitive information.  A remote authenticated user can send specially crafted Open Shortest Path First...
Last Update Date: 9 Aug 2013 12:06 Release Date: 9 Aug 2013 4192 Views

RISK: Medium Risk

Medium Risk

HP LaserJet Pro Printers Unauthorised Access Vulnerability

A vulnerability has been identified in certain HP LaserJet Pro printers, which could be exploited remotely to gain unauthorized access to data.
Last Update Date: 8 Aug 2013 Release Date: 7 Aug 2013 4157 Views

RISK: High Risk

High Risk

Mozilla Products Multiple Vulnerabilities

Multiple vulnerabilities were identified in Mozilla Firefox, Seamonkey, and Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system, cause denial of service conditions, and conduct cross-site scripting attacks. A local user can obtain...
Last Update Date: 8 Aug 2013 Release Date: 7 Aug 2013 4172 Views

RISK: Medium Risk

Medium Risk

ownCloud Cross-Site Scripting and Security Bypass Vulnerabilities

Two vulnerabilities have been identified in ownCloud, which can be exploited by malicious people to conduct cross-site scripting attacks and bypass certain security restrictions. An error within "user_webdavauth" can be exploited to bypass authorisation and gain access to otherwise restricted functionality. Certain unspecified...
Last Update Date: 8 Aug 2013 Release Date: 7 Aug 2013 4030 Views

RISK: Medium Risk

Medium Risk

Tor Browser Bundle "onreadystatechange" Event Handling Code Execution Vulnerability

A vulnerability has been identified in Tor Browser Bundle, which can be exploited by malicious people to compromise a user's system. An error exists when handling the "onreadystatechange" event and reloading pages.
Last Update Date: 8 Aug 2013 Release Date: 7 Aug 2013 4083 Views

RISK: High Risk

High Risk

Cisco TelePresence System Default Credentials Vulnerability

A vulnerability has been identified in Cisco TelePresence. A remote user can gain full control of the target system.   The web server contains an administrative user account with default credentials. A remote user can access the system using these authentication credentials.   Note: Vendor patch is...
Last Update Date: 8 Aug 2013 10:02 Release Date: 8 Aug 2013 4049 Views

RISK: Medium Risk

Medium Risk

PuTTY Multiple Vulnerabilities

 Vulnerabilities has been identified in PuTTY, which can be exploited by malicious people to potentially compromise a user's system. The vulnerabilities are caused due to some integer overflow errors when handling the SSH handshake and can be exploited to cause heap-based buffer overflows...
Last Update Date: 6 Aug 2013 10:26 Release Date: 6 Aug 2013 4125 Views

RISK: Medium Risk

Medium Risk

Joomla! Arbitrary File Upload Vulnerability

A vulnerability has been identified in Joomla!, which can be exploited by malicious users to compromise a vulnerable system.The vulnerability is caused due to the administrator/components/com_media/helpers/media.php script improperly validating the extension of an uploaded file. This...
Last Update Date: 5 Aug 2013 11:44 Release Date: 5 Aug 2013 4137 Views

RISK: Medium Risk

Medium Risk

Windows Phone PEAP-MS-CHAPv2 Authentication Protocol Vulnerability

A vulnerability has been identified in the PEAP-MS-CHAPv2 authentication protocol used by Windows Phone, which can be exploited by remote user can obtain authentication information.The Protected Extensible Authentication Protocol with Microsoft Challenge Handshake Authentication Protocol version 2 (PEAP-MS-CHAPv2...
Last Update Date: 5 Aug 2013 11:32 Release Date: 5 Aug 2013 4466 Views