Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

VMware ESX/ESXi Server Multiple Vulnerabilities

Multiple vulnerabilities have been identified in VMware ESX/ESXi Server, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to disclose potentially sensitive information and cause a DoS (Denial of Service).
Last Update Date: 2 Aug 2013 18:51 Release Date: 2 Aug 2013 4135 Views

RISK: High Risk

High Risk

McAfee Firewall Enterprise BIND RDATA Handling Assertion Failure Denial of Service Vulnerability

A vulnerability has been identified in McAfee Firewall Enterprise, which can be exploited by malicious people to cause a DoS (Denial of Service).   For details, please refer to SA13073005.
Last Update Date: 2 Aug 2013 18:40 Release Date: 2 Aug 2013 4205 Views

RISK: Medium Risk

Medium Risk

Cisco Products Command Injection and Code Execution Vulnerabilities

Multiple vulnerabilities have been identified in various Cisco products, which can be exploited by malicious users and malicious people to compromise a vulnerable system.
Last Update Date: 2 Aug 2013 18:39 Release Date: 2 Aug 2013 4246 Views

RISK: High Risk

High Risk

Cisco Products OSPF Vulnerability

A vulnerability has been identified in various Cisco products, which can be exploited by an unauthenticated attacker to take full control of the OSPF Autonomous System (AS) domain routing table, blackhole traffic, and intercept traffic.  The attacker could trigger this vulnerability by injecting crafted...
Last Update Date: 2 Aug 2013 18:35 Release Date: 2 Aug 2013 4372 Views

RISK: Medium Risk

Medium Risk

OpenOffice.org PLCF and XML Data Parsing Vulnerabilities

Multiple vulnerabilities have been identified in OpenOffice.org, which can be exploited by malicious people to compromise a user's system.An unspecified error when handling PLCF (Plex of Character Positions in File) data within DOC files can be exploited to cause memory corruption...
Last Update Date: 1 Aug 2013 Release Date: 29 Jul 2013 4130 Views

RISK: High Risk

High Risk

Symantec Web Gateway Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Symantec Web Gateway. which can be exploited by remote user conduct cross-site scripting attacks, conduct cross-site request forgery attacks, inject SQL commands and compromise a vulnerable system.A remote user with access to the Symantec Web...
Last Update Date: 1 Aug 2013 Release Date: 29 Jul 2013 4109 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. An error within frame handling can be exploited to bypass origin policies.A type confusion error exists within V8....
Last Update Date: 1 Aug 2013 09:49 Release Date: 1 Aug 2013 4259 Views

RISK: Medium Risk

Medium Risk

TrustGo Antivirus & Mobile Security Denial-of-service Vulnerability

A vulnerability was identified in TrustGo Antivirus & Mobile Security, which can be exploited by malicious application to cause denial-of-service. TrustGo Antivirus & Mobile Security versions 1.2.7 through 1.3.5 crash if an intent is...
Last Update Date: 31 Jul 2013 09:09 Release Date: 31 Jul 2013 4347 Views

RISK: Medium Risk

Medium Risk

Adobe Digital Editions Memory Corruption Vulnerability

A vulnerability was identified in Adobe Digital Editions. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error...
Last Update Date: 31 Jul 2013 09:07 Release Date: 31 Jul 2013 4769 Views

RISK: High Risk

High Risk

ISC BIND RDATA Handling Assertion Failure Denial of Service Vulnerability

A vulnerability has been identified in ISC BIND, which can be exploited by malicious people to cause a DoS (Denial of Service).   The vulnerability is caused due to an error when parsing RDATA within a DNS query and can be exploited to trigger a REQUIRE assertion and...
Last Update Date: 30 Jul 2013 14:12 Release Date: 30 Jul 2013 4238 Views