Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Foxit Reader Facebook Plugin Insecure Library Loading Vulnerability

A vulnerability has been identified in Foxit Reader, which can be exploited by malicious people to compromise a user's system.  The bundled Facebook plug-in (facebook_plugin.fpi) loads libraries (e.g. dwmapi.dll) in an insecure manner...
Last Update Date: 7 Jun 2013 Release Date: 24 Aug 2012 5337 Views

RISK: Medium Risk

Medium Risk

Cisco WebEx Meetings Server Information Disclosure Vulnerability

A vulnerability has been identified in Cisco WebEx Meetings Server, which can be exploited by malicious people to potentially disclose sensitive information.  The vulnerability is caused due to an error when authenticating some user requests, which can be exploited to disclose event passwords and host keys.
Last Update Date: 7 Jun 2013 10:17 Release Date: 7 Jun 2013 4320 Views

RISK: Medium Risk

Medium Risk

IBM InfoSphere Information Server Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in IBM InfoSphere Information Server, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to disclose certain sensitive information, manipulate certain data, and cause a DoS (Denial of Service).  The application...
Last Update Date: 7 Jun 2013 10:17 Release Date: 7 Jun 2013 4295 Views

RISK: High Risk

High Risk

ISC BIND Recursive Query Handling Denial of Service Vulnerability

A vulnerability has been identified in ISC BIND, which can be exploited by malicious people to cause a DoS (Denial of Service).   The vulnerability is caused due to an error when handling recursive query for zones, which can be exploited to cause a crash.
Last Update Date: 7 Jun 2013 Release Date: 6 Jun 2013 4345 Views

RISK: High Risk

High Risk

Apple Safari Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple Safari, which can be exploited by malicious people to conduct spoofing and cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system. Some vulnerabilities are caused due to a bundled vulnerable version of...
Last Update Date: 7 Jun 2013 Release Date: 6 Jun 2013 4248 Views

RISK: High Risk

High Risk

Apple Mac OS X Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple OS X. A remote user can execute arbitrary code on the target system. A remote authenticated user can write files outside of the target SMB directory. A local user can bypass security restrictions. A local user with access to...
Last Update Date: 6 Jun 2013 18:55 Release Date: 6 Jun 2013 4239 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to compromise a user's system. An unspecified error can be exploited to pass a bad handle to renderer. An unspecified error within dev tools API, Skia GPU handling and...
Last Update Date: 6 Jun 2013 18:55 Release Date: 6 Jun 2013 4329 Views

RISK: Medium Risk

Medium Risk

HP Data Protector Multiple Vulnerabilities

Multiple vulnerabilities have been identified in HP Data Protector, which can be exploited by malicious people to compromise a vulnerable system. The vulnerabilities are caused due to unspecified errors.
Last Update Date: 5 Jun 2013 10:09 Release Date: 5 Jun 2013 4248 Views

RISK: Medium Risk

Medium Risk

Linux Kernel iSCSI Heap Overflow Vulnerability

A vulnerability was identified in the Linux Kernel. A remote user can execute arbitrary code on the target system. On systems with an iSCSI target configured and listening on the network, a remote user can send specially crafted data to trigger a buffer overflow and execute arbitrary...
Last Update Date: 4 Jun 2013 10:22 Release Date: 4 Jun 2013 4283 Views

RISK: Medium Risk

Medium Risk

JBoss Enterprise Application Platform Multiple Vulnerabilities

Multiple vulnerabilities have been identified in JBoss Enterprise Application Platform. XML encryption backwards compatibility attacks were found against various frameworks, including Apache CXF. An attacker could force a server to use insecure, legacy cryptosystems, even when secure cryptosystems were enabled on endpoints...
Last Update Date: 31 May 2013 Release Date: 30 May 2013 4217 Views