Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to disclose potentially sensitive information, conduct cross-site scripting attacks, and compromise a user's system. A use-after-free...
Last Update Date: 23 May 2013 11:40 Release Date: 23 May 2013 4107 Views

RISK: Medium Risk

Medium Risk

Apple QuickTime Multiple Vulnerabilities

Multiple vulnerabilities have been identified which can be exploited by malicious users to execute arbitrary code and cause Denial of Service condition via specially crafted files.
Last Update Date: 23 May 2013 10:28 Release Date: 23 May 2013 4248 Views

RISK: Medium Risk

Medium Risk

Wireshark Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service).   An error in the RELOAD dissector (dissectors/packet-reload.c) can be exploited to trigger infinite loops and consume CPU resources...
Last Update Date: 21 May 2013 10:14 Release Date: 21 May 2013 4487 Views

RISK: High Risk

High Risk

Apple iTunes Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple iTunes, which can be exploited by malicious people to conduct spoofing attacks and compromise a user's system.The application does not properly validate SSL server certificates, which can be exploited to conduct Man-in-the-...
Last Update Date: 20 May 2013 10:45 Release Date: 20 May 2013 4303 Views

RISK: Medium Risk

Medium Risk

BlackBerry Tablet OS Flash Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in BlackBerry Tablet OS, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.
Last Update Date: 20 May 2013 10:24 Release Date: 20 May 2013 4219 Views

RISK: Medium Risk

Medium Risk

Cisco Products Multiple Vulnerabilities

Multiple vulnerabilities has been identified in Cisco Products, which can be exploited by remote users to cause denial of service conditions.Cisco Unified Communications Manager does not properly throttle authentication requests. A remote user can send multiple authentication requests in a short period of time to...
Last Update Date: 16 May 2013 18:38 Release Date: 16 May 2013 4375 Views

RISK: High Risk

High Risk

Kerberos kpasswd UDP Processing Vulnerability

A vulnerability has been identifitied in MIT Kerberos. A remote user can cause denial of service conditions. A remote user can send spoofed UDP packets to a target kadmind server running kpasswd to cause kpasswd to pass the UDP packets to the spoofed address and reply to the...
Last Update Date: 16 May 2013 18:34 Release Date: 16 May 2013 4917 Views

RISK: Medium Risk

Medium Risk

Linux Kernel Array Bounds Checking Vulnerability

A vulnerability has been identified in the Linux Kernel. A local user can obtain elevated privileges on the target system. On systems compiled with PERF_EVENTS support, a local user can supply a specially crafted perf_event_open() call to execute arbitrary code on the target system with root...
Last Update Date: 16 May 2013 18:33 Release Date: 16 May 2013 4594 Views

RISK: Medium Risk

Medium Risk

Microsoft Malware Protection Engine File Parsing Vulnerability

A vulnerability has been identified in multiple Microsoft products, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to an unspecified error when parsing certain files and can be exploited to cause memory corruption. Successful exploitation may allow execution...
Last Update Date: 16 May 2013 17:49 Release Date: 16 May 2013 4465 Views

RISK: High Risk

High Risk

IBM Java Multiple Vulnerabilities

Multiple vulnerabilities has been identified in IBM Java, which can be exploited by malicious, local users to disclose certain sensitive information and gain escalated privileges and by malicious people to disclose certain sensitive information, manipulate certain data, bypass certain security restrictions, cause a...
Last Update Date: 16 May 2013 17:47 Release Date: 16 May 2013 4201 Views