Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Adobe Flash Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Flash Player. A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A buffer...
Last Update Date: 12 Dec 2012 14:07 Release Date: 12 Dec 2012 3936 Views

RISK: Medium Risk

Medium Risk

IBM WebSphere Application Server Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in IBM WebSphere Application Server, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.   The vulnerabilities exist in the bundled version of Java.   For more information, please refer to SA12111501.
Last Update Date: 11 Dec 2012 10:14 Release Date: 11 Dec 2012 4915 Views

RISK: Medium Risk

Medium Risk

ISC BIND DNS64 REQUIRE Assertion Failure Denial of Service Vulnerability

A vulnerability has been identified in ISC BIND, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error within the DNS64 IPv6 transition mechanism when handling certain queries, which can be exploited to trigger...
Last Update Date: 7 Dec 2012 Release Date: 6 Dec 2012 4830 Views

RISK: Medium Risk

Medium Risk

Apache Tomcat Multiple Vulnerabilities

Some vulnerabilities have been identified in Apache Tomcat, which can be exploited by malicious people to bypass certain security restrictions and cause a DoS (Denial of Service).An error within the NIO connector when transferring files using sendfile over HTTPS can be exploited to trigger an infinite...
Last Update Date: 7 Dec 2012 Release Date: 6 Dec 2012 5011 Views

RISK: High Risk

High Risk

Opera GIF Image Handling Buffer Underflow Vulnerability

A vulnerability has been identified in Opera, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused due to an error when decoding image data and can be exploited to cause a heap-based buffer underflow via a...
Last Update Date: 7 Dec 2012 Release Date: 6 Dec 2012 5022 Views

RISK: Medium Risk

Medium Risk

F5 FirePass SSL VPN Remote Code Execution Vulnerability

Multiple vulnerabilities have been identified in F5 FirePass, which can be exploited by malicious user to include and execute PHP code on the target system.   The 'CitrixAuth.php' script does not properly validate user-supplied input in the 'sessionId' parameter. A...
Last Update Date: 5 Dec 2012 10:26 Release Date: 5 Dec 2012 5150 Views

RISK: Medium Risk

Medium Risk

Oracle MySQL Server Multiple Vulnerabilities

Multiple vulnerabilities have been identified in MySQL, which can be exploited by malicious users to cause a DoS (Denial of Service) and compromise a vulnerable system and by malicious people to conduct brute force attacks.An error when processing a database name within certain functions when...
Last Update Date: 4 Dec 2012 11:15 Release Date: 4 Dec 2012 4964 Views

RISK: High Risk

High Risk

Google Chrome Two Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome,  where one has an unknown impact and the other can be exploited by malicious people to compromise a user's system. An error exists when handling file paths. A use-after-free error exists when handling...
Last Update Date: 3 Dec 2012 11:39 Release Date: 3 Dec 2012 4877 Views

RISK: Medium Risk

Medium Risk

Wireshark Multiple Denial of Service Vulnerabilities

Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). An error in the USB dissector (epan/dissectors/packet-usb.c) can be exploited to cause an infinite loop and...
Last Update Date: 30 Nov 2012 Release Date: 29 Nov 2012 4262 Views

RISK: Medium Risk

Medium Risk

Apple TV Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple TV, which can be exploit by malicious user to execute arbitrary code, access privilaged data and cause denial of service. An information disclosure issue existed in the handling of APIs related to kernel extensions. Responses containing a OSBundleMachOHeaders key...
Last Update Date: 30 Nov 2012 10:46 Release Date: 30 Nov 2012 4027 Views