Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

F5 FirePass SQL Injection and Redirection Vulnerabilities

Multiple vulnerabilities have been identified in F5 FirePass, which can be exploited by malicious people to conduct spoofing and SQL injection attacks. Input passed via the "refreshURL" parameter to my.activation.cns.php3 is not properly verified before being used to redirect users...
Last Update Date: 24 Oct 2012 11:24 Release Date: 24 Oct 2012 4372 Views

RISK: High Risk

High Risk

Adobe Shockwave Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.   A remote user can create specially crafted content that, when loaded by the target user, will trigger a buffer overflow...
Last Update Date: 24 Oct 2012 11:23 Release Date: 24 Oct 2012 4156 Views

RISK: Medium Risk

Medium Risk

HP-UX Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in HP-UX, which can be exploited by malicious people to compromise a user's system.   For details, please refer to SA12101802.  
Last Update Date: 22 Oct 2012 10:21 Release Date: 22 Oct 2012 4099 Views

RISK: High Risk

High Risk

Novell ZENworks Asset Management Arbitrary Files Disclosure Vulnerability

A vulnerability has been identified in Novell ZENworks Asset Management. A remote user can view arbitrary files on the target system.   A remote user can use hard-coded credentials when invoking a maintenance function to read files on the target system with System privileges. The HandleMaintenanceCalls...
Last Update Date: 19 Oct 2012 09:55 Release Date: 19 Oct 2012 4230 Views

RISK: High Risk

High Risk

Oracle Java Multiple Vulnerabilities

Multiple vulnerabilities were identified in Oracle Java Runtime Environment (JRE). A remote user can take full control of the target system. A remote user can access and modify data and cause partial denial of service conditions on the target system. A remote user can create specially...
Last Update Date: 19 Oct 2012 Release Date: 18 Oct 2012 4705 Views

RISK: High Risk

High Risk

Oracle Products Multiple vulnerabilities

Multiple vulnerabilities have been identified in various Oracle products and components, which could be exploited by attackers to conduct cross-site scripting attacks, denial of service, bypass security restriction, disclose sensitive information and tampering. 
Last Update Date: 18 Oct 2012 14:45 Release Date: 18 Oct 2012 4216 Views

RISK: High Risk

High Risk

Apple Mac OS X Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Java for Mac OS X, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and potentially compromise a vulnerable system. For more information:: SA12101802
Last Update Date: 18 Oct 2012 14:40 Release Date: 18 Oct 2012 4117 Views

RISK: High Risk

High Risk

Oracle Solaris Multiple Vulnerabilities

Multiple vulnerabilities were identified in Solaris. A local user can obtain root privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions. A remote user can send specially crafted data to cause denial...
Last Update Date: 18 Oct 2012 14:37 Release Date: 18 Oct 2012 4254 Views

RISK: Medium Risk

Medium Risk

Multi-vendor IP camera web interface authentication bypass Vulnerability

A vulnerability has been identified in web interface for IP cameras from several vendors including Foscam and Wansview, which can be exploited by malicious people to cause an authentication bypass. By visiting specific URLs, an attacker may be able to perform any function a normal user can...
Last Update Date: 16 Oct 2012 10:05 Release Date: 16 Oct 2012 4819 Views

RISK: High Risk

High Risk

Mozilla Firefox / Thunderbird / SeaMonkey Multiple Vulnerabilities

Multiple vulnerabilities have been reported in Mozilla Firefox, Thunderbird, and SeaMonkey, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. The protected "location" object is accessible by other domain objects, which can be...
Last Update Date: 15 Oct 2012 11:27 Release Date: 15 Oct 2012 4584 Views