Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. An error when handling renders can be exploited to bypass the cross-process policy and cause interference. This vulnerability...
Last Update Date: 2 Aug 2012 18:30 Release Date: 2 Aug 2012 4464 Views

RISK: High Risk

High Risk

Citrix Access Gateway Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Citrix Access Gateway. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a buffer overflow in the Citrix Access Gateway Plug-in for Windows ActiveX control and execute arbitrary code on the...
Last Update Date: 2 Aug 2012 18:30 Release Date: 2 Aug 2012 4453 Views

RISK: High Risk

High Risk

MIT Kerberos Key Distribution Center Heap Overflow Vulnerability

Two vulnerabilities have been identified in the Kerberos KDC, which could be exploited by remote attackers to cause a denial of service or compromise a vulnerable system. By sending a specially crafted AS-REQ, an unauthenticated remote attacker can cause the KDC to abnormally terminate or...
Last Update Date: 1 Aug 2012 11:27 Release Date: 1 Aug 2012 4583 Views

RISK: High Risk

High Risk

Apple Safari for Mac OS X Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple Safari for Mac OS X, which can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose sensitive information, bypass certain security restrictions, and compromise a user's system. ...
Last Update Date: 27 Jul 2012 13:57 Release Date: 27 Jul 2012 4493 Views

RISK: High Risk

High Risk

Apple Xcode Two Vulnerabilities

A vulnerability have been identified in Apple Xcode, which can be exploited by malicious people to disclose potentially sensitive information, hijack a user's session, and bypass certain security restrictions.A design error exists within the implementation of SSL 3. and TLS 1....
Last Update Date: 27 Jul 2012 13:55 Release Date: 27 Jul 2012 4350 Views

RISK: Medium Risk

Medium Risk

ISC DHCP Multiple Vulnerabilities

Multiple vulnerabilities have been identified in ISC DHCP, which can be exploited by remoter user to cause denial of service. A remote user on the local network can send a specially crafted client identifier parameter value to trigger a buffer overflow and cause the target service to crash...
Last Update Date: 26 Jul 2012 12:03 Release Date: 26 Jul 2012 4306 Views

RISK: Medium Risk

Medium Risk

ISC BIND Multiple Vulnerabilities

Multiple vulnerabilities have been identified in ISC BIND, which can be exploited by remote user to cause denial of service. On systems configured for DNSSEC validation, a remote user can cause the cache of failing queries to be used before fully initialized, triggering an assertion failure...
Last Update Date: 26 Jul 2012 12:02 Release Date: 26 Jul 2012 4349 Views

RISK: High Risk

High Risk

Invensys Wonderware Products Insecure Library Loading Vulnerability

A vulnerability has been identified in multiple Invensys Wonderware products, which can be exploited by malicious people to compromise a user's system.   The vulnerability is caused due to the application loading libraries in an insecure manner. This can be exploited to load an arbitrary library...
Last Update Date: 25 Jul 2012 15:02 Release Date: 25 Jul 2012 4420 Views

RISK: High Risk

High Risk

Siemens SIMATIC STEP 7 / PCS 7 Insecure Library Loading Vulnerability

A vulnerability has been identified in Siemens SIMATIC STEP 7 and PCS 7, which can be exploited by malicious people to compromise a user's system.   The vulnerability is caused due to the application loading libraries in an insecure manner. This can be exploited to load...
Last Update Date: 25 Jul 2012 15:01 Release Date: 25 Jul 2012 4654 Views

RISK: Medium Risk

Medium Risk

Google Android DNS Resolver Vulnerability

A vulnerability has been identified in Google Android, which can be exploited by remote user to return spoofed DNS responses and poison the DNS cache on the target system.
Last Update Date: 25 Jul 2012 15:00 Release Date: 25 Jul 2012 4441 Views