Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Wireshark PPP and NFS Dissector Denial of Service Vulnerabilities

Multiple vulnerabilities have been identified in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). An error within the PPP dissector can be exploited to cause a crash via a specially crafted packet. An error within the NFS dissector can...
Last Update Date: 25 Jul 2012 14:59 Release Date: 25 Jul 2012 4554 Views

RISK: High Risk

High Risk

Microsoft Exchange and FAST Search Server 2010 for SharePoint Mulitple Vulnerabilities

Multiple vulnerabilities have been identified in Microsoft Exchange and FAST Search Server 2010 for SharePoint shipped with third-party component, Oracle Outside In libraries, which can be exploited by malicious people to take control of the server process that is parsing a specially crafted file.
Last Update Date: 25 Jul 2012 14:57 Release Date: 25 Jul 2012 4252 Views

RISK: Medium Risk

Medium Risk

Symantec Multiple Products Insecure Library Loading Vulnerability

A vulnerability has been identified in Symantec Backup Exec System Recovery 2010 and Symantec System Recovery 2011, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to the applications loading libraries (e.g. imapi....
Last Update Date: 24 Jul 2012 14:28 Release Date: 24 Jul 2012 4316 Views

RISK: Medium Risk

Medium Risk

PHP Multiple Vulnerabilities

Two vulnerabilities have been identified in PHP, which can be exploited by malicious people to bypass certain security restrictions and execute arbitrary code on the target system. The vulnerability is caused due to an error within the SQLite extension and can be exploited to bypass the "open_basedir...
Last Update Date: 23 Jul 2012 10:47 Release Date: 23 Jul 2012 4409 Views

RISK: High Risk

High Risk

HP StorageWorks File Migration Agent Buffer Overflow Vulnerabilities

Two vulnerabilities have been identified in HP StorageWorks File Migration Agent, which can be exploited by malicious people to compromise a vulnerable system. A boundary error in HsmCfgSvc.exe service when processing CIFS archive names can be exploited to cause a stack-based buffer overflow via...
Last Update Date: 20 Jul 2012 10:25 Release Date: 20 Jul 2012 4426 Views

RISK: Medium Risk

Medium Risk

Cisco Nexus Series Switches IP Stack Processing Denial of Service Vulnerability

A vulnerability has been identified in Cisco NX-OS, which can be exploited by malicious people to cause a DoS (Denial of Service).The vulnerability is caused due to an error within the IP stack processing when obtaining layer 4 (UDP or TCP) information...
Last Update Date: 18 Jul 2012 Release Date: 17 Feb 2012 4919 Views

RISK: High Risk

High Risk

Mozilla Products Multiple vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox, Thunderbird and SeaMonkey, which can be exploited by remote users to execute arbitrary code, spoof web sites, obtain information, and conduct cross- site scripting attacks.
Last Update Date: 18 Jul 2012 11:30 Release Date: 18 Jul 2012 4415 Views

RISK: High Risk

High Risk

Oracle Products Multiple vulnerabilities

Several vulnerabilities were identified in Oracle Products. A remote user can partially access and modify data on the target system. A remote user can cause partial denial of service conditions.
Last Update Date: 18 Jul 2012 11:29 Release Date: 18 Jul 2012 4590 Views

RISK: Medium Risk

Medium Risk

libexif Multiple Vulnerabilities

Multiple vulnerabilities have been identified in libexif, which can be exploited by malicious people to disclose certain sensitive information, cause a DoS (Denial of Service), and compromise an application using the library.An out-of-bounds read error within the "exif_entry_get_value()" ...
Last Update Date: 16 Jul 2012 11:50 Release Date: 16 Jul 2012 4572 Views

RISK: Medium Risk

Medium Risk

VMware ESXi libxml2 Multiple Vulnerabilities

Multiple vulnerabilities have been identified in VMware ESXi, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.
Last Update Date: 16 Jul 2012 11:50 Release Date: 16 Jul 2012 4397 Views