Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Adobe Flash Player / AIR Buffer Overflow Vulnerability

A vulnerability has been identified in Adobe Flash Player and Adobe AIR, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an unspecified error and can be exploited to cause a buffer overflow. Successful exploitation may...
Last Update Date: 9 Jan 2013 14:17 Release Date: 9 Jan 2013 5065 Views

RISK: High Risk

High Risk

Symantec PGP Desktop Elevated Privileges Vulnerability

A vulnerability has been identified in Symantec PGP Desktop. A local user can obtain elevated privileges on the target system.   A local user can issue a specially crafted IOCTL 0x80022058 request to execute arbitrary code on the target system with system level privileges.  Note: Vendor patch...
Last Update Date: 8 Jan 2013 10:34 Release Date: 8 Jan 2013 5518 Views

RISK: Medium Risk

Medium Risk

Ruby on Rails Method Parameters SQL Injection Vulnerability

Multiple vulnerabilities have been identified in Ruby on Rails, which can be exploited by malicious people to conduct SQL injection attacks.   Input passed to the Active Record interface via method parameters is not properly sanitised before being used in SQL queries. This can be exploited to manipulate...
Last Update Date: 4 Jan 2013 15:41 Release Date: 4 Jan 2013 4804 Views

RISK: High Risk

High Risk

VLC Media Player HTML Subtitle Parsing Buffer Overflow Vulnerabilities

Multiple vulnerabilities have been identified in  VLC Media Player, which can be exploited by malicious people to compromise a user's system.   The vulnerabilities are caused due to errors when parsing HTML subtitles in modules/codec/subsdec.c and can be exploited to...
Last Update Date: 2 Jan 2013 Release Date: 31 Dec 2012 5089 Views

RISK: Medium Risk

Medium Risk

FreeType BDF Glyph Processing Buffer Overflow Vulnerability

A vulnerability has been identified in FreeType, which can be exploited by malicious people to potentially compromise an application using the library.   The vulnerability is caused due to an error in the "_bdf_parse_glyphs()" function (src/bdf/bdflib.c) when processing glyph...
Last Update Date: 28 Dec 2012 12:02 Release Date: 28 Dec 2012 4798 Views

RISK: Medium Risk

Medium Risk

GNU grep Long Line Handling Integer Overflow Vulnerability

A vulnerability has been identified in grep, which can be exploited by malicious people to potentially compromise a user's system.   The vulnerability is caused due to an integer overflow error when parsing very long lines and can be exploited to cause a heap-based buffer...
Last Update Date: 28 Dec 2012 12:02 Release Date: 28 Dec 2012 4787 Views

RISK: Medium Risk

Medium Risk

VMware vCenter Server Appliance Directory Traversal Vulnerability

Two vulnerabilities have been identified in VMware vCenter Server Appliance, which can be exploited by remote authenticated user to view files on the target system.A remote authenticated user can supply a specially crafted request to retrieve arbitrary files from the target system.A remote authenticated user...
Last Update Date: 24 Dec 2012 11:11 Release Date: 24 Dec 2012 4899 Views

RISK: Medium Risk

Medium Risk

IBM InfoSphere Streams Java Multiple Vulnerabilities

Multiple vulnerabilities have been indentified in IBM InfoSphere Streams, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
Last Update Date: 21 Dec 2012 17:21 Release Date: 21 Dec 2012 4843 Views

RISK: High Risk

High Risk

Adobe Shockwave Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Shockwave Player. which can be exploited by remote user to compromise a vulnerable system. A remote user can create specially crafted Shockwave content that specifies an older version (10.x) of Shockwave and, when loaded by the...
Last Update Date: 21 Dec 2012 17:19 Release Date: 21 Dec 2012 4875 Views

RISK: High Risk

High Risk

Nagios history.cgi "get_history()" Buffer Overflow Vulnerability

A vulnerability has been identified in Nagios, which can be exploited by malicious people to compromise a vulnerable system.   The vulnerability is caused due to a boundary error within the "get_history()" function (history.c) within history.cgi when handling certain parameters, ...
Last Update Date: 20 Dec 2012 10:12 Release Date: 20 Dec 2012 6248 Views