Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Cisco ASA 5500 Series IPv6 Processing Vulnerability

A vulnerability has been identified in Cisco ASA. A remote user can cause denial of service conditions.   A remote user can send specially crafted IPv6 data through the target device to cause the target device to reload.
Last Update Date: 21 Jun 2012 10:47 Release Date: 21 Jun 2012 4382 Views

RISK: High Risk

High Risk

Mozilla Products Use-After-Free in nsHTMLSelectElement() Vulnerability

A vulnerability has been identified in Mozilla Firefox, Thunderbird and Seamonkey. A remote user can cause arbitrary code to be executed on the target user's system.   A remote user can create specially crafted HTML that, when loaded by the target user, will trigger...
Last Update Date: 20 Jun 2012 10:31 Release Date: 20 Jun 2012 4459 Views

RISK: Medium Risk

Medium Risk

IBM Lotus Notes "notes" URI Handler Vulnerability

A vulnerability has been reported in IBM Lotus Notes, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an error within the "notes" URI handler, which can be exploited to execute arbitrary commands...
Last Update Date: 20 Jun 2012 10:25 Release Date: 20 Jun 2012 4460 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows OpenType Font Processing Denial of Service Vulnerability

A vulnerability has been identified in Microsoft Windows, which can be exploited by malicious, local users to cause a Denial of Service.The vulnerability is caused due to an error in atmfd.dll when processing Adobe OpenType font files and can be exploited to cause a...
Last Update Date: 15 Jun 2012 17:17 Release Date: 15 Jun 2012 4547 Views

RISK: Medium Risk

Medium Risk

Opera Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Opera, which can be exploited by malicious people to conduct spoofing attacks and bypass certain security restrictions. An error when displaying preferences within a small window can be exploited to e.g. execute arbitrary code by tricking a user into...
Last Update Date: 15 Jun 2012 17:16 Release Date: 15 Jun 2012 4715 Views

RISK: Medium Risk

Medium Risk

VMware Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in multiple VMware products, which can be exploited by malicious people to cause denial of service or compromise a user's system. An input validation error when parsing Checkpoint files and can be exploited to execute arbitrary code. A user with...
Last Update Date: 15 Jun 2012 17:14 Release Date: 15 Jun 2012 4213 Views

RISK: Medium Risk

Medium Risk

IBM Rational AppScan Multiple Vulnerabilities

Multiple vulnerabilities have been identified in IBM Rational AppScan, which can be exploited by malicious users to disclose certain information and by malicious people to conduct spoofing and cross-site scripting attacks, disclose potentially sensitive information, hijack a user's session, conduct DNS cache...
Last Update Date: 15 Jun 2012 17:10 Release Date: 15 Jun 2012 4428 Views

RISK: Medium Risk

Medium Risk

Asterisk Skinny Channel Driver Vulnerability

A vulnerability has been identified in Asterisk. A remote authenticated user can cause denial of service conditions.A remote authenticated user with a valid SCCP ID can close a connection to the target Asterisk server when a station is in the 'Off Hook' call state to...
Last Update Date: 15 Jun 2012 17:07 Release Date: 15 Jun 2012 3660 Views

RISK: High Risk

High Risk

Apple Mac OS X Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Java for Mac OS X, which can be exploited by malicious people to conduct cross-site scripting attacks, disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise...
Last Update Date: 14 Jun 2012 10:15 Release Date: 14 Jun 2012 4404 Views

RISK: Extremely High Risk

Extremely High Risk

Microsoft XML Core Services Uninitialised Object Vulnerability

A vulnerability has been identified in Microsoft XML Core Services, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an error when attempting to access an object in memory that has not been initialised. Successful...
Last Update Date: 13 Jun 2012 15:30 Release Date: 13 Jun 2012 4407 Views