Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Google Chrome Two Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome,  where one has an unknown impact and the other can be exploited by malicious people to compromise a user's system. An error exists when handling file paths. A use-after-free error exists when handling...
Last Update Date: 3 Dec 2012 11:39 Release Date: 3 Dec 2012 5641 Views

RISK: Medium Risk

Medium Risk

Wireshark Multiple Denial of Service Vulnerabilities

Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). An error in the USB dissector (epan/dissectors/packet-usb.c) can be exploited to cause an infinite loop and...
Last Update Date: 30 Nov 2012 Release Date: 29 Nov 2012 5014 Views

RISK: Medium Risk

Medium Risk

Apple TV Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple TV, which can be exploit by malicious user to execute arbitrary code, access privilaged data and cause denial of service. An information disclosure issue existed in the handling of APIs related to kernel extensions. Responses containing a OSBundleMachOHeaders key...
Last Update Date: 30 Nov 2012 10:46 Release Date: 30 Nov 2012 4783 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, where one has an unknown impact and others can be exploited by malicious people to compromise a user's system.A use-after-free error exists in SVG filters.An out-of-bounds read...
Last Update Date: 28 Nov 2012 10:08 Release Date: 28 Nov 2012 4729 Views

RISK: High Risk

High Risk

Samsung Printer firmware contains a backdoor administrator account vulnerability

A vulnerability has been identified on Samsung Printer firmware, which can be exploited by remote attacker to take control of an affected device.   Samsung printers (as well as some Dell printers manufactured by Samsung) contain a hardcoded SNMP full read-write community string that...
Last Update Date: 27 Nov 2012 10:58 Release Date: 27 Nov 2012 4851 Views

RISK: Medium Risk

Medium Risk

IBM WebSphere DataPower XC10 Appliance Multiple Vulnerabilities

Multiple vulnerabilities have been identified in IBM WebSphere DataPower XC10 Appliance, which can be exploited by remote authenticated user can gain administrative privileges or cause denial of service conditions. A remote authenticated user can send specially crafted data to execute arbitrary JMX operations on the target system. ...
Last Update Date: 23 Nov 2012 11:06 Release Date: 23 Nov 2012 4980 Views

RISK: Medium Risk

Medium Risk

Oracle Solaris Libxml2 Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Libxml2 included in Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.
Last Update Date: 22 Nov 2012 13:34 Release Date: 22 Nov 2012 4774 Views

RISK: Medium Risk

Medium Risk

Symantec Products KeyView File Processing Vulnerabilities

Multiple vulnerabilities have been identified in Symantec products, which can be exploited by malicious people to compromise a vulnerable system.   For more information, please refer to SA12112201.
Last Update Date: 22 Nov 2012 13:33 Release Date: 22 Nov 2012 4948 Views

RISK: Medium Risk

Medium Risk

Autonomy KeyView File Processing Vulnerabilities

Multiple vulnerabilities have been identified in Autonomy KeyView, which can be exploited by malicious people to compromise a vulnerable system. The vulnerabilities are caused due to errors when processing unspecified file formats and can be exploited to corrupt memory.  Successful exploitation may allow execution of arbitrary code...
Last Update Date: 22 Nov 2012 13:33 Release Date: 22 Nov 2012 4947 Views

RISK: High Risk

High Risk

Mozilla Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox, Thunderbird and SeaMonkey, which can be exploited by malicious people to execute arbitrary code, perform cross-site scripting (XSS) attack,and disclose sensitive information
Last Update Date: 21 Nov 2012 10:48 Release Date: 21 Nov 2012 4871 Views