Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Apple iTunes Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple iTunes, which can be exploited by malicious people to compromise a user's system.An error in the handling of .m3u playlists can be exploited to cause a heap-based buffer overflow via a specially crafted...
Last Update Date: 13 Jun 2012 15:07 Release Date: 13 Jun 2012 4443 Views

RISK: Medium Risk

Medium Risk

Astaro Security Gateway Cross-Site Scripting Vulnerability

A vulnerability has been identified in Astaro Security Gateway, which can be exploited by malicious people to conduct cross-site scripting attacks.
Last Update Date: 12 Jun 2012 15:10 Release Date: 12 Jun 2012 4534 Views

RISK: High Risk

High Risk

Google Chrome Flash Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.   The vulnerabilities are caused due to a bundled vulnerable version of Adobe Flash Player.  Please refer to SA12061101 for more...
Last Update Date: 12 Jun 2012 15:09 Release Date: 12 Jun 2012 4407 Views

RISK: High Risk

High Risk

Check Point Endpoint Connect Insecure Library Loading Vulnerability

A vulnerability has been identified in Check Point EndPoint Connect, which can be exploited by malicious people to compromise a user's system.   The vulnerability is caused due to the application loading certain libraries in an insecure manner. This can be exploited to load arbitrary libraries...
Last Update Date: 12 Jun 2012 15:09 Release Date: 12 Jun 2012 4742 Views

RISK: High Risk

High Risk

IBM Lotus iNotes Upload Module ActiveX Control Buffer Overflow Vulnerability

A vulnerability has been identified in IBM Lotus iNotes Upload Module ActiveX Control, which can be exploited by malicious people to compromise a user's system.   The vulnerability is caused due to an error within the dwa85W.dll module and can be exploited to cause a...
Last Update Date: 11 Jun 2012 11:48 Release Date: 11 Jun 2012 4762 Views

RISK: High Risk

High Risk

F5 Products Unspecified SSH Configuration Vulnerability

A vulnerability has been identified in multiple F5 products, which can be exploited by malicious people to compromise a vulnerable system.  The security issue is caused due to an unspecified configuration error.
Last Update Date: 11 Jun 2012 11:47 Release Date: 11 Jun 2012 4564 Views

RISK: High Risk

High Risk

Adobe Flash Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Flash Player, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. An unspecified error can be exploited to corrupt memory. An unspecified error can be exploited to cause a stack...
Last Update Date: 11 Jun 2012 11:47 Release Date: 11 Jun 2012 4679 Views

RISK: Medium Risk

Medium Risk

IBM WebSphere Sensor Events Multiple Vulnerabilities

Multiple vulnerabilities have been identfied in IBM WebSphere Sensor Events, where some have unknown impacts and others can be exploited by malicious people to conduct cross-site scripting attacks. An unspecified error exists related to directory traversal. An unspecified error exists related to HTTP methods. ...
Last Update Date: 8 Jun 2012 10:04 Release Date: 8 Jun 2012 5119 Views

RISK: High Risk

High Risk

Mozilla Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox, Thunderbird, and SeaMonkey, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to bypass certain security restrictions, disclose sensitive information, and compromise a user's...
Last Update Date: 7 Jun 2012 14:22 Release Date: 7 Jun 2012 4578 Views

RISK: Medium Risk

Medium Risk

Adobe Illustrator Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Illustrator. A remote user can cause arbitrary code to be executed on the target user's system.   A remote user can create a specially crafted file that, when loaded by the target user, will trigger a memory corruption...
Last Update Date: 6 Jun 2012 Release Date: 10 May 2012 4679 Views