Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Opera Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Opera, which can be exploited by malicious people to disclose certain sensitive information and compromise a user's system.The vulnerability is caused due to an error when handling HTTP responses and can be exploited to cause a heap-based...
Last Update Date: 21 Nov 2012 10:47 Release Date: 21 Nov 2012 5055 Views

RISK: Medium Risk

Medium Risk

Adobe ColdFusion Denial of Service Vulnerability

A vulnerability has been identified in Adobe ColdFusion, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an unspecified error when running on Internet Information Services (IIS).
Last Update Date: 21 Nov 2012 10:25 Release Date: 21 Nov 2012 5033 Views

RISK: Medium Risk

Medium Risk

Splunk Multiple Vulnerabilities

Some vulnerabilities have been identified in Splunk, which can be exploited by malicious people to conduct cross-site scripting attacks and cause a DoS (Denial of Service). Certain unspecified input passed to the Splunk Web component is not properly sanitised before being returned to the user...
Last Update Date: 20 Nov 2012 17:36 Release Date: 20 Nov 2012 4921 Views

RISK: High Risk

High Risk

Apple Mac OS X Remote Code Execution Vulnerability

A vulnerability has been identified in Apple Mac OS X, which can be exploited by remote attackers to execute arbitrary code.  Note: Currently, no patch is avaliable. 
Last Update Date: 20 Nov 2012 17:26 Release Date: 20 Nov 2012 4978 Views

RISK: High Risk

High Risk

Apache Tomcat Multiple Vunerabilities

Multipule vulnerabilities have been reported in Apache Tomcat, which can be exploited by malicious people to bypass certain security restrictions and cause a DoS (Denial of Service). An error within the "parseHeaders()" function (InternalNioInputBuffer.java) when parsing request headers does not properly...
Last Update Date: 20 Nov 2012 Release Date: 7 Nov 2012 5851 Views

RISK: Medium Risk

Medium Risk

VMware ESX Server Multiple Vulnerabilities

Multiple vulnerabilities have been identified in VMware ESX Server, which can be exploited by malicious, local users to potentially disclose sensitive information and by malicious people to disclose potentially sensitive information, conduct spoofing and cross-site scripting attacks, and cause a DoS (Denial of...
Last Update Date: 19 Nov 2012 10:44 Release Date: 19 Nov 2012 4943 Views

RISK: High Risk

High Risk

IBM Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in various IBM products, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.   The vulnerabilities are caused due to the application bundling a vulnerable version of Java. For details, please refer...
Last Update Date: 16 Nov 2012 18:00 Release Date: 16 Nov 2012 5412 Views

RISK: Medium Risk

Medium Risk

IBM Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in IBM Java, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.   Some errors in the "invoke()" (java.lang.reflect.Method), "getDeclaredMethods()" (java.lang....
Last Update Date: 15 Nov 2012 10:25 Release Date: 15 Nov 2012 5121 Views

RISK: High Risk

High Risk

Microsoft Internet Explorer Multiple Vulnerabilities

CFormElement Use After Free Vulnerability A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has not been correctly initialized or has been deleted. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary...
Last Update Date: 14 Nov 2012 17:21 Release Date: 14 Nov 2012 4863 Views

RISK: High Risk

High Risk

Microsoft Windows Shell Remote Code Execution Multiple Vulnerabilities

Windows Briefcase Integer Underflow Vulnerability A remote code execution vulnerability exists in the Briefcase feature in Windows. An attacker could exploit the vulnerability by convincing a user to open a specially crafted briefcase. An attacker who successfully exploited this vulnerability could execute arbitrary code...
Last Update Date: 14 Nov 2012 17:21 Release Date: 14 Nov 2012 4809 Views