Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Adobe Flash Professional and Photoshop Buffer Overflow Vulnerability

A vulnerability has been identified in Adobe Flash Professional and Photoshop. A remote user can cause arbitrary code to be executed on the target user's system.   A remote user can trigger a buffer overflow and execute arbitrary code on the target system. The code will...
Last Update Date: 6 Jun 2012 Release Date: 10 May 2012 4585 Views

RISK: High Risk

High Risk

ISC BIND DNS Resource Records Handling Vulnerability

A vulnerability has been identified in ISC BIND, which can be exploited by malicious people to disclose potentially sensitive information or cause a DoS (Denial of Service). The vulnerability is caused due to an error when handling DNS resource records and can be exploited to e....
Last Update Date: 5 Jun 2012 12:04 Release Date: 5 Jun 2012 4864 Views

RISK: High Risk

High Risk

Microsoft Windows Includes Some Invalid Certificates Vulnerability

A vulnerability was identified in Microsoft Windows. A remote user may be able to spoof code signing signatures. The operating system includes some invalid intermediate certificates. The invalid certificates and their thumbprints are: Microsoft Enforced Licensing Intermediate PCA: 2a 83 e9 02 05 91 a5...
Last Update Date: 5 Jun 2012 12:03 Release Date: 5 Jun 2012 4271 Views

RISK: Medium Risk

Medium Risk

Cisco Firewall Services Module Protocol Independent Multicast (PIM) Denial of Service Vulnerability

A vulnerability has been identified in Cisco Firewall Services Module. A remote user can cause denial of service conditions. A remote user can send a specially crafted Protocol Independent Multicast (PIM) message to cause the target device to reload. Devices with multicast routing enabled are...
Last Update Date: 4 Jun 2012 Release Date: 15 Mar 2012 4908 Views

RISK: High Risk

High Risk

Cisco ASA Multiple Vulnerabilities

A vulnerability has been identified in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system or cause denial of service conditions. A remote user can create HTML that, when loaded by the target user, will execute...
Last Update Date: 4 Jun 2012 Release Date: 15 Mar 2012 4775 Views

RISK: Medium Risk

Medium Risk

IBM AIX `TCP large send offload´ Denial of Service Vulnerability

A vulnerability has been reported in AIX, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error within the TCP stack when the "TCP large send offload" option is enabled and can be...
Last Update Date: 4 Jun 2012 Release Date: 7 Feb 2012 5221 Views

RISK: High Risk

High Risk

PHP-CGI query string parameter vulnerability

A vulnerability has been identified in PHP, which can be exploited by remote users to disclose certain sensitive information or compromise a vulnerable system.   The vulnerability is caused due to an error when parsing certain QUERY_STRING parameters. This can be exploited to e.g. disclose...
Last Update Date: 4 Jun 2012 Release Date: 7 May 2012 6083 Views

RISK: High Risk

High Risk

VMware ESX/ESXi Server Multiple Vulnerabilities

Multiple vulnerabilities have been identified in VMware ESX/ESXi Server, which can be exploited by malicious, local users to disclose potentially sensitive and system information, bypass certain security restrictions, cause a DoS (Denial of Service), and gain escalated privileges, by malicious people...
Last Update Date: 4 Jun 2012 Release Date: 1 Feb 2012 5313 Views

RISK: Medium Risk

Medium Risk

HP Network Automation Unspecified Security Bypass Vulnerability

A vulnerability has been identified in HP Network Automation, which can be exploited by malicious people to bypass certain security restrictions.  The vulnerability is caused due to an unspecified error and can be exploited to gain unauthorised access.
Last Update Date: 4 Jun 2012 Release Date: 1 Feb 2012 4912 Views

RISK: Medium Risk

Medium Risk

IrfanView Formats PlugIn Multiple Buffer Overflow Vulnerability

Multiple vulnerabilities have been identified in IrfanView Formats PlugIn, which can be exploited by malicious people to compromise a user's system. Due to an error within the ECW plugin (NCSEcw.dll) when decompressing images and can be exploited to cause a heap-...
Last Update Date: 4 Jun 2012 Release Date: 1 Jun 2012 4645 Views