Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

CA ARCserve Backup Multiple Vulnerabilities

Multiple vulnerabilities have been identified in CA ARCserve Backup. A remote user can execute arbitrary code on the target system and cause denial of service conditions. A remote user can send specially crafted RPC requests to execute arbitrary code on the target system. The code will run...
Last Update Date: 1 Nov 2012 Release Date: 22 Oct 2012 4904 Views

RISK: Medium Risk

Medium Risk

3Com, HP, and H3C Routers and Switches SNMP Configuration Vulnerability

A vulnerability was identified in 3Com, HP, and H3C routers and switches. A remote user can take administrative actions on the target system. A remote user with knowledge of the SNMP public community string can access potentially sensitive data (e.g., user names...
Last Update Date: 25 Oct 2012 16:09 Release Date: 25 Oct 2012 5385 Views

RISK: High Risk

High Risk

ISC BIND Record Handling Lockup Vulnerability

A vulnerability has been identified in ISC BIND, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error when handling queries for certain records and can be exploited to cause the named process to lockup...
Last Update Date: 25 Oct 2012 Release Date: 11 Oct 2012 4987 Views

RISK: Medium Risk

Medium Risk

F5 FirePass SQL Injection and Redirection Vulnerabilities

Multiple vulnerabilities have been identified in F5 FirePass, which can be exploited by malicious people to conduct spoofing and SQL injection attacks. Input passed via the "refreshURL" parameter to my.activation.cns.php3 is not properly verified before being used to redirect users...
Last Update Date: 24 Oct 2012 11:24 Release Date: 24 Oct 2012 5128 Views

RISK: High Risk

High Risk

Adobe Shockwave Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.   A remote user can create specially crafted content that, when loaded by the target user, will trigger a buffer overflow...
Last Update Date: 24 Oct 2012 11:23 Release Date: 24 Oct 2012 4904 Views

RISK: Medium Risk

Medium Risk

HP-UX Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in HP-UX, which can be exploited by malicious people to compromise a user's system.   For details, please refer to SA12101802.  
Last Update Date: 22 Oct 2012 10:21 Release Date: 22 Oct 2012 4840 Views

RISK: High Risk

High Risk

Novell ZENworks Asset Management Arbitrary Files Disclosure Vulnerability

A vulnerability has been identified in Novell ZENworks Asset Management. A remote user can view arbitrary files on the target system.   A remote user can use hard-coded credentials when invoking a maintenance function to read files on the target system with System privileges. The HandleMaintenanceCalls...
Last Update Date: 19 Oct 2012 09:55 Release Date: 19 Oct 2012 4975 Views

RISK: High Risk

High Risk

Oracle Java Multiple Vulnerabilities

Multiple vulnerabilities were identified in Oracle Java Runtime Environment (JRE). A remote user can take full control of the target system. A remote user can access and modify data and cause partial denial of service conditions on the target system. A remote user can create specially...
Last Update Date: 19 Oct 2012 Release Date: 18 Oct 2012 5495 Views

RISK: High Risk

High Risk

Oracle Products Multiple vulnerabilities

Multiple vulnerabilities have been identified in various Oracle products and components, which could be exploited by attackers to conduct cross-site scripting attacks, denial of service, bypass security restriction, disclose sensitive information and tampering. 
Last Update Date: 18 Oct 2012 14:45 Release Date: 18 Oct 2012 4974 Views

RISK: High Risk

High Risk

Apple Mac OS X Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Java for Mac OS X, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and potentially compromise a vulnerable system. For more information:: SA12101802
Last Update Date: 18 Oct 2012 14:40 Release Date: 18 Oct 2012 4861 Views