Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

VMware ESX Server / ESXi Multiple Vulnerabilities

Multiple vulnerabilities have been identified in VMware ESX Server and VMware ESXi, which can be exploited by malicious users to escalated privileges, cause a DoS (Denial of Service) and potentially compromise a vulnerable system. An errors when handling RPC commands can be exploited to cause...
Last Update Date: 7 May 2012 12:39 Release Date: 7 May 2012 4886 Views

RISK: High Risk

High Risk

Cisco Products Multiple Vulnerabilities

Mulitple vulnerabilities have been identified in various Cisco products, which can be exploited by malicious users execute arbitrary code, cause a denial-of-service condition and bypass security restrictions.
Last Update Date: 4 May 2012 12:12 Release Date: 4 May 2012 5431 Views

RISK: Medium Risk

Medium Risk

HP Systems Insight Manager Multiple Vulnerabilities

Multiple vulnerabilities have been identified in HP Systems Insight Manager, which can be exploited by malicious, local users to potentially gain escalated privileges and by malicious people to disclose sensitive information, conduct cross-site scripting and cross-site request forgery attacks, ...
Last Update Date: 2 May 2012 12:06 Release Date: 2 May 2012 4738 Views

RISK: Medium Risk

Medium Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to compromise a user's system. A use-after-free error exists in floats handling and within the xml parser. An error exists within the IPC validation. ...
Last Update Date: 2 May 2012 12:03 Release Date: 2 May 2012 4732 Views

RISK: High Risk

High Risk

Oracle Database Remote Pre-authenticated TNS Poison Vulnerability

A vulnerability has been identified in Oracle Database, which can be exploited by malicious people with network access to the TNS Listener to inject commands and/or hijack connections from the client to the database server.   Note: Currently, there is no patch available for this...
Last Update Date: 30 Apr 2012 12:18 Release Date: 30 Apr 2012 5206 Views

RISK: High Risk

High Risk

VMware ESX Server Multiple Vulnerabilities

Multiple vulnerabilities have been identified in VMware ESX Server, which can be exploited by malicious, local users in a guest virtual machine to gain escalated privileges and by malicious people to cause a DoS (Denial of Service) and potentially compromise the vulnerable system.
Last Update Date: 30 Apr 2012 12:12 Release Date: 30 Apr 2012 5269 Views

RISK: Medium Risk

Medium Risk

IBM Rational Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in multiple IBM Rational products, which can be exploited by malicious users to disclose sensitive information and conduct session fixation and script insertion attacks and by malicious people to disclose sensitive information, overwrite arbitrary files, conduct cross-site request forgery and...
Last Update Date: 27 Apr 2012 12:02 Release Date: 27 Apr 2012 4869 Views

RISK: Medium Risk

Medium Risk

Microsoft Visual Studio Linker Integer Overflow Vulnerability

A vulnerability has been identified in Microsoft Visual Studio 2008, which can be exploited by malicious people to compromise a user's system.The vulnerability is caused due to an integer overflow error in the linker utility (link.exe) when allocating memory based on...
Last Update Date: 27 Apr 2012 11:57 Release Date: 27 Apr 2012 4664 Views

RISK: Medium Risk

Medium Risk

Comodo Internet Security PE File Processing Vulnerability

A vulnerability has been identified in Comodo Internet Security. A remote or local user can cause denial of service conditions.A remote or local user can create a specially crafted PE file that, when loaded into memory on the target system, will cause the target system...
Last Update Date: 27 Apr 2012 11:56 Release Date: 27 Apr 2012 4592 Views

RISK: High Risk

High Risk

Mozilla Firefox / Thunderbird / SeaMonkey Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox, Thunderbird, and SeaMonkey, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, disclose certain sensitive information, compromise a user's system or spoof certain web sites...
Last Update Date: 25 Apr 2012 10:54 Release Date: 25 Apr 2012 4577 Views