Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Asterisk Multiple Vulnerabilities

Multiple vulnerabilities identified in Asterisk, which a remote authenticated user can execute arbitrary code on the target system, cause denial of service conditions, and execute arbitrary shell commands on Asterisk Manager interface. A remote user can send specially crafted SIP UPDATE request to cause Asterisk to...
Last Update Date: 24 Apr 2012 11:20 Release Date: 24 Apr 2012 4561 Views

RISK: Medium Risk

Medium Risk

WordPress external libraries Multiple Vulnerabilities

Multiple vulnerabilities have been identified in WordPress external libraries (Plupload, SWFUpload, SWFObject),  which could be exploited by malicious people to elevation of privilege, and cause a cross-site scripting attack.
Last Update Date: 23 Apr 2012 12:13 Release Date: 23 Apr 2012 4518 Views

RISK: Medium Risk

Medium Risk

IBM Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in IBM Java, which could be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.
Last Update Date: 23 Apr 2012 12:10 Release Date: 23 Apr 2012 4726 Views

RISK: High Risk

High Risk

Oracle Products Multiple Vulnerabilies

Multiple vulnerabilities have been identified in various Oracle products and components, which could be exploited by attackers to denial of service, data manipulation, disclose sensitive information or compromise a vulnerable system.
Last Update Date: 18 Apr 2012 12:01 Release Date: 18 Apr 2012 4977 Views

RISK: Extremely High Risk

Extremely High Risk

Apple Java for Mac OS X Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Java for Mac OS X, which can be exploited by malicious people to compromise a vulnerable system.   Note: Exploit code is publicly available. [13/4/2012 Update]Apple published a new Java security update (Java for...
Last Update Date: 13 Apr 2012 Release Date: 5 Apr 2012 5232 Views

RISK: Medium Risk

Medium Risk

Samba Remote Procedure Call Remote Memory Corruption Vulnerability

A vulnerability has been identified in Samba. A remote user can execute arbitrary code on the target system.   A remote user can send a specially crafted RPC call to trigger a buffer overflow in the Network Data Representation (NDR) marshalling code and execute arbitrary code on...
Last Update Date: 12 Apr 2012 10:37 Release Date: 12 Apr 2012 4932 Views

RISK: Medium Risk

Medium Risk

Microsoft Office Works File Converter Heap Overflow Vulnerability

A remote code execution vulnerability exists in Microsoft Office Works File Converter. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts.
Last Update Date: 11 Apr 2012 11:42 Release Date: 11 Apr 2012 4712 Views

RISK: Medium Risk

Medium Risk

Microsoft Forefront Unified Access Gateway (UAG) Unfiltered Access to UAG Default Website Vulnerability

A vulnerability exists in Microsoft Unified Access Gateway (UAG) that could allow an unauthenticated user to access the default website of the Microsoft UAG server from the external network.
Last Update Date: 11 Apr 2012 11:41 Release Date: 11 Apr 2012 4504 Views

RISK: High Risk

High Risk

Microsoft Windows Common Controls MSCOMCTL.OCX Remote Code Execution Vulnerability

A remote code execution vulnerability exists in the Windows common controls. An attacker could exploit the vulnerability by constructing a specially crafted webpage. When a user views the webpage, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the...
Last Update Date: 11 Apr 2012 11:39 Release Date: 11 Apr 2012 4724 Views

RISK: High Risk

High Risk

Microsoft .NET Framework Parameter Validation Vulnerability

A remote code execution vulnerability exists in the way that Microsoft .NET Framework validates parameters when passing data to a function. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, ...
Last Update Date: 11 Apr 2012 11:36 Release Date: 11 Apr 2012 4659 Views