Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Wireshark Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Wireshark. A remote user can cause denial of service conditions. A remote user can send specially crafted HSRP data to cause the target dissector to enter an infinite loop. A remote user can send specially crafted PPP data to cause the...
Last Update Date: 4 Oct 2012 15:00 Release Date: 4 Oct 2012 5743 Views

RISK: High Risk

High Risk

Google Android Dialer TEL URL Handling Vulnerability

A vulnerability has been identified in Google Android. A remote user can cause denial of service conditions.   A remote user can create a specially crafted 'TEL' protocol URL that, when loaded by the target user, will execute unstructured supplementary service data (USSD) ...
Last Update Date: 3 Oct 2012 10:29 Release Date: 3 Oct 2012 5965 Views

RISK: Medium Risk

Medium Risk

HP-UX OpenSSL Denial of Service Vulnerability

A vulnerability has been identified in HP-UX OpenSSL, which can be exploited by malicious people to cause a DoS (Denial of Service) of the application using the library.The vulnerability is reported in HP-UX versions B.11.11, B...
Last Update Date: 28 Sep 2012 16:10 Release Date: 28 Sep 2012 5291 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system. Certain unspecified input related to frame...
Last Update Date: 27 Sep 2012 16:28 Release Date: 27 Sep 2012 5280 Views

RISK: High Risk

High Risk

Cisco IOS Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Cisco IOS and Unified Communications Manager. A remote user can cause denial of service conditions.
Last Update Date: 27 Sep 2012 16:27 Release Date: 27 Sep 2012 4983 Views

RISK: Medium Risk

Medium Risk

Foxit Reader Insecure Library Loading Vulnerability

A vulnerability has been identified in Foxit Reader, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to the application loading libraries (fxdecod1.dll) in an insecure manner. This can be exploited to load...
Last Update Date: 27 Sep 2012 10:15 Release Date: 27 Sep 2012 5029 Views

RISK: High Risk

High Risk

phpMyAdmin Compromised Source Package Backdoor Vulnerability

A vulnerability has been identified in phpMyAdmin, which can be exploited by malicious people to compromise a vulnerable system.  One of the SourceForge.net mirrors, namely cdnetworks-kr-1, was being used to distribute a modified archive of phpMyAdmin, which includes a...
Last Update Date: 26 Sep 2012 11:51 Release Date: 26 Sep 2012 5265 Views

RISK: High Risk

High Risk

Microsoft Internet Explorer 10 Multipule Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Flash libraries contained within Internet Explorer 10, which can be exploited by malicious people to execute arbitarty code and cause denial of service with user interaction. 
Last Update Date: 25 Sep 2012 11:58 Release Date: 25 Sep 2012 4729 Views

RISK: Medium Risk

Medium Risk

Oracle Database Authentication Protocol Vulnerability

A vulnerability was identiified in Oracle Database. A remote user can determine user password hashes. A remote user can send a few specially crafted network packets to obtain information about the session key and cryptographic salt for a target user. The information can be used to determine...
Last Update Date: 25 Sep 2012 11:56 Release Date: 25 Sep 2012 4872 Views

RISK: Extremely High Risk

Extremely High Risk

Microsoft Internet Explorer Multiple Vulnerabilities

OnMove Use After Free Vulnerability A remote code execution vulnerability exists in the way that Internet Explorer accesses an object in memory that has not been correctly initialized or has been deleted. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code...
Last Update Date: 24 Sep 2012 Release Date: 18 Sep 2012 5210 Views