Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Apple iTunes WebKit Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple iTunes, which can be exploited by malicious people to compromise a user's system. Some unspecified errors exist within the WebKit component. No further information is currently available. Some vulnerabilities are caused due to a bundled vulnerable version...
Last Update Date: 14 Sep 2012 11:38 Release Date: 14 Sep 2012 5716 Views

RISK: Medium Risk

Medium Risk

IBM Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in IBM Java, which can be exploited by attacker to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.
Last Update Date: 14 Sep 2012 Release Date: 10 Sep 2012 5152 Views

RISK: Medium Risk

Medium Risk

Cisco Unified Presence and Jabber Extensible Communications Platform Stream Header Processing Vulnerability

A vulnerability has been identified in Cisco Unified Presence and Jabber Extensible Communications Platform. A remote user can cause denial of service conditions. A remote user can send a specially crafted Extensible Messaging and Presence Protocol (XMPP) stream header to cause the target...
Last Update Date: 13 Sep 2012 10:16 Release Date: 13 Sep 2012 4995 Views

RISK: Medium Risk

Medium Risk

Citrix XenApp Online Plug-in / Receiver Code Execution Vulnerability

A vulnerability has been identified in Citrix XenApp Online Plug-in and Citrix Receiver, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an unspecified error. Successful exploitation may allow execution of arbitrary...
Last Update Date: 13 Sep 2012 10:14 Release Date: 13 Sep 2012 5249 Views

RISK: Medium Risk

Medium Risk

Microsoft System Center Configuration Manager XSS Vulnerability

A cross-site scripting (XSS) vulnerability exists in System Center Configuration Manager where code can be injected back to the user in the resulting page, effectively allowing attacker-controlled code to run in the context of the user clicking the link.
Last Update Date: 12 Sep 2012 12:36 Release Date: 12 Sep 2012 5039 Views

RISK: High Risk

High Risk

Microsoft Visual Studio Team Foundation Server XSS Vulnerability

A reflected XSS vulnerability exists in Visual Studio Team Foundation Server that could allow an attacker to inject a client-side script into the user's instance of Internet Explorer or any web browser using Team Foundation Server web access. The script could spoof content, disclose...
Last Update Date: 12 Sep 2012 12:34 Release Date: 12 Sep 2012 5050 Views

RISK: High Risk

High Risk

RealPlayer Multiple Vulnerabilities

Multiple vulnerabilities have been identified in RealPlayer, which can be exploited by malicious people to compromise a user's system.An error when unpacking AAC stream data can be exploited to cause a buffer overflow.An error when decoding AAC SDK can be exploited to corrupt...
Last Update Date: 11 Sep 2012 10:18 Release Date: 11 Sep 2012 5208 Views

RISK: Medium Risk

Medium Risk

Citrix XenServer Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Citrix XenServer, which can be exploited by malicious people to cause a DoS (Denial of Service) and gain escalated privileges.
Last Update Date: 7 Sep 2012 10:31 Release Date: 7 Sep 2012 5165 Views

RISK: High Risk

High Risk

Apple Mac OS X Java Unspecified Code Execution Vulnerability

A vulnerability has been identified in Apple Mac OS X Java, which can be exploited by malicious people to compromise a user's system. The vulnerability is due to the vulnerability described in SA12082801.
Last Update Date: 6 Sep 2012 09:50 Release Date: 6 Sep 2012 5346 Views

RISK: High Risk

High Risk

VMware Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in VMware Products, which can be exploited by malicious people to conduct cross-site scripting attacks, disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.
Last Update Date: 3 Sep 2012 14:17 Release Date: 3 Sep 2012 5310 Views