Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Cisco Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in various Cisco products, which can be exploited by malicious users to execute arbitrary code, disclose potentially sensitive information or cause denial of service.
Last Update Date: 8 Aug 2012 09:45 Release Date: 8 Aug 2012 5230 Views

RISK: High Risk

High Risk

IBM AIX and Virtual I/O Server OpenSSL Multiple Vulnerabilities

Multiple vulnerabilities have been identified in OpenSSL included in IBM AIX and Virtual I/O Server, which can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), and potentially compromise an application using the library.
Last Update Date: 3 Aug 2012 13:30 Release Date: 3 Aug 2012 5537 Views

RISK: High Risk

High Risk

Opera Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Opera, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a user's system. An error when handling certain DOM elements can be exploited to bypass the HTML sanitizer and conduct cross-site...
Last Update Date: 3 Aug 2012 13:29 Release Date: 3 Aug 2012 5530 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. An error when handling renders can be exploited to bypass the cross-process policy and cause interference. This vulnerability...
Last Update Date: 2 Aug 2012 18:30 Release Date: 2 Aug 2012 5231 Views

RISK: High Risk

High Risk

Citrix Access Gateway Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Citrix Access Gateway. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a buffer overflow in the Citrix Access Gateway Plug-in for Windows ActiveX control and execute arbitrary code on the...
Last Update Date: 2 Aug 2012 18:30 Release Date: 2 Aug 2012 5235 Views

RISK: High Risk

High Risk

MIT Kerberos Key Distribution Center Heap Overflow Vulnerability

Two vulnerabilities have been identified in the Kerberos KDC, which could be exploited by remote attackers to cause a denial of service or compromise a vulnerable system. By sending a specially crafted AS-REQ, an unauthenticated remote attacker can cause the KDC to abnormally terminate or...
Last Update Date: 1 Aug 2012 11:27 Release Date: 1 Aug 2012 5357 Views

RISK: High Risk

High Risk

Apple Safari for Mac OS X Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple Safari for Mac OS X, which can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose sensitive information, bypass certain security restrictions, and compromise a user's system. ...
Last Update Date: 27 Jul 2012 13:57 Release Date: 27 Jul 2012 5258 Views

RISK: High Risk

High Risk

Apple Xcode Two Vulnerabilities

A vulnerability have been identified in Apple Xcode, which can be exploited by malicious people to disclose potentially sensitive information, hijack a user's session, and bypass certain security restrictions.A design error exists within the implementation of SSL 3. and TLS 1....
Last Update Date: 27 Jul 2012 13:55 Release Date: 27 Jul 2012 5112 Views

RISK: Medium Risk

Medium Risk

ISC DHCP Multiple Vulnerabilities

Multiple vulnerabilities have been identified in ISC DHCP, which can be exploited by remoter user to cause denial of service. A remote user on the local network can send a specially crafted client identifier parameter value to trigger a buffer overflow and cause the target service to crash...
Last Update Date: 26 Jul 2012 12:03 Release Date: 26 Jul 2012 5060 Views

RISK: Medium Risk

Medium Risk

ISC BIND Multiple Vulnerabilities

Multiple vulnerabilities have been identified in ISC BIND, which can be exploited by remote user to cause denial of service. On systems configured for DNSSEC validation, a remote user can cause the cache of failing queries to be used before fully initialized, triggering an assertion failure...
Last Update Date: 26 Jul 2012 12:02 Release Date: 26 Jul 2012 5103 Views