Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Invensys Wonderware Products Insecure Library Loading Vulnerability

A vulnerability has been identified in multiple Invensys Wonderware products, which can be exploited by malicious people to compromise a user's system.   The vulnerability is caused due to the application loading libraries in an insecure manner. This can be exploited to load an arbitrary library...
Last Update Date: 25 Jul 2012 15:02 Release Date: 25 Jul 2012 5179 Views

RISK: High Risk

High Risk

Siemens SIMATIC STEP 7 / PCS 7 Insecure Library Loading Vulnerability

A vulnerability has been identified in Siemens SIMATIC STEP 7 and PCS 7, which can be exploited by malicious people to compromise a user's system.   The vulnerability is caused due to the application loading libraries in an insecure manner. This can be exploited to load...
Last Update Date: 25 Jul 2012 15:01 Release Date: 25 Jul 2012 5459 Views

RISK: Medium Risk

Medium Risk

Google Android DNS Resolver Vulnerability

A vulnerability has been identified in Google Android, which can be exploited by remote user to return spoofed DNS responses and poison the DNS cache on the target system.
Last Update Date: 25 Jul 2012 15:00 Release Date: 25 Jul 2012 5198 Views

RISK: High Risk

High Risk

Wireshark PPP and NFS Dissector Denial of Service Vulnerabilities

Multiple vulnerabilities have been identified in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). An error within the PPP dissector can be exploited to cause a crash via a specially crafted packet. An error within the NFS dissector can...
Last Update Date: 25 Jul 2012 14:59 Release Date: 25 Jul 2012 5324 Views

RISK: High Risk

High Risk

Microsoft Exchange and FAST Search Server 2010 for SharePoint Mulitple Vulnerabilities

Multiple vulnerabilities have been identified in Microsoft Exchange and FAST Search Server 2010 for SharePoint shipped with third-party component, Oracle Outside In libraries, which can be exploited by malicious people to take control of the server process that is parsing a specially crafted file.
Last Update Date: 25 Jul 2012 14:57 Release Date: 25 Jul 2012 4993 Views

RISK: Medium Risk

Medium Risk

Symantec Multiple Products Insecure Library Loading Vulnerability

A vulnerability has been identified in Symantec Backup Exec System Recovery 2010 and Symantec System Recovery 2011, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to the applications loading libraries (e.g. imapi....
Last Update Date: 24 Jul 2012 14:28 Release Date: 24 Jul 2012 5053 Views

RISK: Medium Risk

Medium Risk

PHP Multiple Vulnerabilities

Two vulnerabilities have been identified in PHP, which can be exploited by malicious people to bypass certain security restrictions and execute arbitrary code on the target system. The vulnerability is caused due to an error within the SQLite extension and can be exploited to bypass the "open_basedir...
Last Update Date: 23 Jul 2012 10:47 Release Date: 23 Jul 2012 5159 Views

RISK: High Risk

High Risk

HP StorageWorks File Migration Agent Buffer Overflow Vulnerabilities

Two vulnerabilities have been identified in HP StorageWorks File Migration Agent, which can be exploited by malicious people to compromise a vulnerable system. A boundary error in HsmCfgSvc.exe service when processing CIFS archive names can be exploited to cause a stack-based buffer overflow via...
Last Update Date: 20 Jul 2012 10:25 Release Date: 20 Jul 2012 5186 Views

RISK: Medium Risk

Medium Risk

Cisco Nexus Series Switches IP Stack Processing Denial of Service Vulnerability

A vulnerability has been identified in Cisco NX-OS, which can be exploited by malicious people to cause a DoS (Denial of Service).The vulnerability is caused due to an error within the IP stack processing when obtaining layer 4 (UDP or TCP) information...
Last Update Date: 18 Jul 2012 Release Date: 17 Feb 2012 5680 Views

RISK: High Risk

High Risk

Mozilla Products Multiple vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox, Thunderbird and SeaMonkey, which can be exploited by remote users to execute arbitrary code, spoof web sites, obtain information, and conduct cross- site scripting attacks.
Last Update Date: 18 Jul 2012 11:30 Release Date: 18 Jul 2012 5151 Views