Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Adobe Reader and Acrobat Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Reader and Acrobat, which can be exploited to execute arbitrary code on the target user's system.  A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on...
Last Update Date: 11 Jan 2012 09:44 Release Date: 11 Jan 2012 4963 Views

RISK: Medium Risk

Medium Risk

GnuTLS DTLS CBC Mode Plaintext Recovery Vulnerability

A vulnerability has been identified in GnuTLS, which can be exploited by malicious people to disclose potentially sensitive information.The vulnerability is caused due to the CBC mode encryption of the Datagram Transport Layer Security (DTLS) implementation exposing timing differences, which can be exploited to...
Last Update Date: 10 Jan 2012 11:32 Release Date: 10 Jan 2012 4920 Views

RISK: High Risk

High Risk

IBM Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in IBM Java, which can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS...
Last Update Date: 10 Jan 2012 11:27 Release Date: 10 Jan 2012 4974 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to compromise a user's system.A use-after-free error exists within the handling of animation frames.A boundary error within the "xmlStringLenDecodeEntities()" function (parser...
Last Update Date: 9 Jan 2012 12:42 Release Date: 9 Jan 2012 4887 Views

RISK: High Risk

High Risk

FFmpeg Multiple Vulnerabilities

Multiple vulnerabilities have been identified in FFmpeg, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a user's system.Errors when processing MKV and Vorbis files can be exploited to cause an out-of-bounds...
Last Update Date: 9 Jan 2012 12:41 Release Date: 9 Jan 2012 5046 Views

RISK: Medium Risk

Medium Risk

Mozilla Firefox Drag and Drop Handling Same Origin Policy Bypass Vulnerability

A vulnerability has been identified in Mozilla Firefox, which can be exploited by malicious people to bypass certain security restrictions.The vulnerability is caused due to an error when handling drag and drop events and can be exploited to bypass the same origin policy and e.g...
Last Update Date: 6 Jan 2012 10:37 Release Date: 6 Jan 2012 5243 Views

RISK: High Risk

High Risk

OpenSSL Multiple Vulnerabilities

Multiple vulnerabilities have been identified in OpenSSL, which can be exploited by attackers to conduct remote code execution and denial of service. The vulnerabilities can cause the following issues:DTLS Plaintext Recovery Attack (CVE-2011-4108)Double-free in Policy Checks (...
Last Update Date: 5 Jan 2012 11:57 Release Date: 5 Jan 2012 5205 Views

RISK: Medium Risk

Medium Risk

MIT Kerberos krb5 Telnet Daemon and Client Buffer Overflow Vulnerability

A vulnerability has been identified in the telnet daemon (telnetd) and telnet client of MIT Kerberos krb5, which can be exploited by unauthenticated remote attacker to cause a buffer overflow and probably execute arbitrary code with the privileges of the telnet daemon.
Last Update Date: 4 Jan 2012 11:16 Release Date: 4 Jan 2012 5153 Views

RISK: High Risk

High Risk

Multiple programming languages and frameworks Hash Table collision denial of service vulnerability

A vulnerability has been identified in multiple web programming languages and frameworks, which can be exploited by malicious people to cause a DoS (Denial of Service). A variety of programming languages and platforms suffered from a Denial of Service (DoS) condition against storage functions of...
Last Update Date: 30 Dec 2011 18:10 Release Date: 30 Dec 2011 5123 Views

RISK: High Risk

High Risk

Microsoft ASP .NET Framework Multiple Vulnerabilities

Collisions in HashTable May Cause DoS Vulnerability A denial of service vulnerability exists in the way that ASP.NET Framework handles specially crafted requests, causing a hash collision. An attacker who successfully exploited this vulnerability could send a small number of specially crafted requests to an...
Last Update Date: 30 Dec 2011 18:08 Release Date: 30 Dec 2011 5143 Views