Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

F5 Products Multiple Vulnerabilities

Multiple vulnerabilities has been identified in multiple F5 products, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. The vulnerability is caused due to a bundled vulnerable version of BIND. For more information: ...
Last Update Date: 22 Jun 2012 12:47 Release Date: 22 Jun 2012 5548 Views

RISK: Medium Risk

Medium Risk

Winamp AVI / IT File Processing Vulnerabilities

Multiple vulnerabilities have been identified in Winamp, which can be exploited by malicious people to compromise a user's system.An error in bmp.w5s when allocating memory using values from the "strf" chunk to process BI_RGB video data within AVI files can be...
Last Update Date: 22 Jun 2012 12:47 Release Date: 22 Jun 2012 5170 Views

RISK: Medium Risk

Medium Risk

Cisco AnyConnect Secure Mobility Client Software Update Vulnerability

Multiple vulnerabilities have been identified in Cisco AnyConnect Secure Mobility Client. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted HTML that, when loaded by the target user, will execute...
Last Update Date: 21 Jun 2012 10:47 Release Date: 21 Jun 2012 5465 Views

RISK: Medium Risk

Medium Risk

Cisco ASA 5500 Series IPv6 Processing Vulnerability

A vulnerability has been identified in Cisco ASA. A remote user can cause denial of service conditions.   A remote user can send specially crafted IPv6 data through the target device to cause the target device to reload.
Last Update Date: 21 Jun 2012 10:47 Release Date: 21 Jun 2012 5120 Views

RISK: High Risk

High Risk

Mozilla Products Use-After-Free in nsHTMLSelectElement() Vulnerability

A vulnerability has been identified in Mozilla Firefox, Thunderbird and Seamonkey. A remote user can cause arbitrary code to be executed on the target user's system.   A remote user can create specially crafted HTML that, when loaded by the target user, will trigger...
Last Update Date: 20 Jun 2012 10:31 Release Date: 20 Jun 2012 5200 Views

RISK: Medium Risk

Medium Risk

IBM Lotus Notes "notes" URI Handler Vulnerability

A vulnerability has been reported in IBM Lotus Notes, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an error within the "notes" URI handler, which can be exploited to execute arbitrary commands...
Last Update Date: 20 Jun 2012 10:25 Release Date: 20 Jun 2012 5243 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows OpenType Font Processing Denial of Service Vulnerability

A vulnerability has been identified in Microsoft Windows, which can be exploited by malicious, local users to cause a Denial of Service.The vulnerability is caused due to an error in atmfd.dll when processing Adobe OpenType font files and can be exploited to cause a...
Last Update Date: 15 Jun 2012 17:17 Release Date: 15 Jun 2012 5288 Views

RISK: Medium Risk

Medium Risk

Opera Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Opera, which can be exploited by malicious people to conduct spoofing attacks and bypass certain security restrictions. An error when displaying preferences within a small window can be exploited to e.g. execute arbitrary code by tricking a user into...
Last Update Date: 15 Jun 2012 17:16 Release Date: 15 Jun 2012 5440 Views

RISK: Medium Risk

Medium Risk

VMware Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in multiple VMware products, which can be exploited by malicious people to cause denial of service or compromise a user's system. An input validation error when parsing Checkpoint files and can be exploited to execute arbitrary code. A user with...
Last Update Date: 15 Jun 2012 17:14 Release Date: 15 Jun 2012 4981 Views

RISK: Medium Risk

Medium Risk

IBM Rational AppScan Multiple Vulnerabilities

Multiple vulnerabilities have been identified in IBM Rational AppScan, which can be exploited by malicious users to disclose certain information and by malicious people to conduct spoofing and cross-site scripting attacks, disclose potentially sensitive information, hijack a user's session, conduct DNS cache...
Last Update Date: 15 Jun 2012 17:10 Release Date: 15 Jun 2012 5166 Views