Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Oracle Java SE Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Oracle Java SE. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. A local user can partially access and modify data and partially deny service on the target system. ...
Last Update Date: 13 Jun 2012 15:10 Release Date: 13 Jun 2012 5335 Views

RISK: Medium Risk

Medium Risk

Adobe ColdFusion Component Browser Vulnerability

A vulnerability has been identified in Adobe ColdFusion. A remote user can conduct HTTP response splitting attacks. A remote user can submit a specially crafted URL to cause the target server to return a split response. A remote user can exploit this to spoof content on the...
Last Update Date: 13 Jun 2012 15:09 Release Date: 13 Jun 2012 5271 Views

RISK: High Risk

High Risk

MySQL memcmp() Comparison Error Vulnerability

A vulnerability has been identified in MySQL. A remote user can bypass authentication. A remote user can trigger a flaw in comparing authentication data to bypass authentication. Versions compiled with a memcmp() function that can return an arbitrary integer (outside of -128 .. 127...
Last Update Date: 13 Jun 2012 15:08 Release Date: 13 Jun 2012 5612 Views

RISK: High Risk

High Risk

Apple iTunes Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple iTunes, which can be exploited by malicious people to compromise a user's system.An error in the handling of .m3u playlists can be exploited to cause a heap-based buffer overflow via a specially crafted...
Last Update Date: 13 Jun 2012 15:07 Release Date: 13 Jun 2012 5189 Views

RISK: Medium Risk

Medium Risk

Astaro Security Gateway Cross-Site Scripting Vulnerability

A vulnerability has been identified in Astaro Security Gateway, which can be exploited by malicious people to conduct cross-site scripting attacks.
Last Update Date: 12 Jun 2012 15:10 Release Date: 12 Jun 2012 5272 Views

RISK: High Risk

High Risk

Google Chrome Flash Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.   The vulnerabilities are caused due to a bundled vulnerable version of Adobe Flash Player.  Please refer to SA12061101 for more...
Last Update Date: 12 Jun 2012 15:09 Release Date: 12 Jun 2012 5158 Views

RISK: High Risk

High Risk

Check Point Endpoint Connect Insecure Library Loading Vulnerability

A vulnerability has been identified in Check Point EndPoint Connect, which can be exploited by malicious people to compromise a user's system.   The vulnerability is caused due to the application loading certain libraries in an insecure manner. This can be exploited to load arbitrary libraries...
Last Update Date: 12 Jun 2012 15:09 Release Date: 12 Jun 2012 5518 Views

RISK: High Risk

High Risk

IBM Lotus iNotes Upload Module ActiveX Control Buffer Overflow Vulnerability

A vulnerability has been identified in IBM Lotus iNotes Upload Module ActiveX Control, which can be exploited by malicious people to compromise a user's system.   The vulnerability is caused due to an error within the dwa85W.dll module and can be exploited to cause a...
Last Update Date: 11 Jun 2012 11:48 Release Date: 11 Jun 2012 5524 Views

RISK: High Risk

High Risk

F5 Products Unspecified SSH Configuration Vulnerability

A vulnerability has been identified in multiple F5 products, which can be exploited by malicious people to compromise a vulnerable system.  The security issue is caused due to an unspecified configuration error.
Last Update Date: 11 Jun 2012 11:47 Release Date: 11 Jun 2012 5305 Views

RISK: High Risk

High Risk

Adobe Flash Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Flash Player, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. An unspecified error can be exploited to corrupt memory. An unspecified error can be exploited to cause a stack...
Last Update Date: 11 Jun 2012 11:47 Release Date: 11 Jun 2012 5453 Views