Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Joomla! Security Bypass and Cross-Site Scripting Vulnerability

Two vulnerability have been identified in Joomla!, which can be exploited by malicious people to bypass certain security restrictions and conduct cross-site scripting attacks. Certain unspecified input is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML...
Last Update Date: 15 Nov 2011 12:26 Release Date: 15 Nov 2011 5370 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. The application bundles a vulnerable version of the Adobe Flash player.For details, please refer to HKCERT security bulletin...
Last Update Date: 15 Nov 2011 12:22 Release Date: 15 Nov 2011 5158 Views

RISK: High Risk

High Risk

Adobe Flash Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Flash Player, which can be exploited by attackers to take control of the affected system. 
Last Update Date: 14 Nov 2011 Release Date: 11 Nov 2011 5478 Views

RISK: High Risk

High Risk

Apple iOS Multiple Vulnerabilities

Multiple Vulnerabilities have been identified in Apple iOS, which can be exploited by malicious people to obtain sensitive information and execute arbitrary code on the affected system. A remote user can create a specially crafted FreeType font that, when loaded by the target user, will execute...
Last Update Date: 14 Nov 2011 Release Date: 11 Nov 2011 5322 Views

RISK: Medium Risk

Medium Risk

ProFTPD Response Pool Use-After-Free Vulnerability

A vulnerability has been identified in ProFTPD, which can be exploited by malicious people to compromise a vulnerable system.The vulnerability is caused due to a use-after-free error when handling response pool allocation lists and can be exploited to corrupt memory.Successful exploitation...
Last Update Date: 14 Nov 2011 Release Date: 11 Nov 2011 5361 Views

RISK: High Risk

High Risk

Apple Mac OS X Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Java for Apple Mac OS X, which can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data...
Last Update Date: 10 Nov 2011 11:25 Release Date: 10 Nov 2011 5066 Views

RISK: Medium Risk

Medium Risk

IBM WebSphere Application Server Web Services Feature Pack Multiple Vulnerabilities

Multiple vulnerabilities have been identified in IBM WebSphere Application Server Web Services Feature Pack, which can be exploited by malicious people to cause a Denial of Service (DoS).WSRMModule holds on to AxisService references and eventually causes OutOfMemory error.org.apache.commons.logging...
Last Update Date: 10 Nov 2011 Release Date: 8 Nov 2011 5377 Views

RISK: High Risk

High Risk

Mozilla Products Multiple vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox and Thunderbird, which can be exploited by malicious people to execute arbitrary code and take complete control of an affected system.
Last Update Date: 9 Nov 2011 12:39 Release Date: 9 Nov 2011 5275 Views

RISK: High Risk

High Risk

Adobe Shockwave Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Shockwave Player, which can be exploited by attackers to run malicious code on the affected system.
Last Update Date: 9 Nov 2011 12:34 Release Date: 9 Nov 2011 4987 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows TrueType Font Parsing Vulnerability

A denial of service vulnerability exists in the Microsoft Windows kernel. This vulnerability is caused when the Windows kernel improperly processes a specifically crafted TrueType font file. An attacker who successfully exploited this vulnerability could cause the affected system to stop responding and restart.
Last Update Date: 9 Nov 2011 12:32 Release Date: 9 Nov 2011 5130 Views