Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Apple iOS Remote Code Execution and Address Bar Urls Spoofing Vulnerabilities

Two vulnerabilities were identified in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. A remote user can create a specially crafted file that, when loaded by...
Last Update Date: 8 May 2012 12:40 Release Date: 8 May 2012 6191 Views

RISK: Medium Risk

Medium Risk

Apple Mac OS X FileVault Plain Text Password Logging Vulnerability

A security issue has been identified in Apple Mac OS X, which can be exploited by malicious people with physical access to bypass certain security restrictions.   The security issue is caused due to the debug switch being enabled within FileVault when using "Legacy ...
Last Update Date: 8 May 2012 12:33 Release Date: 8 May 2012 5513 Views

RISK: Extremely High Risk

Extremely High Risk

Adobe Flash Player Object Confusion Vulnerability

A vulnerability has been identified in Adobe Flash Player, which can be exploited by remote users to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
Last Update Date: 7 May 2012 12:40 Release Date: 7 May 2012 5552 Views

RISK: High Risk

High Risk

VMware ESX Server / ESXi Multiple Vulnerabilities

Multiple vulnerabilities have been identified in VMware ESX Server and VMware ESXi, which can be exploited by malicious users to escalated privileges, cause a DoS (Denial of Service) and potentially compromise a vulnerable system. An errors when handling RPC commands can be exploited to cause...
Last Update Date: 7 May 2012 12:39 Release Date: 7 May 2012 5692 Views

RISK: High Risk

High Risk

Cisco Products Multiple Vulnerabilities

Mulitple vulnerabilities have been identified in various Cisco products, which can be exploited by malicious users execute arbitrary code, cause a denial-of-service condition and bypass security restrictions.
Last Update Date: 4 May 2012 12:12 Release Date: 4 May 2012 6224 Views

RISK: Medium Risk

Medium Risk

HP Systems Insight Manager Multiple Vulnerabilities

Multiple vulnerabilities have been identified in HP Systems Insight Manager, which can be exploited by malicious, local users to potentially gain escalated privileges and by malicious people to disclose sensitive information, conduct cross-site scripting and cross-site request forgery attacks, ...
Last Update Date: 2 May 2012 12:06 Release Date: 2 May 2012 5492 Views

RISK: Medium Risk

Medium Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to compromise a user's system. A use-after-free error exists in floats handling and within the xml parser. An error exists within the IPC validation. ...
Last Update Date: 2 May 2012 12:03 Release Date: 2 May 2012 5472 Views

RISK: High Risk

High Risk

Oracle Database Remote Pre-authenticated TNS Poison Vulnerability

A vulnerability has been identified in Oracle Database, which can be exploited by malicious people with network access to the TNS Listener to inject commands and/or hijack connections from the client to the database server.   Note: Currently, there is no patch available for this...
Last Update Date: 30 Apr 2012 12:18 Release Date: 30 Apr 2012 5993 Views

RISK: High Risk

High Risk

VMware ESX Server Multiple Vulnerabilities

Multiple vulnerabilities have been identified in VMware ESX Server, which can be exploited by malicious, local users in a guest virtual machine to gain escalated privileges and by malicious people to cause a DoS (Denial of Service) and potentially compromise the vulnerable system.
Last Update Date: 30 Apr 2012 12:12 Release Date: 30 Apr 2012 6022 Views

RISK: Medium Risk

Medium Risk

IBM Rational Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in multiple IBM Rational products, which can be exploited by malicious users to disclose sensitive information and conduct session fixation and script insertion attacks and by malicious people to disclose sensitive information, overwrite arbitrary files, conduct cross-site request forgery and...
Last Update Date: 27 Apr 2012 12:02 Release Date: 27 Apr 2012 5619 Views