Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

HP TCP/IP Services for OpenVMS Multiple Vunlerabilities

Multiple vulnerabilities have been identified with HP TCP/IP Services for OpenVMS Running NTP. The vulnerabilities could be remotely exploited to execute arbitrary code or create a Denial of Service (DoS).
Last Update Date: 23 Sep 2011 09:28 Release Date: 23 Sep 2011 5202 Views

RISK: High Risk

High Risk

Google Chrome Flash Player Vulnerability

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a user's system. The vulnerabilities are caused due to a bundled vulnerable version of Adobe Flash Player. Please refer to SA11092203...
Last Update Date: 22 Sep 2011 12:21 Release Date: 22 Sep 2011 5720 Views

RISK: High Risk

High Risk

Adobe Flash Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a user's system.   Note: The vulnerability (CVE-2011-2444) is reportedly being exploited in...
Last Update Date: 22 Sep 2011 12:15 Release Date: 22 Sep 2011 5727 Views

RISK: Medium Risk

Medium Risk

Cisco Identity Services Engine Database Default Credentials Vulnerability

A vulnerability has been identified in Cisco Identity Services Engine, which can be exploited by malicious people to bypass certain security restrictions.   The security issue is caused due to the appliance including an undocumented database account with default credentials. This can be exploited to...
Last Update Date: 22 Sep 2011 10:41 Release Date: 22 Sep 2011 5502 Views

RISK: Medium Risk

Medium Risk

Fraudulent SSL Digital Certificates affect multiple Internet Applications and Network devices

DigiNotar is a Dutch certification authority (CA) for issuing the SSL and EVSSL digital certificate, many internet application and network devices are preloaded the DigiNotar's root certificate in the trusted root certification authorities. The list of known fraudulent certificates issued by DigiNotarby contains some...
Last Update Date: 21 Sep 2011 Release Date: 16 Sep 2011 5991 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to conduct spoofing and cross-site scripting attacks, disclose sensitive information, bypass certain security restrictions, and compromise a user...
Last Update Date: 20 Sep 2011 11:48 Release Date: 20 Sep 2011 5575 Views

RISK: Medium Risk

Medium Risk

Oracle Fusion Middleware & Application Server Vulnerability

 A vulnerability have been identified in Oracle Fusion Middleware & Application Server, which can be exploited by remote attacker cause denial of service attack.
Last Update Date: 19 Sep 2011 12:18 Release Date: 19 Sep 2011 5818 Views

RISK: High Risk

High Risk

Adobe Reader and Acrobat Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Reader and Acrobat, which can be exploited by remote attacker cause the application to crash and compromise a vulnerable system.
Last Update Date: 14 Sep 2011 12:09 Release Date: 14 Sep 2011 5267 Views

RISK: Medium Risk

Medium Risk

Microsoft SharePoint Multiple Elevation of Privilege Vulnerabilities

XSS in SharePoint Calendar Vulnerability A cross-site scripting vulnerability exists in Microsoft SharePoint 2010 that could result in information disclosure or elevation of privilege if a user clicks a specially crafted URL containing malicious JavaScript elements. Due to the vulnerability, when the malicious JavaScript is...
Last Update Date: 14 Sep 2011 11:58 Release Date: 14 Sep 2011 4991 Views

RISK: High Risk

High Risk

Microsoft Office Multiple Remote Code Execution Vulnerabilities

Office Component Insecure Library Loading Vulnerability A remote code execution vulnerability exists in the way that Microsoft Office handles the loading of DLL files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view...
Last Update Date: 14 Sep 2011 11:55 Release Date: 14 Sep 2011 4928 Views