Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Adobe Flash Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Flash Player, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. An unspecified error can be exploited to corrupt memory. An unspecified error can be exploited to cause a stack...
Last Update Date: 11 Jun 2012 11:47 Release Date: 11 Jun 2012 4392 Views

RISK: Medium Risk

Medium Risk

IBM WebSphere Sensor Events Multiple Vulnerabilities

Multiple vulnerabilities have been identfied in IBM WebSphere Sensor Events, where some have unknown impacts and others can be exploited by malicious people to conduct cross-site scripting attacks. An unspecified error exists related to directory traversal. An unspecified error exists related to HTTP methods. ...
Last Update Date: 8 Jun 2012 10:04 Release Date: 8 Jun 2012 4829 Views

RISK: High Risk

High Risk

Mozilla Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox, Thunderbird, and SeaMonkey, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to bypass certain security restrictions, disclose sensitive information, and compromise a user's...
Last Update Date: 7 Jun 2012 14:22 Release Date: 7 Jun 2012 4295 Views

RISK: Medium Risk

Medium Risk

Adobe Illustrator Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Illustrator. A remote user can cause arbitrary code to be executed on the target user's system.   A remote user can create a specially crafted file that, when loaded by the target user, will trigger a memory corruption...
Last Update Date: 6 Jun 2012 Release Date: 10 May 2012 4387 Views

RISK: Medium Risk

Medium Risk

Adobe Flash Professional and Photoshop Buffer Overflow Vulnerability

A vulnerability has been identified in Adobe Flash Professional and Photoshop. A remote user can cause arbitrary code to be executed on the target user's system.   A remote user can trigger a buffer overflow and execute arbitrary code on the target system. The code will...
Last Update Date: 6 Jun 2012 Release Date: 10 May 2012 4304 Views

RISK: High Risk

High Risk

ISC BIND DNS Resource Records Handling Vulnerability

A vulnerability has been identified in ISC BIND, which can be exploited by malicious people to disclose potentially sensitive information or cause a DoS (Denial of Service). The vulnerability is caused due to an error when handling DNS resource records and can be exploited to e....
Last Update Date: 5 Jun 2012 12:04 Release Date: 5 Jun 2012 4571 Views

RISK: High Risk

High Risk

Microsoft Windows Includes Some Invalid Certificates Vulnerability

A vulnerability was identified in Microsoft Windows. A remote user may be able to spoof code signing signatures. The operating system includes some invalid intermediate certificates. The invalid certificates and their thumbprints are: Microsoft Enforced Licensing Intermediate PCA: 2a 83 e9 02 05 91 a5...
Last Update Date: 5 Jun 2012 12:03 Release Date: 5 Jun 2012 3981 Views

RISK: Medium Risk

Medium Risk

Cisco Firewall Services Module Protocol Independent Multicast (PIM) Denial of Service Vulnerability

A vulnerability has been identified in Cisco Firewall Services Module. A remote user can cause denial of service conditions. A remote user can send a specially crafted Protocol Independent Multicast (PIM) message to cause the target device to reload. Devices with multicast routing enabled are...
Last Update Date: 4 Jun 2012 Release Date: 15 Mar 2012 4616 Views

RISK: High Risk

High Risk

Cisco ASA Multiple Vulnerabilities

A vulnerability has been identified in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system or cause denial of service conditions. A remote user can create HTML that, when loaded by the target user, will execute...
Last Update Date: 4 Jun 2012 Release Date: 15 Mar 2012 4493 Views

RISK: Medium Risk

Medium Risk

IBM AIX `TCP large send offload´ Denial of Service Vulnerability

A vulnerability has been reported in AIX, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error within the TCP stack when the "TCP large send offload" option is enabled and can be...
Last Update Date: 4 Jun 2012 Release Date: 7 Feb 2012 4904 Views