Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Oracle Database Remote Pre-authenticated TNS Poison Vulnerability

A vulnerability has been identified in Oracle Database, which can be exploited by malicious people with network access to the TNS Listener to inject commands and/or hijack connections from the client to the database server.   Note: Currently, there is no patch available for this...
Last Update Date: 30 Apr 2012 12:18 Release Date: 30 Apr 2012 4854 Views

RISK: High Risk

High Risk

VMware ESX Server Multiple Vulnerabilities

Multiple vulnerabilities have been identified in VMware ESX Server, which can be exploited by malicious, local users in a guest virtual machine to gain escalated privileges and by malicious people to cause a DoS (Denial of Service) and potentially compromise the vulnerable system.
Last Update Date: 30 Apr 2012 12:12 Release Date: 30 Apr 2012 4942 Views

RISK: Medium Risk

Medium Risk

IBM Rational Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in multiple IBM Rational products, which can be exploited by malicious users to disclose sensitive information and conduct session fixation and script insertion attacks and by malicious people to disclose sensitive information, overwrite arbitrary files, conduct cross-site request forgery and...
Last Update Date: 27 Apr 2012 12:02 Release Date: 27 Apr 2012 4535 Views

RISK: Medium Risk

Medium Risk

Microsoft Visual Studio Linker Integer Overflow Vulnerability

A vulnerability has been identified in Microsoft Visual Studio 2008, which can be exploited by malicious people to compromise a user's system.The vulnerability is caused due to an integer overflow error in the linker utility (link.exe) when allocating memory based on...
Last Update Date: 27 Apr 2012 11:57 Release Date: 27 Apr 2012 4336 Views

RISK: Medium Risk

Medium Risk

Comodo Internet Security PE File Processing Vulnerability

A vulnerability has been identified in Comodo Internet Security. A remote or local user can cause denial of service conditions.A remote or local user can create a specially crafted PE file that, when loaded into memory on the target system, will cause the target system...
Last Update Date: 27 Apr 2012 11:56 Release Date: 27 Apr 2012 4264 Views

RISK: High Risk

High Risk

Mozilla Firefox / Thunderbird / SeaMonkey Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox, Thunderbird, and SeaMonkey, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, disclose certain sensitive information, compromise a user's system or spoof certain web sites...
Last Update Date: 25 Apr 2012 10:54 Release Date: 25 Apr 2012 4256 Views

RISK: Medium Risk

Medium Risk

Asterisk Multiple Vulnerabilities

Multiple vulnerabilities identified in Asterisk, which a remote authenticated user can execute arbitrary code on the target system, cause denial of service conditions, and execute arbitrary shell commands on Asterisk Manager interface. A remote user can send specially crafted SIP UPDATE request to cause Asterisk to...
Last Update Date: 24 Apr 2012 11:20 Release Date: 24 Apr 2012 4230 Views

RISK: Medium Risk

Medium Risk

WordPress external libraries Multiple Vulnerabilities

Multiple vulnerabilities have been identified in WordPress external libraries (Plupload, SWFUpload, SWFObject),  which could be exploited by malicious people to elevation of privilege, and cause a cross-site scripting attack.
Last Update Date: 23 Apr 2012 12:13 Release Date: 23 Apr 2012 4195 Views

RISK: Medium Risk

Medium Risk

IBM Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in IBM Java, which could be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.
Last Update Date: 23 Apr 2012 12:10 Release Date: 23 Apr 2012 4395 Views

RISK: High Risk

High Risk

Oracle Products Multiple Vulnerabilies

Multiple vulnerabilities have been identified in various Oracle products and components, which could be exploited by attackers to denial of service, data manipulation, disclose sensitive information or compromise a vulnerable system.
Last Update Date: 18 Apr 2012 12:01 Release Date: 18 Apr 2012 4655 Views