Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Schneider Electric Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in multiple Schneider Electric products, which can be exploited by malicious people to conduct cross-site scripting attacks, disclose potentially sensitive information, and compromise a user's system. Two errors in the TeeChart ActiveX control can be exploited to...
Last Update Date: 30 Nov 2011 10:18 Release Date: 30 Nov 2011 4838 Views

RISK: High Risk

High Risk

Siemens Automation License Manager Denial of Service and ActiveX Control Vulnerabilities

Multiple vulnerabilities have identified in Siemens Automation License Manager, which can be exploited by malicious people to cause a DoS (Denial of Service) and manipulate certain data.An error in almsrvx.exe when processing certain requests can be exploited to cause an unhandled exception and...
Last Update Date: 29 Nov 2011 10:41 Release Date: 29 Nov 2011 4903 Views

RISK: Medium Risk

Medium Risk

Novell NetWare XNFS.NLM "xdrDecodeString()" Buffer Overflow Vulnerability

A vulnerability has been identified in Novell NetWare, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to an error within the "xdrDecodeString()" function in XNFS.NLM when processing certain NFS requests. This can...
Last Update Date: 25 Nov 2011 10:01 Release Date: 25 Nov 2011 4389 Views

RISK: High Risk

High Risk

IBM Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in IBM Java, which can be exploited by malicious users to disclose potentially sensitive information, cause a DoS (Denial of Service), and compromise a vulnerable system. For more information, please refer to SA11101902.
Last Update Date: 24 Nov 2011 09:40 Release Date: 24 Nov 2011 4890 Views

RISK: High Risk

High Risk

Cisco Security Agent Multiple Remote Code Execution Vulnerabilities

Multiple vulnerabilities have been identified in Cisco Security Agent, which can be exploited by unauthenticated attacker to perform remote code execution on the affected device. These  vulnerabilities are in a third-party library (Oracle Outside In). 
Last Update Date: 22 Nov 2011 14:30 Release Date: 22 Nov 2011 4807 Views

RISK: Medium Risk

Medium Risk

Novell Open Enterprise Server iPrint Client "GetDriverSettings()" Buffer Overflow Vulnerability

A vulnerability has been identified in Novell Open Enterprise Server, which can be exploited by malicious people to compromise a user's system.   For more information, please refer to SA11102803.
Last Update Date: 22 Nov 2011 14:27 Release Date: 22 Nov 2011 4485 Views

RISK: High Risk

High Risk

RealPlayer Multiple Vulnerabilities

Multiple vulnerabilities have been identified in RealPlayer, which can be exploited by malicious people to compromise a user's system.  Successful exploitation of the vulnerabilities may allow execution of arbitrary code.     An unspecified error related to RealVideo rendering can be exploited to cause a heap-...
Last Update Date: 22 Nov 2011 14:26 Release Date: 22 Nov 2011 5138 Views

RISK: Medium Risk

Medium Risk

Juniper Junos IPv6 Over IPv4 Tunnel Security Policy Bypass Vulnerability

A vulnerability has been identified in Juniper Junos, which can be exploited by malicious people to bypass certain security restrictions.The vulnerability is caused due to an error when enforcing security policies on IPv6 over IPv4 tunnels. This can lead to certain security policies not being enforced...
Last Update Date: 18 Nov 2011 15:00 Release Date: 18 Nov 2011 4901 Views

RISK: High Risk

High Risk

Google Chrome V8 Memory Corruption Vulnerability

A vulnerability has been identified in Google Chrome, which can be exploited by malicious people to compromise a user's system.The vulnerability is caused due to an error in V8 (JavaScript engine) and can be exploited to cause an out of bounds write and...
Last Update Date: 18 Nov 2011 14:59 Release Date: 18 Nov 2011 4990 Views

RISK: High Risk

High Risk

ISC BIND Recursive Query Processing Denial of Service Vulnerability

A vulnerability has been identified in ISC BIND, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an unspecified error when processing recursive queries. NOTE: The vulnerability is currently being actively exploited.
Last Update Date: 17 Nov 2011 11:48 Release Date: 17 Nov 2011 5123 Views