Skip to main content

Security Bulletin

Filter by:

RISK: Extremely High Risk

Extremely High Risk

Adobe Flash Player Multiple Vulnerabilities

Multiple vulnerabilities ws identified in Adobe Flash Player. A remote user can bypass the memory address randomization security feature and cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted Flash content that, when loaded by...
Last Update Date: 28 Jan 2015 Release Date: 23 Jan 2015 4589 Views

RISK: Medium Risk

Medium Risk

PHP Multiple Vulnerabilities

Multiple vulnerabilities were identified in PHP. A remote user can execute arbitrary code on the target system and cause denial of service conditions. A user can create a specially crafted PHP file that will trigger a use-after-free memory error in the PHP unserialize() ...
Last Update Date: 27 Jan 2015 09:32 Release Date: 27 Jan 2015 4017 Views

RISK: High Risk

High Risk

Symantec Critical System Protection Multiple Vulnerabilities

Multiple vulnerabilities were identified in Symantec Critical System Protection. A remote authenticated user can execute arbitrary code on the target system, inject SQL commands, and obtain potentially sensitive information. A remote user can conduct cross-site scripting attacks. A local user can bypass security...
Last Update Date: 21 Jan 2015 10:45 Release Date: 21 Jan 2015 3949 Views

RISK: High Risk

High Risk

MySQL Multiple Vulnerabilites

Multiple vulnerabilities were identified in MySQL. A remote user can cause partial denial of service conditions, partially access and modify data on the target system.
Last Update Date: 21 Jan 2015 10:42 Release Date: 21 Jan 2015 4022 Views

RISK: High Risk

High Risk

Oracle Products Multiple Vulnerabilities

Multiple vulnerabilities were identified in Oracle Products.Multiple vulnerabilities were identified in Oracle Fusion Middleware. A remote user can gain elevated privileges, partially access and modify data on the target system. A remote or local user can cause partial denial of service conditions.Several vulnerabilities...
Last Update Date: 21 Jan 2015 10:39 Release Date: 21 Jan 2015 4225 Views

RISK: Medium Risk

Medium Risk

Moodle Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Moodle, which can be exploited by malicious users to bypass certain security restrictions, conduct script insertion attacks, conduct cross-site request forgery attacks and cause a DoS (Denial of Service).
Last Update Date: 20 Jan 2015 10:28 Release Date: 20 Jan 2015 3918 Views

RISK: High Risk

High Risk

Mozilla Firefox / Thunderbird Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox and Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system, conduct cross-site request forgery attacks, and obtain potentially sensitive information. A remote user can create specially crafted...
Last Update Date: 15 Jan 2015 11:53 Release Date: 15 Jan 2015 3908 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Kernel-Mode Driver Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists in the WebDAV kernel-mode driver (mrxdav.sys) when it fails to properly validate and enforce impersonation levels. An attacker who successfully exploited this vulnerability could bypass impersonation-level security and gain elevated privileges on a targeted system...
Last Update Date: 15 Jan 2015 Release Date: 14 Jan 2015 4096 Views

RISK: Medium Risk

Medium Risk

Network Policy Server Denial of Service Vulnerability

This is a denial of service vulnerability. An unauthenticated attacker who successfully exploited this vulnerability could send specially crafted username strings to an Internet Authentication Service (IAS) or Network Policy Server (NPS), causing a denial of service condition for RADIUS authentication on the IAS or...
Last Update Date: 15 Jan 2015 Release Date: 14 Jan 2015 3922 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Error Reporting Security Feature Bypass Vulnerability

A security feature bypass vulnerability exists in Windows Error Reporting (WER) that allows administrative users to view the memory contents of processes protected by "Protected Process Light." "Protected Process Light" inhibits debugging of critical system processes by arbitrary users on the system, even administrative...
Last Update Date: 15 Jan 2015 Release Date: 14 Jan 2015 4017 Views