Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Oracle Products Multiple vulnerabilities

Multiple vulnerabilities have been identified in various Oracle products and components, which could be exploited by attackers to denial of service, escalation of privilege, remote code execution, sensitive information disclosure and tampering.
Last Update Date: 17 Oct 2013 14:27 Release Date: 17 Oct 2013 4463 Views

RISK: High Risk

High Risk

Microsoft Internet Explorer Memory Corruption Vulnerabilities

Remote code execution vulnerabilities exist when Internet Explorer improperly accesses an object in memory. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
Last Update Date: 16 Oct 2013 Release Date: 9 Oct 2013 3921 Views

RISK: Medium Risk

Medium Risk

FFmpeg Multiple Vulnerabilities

Some vulnerabilities have been reported in FFmpeg, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.Some errors within libavcodec/vmnc.c can be exploited to cause out of bounds read...
Last Update Date: 15 Oct 2013 16:19 Release Date: 15 Oct 2013 3964 Views

RISK: Medium Risk

Medium Risk

BlackBerry Universal Device Service Wrapper Vulnerability

A vulnerability has been identified in BlackBerry Universal Device Service, which could potentially allow an attacker to obtain escalation of privilege and then execute arbitrary code.
Last Update Date: 10 Oct 2013 10:25 Release Date: 10 Oct 2013 3997 Views

RISK: High Risk

High Risk

Cisco Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Cisco products, which can be exploited by attackers to conduct cross site scripting, denial of service, elevation of privilege, security restriction bypass and sensitive information disclosure.
Last Update Date: 10 Oct 2013 10:24 Release Date: 10 Oct 2013 4106 Views

RISK: High Risk

High Risk

Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities

OpenType Font Parsing VulnerabilityA remote code execution vulnerability exists in the way that Windows parses specially crafted OpenType fonts (OTF). An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete...
Last Update Date: 9 Oct 2013 19:00 Release Date: 9 Oct 2013 4165 Views

RISK: High Risk

High Risk

Microsoft .NET Framework Remote Code Execution Vulnerabilities

OpenType Font Parsing VulnerabilityA remote code execution vulnerability exists in the way that affected components handle specially crafted OpenType fonts (OTF). The vulnerability could allow remote code execution if a user visits a website hosting an XAML Browser Application (XBAP) containing a specially crafted OTF file...
Last Update Date: 9 Oct 2013 18:58 Release Date: 9 Oct 2013 4043 Views

RISK: High Risk

High Risk

Microsoft Windows Common Control Library Remote Code Execution Vulnerability

Comctl32 Integer Overflow VulnerabilityA remote code execution vulnerability exists in the way that the Windows common control library handles allocating memory for data structures. The vulnerability could allow remote code execution if an attacker sends a specially crafted web request to an ASP.NET web application running on...
Last Update Date: 9 Oct 2013 18:58 Release Date: 9 Oct 2013 4017 Views

RISK: High Risk

High Risk

Microsoft SharePoint Server Remote Code Execution Vulnerabilities

Microsoft Excel Memory Corruption VulnerabilityA remote code execution vulnerability exists in the way that affected Microsoft Office Services and Web Apps parse content in specially crafted files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs...
Last Update Date: 9 Oct 2013 18:57 Release Date: 9 Oct 2013 3938 Views

RISK: Medium Risk

Medium Risk

Microsoft Excel Remote Code Execution Vulnerabilities

A remote code execution vulnerability exists in the way that Microsoft Excel parses content in Excel files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or...
Last Update Date: 9 Oct 2013 18:57 Release Date: 9 Oct 2013 3982 Views