Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

IBM Tivoli System Automation Application Manager Multiple Vulnerabilities

Multiple vulnerabilities have been identified in IBM Tivoli System Automation Application Manager, which can be exploited by malicious, local users to disclose potentially sensitive information, manipulate certain data, and cause a DoS (Denial of Service), by malicious users to bypass certain security restrictions, ...
Last Update Date: 12 Apr 2013 10:45 Release Date: 12 Apr 2013 3823 Views

RISK: High Risk

High Risk

Oracle Solaris Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Solaris C Library, ISC BIND and Python included in Solaris, which can be exploited by malicious people to disclose potentially sensitive information, hijack a user's session, and cause a DoS (Denial of Service).
Last Update Date: 12 Apr 2013 10:39 Release Date: 12 Apr 2013 3774 Views

RISK: High Risk

High Risk

Cisco Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Cisco products.A remote user can cause denial of service conditions.A remote user can gain access to the target system.
Last Update Date: 12 Apr 2013 Release Date: 11 Apr 2013 3648 Views

RISK: Medium Risk

Medium Risk

Adobe ColdFusion Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe ColdFusion, which can be exploited by malicious users to bypass certain security restrictions and malicious people to conduct spoofing attacks.An unspecified error can be exploited to impersonate an authenticated user.An unspecified error can be exploited to gain access...
Last Update Date: 11 Apr 2013 11:21 Release Date: 11 Apr 2013 3510 Views

RISK: High Risk

High Risk

Adobe Shockwave Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Shockwave Player, which can be exploited by malicious people to compromise a user's system. An unspecified error can be exploited to cause a buffer overflow. An unspecified error can be exploited to corrupt memory.
Last Update Date: 11 Apr 2013 11:21 Release Date: 11 Apr 2013 3417 Views

RISK: High Risk

High Risk

Adobe Flash Player / AIR Multiple Vulnerabilities

Multiple vulnerabilities have been indentified in Adobe Flash Player and Adobe AIR, which can be exploited by malicious people to compromise a user's system.An integer overflow error can be exploited to execute arbitrary code.Some unspecified errors can be exploited to cause memory corruption...
Last Update Date: 11 Apr 2013 Release Date: 10 Apr 2013 3585 Views

RISK: High Risk

High Risk

Microsoft Antimalware Improper Pathname Vulnerability

This is an elevation of privilege vulnerability. An attacker who successfully exploited this vulnerability could execute arbitrary code in the security context of the LocalSystem account and take complete control of the system. An attacker could then install programs; view, change, or delete data; ...
Last Update Date: 10 Apr 2013 12:31 Release Date: 10 Apr 2013 3416 Views

RISK: High Risk

High Risk

Microsoft HTML Sanitization Component Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists in the way that HTML strings are sanitized. An attacker who successfully exploited this vulnerability could perform cross-site scripting attacks on affected systems and run script in the security context of the current user.
Last Update Date: 10 Apr 2013 12:31 Release Date: 10 Apr 2013 3472 Views

RISK: High Risk

High Risk

Microsoft Kernel-Mode Driver Elevation Of Privilege Vulnerabilities

An elevation of privilege vulnerability exists when the Windows kernel-mode driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could gain elevated privileges and read arbitrary amounts of kernel memory. A denial of service vulnerability exists when Windows fails to handle a...
Last Update Date: 10 Apr 2013 12:30 Release Date: 10 Apr 2013 3541 Views

RISK: High Risk

High Risk

Microsoft Windows CSRSS Memory Corruption Vulnerability

An elevation of privilege vulnerability exists when the Windows CSRSS improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the local system. An attacker could then install programs; view, change, or delete data; ...
Last Update Date: 10 Apr 2013 12:21 Release Date: 10 Apr 2013 3311 Views