Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Apple Mac OS X and Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple Mac OS X and Java bundled, which can be exploited by remote attackers to execute arbitrary code.
Last Update Date: 20 Feb 2013 16:24 Release Date: 20 Feb 2013 3849 Views

RISK: High Risk

High Risk

Oracle Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Oracle Java. A remote user can cause arbitrary code to be executed, and partially modify data on the target system. A remote user can create a specially crafted Java Web Start application or Java applet that, when loaded by the...
Last Update Date: 20 Feb 2013 16:24 Release Date: 20 Feb 2013 4320 Views

RISK: Medium Risk

Medium Risk

FFmpeg Multiple Vulnerabilities

Multiple vulnerabilities have been identified in FFmpeg. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted file that, when loaded by the target user, will trigger an integer overflow, ...
Last Update Date: 14 Feb 2013 17:51 Release Date: 14 Feb 2013 3980 Views

RISK: High Risk

High Risk

BlackBerry Enterprise Server Multiple Vulnerabilities

Multiple vulnerabilities have been identified in BlackBerry Enterprise Server, which can be exploited by malicious people to compromise a vulnerable system.   The vulnerabilities exist in the bundled version of LibTIFF, which is used by the BlackBerry Mobile Data System Connection Service and the BlackBerry Messaging Agent.
Last Update Date: 14 Feb 2013 17:47 Release Date: 14 Feb 2013 3909 Views

RISK: High Risk

High Risk

Adobe Shockwave Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Shockwave Player.A remote user can cause arbitrary code to be executed on the target user's system.A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on...
Last Update Date: 14 Feb 2013 17:45 Release Date: 14 Feb 2013 3938 Views

RISK: High Risk

High Risk

Adobe Flash Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system, and obtain potentially sensitive information. A remote user can create a specially crafted file that, when loaded by the target...
Last Update Date: 14 Feb 2013 17:43 Release Date: 14 Feb 2013 4065 Views

RISK: High Risk

High Risk

cURL Buffer Overflow Vulnerability

A vulnerability has been identified in cURL. A remote user can execute arbitrary code on the target system. A remote server can return specially crafted data via POP3, SMTP, or IMAP to trigger a buffer overflow in Curl_sasl_create_digest_md5_message() and execute arbitrary code on the target...
Last Update Date: 14 Feb 2013 17:42 Release Date: 14 Feb 2013 4016 Views

RISK: High Risk

High Risk

Microsoft Windows CSRSS Reference Count Vulnerability

An elevation of privilege vulnerability exists when the Windows CSRSS improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the local system. An attacker could then install programs; view, change, or delete data; ...
Last Update Date: 14 Feb 2013 17:40 Release Date: 14 Feb 2013 3568 Views

RISK: High Risk

High Risk

Microsoft Windows TCP FIN WAIT Vulnerability

A denial of service vulnerability exists in the Windows TCP/IP stack that could cause the target system to stop responding and automatically restart. The vulnerability is caused when the TCP/IP stack improperly handles a connection termination sequence.
Last Update Date: 14 Feb 2013 17:37 Release Date: 14 Feb 2013 3884 Views

RISK: High Risk

High Risk

Microsoft Windows Kernel Multiple Vulnerabilities

Kernel Race Condition Vulnerability An elevation of privilege vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data...
Last Update Date: 14 Feb 2013 17:33 Release Date: 14 Feb 2013 3549 Views