Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Oracle Solaris Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Java included in Solaris, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and potentially compromise a vulnerable system.   For more information, please refer to...
Last Update Date: 20 Dec 2012 10:12 Release Date: 20 Dec 2012 4654 Views

RISK: Medium Risk

Medium Risk

RealPlayer Multiple Vulnerabilities

Multiple vulnerabilities have been indentified in RealPlayer, which can be exploited by malicious people to compromise a user's system. An error when handling RealAudio files may result in dereferencing an invalid pointer, and can be exploited to cause a buffer overflow. Successful exploitation of...
Last Update Date: 18 Dec 2012 09:56 Release Date: 18 Dec 2012 4852 Views

RISK: Medium Risk

Medium Risk

VMware View Connection/Security Server Directory Traversal Vulnerability

A vulnerability has been identified in VMware View, which can be exploited by malicious people to disclose sensitive information. The vulnerability is caused due to an error within the View Connection Server and View Security Server and can be exploited to disclose arbitrary files via directory traversal attacks...
Last Update Date: 17 Dec 2012 10:52 Release Date: 17 Dec 2012 4951 Views

RISK: High Risk

High Risk

Adobe Camera Raw Plug-in TIFF Image Processing Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Camera Raw Plug-in, which can be exploited by malicious people to compromise a user's system.An error in the "Camera Raw.8bi" plug-in when processing a LZW compressed TIFF image can be...
Last Update Date: 14 Dec 2012 11:03 Release Date: 14 Dec 2012 4994 Views

RISK: High Risk

High Risk

Apple QuickTime Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple QuickTime, which can be exploited when viewing maliciously crafted PICT, TeXML, Targa or movie files and website to cause application termination or arbitrary code execution.  
Last Update Date: 13 Dec 2012 10:38 Release Date: 13 Dec 2012 5022 Views

RISK: Medium Risk

Medium Risk

Citrix XenApp XML Service Interface Vulnerability

A vulnerability has been identified in Citrix XenApp. A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to trigger a flaw in the XML Service interface and execute arbitrary code on the target system. The code will...
Last Update Date: 13 Dec 2012 10:34 Release Date: 13 Dec 2012 4912 Views

RISK: High Risk

High Risk

VLC Media Player SWF Video Decoding Use-After-Free Vulnerability

A vulnerability has been identified in VLC Media Player, which can be exploited by malicious people to potentially compromise a user's system.   The vulnerability is caused due to a use-after-free error when releasing a picture object during video decoding of Flash (...
Last Update Date: 13 Dec 2012 10:31 Release Date: 13 Dec 2012 5099 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Revoked Certificate Bypass Vulnerability

A security feature bypass vulnerability exists in Windows due to the way the IP-HTTPS Component handles certificates. An attacker who successfully exploited this vulnerability could bypass certificate validation checks.
Last Update Date: 12 Dec 2012 14:51 Release Date: 12 Dec 2012 4783 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows DirectPlay Heap Overflow Vulnerability

A remote code execution vulnerability exists in the way that DirectPlay handles specially crafted content. The vulnerability could allow remote code execution if an attacker convinces a user to view a specially crafted Office document with embedded content. An attacker who successfully exploited this vulnerability could take complete...
Last Update Date: 12 Dec 2012 14:51 Release Date: 12 Dec 2012 4837 Views

RISK: High Risk

High Risk

Microsoft Windows Filename Parsing Vulnerability

A remote code execution vulnerability exists in the way that Microsoft Windows parses filenames. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
Last Update Date: 12 Dec 2012 14:51 Release Date: 12 Dec 2012 5214 Views