Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Microsoft Windows C Run-Time Library Buffer Overflow Vulnerability

A remote code execution vulnerability exists in the way that the msvcrt DLL calculates the size of a buffer in memory, allowing data to be copied into memory that has not been properly allocated. This vulnerability could allow remote code execution if a user opens a specially crafted...
Last Update Date: 15 Feb 2012 11:44 Release Date: 15 Feb 2012 4858 Views

RISK: High Risk

High Risk

Oracle Java SE Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Oracle Java SE, which can be exploited by attackers to execute arbitrary code, cause denial of service, and manipulate data. A remote user can send specially crafted data to execute arbitrary code on the target system or cause complete denial...
Last Update Date: 15 Feb 2012 10:26 Release Date: 15 Feb 2012 5020 Views

RISK: High Risk

High Risk

Adobe Shockwave Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Shockwave Player, which can be exploited by malicious people to compromise a user's system. An unspecified error in the Shockwave 3D Asset can be exploited to corrupt memory. An unspecified error can be exploited to cause a heap...
Last Update Date: 15 Feb 2012 10:07 Release Date: 15 Feb 2012 4755 Views

RISK: High Risk

High Risk

Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability

A vulnerability has been identified in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a use-after-free error in the "nsXBLDocumentInfo::ReadPrototypeBindings()" method when handling XBL bindings...
Last Update Date: 14 Feb 2012 10:23 Release Date: 14 Feb 2012 4877 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions, manipulate certain data, and compromise a user's system. An unspecified error exists within clipboard monitoring after a...
Last Update Date: 10 Feb 2012 14:52 Release Date: 10 Feb 2012 5031 Views

RISK: Medium Risk

Medium Risk

MySQL Unspecified Code Execution Vulnerability

A vulnerability has been identified in MySQL, which can be exploited by malicious people to compromise a vulnerable system.The vulnerability is caused due to an unspecified error. Successful exploitation allows execution of arbitrary code.
Last Update Date: 10 Feb 2012 14:40 Release Date: 10 Feb 2012 4746 Views

RISK: High Risk

High Risk

Novell iPrint Client Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Novell iPrint Client, which can be exploited by malicious people to compromise a user's system. An unspecified error exists in nipplib.dll within the "GetDriverSettings(." function. An unspecified error exists within the "GetPrinterURLList2(." function...
Last Update Date: 10 Feb 2012 14:38 Release Date: 10 Feb 2012 4693 Views

RISK: Medium Risk

Medium Risk

Mulitple QQ products for Android Security Bypass Vulnerabilities

Multiple vulnerabilities have been identified in Mulitple QQ products for Android, which can be exploited by malicious people to bypass certain security restrictions.The vulnerabilities are caused due to an unspecified error and can be exploited to disclose and manipulate certain sensitive information like e.g. ...
Last Update Date: 10 Feb 2012 14:35 Release Date: 10 Feb 2012 5040 Views

RISK: Medium Risk

Medium Risk

ISC BIND Deleted Domain Name Resolving Vulnerability

A vulnerability has been identified in ISC BIND, which can be exploited by malicious people to bypass certain security restrictions.The vulnerability is caused due to an error within the cache update policy, which does not properly handle revoked domain names. This can be exploited to...
Last Update Date: 9 Feb 2012 10:01 Release Date: 9 Feb 2012 4808 Views

RISK: High Risk

High Risk

HP-UX Apache Tomcat Servlet Engine Multiple Denial of Service Vulnerabilities

Multiple vulnerabilities have been identified in HP-UX Apache running Tomcat Servlet Engine, which can be exploited by malicious people to cause a DoS (Denial of Service).
Last Update Date: 8 Feb 2012 11:09 Release Date: 8 Feb 2012 4894 Views