Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Oracle Solaris Adobe Flash Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Flash Player included in Solaris, which can be exploited by malicious people to disclose potentially sensitive information and compromise a user's system.   For more information, please refer to SA11051601
Last Update Date: 26 Jul 2011 12:16 Release Date: 26 Jul 2011 6252 Views

RISK: High Risk

High Risk

Apple Safari Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple Safari, which can be exploited by malicious people to disclose sensitive information, manipulate certain data, conduct cross-site scripting and spoofing attacks, bypass certain security restrictions, and compromise a user's system. An error within...
Last Update Date: 22 Jul 2011 12:12 Release Date: 22 Jul 2011 5829 Views

RISK: High Risk

High Risk

Foxit Reader ActiveX Control "OpenFile()" Buffer Overflow Vulnerability

A vulnerability has been identified in Foxit Reader, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in the FoxitReaderOCX ActiveX control when processing the "OpenFile()" method. This can be exploited...
Last Update Date: 22 Jul 2011 11:45 Release Date: 22 Jul 2011 6043 Views

RISK: High Risk

High Risk

Oracle Solaris Multiple Vulnerabilities

Multiple vulnerabilities have been reported in Oracle Solaris, which can be exploited by malicious and local users to cause a DoS (Denial of Service), gain escalated privileges or potentially compromise a vulnerable system. An unspecified error in fingerd can be exploited to cause the system to...
Last Update Date: 21 Jul 2011 10:21 Release Date: 21 Jul 2011 5982 Views

RISK: High Risk

High Risk

Google Picasa JPEG Image Processing Code Execution Vulnerability

A vulnerability has been identified in Google Picasa, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an unspecified error when handling certain properties of an image file and can be exploited to execute arbitrary...
Last Update Date: 21 Jul 2011 10:13 Release Date: 21 Jul 2011 5848 Views

RISK: High Risk

High Risk

Citrix Access Gateway Plug-in ActiveX Control Code Execution Vulnerabilities

Some vulnerabilities have identified in Citrix Access Gateway Plug-in for Windows, which can be exploited by malicious people to compromise a user's system. The vulnerabilities are caused due to unspecified errors in the ActiveX control.
Last Update Date: 15 Jul 2011 11:12 Release Date: 15 Jul 2011 5937 Views

RISK: High Risk

High Risk

Apple iOS FreeType PostScript Type1 Font Parsing Vulnerability

A vulnerability has identified in Apple iOS, which can be exploited by malicious people to compromise a vulnerable system.  The vulnerability is caused due to the use of the vulnerable FreeType code.
Last Update Date: 15 Jul 2011 11:03 Release Date: 15 Jul 2011 6141 Views

RISK: High Risk

High Risk

VLC Media Player RealMedia and AVI File Parsing Vulnerabilities

Two vulnerabilities have identified  in VLC Media Player, which can be exploited by malicious people to compromise a user's system.An integer overflow error when parsing a RealAudio data block within RealMedia (RM) files can be exploited to cause a heap-based...
Last Update Date: 14 Jul 2011 15:53 Release Date: 14 Jul 2011 5743 Views

RISK: High Risk

High Risk

IBM Java Multiple Vulnerabilities

Multiple vulnerabilities have identified in IBM Java, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.
Last Update Date: 14 Jul 2011 15:51 Release Date: 14 Jul 2011 5696 Views

RISK: High Risk

High Risk

Microsoft Visio Insecure Library Loading Vulnerability

A remote code execution vulnerability exists in the way that Microsoft Visio handles the loading of DLL files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; ...
Last Update Date: 13 Jul 2011 11:25 Release Date: 13 Jul 2011 5511 Views