Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Google Picasa JPEG Image Processing Code Execution Vulnerability

A vulnerability has been identified in Google Picasa, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an unspecified error when handling certain properties of an image file and can be exploited to execute arbitrary...
Last Update Date: 21 Jul 2011 10:13 Release Date: 21 Jul 2011 5524 Views

RISK: High Risk

High Risk

Citrix Access Gateway Plug-in ActiveX Control Code Execution Vulnerabilities

Some vulnerabilities have identified in Citrix Access Gateway Plug-in for Windows, which can be exploited by malicious people to compromise a user's system. The vulnerabilities are caused due to unspecified errors in the ActiveX control.
Last Update Date: 15 Jul 2011 11:12 Release Date: 15 Jul 2011 5606 Views

RISK: High Risk

High Risk

Apple iOS FreeType PostScript Type1 Font Parsing Vulnerability

A vulnerability has identified in Apple iOS, which can be exploited by malicious people to compromise a vulnerable system.  The vulnerability is caused due to the use of the vulnerable FreeType code.
Last Update Date: 15 Jul 2011 11:03 Release Date: 15 Jul 2011 5821 Views

RISK: High Risk

High Risk

VLC Media Player RealMedia and AVI File Parsing Vulnerabilities

Two vulnerabilities have identified  in VLC Media Player, which can be exploited by malicious people to compromise a user's system.An integer overflow error when parsing a RealAudio data block within RealMedia (RM) files can be exploited to cause a heap-based...
Last Update Date: 14 Jul 2011 15:53 Release Date: 14 Jul 2011 5414 Views

RISK: High Risk

High Risk

IBM Java Multiple Vulnerabilities

Multiple vulnerabilities have identified in IBM Java, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.
Last Update Date: 14 Jul 2011 15:51 Release Date: 14 Jul 2011 5371 Views

RISK: High Risk

High Risk

Microsoft Visio Insecure Library Loading Vulnerability

A remote code execution vulnerability exists in the way that Microsoft Visio handles the loading of DLL files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; ...
Last Update Date: 13 Jul 2011 11:25 Release Date: 13 Jul 2011 5175 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Multiple Vulnerabilities

CSRSS Local EOP AllocConsole Vulnerability An elevation of privilege vulnerability exists in Windows CSRSS due to the way that the CSRSS subsystem assigns memory for specific user transactions. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs...
Last Update Date: 13 Jul 2011 11:23 Release Date: 13 Jul 2011 5124 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Kernel-Mode Drivers Multiple Vulnerabilities

Win32k Use After Free Vulnerability An elevation of privilege vulnerability exists due to the way that Windows kernel-mode drivers manage kernel-mode driver objects. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs...
Last Update Date: 13 Jul 2011 11:22 Release Date: 13 Jul 2011 5017 Views

RISK: High Risk

High Risk

Microsoft Windows Bluetooth Stack Vulnerability

A remote code execution vulnerability exists in the Windows Bluetooth 2.1 Stack due to the way an object in memory is accessed when it has not been correctly initialized or has been deleted. An attacker could exploit the vulnerability by constructing a series of specially crafted Bluetooth...
Last Update Date: 13 Jul 2011 11:21 Release Date: 13 Jul 2011 5139 Views

RISK: High Risk

High Risk

Sun Java JRE Insecure Executable Loading Vulnerability

A vulnerability has identified in Sun Java, which can be exploited by malicious people to compromise a user's system.The vulnerability is caused due to the application loading an executable file in an insecure manner when an out of memory condition occurs. This can be...
Last Update Date: 12 Jul 2011 12:21 Release Date: 12 Jul 2011 5551 Views