You are here

JC3 High Impact Assessment Bulletins

RSS
March 19, 2013
V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability

A vulnerability has been reported in RealPlayer

March 15, 2013
V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks

This security update resolves four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation.

March 14, 2013
V-111: Multiple vulnerabilities have been reported in Puppet

Puppet Multiple Vulnerabilities

March 13, 2013
V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code

Several vulnerabilities were reported in Adobe Flash Player.

March 11, 2013
V-108: Microsoft Security Bulletin Advance Notification for March 2013

Microsoft Security Bulletin Advance Notification for March 2013. Microsoft has posted 4 Critical Bulletins and 3 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft will host a webcast to address customer questions on the security bulletins on March 13, 2013, at 11:00 AM Pacific Time (US & Canada).

March 7, 2013
V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

March 5, 2013
V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code

A vulnerability was reported in Oracle Java

March 1, 2013
V-102: SUSE update for flash-player

This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

February 27, 2013
V-100: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code

Several vulnerabilities were reported in Adobe Flash Player.

February 22, 2013
V-097: Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.