Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been reported in Google Chrome, which can be exploited by attacker to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.An unspecified error within V8 can be exploited to conduct cross-site scripting...
Last Update Date: 9 Apr 2014 16:27 Release Date: 9 Apr 2014 3505 Views

RISK: High Risk

High Risk

Adobe Flash Player / AIR Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Flash Player and Adobe AIR, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.
Last Update Date: 9 Apr 2014 16:26 Release Date: 9 Apr 2014 3178 Views

RISK: High Risk

High Risk

Microsoft Publisher Remote Code Execution Vulnerability

A remote code execution vulnerability exists in the way that affected versions of Microsoft Publisher parses specially crafted files. An attacker who successfully exploited this vulnerability could run arbitrary code as the current user. If the current user is logged on with administrative user rights, an attacker...
Last Update Date: 9 Apr 2014 16:25 Release Date: 9 Apr 2014 3156 Views

RISK: High Risk

High Risk

Microsoft Windows File Handling Component Remote Code Execution Vulnerability

A remote code execution vulnerability exists in Microsoft Windows when processing .bat and .cmd files that are run from an external network. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, ...
Last Update Date: 9 Apr 2014 16:25 Release Date: 9 Apr 2014 3262 Views

RISK: High Risk

High Risk

Microsoft Internet Explorer Multiple Memory Corruption Vulnerabilities

Remote code execution vulnerabilities exist when Internet Explorer improperly accesses objects in memory. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
Last Update Date: 9 Apr 2014 16:24 Release Date: 9 Apr 2014 3301 Views

RISK: High Risk

High Risk

Microsoft Word & Office Web Apps Multiple Vulnerabilities

A remote code execution vulnerability exists in the way that affected Microsoft Word and Office software converts/ parses specially crafted files. An attacker who successfully exploited this vulnerability could run arbitrary code as the current user. If the current user is logged on with administrative user rights...
Last Update Date: 9 Apr 2014 16:24 Release Date: 9 Apr 2014 3292 Views

RISK: High Risk

High Risk

Microsoft Office Denial of Service Vulnerability

A vulnerability was identified in Microsoft Office. A remote user can cause denial of service conditions.   A remote user can send a specially crafted XML document that, when processed by the target application, will trigger an entity expansion flaw to consume excessive memory resources and cause...
Last Update Date: 8 Apr 2014 12:34 Release Date: 8 Apr 2014 3426 Views

RISK: Medium Risk

Medium Risk

Cisco IOS Multiple Vulnerabilities

Multiple vulnerabilities were identified in Cisco IOS, IOS XE and IOS XR. A remote user can cause denial of service conditions.
Last Update Date: 7 Apr 2014 11:36 Release Date: 7 Apr 2014 3254 Views

RISK: High Risk

High Risk

NTP Abused to Launch Distributed Reflection Denial of Service Attack (DRDoS)

Network Time Protocol (NTP) and other UDP-based protocols can be used to amplify denial-of-service attacks. Servers running the NTP based on implementations of ntpd prior to version 4.2.7p26 that use the default unrestricted query configuration...
Last Update Date: 3 Apr 2014 Release Date: 7 Feb 2014 5591 Views

RISK: High Risk

High Risk

Apple Safari Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple Safari. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass sandbox controls. A remote user can create specially crafted content that, when loaded by the target...
Last Update Date: 3 Apr 2014 09:11 Release Date: 3 Apr 2014 3375 Views