Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Wireshark Libpcap CAP Files Parsing Memory Corruption Vulnerability

A vulnerability has been identified in Wireshark, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an unspecified error when parsing CAP files and can be exploited to cause memory corruption via a specially crafted CAP file...
Last Update Date: 11 Apr 2014 10:10 Release Date: 11 Apr 2014 4347 Views

RISK: Medium Risk

Medium Risk

WordPress Multiple Vulnerabilities

Multiple vulnerabilities have been identified in WordPress, which can be exploited by malicious people to conduct cross-site scripting and bypass certain security restrictions. An error in the cookie keyed hash value verification can be exploited to gain unauthorized access.An error when verifying the "...
Last Update Date: 11 Apr 2014 10:05 Release Date: 11 Apr 2014 4094 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been reported in Google Chrome, which can be exploited by attacker to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.An unspecified error within V8 can be exploited to conduct cross-site scripting...
Last Update Date: 9 Apr 2014 16:27 Release Date: 9 Apr 2014 4291 Views

RISK: High Risk

High Risk

Adobe Flash Player / AIR Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Flash Player and Adobe AIR, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.
Last Update Date: 9 Apr 2014 16:26 Release Date: 9 Apr 2014 3954 Views

RISK: High Risk

High Risk

Microsoft Publisher Remote Code Execution Vulnerability

A remote code execution vulnerability exists in the way that affected versions of Microsoft Publisher parses specially crafted files. An attacker who successfully exploited this vulnerability could run arbitrary code as the current user. If the current user is logged on with administrative user rights, an attacker...
Last Update Date: 9 Apr 2014 16:25 Release Date: 9 Apr 2014 3934 Views

RISK: High Risk

High Risk

Microsoft Windows File Handling Component Remote Code Execution Vulnerability

A remote code execution vulnerability exists in Microsoft Windows when processing .bat and .cmd files that are run from an external network. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, ...
Last Update Date: 9 Apr 2014 16:25 Release Date: 9 Apr 2014 4140 Views

RISK: High Risk

High Risk

Microsoft Internet Explorer Multiple Memory Corruption Vulnerabilities

Remote code execution vulnerabilities exist when Internet Explorer improperly accesses objects in memory. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
Last Update Date: 9 Apr 2014 16:24 Release Date: 9 Apr 2014 4105 Views

RISK: High Risk

High Risk

Microsoft Word & Office Web Apps Multiple Vulnerabilities

A remote code execution vulnerability exists in the way that affected Microsoft Word and Office software converts/ parses specially crafted files. An attacker who successfully exploited this vulnerability could run arbitrary code as the current user. If the current user is logged on with administrative user rights...
Last Update Date: 9 Apr 2014 16:24 Release Date: 9 Apr 2014 4057 Views

RISK: High Risk

High Risk

Microsoft Office Denial of Service Vulnerability

A vulnerability was identified in Microsoft Office. A remote user can cause denial of service conditions.   A remote user can send a specially crafted XML document that, when processed by the target application, will trigger an entity expansion flaw to consume excessive memory resources and cause...
Last Update Date: 8 Apr 2014 12:34 Release Date: 8 Apr 2014 4192 Views

RISK: Medium Risk

Medium Risk

Cisco IOS Multiple Vulnerabilities

Multiple vulnerabilities were identified in Cisco IOS, IOS XE and IOS XR. A remote user can cause denial of service conditions.
Last Update Date: 7 Apr 2014 11:36 Release Date: 7 Apr 2014 4031 Views