Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Cisco Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in various Cisco products. which can be exploited by remote user to conduct cross-site scripting attacks or login to the target system.
Last Update Date: 12 Jul 2013 11:51 Release Date: 12 Jul 2013 3264 Views

RISK: Medium Risk

Medium Risk

HP Network Node Manager I (NNMi) Unspecified Vulnerability

A vulnerability has been identified in HP Network Node Manager I (NNMi), which can be exploited by remote user to partially access and modify data and cause partial denial of service conditions on the target system.
Last Update Date: 12 Jul 2013 11:51 Release Date: 12 Jul 2013 3495 Views

RISK: High Risk

High Risk

Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerabilities

TrueType Font Parsing VulnerabilityA remote code execution vulnerability exists in the way that affected components handle specially crafted TrueType font files. The vulnerability could allow remote code execution if a user opens a specially crafted TrueType font file. An attacker who successfully exploited this vulnerability could take complete...
Last Update Date: 10 Jul 2013 15:14 Release Date: 10 Jul 2013 3368 Views

RISK: High Risk

High Risk

Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities

Win32k Memory Allocation VulnerabilityAn elevation of privilege vulnerability exists when the Windows kernel-mode driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated privileges. Win32k Dereference VulnerabilityAn elevation of privilege vulnerability exists in the way that the...
Last Update Date: 10 Jul 2013 15:14 Release Date: 10 Jul 2013 3382 Views

RISK: Medium Risk

Medium Risk

Microsoft GDI+ Remote Code Execution Vulnerability

A remote code execution vulnerability exists in the way that affected Windows components and other affected software handle specially crafted TrueType font files. The vulnerability could allow remote code execution if a user views shared content that embeds TrueType font files. An attacker who successfully exploited this vulnerability...
Last Update Date: 10 Jul 2013 15:14 Release Date: 10 Jul 2013 3305 Views

RISK: High Risk

High Risk

Microsoft Internet Explorer Cumulative Security Vulnerabilities

Shift JIS Character Encoding VulnerabilityA cross-site-scripting (XSS) vulnerability exists in Internet Explorer that could allow information disclosure. An attacker could exploit the vulnerability by constructing a specially crafted webpage that could allow information disclosure if a user viewed the webpage. An attacker...
Last Update Date: 10 Jul 2013 15:14 Release Date: 10 Jul 2013 3319 Views

RISK: Medium Risk

Medium Risk

Microsoft DirectShow Remote Code Execution Vulnerability

A remote code execution vulnerability exists in the way that Microsoft DirectShow parses GIF image files. This vulnerability could allow remote code execution if a user opened a specially crafted GIF file. If a user is logged on with administrative user rights, an attacker who successfully exploited...
Last Update Date: 10 Jul 2013 15:13 Release Date: 10 Jul 2013 3329 Views

RISK: High Risk

High Risk

Microsoft Windows Media Format Runtime Remote Code Execution Vulnerability

A remote code execution vulnerability exists in the way Windows Media Format Runtime handles certain media files. This vulnerability could allow an attacker to execute arbitrary code if the attacker convinces a user to open a specially crafted media file. An attacker could then install programs; view...
Last Update Date: 10 Jul 2013 15:13 Release Date: 10 Jul 2013 3456 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows 7 Defender Improper Pathname Vulnerability

This is an elevation of privilege vulnerability. An attacker who successfully exploited this vulnerability could execute arbitrary code in the security context of the LocalSystem account and take complete control of the system. An attacker could then install programs; view, change, or delete data; ...
Last Update Date: 10 Jul 2013 15:13 Release Date: 10 Jul 2013 3270 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multipule vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious, local users to disclose potentially sensitive data and by malicious people to bypass certain security restrictions, conduct spoofing attacks, disclose certain sensitive data, and...
Last Update Date: 10 Jul 2013 14:26 Release Date: 10 Jul 2013 3481 Views