Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Microsoft Works Heap Vulnerability

A remote code execution vulnerability exists in the way that affected versions of Microsoft Works parse specially crafted Word files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete...
Last Update Date: 10 Oct 2012 15:38 Release Date: 10 Oct 2012 4734 Views

RISK: High Risk

High Risk

Microsoft Word Multiple Vulnerabilities

Word PAPX Section Corruption Vulnerability A remote code execution vulnerability exists in the way that Microsoft Word handles specially crafted Word files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, ...
Last Update Date: 10 Oct 2012 15:36 Release Date: 10 Oct 2012 4809 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the...
Last Update Date: 9 Oct 2012 14:38 Release Date: 9 Oct 2012 4723 Views

RISK: High Risk

High Risk

Adobe Flash Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Flash Player, which can be exploited by remote attackers to execute arbitray code.   The product contains buffer overflow and memory corruption vulnerabilites, which could lead to code execution.
Last Update Date: 9 Oct 2012 10:15 Release Date: 9 Oct 2012 4976 Views

RISK: Medium Risk

Medium Risk

McAfee Firewall Enterprise BIND Resource Record Denial of Service Vulnerability

A vulnerability has been identified in McAfee Firewall Enterprise, which can be exploited by malicious people to cause a DoS (Denial of Service).   Please refer to SA12091401 for details.
Last Update Date: 5 Oct 2012 09:41 Release Date: 5 Oct 2012 5246 Views

RISK: Medium Risk

Medium Risk

Apple OS X Server Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple OS X Server, which can be exploited to disclose sensitive information. Vulnerabilities in PostgreSQL may allow database users to read files from the file system with the privileges of the database server role account. An attacker may cause the Jabber...
Last Update Date: 4 Oct 2012 15:00 Release Date: 4 Oct 2012 5032 Views

RISK: Medium Risk

Medium Risk

Wireshark Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Wireshark. A remote user can cause denial of service conditions. A remote user can send specially crafted HSRP data to cause the target dissector to enter an infinite loop. A remote user can send specially crafted PPP data to cause the...
Last Update Date: 4 Oct 2012 15:00 Release Date: 4 Oct 2012 4970 Views

RISK: High Risk

High Risk

Google Android Dialer TEL URL Handling Vulnerability

A vulnerability has been identified in Google Android. A remote user can cause denial of service conditions.   A remote user can create a specially crafted 'TEL' protocol URL that, when loaded by the target user, will execute unstructured supplementary service data (USSD) ...
Last Update Date: 3 Oct 2012 10:29 Release Date: 3 Oct 2012 5162 Views

RISK: Medium Risk

Medium Risk

HP-UX OpenSSL Denial of Service Vulnerability

A vulnerability has been identified in HP-UX OpenSSL, which can be exploited by malicious people to cause a DoS (Denial of Service) of the application using the library.The vulnerability is reported in HP-UX versions B.11.11, B...
Last Update Date: 28 Sep 2012 16:10 Release Date: 28 Sep 2012 4529 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system. Certain unspecified input related to frame...
Last Update Date: 27 Sep 2012 16:28 Release Date: 27 Sep 2012 4483 Views