Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Microsoft Internet Information Services (IIS) Two Information Disclosure Vulnerabilities

Password Disclosure Vulnerability An information disclosure vulnerability exists when Microsoft Internet Information Services (IIS) fails to properly protect log files. FTP Command Injection VulnerabiliyAn information disclosure vulnerability exists in the way that Microsoft Internet Information Services (IIS) FTP Service negotiates encrypted ...
Last Update Date: 14 Nov 2012 17:21 Release Date: 14 Nov 2012 4823 Views

RISK: High Risk

High Risk

Microsoft .NET Framework Multiple Vulnerabilities

Reflection Bypass Vulnerability An elevation of privilege vulnerability exists in the way that .NET Framework validates the permissions of certain objects performing reflection. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view...
Last Update Date: 14 Nov 2012 17:20 Release Date: 14 Nov 2012 4760 Views

RISK: High Risk

High Risk

Microsoft Windows Kernel-Mode Drivers Three Vulnerabilities

Win32k Use After Free Vulnerability An elevation of privilege vulnerability exists when the Windows kernel-mode driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change...
Last Update Date: 14 Nov 2012 17:20 Release Date: 14 Nov 2012 4791 Views

RISK: High Risk

High Risk

Microsoft Office Excel Multiple Vulnerabilities

Excel SerAuxErrBar Heap Overflow Vulnerability A remote code execution vulnerability exists in the way that Microsoft Excel handles specially crafted Excel files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change...
Last Update Date: 14 Nov 2012 17:18 Release Date: 14 Nov 2012 4664 Views

RISK: Medium Risk

Medium Risk

VMware Workstation / Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in VMware Workstation and VMware Player, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to compromise a user's system. An error due to insecure permissions being assigned to process threads when creating...
Last Update Date: 14 Nov 2012 Release Date: 12 Nov 2012 5059 Views

RISK: High Risk

High Risk

IrfanView TIFF Image Decompression Buffer Overflow Vulnerability

A vulnerability has been identified in IrfanView, which can be exploited by malicious people to compromise a user's system.   The vulnerability is caused due to an error when processing JPEG compressed TIFF images and can be exploited to cause a heap-based buffer overflow via...
Last Update Date: 14 Nov 2012 Release Date: 12 Nov 2012 5018 Views

RISK: High Risk

High Risk

Cisco IronPort Appliance Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Cisco IronPort Web Security Appliance and Cisco IronPort Email Security Appliance, which can be exploited by malicious people to compromise a vulnerable device.   The vulnerabilities are caused due to a bundled vulnerable version of Sophos Engine.
Last Update Date: 14 Nov 2012 Release Date: 12 Nov 2012 5236 Views

RISK: High Risk

High Risk

Sophos Anti-Virus Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Sophos Anti-Virus, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct cross-site scripting attacks and compromise a user's system. An integer overflow error when scanning a...
Last Update Date: 9 Nov 2012 Release Date: 6 Nov 2012 4954 Views

RISK: High Risk

High Risk

Apple QuickTime Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple QuickTime, which can be exploited by malicious people to compromise a user's system. A boundary error when processing a PICT file can be exploited to cause a buffer overflow. An error when processing a PICT file can be...
Last Update Date: 9 Nov 2012 11:26 Release Date: 9 Nov 2012 4938 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. The application bundles a vulnerable version of Adobe Flash Player. For more information, please refer to SA12110801.An...
Last Update Date: 8 Nov 2012 11:56 Release Date: 8 Nov 2012 5781 Views