Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Microsoft Windows Kerberos NULL Dereference Vulnerability

A denial of service vulnerability exists when the Microsoft Kerberos implementation fails to properly handle a specially crafted session. An attacker who successfully exploited this vulnerability could cause the system to stop responding and restart.
Last Update Date: 10 Oct 2012 15:44 Release Date: 10 Oct 2012 4782 Views

RISK: High Risk

High Risk

Microsoft Windows Kernel Integer Overflow Vulnerability

An elevation of privilege vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts...
Last Update Date: 10 Oct 2012 15:42 Release Date: 10 Oct 2012 4745 Views

RISK: Medium Risk

Medium Risk

Microsoft FAST Search Server 2010 for SharePoint Multiple Vulnerabilities

Remote code execution vulnerabilities exist in FAST Search Server 2010 for SharePoint using the Advanced Filter Pack, an attacker could run arbitrary code in the context of a user account with a restricted token. By default, Advanced Filter Pack in FAST is disabled.
Last Update Date: 10 Oct 2012 15:40 Release Date: 10 Oct 2012 5521 Views

RISK: High Risk

High Risk

Microsoft Office and SharePoint Products HTML Sanitization Vulnerability

An elevation of privilege vulnerability exists in the way that HTML strings are sanitized. An attacker who successfully exploited this vulnerability could perform cross-site scripting attacks and run script in the security context of the logged-on user.
Last Update Date: 10 Oct 2012 15:39 Release Date: 10 Oct 2012 5569 Views

RISK: High Risk

High Risk

Microsoft Works Heap Vulnerability

A remote code execution vulnerability exists in the way that affected versions of Microsoft Works parse specially crafted Word files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete...
Last Update Date: 10 Oct 2012 15:38 Release Date: 10 Oct 2012 5497 Views

RISK: High Risk

High Risk

Microsoft Word Multiple Vulnerabilities

Word PAPX Section Corruption Vulnerability A remote code execution vulnerability exists in the way that Microsoft Word handles specially crafted Word files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, ...
Last Update Date: 10 Oct 2012 15:36 Release Date: 10 Oct 2012 5572 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the...
Last Update Date: 9 Oct 2012 14:38 Release Date: 9 Oct 2012 5457 Views

RISK: High Risk

High Risk

Adobe Flash Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Flash Player, which can be exploited by remote attackers to execute arbitray code.   The product contains buffer overflow and memory corruption vulnerabilites, which could lead to code execution.
Last Update Date: 9 Oct 2012 10:15 Release Date: 9 Oct 2012 5721 Views

RISK: Medium Risk

Medium Risk

McAfee Firewall Enterprise BIND Resource Record Denial of Service Vulnerability

A vulnerability has been identified in McAfee Firewall Enterprise, which can be exploited by malicious people to cause a DoS (Denial of Service).   Please refer to SA12091401 for details.
Last Update Date: 5 Oct 2012 09:41 Release Date: 5 Oct 2012 6116 Views

RISK: Medium Risk

Medium Risk

Apple OS X Server Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple OS X Server, which can be exploited to disclose sensitive information. Vulnerabilities in PostgreSQL may allow database users to read files from the file system with the privileges of the database server role account. An attacker may cause the Jabber...
Last Update Date: 4 Oct 2012 15:00 Release Date: 4 Oct 2012 5797 Views