Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Microsoft Windows WinVerifyTrust Signature Validation Vulnerability

A remote code execution vulnerability exists in the Windows Authenticode Signature Verification function used for portable executable (PE) files. An anonymous attacker could exploit the vulnerability by modifying an existing signed executable file to leverage unverified portions of the file in such a way as to add...
Last Update Date: 11 Apr 2012 11:34 Release Date: 11 Apr 2012 5308 Views

RISK: High Risk

High Risk

Microsoft Internet Explorer Multiple Vulnerabilities

Print Feature Remote Code Execution Vulnerability A remote code execution vulnerability exists when Internet Explorer attempts to print a specially crafted HTML page. The vulnerability could allow an attacker to execute arbitrary code in the context of the current user. JScript9 Remote Code Execution Vulnerability A remote code...
Last Update Date: 11 Apr 2012 11:31 Release Date: 11 Apr 2012 5298 Views

RISK: Medium Risk

Medium Risk

Adobe Acrobat/Reader Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Acrobat/Reader. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted file that, when loaded by the target user, will trigger a...
Last Update Date: 11 Apr 2012 09:13 Release Date: 11 Apr 2012 4729 Views

RISK: Medium Risk

Medium Risk

FFmpeg Multiple Vulnerabilities

Multiple vulnerabilities have been identified in FFmpeg, which can be exploited by malicious people to compromise an application using the library.A format string error exists within the "srt_to_ass()" function (libavcodec/srtdec.c) when parsing certain parameters.An integer overflow error...
Last Update Date: 10 Apr 2012 14:15 Release Date: 10 Apr 2012 5481 Views

RISK: Medium Risk

Medium Risk

Oracle MySQL Server Two Unspecified Vulnerabilities

Two vulnerabilities with unknown impacts have been identified in Oracle MySQL Server.   The vulnerabilities are caused due to unspecified errors. No further information is currently available.
Last Update Date: 10 Apr 2012 14:14 Release Date: 10 Apr 2012 4606 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome where some have unknown impacts while others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. Two unspecified errors in Flash Player can be exploited to corrupt memory in the Chrome interface...
Last Update Date: 10 Apr 2012 14:13 Release Date: 10 Apr 2012 4659 Views

RISK: High Risk

High Risk

VMware ESX Server Multiple Vulnerabilities

Multiple vulnerabilities have been identified in VMware ESX Server, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.
Last Update Date: 2 Apr 2012 11:29 Release Date: 2 Apr 2012 4629 Views

RISK: Medium Risk

Medium Risk

IrfanView Multiple Buffer Overflow Vulnerabilities

Multiple vulnerabilities have been identified in IrfanView, which can be exploited by malicious people to compromise a user's system.A boundary error when processing RLE compressed bitmap files can be exploited to cause a heap-based buffer overflow by e.g. tricking a...
Last Update Date: 2 Apr 2012 11:28 Release Date: 2 Apr 2012 4928 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to conduct cross-site scripting and spoofing attacks and compromise a user's system.Some errors exist in the bundled version of Adobe Flash...
Last Update Date: 2 Apr 2012 Release Date: 30 Mar 2012 5373 Views

RISK: Medium Risk

Medium Risk

Cisco IOS Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Cisco IOS, which can be exploited by attackers to cause remote code execution and denial of service. A vulnerability lets remote authenticated users bypass command authorization level controls. Zone-based firewall IP/HTTP/H.323/SIP...
Last Update Date: 30 Mar 2012 Release Date: 29 Mar 2012 4804 Views