Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Microsoft Windows Shell Command Injection Vulnerability

A remote code execution vulnerability exists in the way Windows handles file and directory names. This vulnerability could allow remote code execution if a user opens a file or directory with a specially crafted name. If a user is logged on with administrative user rights...
Last Update Date: 11 Jul 2012 17:13 Release Date: 11 Jul 2012 5159 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Kernel-Mode Drivers Multiple Vulnerability

An elevation of privilege vulnerability exists when the Windows kernel-mode driver improperly validates parameters when creating a hook procedure. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete...
Last Update Date: 11 Jul 2012 17:11 Release Date: 11 Jul 2012 5004 Views

RISK: High Risk

High Risk

Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability

A remote code execution vulnerability exists in the way that Microsoft Visual Basic for Applications handles the loading of DLL files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or...
Last Update Date: 11 Jul 2012 17:10 Release Date: 11 Jul 2012 5155 Views

RISK: High Risk

High Risk

Microsoft Windows Data Access Components Vulnerability

A remote code execution vulnerability exists in the way that Microsoft Data Access Components accesses an object in memory that has been improperly initialized. An attacker who successfully exploited this vulnerability could run arbitrary code on the target system. An attacker could then install programs; view, ...
Last Update Date: 11 Jul 2012 17:08 Release Date: 11 Jul 2012 4960 Views

RISK: High Risk

High Risk

Microsoft Internet Explorer Multiple Vulnerabilities

Cached Object Remote Code Execution Vulnerability A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has been deleted. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user...
Last Update Date: 11 Jul 2012 17:07 Release Date: 11 Jul 2012 5056 Views

RISK: High Risk

High Risk

VLC Player Buffer Overflow Vulnerability

A vulnerability has been identified in VLC Player. which can be exploited by remote user to compromise a vulnerable system. A remote user can create a specially crafted file that, when loaded by the target user, will trigger a heap overflow and execute arbitrary code on...
Last Update Date: 10 Jul 2012 Release Date: 9 Jul 2012 5321 Views

RISK: High Risk

High Risk

Microsoft IIS Web Server Discloses Sensitive Information Vulnerability

A vulnerability has been identified in Microsoft IIS Web Server. which can be exploited by remote user to potentially sensitive information. A remote user can supply a specially crafted request containing the tilde ('~') character to determine whether a matching file exists within the web directory on the...
Last Update Date: 10 Jul 2012 Release Date: 9 Jul 2012 5652 Views

RISK: Medium Risk

Medium Risk

Asterisk Product Denial of Service Vulnerabilities

Multiple vulnerabilities has been identified in Asterisk, which can be exploited by remote authenticated user to denial of service attack.A remote authenticated user can respond to a re-invite with a provisional response and not send a final response to cause the remote system to fail...
Last Update Date: 10 Jul 2012 Release Date: 9 Jul 2012 5203 Views

RISK: Medium Risk

Medium Risk

Pidgin MXit Message Parsing Buffer Overflow Vulnerability

A vulnerability has been identified in Pidgin, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error within the "mxit_show_message()" function (libpurple/protocols/mxit/markup.c) when...
Last Update Date: 10 Jul 2012 Release Date: 9 Jul 2012 5077 Views

RISK: Medium Risk

Medium Risk

IBM WebSphere Application Server Feature Pack Security Bypass Vulnerability

A vulnerability has been identified in IBM WebSphere Application Server Feature Pack for Web Services, which can be exploited by malicious users to bypass certain security restrictions. An error related to LPTA tokens in a WS-Security policy enabled Java API for XML Web Services (JAX...
Last Update Date: 6 Jul 2012 10:34 Release Date: 6 Jul 2012 5464 Views