Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Microsoft Windows Active Directory LDAPS Authentication Bypass Vulnerability

An elevation of privilege vulnerability exists in Active Directory when configured to use LDAP over SSL (LDAPS). An attacker could exploit this vulnerability by using a previously revoked certificate to authenticate to the Active Directory domain and gain access to network resources or run code under the privileges...
Last Update Date: 9 Nov 2011 12:29 Release Date: 9 Nov 2011 5132 Views

RISK: High Risk

High Risk

Microsoft Windows Mail / Windows Meeting Space Insecure Library Loading Vulnerability

A remote code execution vulnerability exists in the way that Windows Mail and Windows Meeting Space handle the loading of DLL files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, ...
Last Update Date: 9 Nov 2011 12:26 Release Date: 9 Nov 2011 5071 Views

RISK: High Risk

High Risk

Microsoft Windows TCP/IP Reference Counter Overflow Vulnerability

A remote code execution vulnerability exists in the Windows TCP/IP stack due to the processing of a continuous flow of specially crafted UDP packets. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view...
Last Update Date: 9 Nov 2011 12:22 Release Date: 9 Nov 2011 5032 Views

RISK: High Risk

High Risk

Microsoft Windows TrueType Font Parsing Code Execution Vulnerability

A vulnerability has been identified in Microsoft Windows, which can be exploited by malicious people to  compromise a vulnerable system. The vulnerability is caused due to an error within the Win32k kernel-mode driver (win32k.sys) when parsing TrueType fonts.
Last Update Date: 7 Nov 2011 10:48 Release Date: 7 Nov 2011 5032 Views

RISK: High Risk

High Risk

phpMyadmin XML Entity References Information Disclosure Vulnerability

A vulnerability has been identified in phpMyAdmin, which can be exploited by malicious users to disclose potentially sensitive information.The vulnerability is caused due to an error within libraries/import/xml.php when processing XML data, which can be exploited to e.g...
Last Update Date: 4 Nov 2011 10:22 Release Date: 4 Nov 2011 5114 Views

RISK: High Risk

High Risk

Wireshark Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. An error related to an uninitialised variable within the CSN.1 dissector can be exploited to cause a crash...
Last Update Date: 3 Nov 2011 11:18 Release Date: 3 Nov 2011 5005 Views

RISK: Medium Risk

Medium Risk

D-Link Products SSH Server Buffer Overflow Vulnerability

A vulnerability has been identified in multiple D-Link products, which can be exploited by malicious people to cause a DoS (Denial of Service) a vulnerable device. The vulnerability is caused due to an unspecified error within the Secure Shell (SSH) server and...
Last Update Date: 31 Oct 2011 12:47 Release Date: 31 Oct 2011 5272 Views

RISK: High Risk

High Risk

VMware Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in multiple products, which can be exploited by malicious, local users to disclose potentially sensitive information, manipulate certain data, bypass certain security restrictions, conduct spoofing attacks, conduct DNS cache poisoning attacks, cause a DoS (Denial of Service...
Last Update Date: 31 Oct 2011 12:47 Release Date: 31 Oct 2011 5126 Views

RISK: Medium Risk

Medium Risk

Cisco Security Agent Outside In Technology File Processing Vulnerabilities

Two vulnerabilities identified in Cisco Security Agent, which can be exploited by malicious people to compromise a vulnerable system.An unspecified error exists in the vswk6.dll and sccut.dll modules when handling Lotus 123 files.A second unspecified error exists in the vswk6....
Last Update Date: 28 Oct 2011 15:00 Release Date: 28 Oct 2011 5140 Views

RISK: High Risk

High Risk

Apple QuickTime Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple Quicktime, which can be exploited by malicious people to compromise a user's system.An integer overflow error when handling PICT files can be exploited via a specially crafted .pict file.A signedness error when handling font tables...
Last Update Date: 28 Oct 2011 15:00 Release Date: 28 Oct 2011 5201 Views