Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Apple Mac OS X Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple Mac OS X, which can be exploited by malicious people to execute arbitrary code, obtain sensitive information, operate with elevated privileges, cause a denial-of-service condition or compromise a user's system.
Last Update Date: 11 May 2012 11:25 Release Date: 11 May 2012 5319 Views

RISK: High Risk

High Risk

Apple Safari Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple Safari, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.
Last Update Date: 11 May 2012 11:22 Release Date: 11 May 2012 5318 Views

RISK: Medium Risk

Medium Risk

Adobe Shockwave Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Shockwave Player, which can be exploited by malicious people to compromise a user's system. Several unspecified error can be exploited to corrupt memory. Successful exploitation of the vulnerabilities may allow execution of arbitrary code.
Last Update Date: 10 May 2012 18:54 Release Date: 10 May 2012 5214 Views

RISK: High Risk

High Risk

Microsoft .NET Framework Two Serialization Vulnerabilities

.NET Framework Serialization Vulnerability A remote code execution vulnerability exists in the Microsoft .NET Framework due to the improper serialization of untrusted input. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; ...
Last Update Date: 9 May 2012 18:07 Release Date: 9 May 2012 5312 Views

RISK: High Risk

High Risk

Microsoft Office, Windows, .NET Framework, and Silverlight Multiple Vulnerabilities

TrueType Font Parsing Vulnerability A remote code execution vulnerability exists in the way that affected components handle a specially crafted TrueType font file. The vulnerability could allow remote code execution if a user opens a specially crafted TrueType font file. An attacker who successfully exploited this vulnerability...
Last Update Date: 9 May 2012 17:35 Release Date: 9 May 2012 5450 Views

RISK: High Risk

High Risk

Microsoft Windows Partition Manager Privilege Escalation Vulnerability

An elevation of privilege vulnerability exists in the way that Windows Partition Manager handles device relations requests. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create...
Last Update Date: 9 May 2012 17:32 Release Date: 9 May 2012 5208 Views

RISK: High Risk

High Risk

Microsoft Windows TCP/IP Stack Two Vulnerabilities

Windows Firewall Bypass Vulnerability A security feature bypass vulnerability exists in Windows due to the way that Windows Firewall handles outbound broadcast packets. An attacker who successfully exploited this vulnerability could bypass the Windows Firewall defense-in-depth mechanism to facilitate exploitation of other vulnerabilities.   ...
Last Update Date: 9 May 2012 16:12 Release Date: 9 May 2012 5122 Views

RISK: High Risk

High Risk

Microsoft Visio Viewer VSD File Format Memory Corruption Vulnerability

A remote code execution vulnerability exists in the way that Microsoft Visio validates attributes when handling specially crafted Visio files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete...
Last Update Date: 9 May 2012 16:06 Release Date: 9 May 2012 5229 Views

RISK: High Risk

High Risk

Microsoft Office Excel Multiple Vulnerabilities

Excel File Format Memory Corruption Vulnerability A remote code execution vulnerability exists in the way that Microsoft Excel handles specially crafted Excel files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, ...
Last Update Date: 9 May 2012 15:57 Release Date: 9 May 2012 5237 Views

RISK: High Risk

High Risk

Microsoft Word RTF Mismatch Vulnerability

A remote code execution vulnerability exists in the way that affected Microsoft Office software parses specially crafted Rich Text Format (RTF) data. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, ...
Last Update Date: 9 May 2012 15:55 Release Date: 9 May 2012 5198 Views