Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Microsoft Visual Studio Linker Integer Overflow Vulnerability

A vulnerability has been identified in Microsoft Visual Studio 2008, which can be exploited by malicious people to compromise a user's system.The vulnerability is caused due to an integer overflow error in the linker utility (link.exe) when allocating memory based on...
Last Update Date: 27 Apr 2012 11:57 Release Date: 27 Apr 2012 5400 Views

RISK: Medium Risk

Medium Risk

Comodo Internet Security PE File Processing Vulnerability

A vulnerability has been identified in Comodo Internet Security. A remote or local user can cause denial of service conditions.A remote or local user can create a specially crafted PE file that, when loaded into memory on the target system, will cause the target system...
Last Update Date: 27 Apr 2012 11:56 Release Date: 27 Apr 2012 5334 Views

RISK: High Risk

High Risk

Mozilla Firefox / Thunderbird / SeaMonkey Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox, Thunderbird, and SeaMonkey, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, disclose certain sensitive information, compromise a user's system or spoof certain web sites...
Last Update Date: 25 Apr 2012 10:54 Release Date: 25 Apr 2012 5297 Views

RISK: Medium Risk

Medium Risk

Asterisk Multiple Vulnerabilities

Multiple vulnerabilities identified in Asterisk, which a remote authenticated user can execute arbitrary code on the target system, cause denial of service conditions, and execute arbitrary shell commands on Asterisk Manager interface. A remote user can send specially crafted SIP UPDATE request to cause Asterisk to...
Last Update Date: 24 Apr 2012 11:20 Release Date: 24 Apr 2012 5320 Views

RISK: Medium Risk

Medium Risk

WordPress external libraries Multiple Vulnerabilities

Multiple vulnerabilities have been identified in WordPress external libraries (Plupload, SWFUpload, SWFObject),  which could be exploited by malicious people to elevation of privilege, and cause a cross-site scripting attack.
Last Update Date: 23 Apr 2012 12:13 Release Date: 23 Apr 2012 5254 Views

RISK: Medium Risk

Medium Risk

IBM Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in IBM Java, which could be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.
Last Update Date: 23 Apr 2012 12:10 Release Date: 23 Apr 2012 5464 Views

RISK: High Risk

High Risk

Oracle Products Multiple Vulnerabilies

Multiple vulnerabilities have been identified in various Oracle products and components, which could be exploited by attackers to denial of service, data manipulation, disclose sensitive information or compromise a vulnerable system.
Last Update Date: 18 Apr 2012 12:01 Release Date: 18 Apr 2012 5725 Views

RISK: Extremely High Risk

Extremely High Risk

Apple Java for Mac OS X Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Java for Mac OS X, which can be exploited by malicious people to compromise a vulnerable system.   Note: Exploit code is publicly available. [13/4/2012 Update]Apple published a new Java security update (Java for...
Last Update Date: 13 Apr 2012 Release Date: 5 Apr 2012 5977 Views

RISK: Medium Risk

Medium Risk

Samba Remote Procedure Call Remote Memory Corruption Vulnerability

A vulnerability has been identified in Samba. A remote user can execute arbitrary code on the target system.   A remote user can send a specially crafted RPC call to trigger a buffer overflow in the Network Data Representation (NDR) marshalling code and execute arbitrary code on...
Last Update Date: 12 Apr 2012 10:37 Release Date: 12 Apr 2012 5709 Views

RISK: Medium Risk

Medium Risk

Microsoft Office Works File Converter Heap Overflow Vulnerability

A remote code execution vulnerability exists in Microsoft Office Works File Converter. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts.
Last Update Date: 11 Apr 2012 11:42 Release Date: 11 Apr 2012 5475 Views