Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Microsoft Forefront Unified Access Gateway (UAG) Unfiltered Access to UAG Default Website Vulnerability

A vulnerability exists in Microsoft Unified Access Gateway (UAG) that could allow an unauthenticated user to access the default website of the Microsoft UAG server from the external network.
Last Update Date: 11 Apr 2012 11:41 Release Date: 11 Apr 2012 5262 Views

RISK: High Risk

High Risk

Microsoft Windows Common Controls MSCOMCTL.OCX Remote Code Execution Vulnerability

A remote code execution vulnerability exists in the Windows common controls. An attacker could exploit the vulnerability by constructing a specially crafted webpage. When a user views the webpage, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the...
Last Update Date: 11 Apr 2012 11:39 Release Date: 11 Apr 2012 5529 Views

RISK: High Risk

High Risk

Microsoft .NET Framework Parameter Validation Vulnerability

A remote code execution vulnerability exists in the way that Microsoft .NET Framework validates parameters when passing data to a function. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, ...
Last Update Date: 11 Apr 2012 11:36 Release Date: 11 Apr 2012 5428 Views

RISK: High Risk

High Risk

Microsoft Windows WinVerifyTrust Signature Validation Vulnerability

A remote code execution vulnerability exists in the Windows Authenticode Signature Verification function used for portable executable (PE) files. An anonymous attacker could exploit the vulnerability by modifying an existing signed executable file to leverage unverified portions of the file in such a way as to add...
Last Update Date: 11 Apr 2012 11:34 Release Date: 11 Apr 2012 6196 Views

RISK: High Risk

High Risk

Microsoft Internet Explorer Multiple Vulnerabilities

Print Feature Remote Code Execution Vulnerability A remote code execution vulnerability exists when Internet Explorer attempts to print a specially crafted HTML page. The vulnerability could allow an attacker to execute arbitrary code in the context of the current user. JScript9 Remote Code Execution Vulnerability A remote code...
Last Update Date: 11 Apr 2012 11:31 Release Date: 11 Apr 2012 6057 Views

RISK: Medium Risk

Medium Risk

Adobe Acrobat/Reader Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Acrobat/Reader. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted file that, when loaded by the target user, will trigger a...
Last Update Date: 11 Apr 2012 09:13 Release Date: 11 Apr 2012 5509 Views

RISK: Medium Risk

Medium Risk

FFmpeg Multiple Vulnerabilities

Multiple vulnerabilities have been identified in FFmpeg, which can be exploited by malicious people to compromise an application using the library.A format string error exists within the "srt_to_ass()" function (libavcodec/srtdec.c) when parsing certain parameters.An integer overflow error...
Last Update Date: 10 Apr 2012 14:15 Release Date: 10 Apr 2012 6269 Views

RISK: Medium Risk

Medium Risk

Oracle MySQL Server Two Unspecified Vulnerabilities

Two vulnerabilities with unknown impacts have been identified in Oracle MySQL Server.   The vulnerabilities are caused due to unspecified errors. No further information is currently available.
Last Update Date: 10 Apr 2012 14:14 Release Date: 10 Apr 2012 5358 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome where some have unknown impacts while others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. Two unspecified errors in Flash Player can be exploited to corrupt memory in the Chrome interface...
Last Update Date: 10 Apr 2012 14:13 Release Date: 10 Apr 2012 5406 Views

RISK: High Risk

High Risk

VMware ESX Server Multiple Vulnerabilities

Multiple vulnerabilities have been identified in VMware ESX Server, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.
Last Update Date: 2 Apr 2012 11:29 Release Date: 2 Apr 2012 5384 Views