Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Microsoft Internet Explorer Multiple Vulnerabilities

Scroll Event Remote Code Execution Vulnerability A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has been deleted. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the logged-...
Last Update Date: 12 Oct 2011 11:51 Release Date: 12 Oct 2011 4830 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Ancillary Function Driver Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists where the Ancillary Function Driver (afd.sys) improperly validates input passed from user mode to the Windows kernel. The vulnerability could allow an attacker to run code with elevated privileges. A local attacker who successfully exploited this vulnerability could...
Last Update Date: 12 Oct 2011 11:51 Release Date: 12 Oct 2011 5073 Views

RISK: Medium Risk

Medium Risk

Microsoft Host Integration Server Denial of Service Vulnerabilities

Endless Loop DoS in snabase.exe Vulnerability An unauthenticated denial of service vulnerability exists in the way that Host Integration Server handles some UDP and TCP network traffic. The vulnerability could allow a remote user to cause snabase.exe, snaserver.exe, snalink.exe...
Last Update Date: 12 Oct 2011 11:47 Release Date: 12 Oct 2011 5070 Views

RISK: High Risk

High Risk

Apple iTunes Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple iTunes, which can be exploited to cause remote code execution. These issues are caused by the errors in CoreFoundation, ColorSync, CoreAudio, CoreMedia, ImageIO and WebKit.
Last Update Date: 12 Oct 2011 11:44 Release Date: 12 Oct 2011 5506 Views

RISK: High Risk

High Risk

Microsoft .NET Framework Class Inheritance Vulnerability

A remote code execution vulnerability exists in the way that the Microsoft .NET Framework and Silverlight framework restrict inheritance within classes. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user. An attacker could then install...
Last Update Date: 12 Oct 2011 11:39 Release Date: 12 Oct 2011 5049 Views

RISK: Medium Risk

Medium Risk

Autonomy Keyview Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Autonomy Keyview, which can be exploited by malicious people to compromise a vulnerable system.An integer overflow error in jtdsr.dll when parsing QLST chunks within Ichitaro documents can be exploited to cause a heap-based buffer overflow.A...
Last Update Date: 10 Oct 2011 12:26 Release Date: 10 Oct 2011 5408 Views

RISK: High Risk

High Risk

IBM Raditional Appscan Products Two Vulnerabilities

Two vulnerabilities have been identified in IBM Rational AppScan, which can be exploited by malicious people to compromise a user's system. An unspecified error in the import functionality can be exploited via a specially crafted ZIP file. NOTE: This only affects the Enterprise and...
Last Update Date: 7 Oct 2011 15:11 Release Date: 7 Oct 2011 5349 Views

RISK: High Risk

High Risk

Cisco Firewall Services Module Security Bypass and Denial of Service Vulnerabilities

Multiple vulnerabilities have been identified in Cisco Firewall Services Module (FWSM), which can be exploited by malicious people to bypass certain security restrictions and cause a DoS (Denial of Service). An error in the implementation of the system log message ID 302015 when generating a log...
Last Update Date: 7 Oct 2011 15:10 Release Date: 7 Oct 2011 5344 Views

RISK: Medium Risk

Medium Risk

Cisco Network Admission Control Directory Traversal Vulnerability

A vulnerability has been identified in Cisco Network Admission Control (NAC), which can be exploited by malicious people to disclose sensitive information. Certain input passed to the management interface via the URL is not properly verified before being used. This can be exploited to disclose the...
Last Update Date: 7 Oct 2011 15:02 Release Date: 7 Oct 2011 5389 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. A use-after-free error exists in text line box handling and the v8 bindings. An error in...
Last Update Date: 6 Oct 2011 14:21 Release Date: 6 Oct 2011 5455 Views