Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Microsoft Windows Kernel-Mode Drivers PostMessage Function Vulnerability

An elevation of privilege vulnerability exists in the way that the Windows kernel-mode driver manages the PostMessage function. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data...
Last Update Date: 14 Mar 2012 12:18 Release Date: 14 Mar 2012 5743 Views

RISK: High Risk

High Risk

Microsoft Windows DNS Server Denial of Service Vulnerability

A denial of service vulnerability exists in the way that the DNS server improperly handles objects in memory when looking up the resource record of a domain. An attacker that successfully exploited this vulnerability could cause the DNS server on the target system to stop responding and automatically restart...
Last Update Date: 14 Mar 2012 12:17 Release Date: 14 Mar 2012 5527 Views

RISK: High Risk

High Risk

Microsoft Windows Remote Desktop and Terminal Server Multiple Vulnerabilities

Remote Desktop Protocol Vulnerability A remote code execution vulnerability exists in the way that the Remote Desktop Protocol accesses an object in memory that has been improperly initialized or has been deleted. An attacker who successfully exploited this vulnerability could run abitrary code on the target system. ...
Last Update Date: 14 Mar 2012 12:16 Release Date: 14 Mar 2012 5821 Views

RISK: Medium Risk

Medium Risk

Citrix XenServer Workload Balancing Component Denial of Service Vulnerability

A vulnerability has been identified in Citrix XenServer, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an unspecified error in the Workload Balancing component.
Last Update Date: 14 Mar 2012 09:39 Release Date: 14 Mar 2012 5700 Views

RISK: Medium Risk

Medium Risk

Apple Safari Multiple Vulnerabilities

Multipule vulnerabilities were reported in Apple Safari. A remote user can spoof URLs, bypass cookie restrictions and  obtain HTTP authentication credentials. A remote user can create a specially crafted URL containing International Domain Name (IDN) characters to load a spoofed site that appears to...
Last Update Date: 13 Mar 2012 10:37 Release Date: 13 Mar 2012 5452 Views

RISK: Medium Risk

Medium Risk

Google Chrome Three Unspecified Code Execution Vulnerabilities

Three vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system. The vulnerabilities are caused due to unspecified errors when loading certain plug-ins and handling GPU memory. No further information is currently available.
Last Update Date: 13 Mar 2012 10:32 Release Date: 13 Mar 2012 5556 Views

RISK: High Risk

High Risk

VMware ESX Server / VirtualCenter Multiple Vulnerabilities

Multiple vulnerabilities have been identified in ESX Server and VirtualCenter, which can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause...
Last Update Date: 12 Mar 2012 11:06 Release Date: 12 Mar 2012 5552 Views

RISK: High Risk

High Risk

Google Chrome Code Execution Vulnerabilities

Two vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to compromise a user's system.   The vulnerabilities are caused due to unspecified errors when handling certain JavaScript and navigating history.   Successful exploitation allows execution of arbitrary code.
Last Update Date: 12 Mar 2012 11:03 Release Date: 12 Mar 2012 5461 Views

RISK: High Risk

High Risk

Apple iOS Multiple Vulnerabilities

Multiple vulnerabilities have identified in Apple iOS. A remote user can conduct cross-site scripting attacks, obtain potentially sensitive information and cause arbitrary code to be executed on the target user's system. A local user can bypass the screen lock.A remote user...
Last Update Date: 9 Mar 2012 11:28 Release Date: 9 Mar 2012 6159 Views

RISK: Medium Risk

Medium Risk

Joomla! Multiple Vulnerabilities

Two vulnerabilities have been identified in Joomla!, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. Certain input passed to the Highlight plugin is not properly sanitised before being returned to the user. This can be exploited to execute...
Last Update Date: 8 Mar 2012 12:15 Release Date: 8 Mar 2012 5524 Views