Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Microsoft Excel Multiple Remote Code Execution Vulnerabilities

A remote code execution vulnerabilities exists in the way that Microsoft Excel handles specially crafted Excel files. An attacker who successfully exploited this vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or...
Last Update Date: 14 Sep 2011 11:52 Release Date: 14 Sep 2011 4958 Views

RISK: High Risk

High Risk

Microsoft Windows Components Insecure Library Loading Vulnerability

A remote code execution vulnerability exists in the way that certain Windows components handle the loading of DLL files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data...
Last Update Date: 14 Sep 2011 11:48 Release Date: 14 Sep 2011 4951 Views

RISK: Medium Risk

Medium Risk

Microsoft WINS Local Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists in WINS, allowing arbitrary code to be executed in the context of the local system. The vulnerability is caused when the WINS server improperly processes a sequence of specially crafted packets received on the loopback interface. A local attacker who successfully...
Last Update Date: 14 Sep 2011 11:45 Release Date: 14 Sep 2011 5247 Views

RISK: High Risk

High Risk

Wireshark Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. An error within the processing of certain IKE packets can be exploited to cause an infinite loop...
Last Update Date: 12 Sep 2011 10:22 Release Date: 12 Sep 2011 5424 Views

RISK: Medium Risk

Medium Risk

WordPress DukaPress Shopping Cart Plugin Vulnerability

 A vulnerability has been identified in DukaPress Shopping Cart plugin for WordPress, which can be exploited by remote attacker to compromise a user's system.
Last Update Date: 7 Sep 2011 09:54 Release Date: 7 Sep 2011 5547 Views

RISK: High Risk

High Risk

F-Secure Gadget Resource Handler ActiveX Control "initialize()" Buffer Overflow Vulnerability

A vulnerability has been identified in the F-Secure Gadget Resource Handler ActiveX Control, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in the handling of the "initialize()" ...
Last Update Date: 25 Aug 2011 09:25 Release Date: 25 Aug 2011 5591 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to bypass certain security restrictions and potentially compromise a user's system. An error related to the command line can lead to "URL parsing confusion". Note: This vulnerability affects...
Last Update Date: 24 Aug 2011 12:22 Release Date: 24 Aug 2011 5606 Views

RISK: High Risk

High Risk

RealPlayer Multiple Vulnerabilities

Multiple vulnerabilities have been identified in RealPlayer, which can be exploited by malicious people to compromise a user's system. A use-after-free error exists in pngu3267.dll within the handling of displayed dialog boxes when navigating away from a web page. ...
Last Update Date: 18 Aug 2011 12:04 Release Date: 18 Aug 2011 5938 Views

RISK: High Risk

High Risk

Mozilla Firefox / Thunderbird Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox and Thunderbird, which can be exploited by malicious people to bypass certain security restrictions, disclose certain sensitive information, and compromise a vulnerable system.   Firefox 3.6.x/Thunderbird 3.1.x: Some...
Last Update Date: 18 Aug 2011 12:01 Release Date: 18 Aug 2011 5969 Views

RISK: High Risk

High Risk

Mass Injection Attacks Targeting osCommerce Vulnerabilities

Multiple vulnerabilities have been identified in osCommerce application, which can be exploited by hackers to inject malicious content in vulnerable osCommerce websites.   A large scale injection attack targeting osCommerce websites is reported.  Injected "<iframe>" and "<script>" pointing to malicious links will infect computers...
Last Update Date: 12 Aug 2011 Release Date: 2 Aug 2011 8382 Views