Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Vulnerability

An elevation of privilege vulnerability exists in the Client/Server Run-time Subsystem (CSRSS), allowing arbitrary code to be executed in the context of another process. If this process runs with administrator privileges, an attacker could then install programs; view...
Last Update Date: 10 Aug 2011 12:20 Release Date: 10 Aug 2011 3597 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Remote Access Service NDISTAPI Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists in the Remote Access Service NDISTAPI driver. The vulnerability is caused when the NDISTAPI driver improperly validates user-supplied input when passing data from user mode to the Windows kernel. A local attacker who successfully exploited this vulnerability could execute arbitrary...
Last Update Date: 10 Aug 2011 11:56 Release Date: 10 Aug 2011 5513 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Remote Desktop Web Access Vulnerability

A reflected XSS vulnerability exists in Remote Desktop Web Access that could allow an attacker to inject a client-side script into the user's instance of Internet Explorer. This script could spoof content, disclose information, or take any action that the user could take...
Last Update Date: 10 Aug 2011 11:54 Release Date: 10 Aug 2011 5521 Views

RISK: High Risk

High Risk

Microsoft Visio Multiple Remote Code Execution Vulnerabilities

pStream Release RCE Vulnerability A remote code execution vulnerability exists in the way that Microsoft Visio validates objects in memory when parsing specially crafted Visio files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs...
Last Update Date: 10 Aug 2011 11:53 Release Date: 10 Aug 2011 5479 Views

RISK: High Risk

High Risk

Microsoft Windows Data Access Components Insecure Library Loading Vulnerability

A remote code execution vulnerability exists in the way that the Windows Data Access Tracing component handles the loading of DLL files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, ...
Last Update Date: 10 Aug 2011 11:52 Release Date: 10 Aug 2011 5582 Views

RISK: High Risk

High Risk

Microsoft Windows DNS Server Multiple Vulnerabilities

DNS NAPTR Query Vulnerability A remote code execution vulnerability exists in the way that the Windows DNS Server improperly handles a specially crafted NAPTR query string in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the system. An attacker could...
Last Update Date: 10 Aug 2011 11:52 Release Date: 10 Aug 2011 5687 Views

RISK: High Risk

High Risk

Microsoft Internet Explorer Multiple Vulnerabilities

Window Open Race Condition Vulnerability A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that may have been corrupted due to a race condition. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the...
Last Update Date: 10 Aug 2011 11:47 Release Date: 10 Aug 2011 5389 Views

RISK: High Risk

High Risk

Apple QuickTime Multiple Vulnerabilities

Multiple vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system. An error within the processing of GIF files can be exploited to cause a heap-based buffer overflow by tricking a user into opening a...
Last Update Date: 9 Aug 2011 Release Date: 5 Aug 2011 5796 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, and compromise a user's system. An unspecified error exists when confirming an extension install via a browser dialog.An unspecified...
Last Update Date: 4 Aug 2011 09:57 Release Date: 4 Aug 2011 6162 Views

RISK: High Risk

High Risk

Apple iWork Numbers / Pages Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple iWork, which can be exploited by malicious people to compromise a user's system. An error in iWork Numbers when handling Excel files can be exploited to cause a buffer overflow via a specially crafted file. An error in...
Last Update Date: 27 Jul 2011 09:21 Release Date: 27 Jul 2011 13483 Views