Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

GTK+ Insecure Library Loading Vulnerability

A vulnerability has been identified in GTK+, which can be exploited by malicious people to compromise an application using the library. The vulnerability is caused due to the "_gdk_input_wintab_init_check()" (gdk/win32/gdkinput-win32.c) and the "xp_theme_init()" functions (...
Last Update Date: 16 Dec 2011 Release Date: 6 Sep 2011 6208 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to conduct spoofing attacks, disclose potentially sensitive information, and compromise a user's system. An error in regex matching, libxml, PDF parser, SVG parsing, handling YUV...
Last Update Date: 15 Dec 2011 10:39 Release Date: 15 Dec 2011 5756 Views

RISK: High Risk

High Risk

Microsoft Internet Explorer Multiple Vulnerabilities

XSS Filter Information Disclosure VulnerabilityAn information disclosure vulnerability exists in Internet Explorer. An attacker could exploit the vulnerability by constructing a specially crafted Web page that contains malicious JavaScript code. An attacker who successfully exploited this vulnerability could view content from another domain or Internet Explorer zone....
Last Update Date: 14 Dec 2011 14:53 Release Date: 14 Dec 2011 5631 Views

RISK: High Risk

High Risk

Microsoft Windows Kernel Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists in the Windows kernel due to the way the kernel accesses an object that has not been correctly initialized. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, ...
Last Update Date: 14 Dec 2011 14:50 Release Date: 14 Dec 2011 5602 Views

RISK: High Risk

High Risk

Microsoft Windows Client/Server Runtime Subsystem Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists in the Client/Server Run-time Subsystem (CSRSS), allowing arbitrary code to be executed in the context of another process. If this process runs with administrator privileges, an attacker could then install programs; view, change, ...
Last Update Date: 14 Dec 2011 14:49 Release Date: 14 Dec 2011 5841 Views

RISK: High Risk

High Risk

Microsoft Excel Remote Code Execution Vulnerability

A remote code execution vulnerability exists in the way that Microsoft Excel handles specially crafted Excel files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or...
Last Update Date: 14 Dec 2011 14:34 Release Date: 14 Dec 2011 5515 Views

RISK: High Risk

High Risk

Microsoft Windows Active Directory Remote Code Execution Vulnerability

A remote code execution vulnerability exists in Active Directory. To exploit this vulnerability, an attacker would first need to acquire credentials to log on to an Active Directory domain. An attacker could then run a specially crafted application that could exploit the vulnerability...
Last Update Date: 14 Dec 2011 12:34 Release Date: 14 Dec 2011 5618 Views

RISK: High Risk

High Risk

Microsoft Publisher Remote Code Execution Vulnerabilities

A remote code execution vulnerability exists in the way that Microsoft Publisher parses Publisher files. An attacker could exploit the vulnerability by creating a specially crafted Publisher file that could be included as an e-mail attachment, or hosted on a specially crafted or compromised Web site...
Last Update Date: 14 Dec 2011 12:33 Release Date: 14 Dec 2011 5614 Views

RISK: High Risk

High Risk

Microsoft PowerPoint Remote Code Execution Vulnerabilities

PowerPoint Insecure Library Loading Vulnerability A remote code execution vulnerability exists in the way that Microsoft PowerPoint handles the loading of DLL files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; ...
Last Update Date: 14 Dec 2011 12:32 Release Date: 14 Dec 2011 5678 Views

RISK: High Risk

High Risk

Microsoft Time Remote Code Execution Vulnerability

A remote code execution vulnerability exists in the Microsoft Time component. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could...
Last Update Date: 14 Dec 2011 12:31 Release Date: 14 Dec 2011 5513 Views