Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Mozilla Products Multiple vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox and Thunderbird, which can be exploited by malicious people to execute arbitrary code and take complete control of an affected system.
Last Update Date: 9 Nov 2011 12:39 Release Date: 9 Nov 2011 5999 Views

RISK: High Risk

High Risk

Adobe Shockwave Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Shockwave Player, which can be exploited by attackers to run malicious code on the affected system.
Last Update Date: 9 Nov 2011 12:34 Release Date: 9 Nov 2011 5706 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows TrueType Font Parsing Vulnerability

A denial of service vulnerability exists in the Microsoft Windows kernel. This vulnerability is caused when the Windows kernel improperly processes a specifically crafted TrueType font file. An attacker who successfully exploited this vulnerability could cause the affected system to stop responding and restart.
Last Update Date: 9 Nov 2011 12:32 Release Date: 9 Nov 2011 5870 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Active Directory LDAPS Authentication Bypass Vulnerability

An elevation of privilege vulnerability exists in Active Directory when configured to use LDAP over SSL (LDAPS). An attacker could exploit this vulnerability by using a previously revoked certificate to authenticate to the Active Directory domain and gain access to network resources or run code under the privileges...
Last Update Date: 9 Nov 2011 12:29 Release Date: 9 Nov 2011 5878 Views

RISK: High Risk

High Risk

Microsoft Windows Mail / Windows Meeting Space Insecure Library Loading Vulnerability

A remote code execution vulnerability exists in the way that Windows Mail and Windows Meeting Space handle the loading of DLL files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, ...
Last Update Date: 9 Nov 2011 12:26 Release Date: 9 Nov 2011 5805 Views

RISK: High Risk

High Risk

Microsoft Windows TCP/IP Reference Counter Overflow Vulnerability

A remote code execution vulnerability exists in the Windows TCP/IP stack due to the processing of a continuous flow of specially crafted UDP packets. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view...
Last Update Date: 9 Nov 2011 12:22 Release Date: 9 Nov 2011 5778 Views

RISK: High Risk

High Risk

Microsoft Windows TrueType Font Parsing Code Execution Vulnerability

A vulnerability has been identified in Microsoft Windows, which can be exploited by malicious people to  compromise a vulnerable system. The vulnerability is caused due to an error within the Win32k kernel-mode driver (win32k.sys) when parsing TrueType fonts.
Last Update Date: 7 Nov 2011 10:48 Release Date: 7 Nov 2011 5770 Views

RISK: High Risk

High Risk

phpMyadmin XML Entity References Information Disclosure Vulnerability

A vulnerability has been identified in phpMyAdmin, which can be exploited by malicious users to disclose potentially sensitive information.The vulnerability is caused due to an error within libraries/import/xml.php when processing XML data, which can be exploited to e.g...
Last Update Date: 4 Nov 2011 10:22 Release Date: 4 Nov 2011 5862 Views

RISK: High Risk

High Risk

Wireshark Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. An error related to an uninitialised variable within the CSN.1 dissector can be exploited to cause a crash...
Last Update Date: 3 Nov 2011 11:18 Release Date: 3 Nov 2011 5746 Views

RISK: Medium Risk

Medium Risk

D-Link Products SSH Server Buffer Overflow Vulnerability

A vulnerability has been identified in multiple D-Link products, which can be exploited by malicious people to cause a DoS (Denial of Service) a vulnerable device. The vulnerability is caused due to an unspecified error within the Secure Shell (SSH) server and...
Last Update Date: 31 Oct 2011 12:47 Release Date: 31 Oct 2011 6031 Views