Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Adobe Reader and Acrobat Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Reader and Acrobat, which can be exploited by remote attacker cause the application to crash and compromise a vulnerable system.
Last Update Date: 14 Sep 2011 12:09 Release Date: 14 Sep 2011 6015 Views

RISK: Medium Risk

Medium Risk

Microsoft SharePoint Multiple Elevation of Privilege Vulnerabilities

XSS in SharePoint Calendar Vulnerability A cross-site scripting vulnerability exists in Microsoft SharePoint 2010 that could result in information disclosure or elevation of privilege if a user clicks a specially crafted URL containing malicious JavaScript elements. Due to the vulnerability, when the malicious JavaScript is...
Last Update Date: 14 Sep 2011 11:58 Release Date: 14 Sep 2011 5741 Views

RISK: High Risk

High Risk

Microsoft Office Multiple Remote Code Execution Vulnerabilities

Office Component Insecure Library Loading Vulnerability A remote code execution vulnerability exists in the way that Microsoft Office handles the loading of DLL files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view...
Last Update Date: 14 Sep 2011 11:55 Release Date: 14 Sep 2011 5673 Views

RISK: High Risk

High Risk

Microsoft Excel Multiple Remote Code Execution Vulnerabilities

A remote code execution vulnerabilities exists in the way that Microsoft Excel handles specially crafted Excel files. An attacker who successfully exploited this vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or...
Last Update Date: 14 Sep 2011 11:52 Release Date: 14 Sep 2011 5733 Views

RISK: High Risk

High Risk

Microsoft Windows Components Insecure Library Loading Vulnerability

A remote code execution vulnerability exists in the way that certain Windows components handle the loading of DLL files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data...
Last Update Date: 14 Sep 2011 11:48 Release Date: 14 Sep 2011 5713 Views

RISK: Medium Risk

Medium Risk

Microsoft WINS Local Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists in WINS, allowing arbitrary code to be executed in the context of the local system. The vulnerability is caused when the WINS server improperly processes a sequence of specially crafted packets received on the loopback interface. A local attacker who successfully...
Last Update Date: 14 Sep 2011 11:45 Release Date: 14 Sep 2011 5998 Views

RISK: High Risk

High Risk

Wireshark Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. An error within the processing of certain IKE packets can be exploited to cause an infinite loop...
Last Update Date: 12 Sep 2011 10:22 Release Date: 12 Sep 2011 6237 Views

RISK: Medium Risk

Medium Risk

WordPress DukaPress Shopping Cart Plugin Vulnerability

 A vulnerability has been identified in DukaPress Shopping Cart plugin for WordPress, which can be exploited by remote attacker to compromise a user's system.
Last Update Date: 7 Sep 2011 09:54 Release Date: 7 Sep 2011 6292 Views

RISK: High Risk

High Risk

F-Secure Gadget Resource Handler ActiveX Control "initialize()" Buffer Overflow Vulnerability

A vulnerability has been identified in the F-Secure Gadget Resource Handler ActiveX Control, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in the handling of the "initialize()" ...
Last Update Date: 25 Aug 2011 09:25 Release Date: 25 Aug 2011 6325 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to bypass certain security restrictions and potentially compromise a user's system. An error related to the command line can lead to "URL parsing confusion". Note: This vulnerability affects...
Last Update Date: 24 Aug 2011 12:22 Release Date: 24 Aug 2011 6359 Views