Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Apple Mac OS X Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple Mac OS X, which could be exploited by attackers to conduct cross-site scripting attacks, bypass certain security restrictions, disclose sensitive information, cause a denial of service or compromise a vulnrable system.1. The CUPS web...
Last Update Date: 28 Jan 2011 Release Date: 17 Jun 2010 4833 Views

RISK: Medium Risk

Medium Risk

Apple Mac OS X Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple Mac OS X, which could be exploited by attackers to conduct cross-site scripting attacks, bypass certain security restrictions, disclose sensitive information, cause a denial of service or compromise a vulnrable system.1. The CUPS web...
Last Update Date: 28 Jan 2011 Release Date: 17 Jun 2010 4724 Views

RISK: Medium Risk

Medium Risk

HP OpenView Network Node Manager Buffer Overflow Vulnerabilities

Two vulnerabilities have been identified in HP OpenView Network Node Manager (OV NNM), which could be exploited by remote attackers to compromise a vulnerable system.1. A buffer overflow error within the "ovwebsnmpsrv.exe" process (invoked via the "jovgraph.exe...
Last Update Date: 28 Jan 2011 Release Date: 11 Jun 2010 4681 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Help and Support Center Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Microsoft Windows, which could be exploited by remote attackers to compromise a vulnerable system.1. An error in the "MPC::HTML::UrlUnescapeW()" function within the Help and Support Center application (helpctr.exe) that does...
Last Update Date: 28 Jan 2011 Release Date: 11 Jun 2010 4509 Views

RISK: Medium Risk

Medium Risk

CA PSFormX and WebScan ActiveX Controls Multiple Vulnerabilities

Multiple vulnerabilities have been identified in CA PSFormX and WebScan ActiveX controls, which could be exploited by remote attackers to comrpromise an affected system. These issues are caused by input validation errors when processing user-supplied parameters, which could be exploited to execute arbitrary code by...
Last Update Date: 28 Jan 2011 Release Date: 11 Jun 2010 4711 Views

RISK: Medium Risk

Medium Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which could be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, disclose potentially sensitive information, or potentially compromise a vulnerable system.1. An unspecified error exists related to cross...
Last Update Date: 28 Jan 2011 Release Date: 10 Jun 2010 4655 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows OpenType CFF Font Driver Memory Corruption Vulnerability ( 09 June 2010 )

An elevation of privilege vulnerability exists in the Windows OpenType Compact Font Format (CFF) driver due to improper validation of certain data passed from user mode to kernel mode. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could...
Last Update Date: 28 Jan 2011 Release Date: 9 Jun 2010 4509 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Kernel-Mode Drivers Multiple Vulnerabilities ( 09 June 2010 )

1. Win32k Improper Data Validation VulnerabilityAn elevation of privilege vulnerability exists because the Windows kernel-mode drivers do not properly validate changes in certain kernel objects. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs...
Last Update Date: 28 Jan 2011 Release Date: 9 Jun 2010 4489 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Media Decompression Multiple Vulnerabilities ( 09 June 2010 )

1. Media Decompression VulnerabilityA remote code execution vulnerability exists in the way that Microsoft Windows handles media files. This vulnerability could allow remote code execution if a user opened a specially crafted media file. If a user is logged on with administrative user rights, an attacker...
Last Update Date: 28 Jan 2011 Release Date: 9 Jun 2010 4867 Views

RISK: Medium Risk

Medium Risk

Microsoft Office COM Validation Vulnerability ( 09 June 2010 )

A remote code execution vulnerability exists in the way that affected Microsoft Office software validates COM object instantiation. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; ...
Last Update Date: 28 Jan 2011 Release Date: 9 Jun 2010 4479 Views