Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Microsoft Office Word Multiple Vulnerabilities ( 11 August 2010 )

1. Word Record Parsing VulnerabilityA remote code execution vulnerability exists in the way that Microsoft Office Word handles malformed records inside a specially crafted Word file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs...
Last Update Date: 28 Jan 2011 Release Date: 11 Aug 2010 5251 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows MPEG Layer-3 Audio Decoder Buffer Overflow Vulnerability ( 11 August 2010 )

A remote code execution vulnerability exists in the way that Microsoft DirectShow MP3 filter handles supported format files. This vulnerability could allow code execution if a user opened a specially crafted audio file. If a user is logged on with administrative user rights, an attacker who successfully...
Last Update Date: 28 Jan 2011 Release Date: 11 Aug 2010 5182 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Msxml2.XMLHTTP.3.0 Response Handling Memory Corruption Vulnerability ( 11 August 2010 )

A remote code execution vulnerability exists in the way that Microsoft XML Core Services handles HTTP responses. The vulnerability could allow remote code execution if a user browses a Web site that contains specially crafted content or opens specially crafted HTML e-mail. An attacker who successfully...
Last Update Date: 28 Jan 2011 Release Date: 11 Aug 2010 5421 Views

RISK: Medium Risk

Medium Risk

Microsoft Internet Explorer Multiple Vulnerabilities ( 11 August 2010 )

1. Event Handler Cross-Domain VulnerabilityAn information disclosure vulnerability exists in Internet Explorer that could allow script to gain access to a browser window in another domain or Internet Explorer zone. An attacker could exploit the vulnerability by constructing a specially crafted Web page that could allow...
Last Update Date: 28 Jan 2011 Release Date: 11 Aug 2010 5158 Views

RISK: Medium Risk

Medium Risk

Microsoft Office Excel Memory Corruption Vulnerability ( 11 August 2010 )

A remote code execution vulnerability exists in the way that Microsoft Office Excel handles specially crafted Excel files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; ...
Last Update Date: 28 Jan 2011 Release Date: 11 Aug 2010 5131 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Movie Maker Memory Corruption Vulnerability ( 11 August 2010 )

A remote code execution vulnerability exists in the way that Windows Movie Maker handles specially crafted project files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; ...
Last Update Date: 28 Jan 2011 Release Date: 11 Aug 2010 5187 Views

RISK: Medium Risk

Medium Risk

Microsoft .NET Framework Common Language Runtime and Silverlight Multiple Vulnerabilities ( 11 August 2010 )

1. Microsoft Silverlight Memory Corruption VulnerabilityA remote code execution vulnerability exists in the way that Microsoft Silverlight handles pointers. The vulnerability could allow remote code execution if a user visit a specially crafted Web site that contains Silverlight content.2. Microsoft Silverlight and Microsoft .NET...
Last Update Date: 28 Jan 2011 Release Date: 11 Aug 2010 5268 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Cinepak Codec Decompression Vulnerability ( 11 August 2010 )

A remote code execution vulnerability exists in the way the Cinepak codec handles supported format files. This vulnerability could allow code execution if a user opened a specially crafted media file. If a user is logged on with administrative user rights, an attacker who successfully exploited this...
Last Update Date: 28 Jan 2011 Release Date: 11 Aug 2010 5359 Views

RISK: Medium Risk

Medium Risk

Foxit Reader Compact Font Format Memory Corruption Vulnerability

A vulnerability has been identified in Foxit Reader, which could be exploited by attackers to potentially compromise a vulnerable system. This issue is caused by a memory corruption error when processing Compact Font Format (CFF) data within a PDF document, which could be exploited by...
Last Update Date: 28 Jan 2011 Release Date: 9 Aug 2010 5352 Views

RISK: Medium Risk

Medium Risk

Adobe Acrobat and Reader Font Parsing Integer Overflow Vulnerability

A vulnerability has been identified in Adobe Acrobat and Reader, which could be exploited by attackers to potentially compromise a vulnerable system. This issue is caused by an integer overflow error in the "CoolType.dll" module when processing a PDF document containing a TrueType Font...
Last Update Date: 28 Jan 2011 Release Date: 5 Aug 2010 5596 Views