Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Google Chrome Code Execution and Security Bypass Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which could be exploited by remote attackers to bypass restrictions, disclose sensitive information or compromise a vulnerable system.1. Due to an unspecified DNS and fall-back behavior of proxies, which could disclose sensitive information....
Last Update Date: 28 Jan 2011 Release Date: 12 Feb 2010 5333 Views

RISK: Medium Risk

Medium Risk

HP OpenView Network Node Manager Java JDK / JRE Multiple Vulnerabilities

Multiple vulnerabilities have been identified in in HP OpenView Network Node Manager, which can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, cause a DoS (Denial of service), or compromise a vulnerable system.The vulnerabilities are caused due to...
Last Update Date: 28 Jan 2011 Release Date: 11 Feb 2010 5391 Views

RISK: Medium Risk

Medium Risk

Panda Security ActiveScan "as2stubie.dll" File Download Vulnerability

A vulnerability has been identified in Panda Security ActiveScan, which could be exploited by remote attackers to compromise a vulnerable system. This issue is caused by an error in the "as2stubie.dll" component that fails to validate the digital signature of the "as2guiie....
Last Update Date: 28 Jan 2011 Release Date: 11 Feb 2010 5407 Views

RISK: Medium Risk

Medium Risk

HP OpenView Network Node Manager Arbitrary Command Execution Vulnerability

A vulnerability has been identified in HP Network Node Manager, which can be exploited by malicious people to compromise a vulnerable system.The vulnerability is caused due to an unspecified error, which can be exploited to execute arbitrary commands.
Last Update Date: 28 Jan 2011 Release Date: 11 Feb 2010 5341 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows TCP/IP Multiple Vulnerabilities

1. ICMPv6 Router Advertisement VulnerabilityA remote code execution vulnerability exists in the Windows TCP/IP stack due to insufficient bounds checking when processing specially crafted ICMPv6 Router Advertisement packets. An anonymous attacker could exploit the vulnerability by sending specially crafted ICMPv6 Router Advertisement packets to a computer...
Last Update Date: 28 Jan 2011 Release Date: 10 Feb 2010 5312 Views

RISK: Medium Risk

Medium Risk

Microsoft Office MSO.DLL Buffer Overflow Vulnerabilities

A remote code execution vulnerability exists in the way Microsoft Office handles specially crafted Office files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create...
Last Update Date: 28 Jan 2011 Release Date: 10 Feb 2010 5272 Views

RISK: Medium Risk

Medium Risk

Microsoft SMB Client Multiple Vulnerabilities

1. SMB Client Pool Corruption VulnerabilityAn unauthenticated remote code execution vulnerability exists in the way that Microsoft Server Message Block (SMB) Protocol software handles specially crafted SMB responses. An attempt to exploit the vulnerability would not require authentication, allowing an attacker to exploit the vulnerability...
Last Update Date: 28 Jan 2011 Release Date: 10 Feb 2010 5195 Views

RISK: Medium Risk

Medium Risk

Microsoft SMB Server Multiple Vulnerabilities

1. SMB Pathname Overflow VulnerabilityAn authenticated remote code execution vulnerability exists in the way that Microsoft Server Message Block (SMB) Protocol software handles specially crafted SMB packets. An attacker could exploit the vulnerability by sending a specially crafted network message to a system running the Server...
Last Update Date: 28 Jan 2011 Release Date: 10 Feb 2010 5395 Views

RISK: Medium Risk

Medium Risk

Microsoft URL Validation Vulnerability

A remote code execution vulnerability exists in affected versions of Microsoft Windows. The vulnerability results from the incorrect validation of input sent to the ShellExecute API function. An attacker who successfully exploited this vulnerability could take complete control of an affected system.
Last Update Date: 28 Jan 2011 Release Date: 10 Feb 2010 5190 Views

RISK: Medium Risk

Medium Risk

Microsoft Office PowerPoint Multiple Vulnerabilities

1. PowerPoint File Path Handling Buffer Overflow VulnerabilityA remote code execution vulnerability exists in the way that Microsoft Office PowerPoint handles specially crafted PowerPoint files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; ...
Last Update Date: 28 Jan 2011 Release Date: 10 Feb 2010 5273 Views