Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Microsoft Office SharePoint Server Security Bypass Vulnerability (10 December 2008)

An elevation of privilege vulnerability exists in Microsoft Office SharePoint Server 2007 and Microsoft Office SharePoint Server 2007 Service Pack 1. The vulnerability could allow elevation of privilege if an attacker bypasses authentication by browsing to an administrative URL on a SharePoint site. A successful attack leading to...
Last Update Date: 28 Jan 2011 Release Date: 10 Dec 2008 4485 Views

RISK: Medium Risk

Medium Risk

Microsoft Office Word Multiple Code Execution Vulnerabilities (10 December 2008)

1. Word Memory Corruption VulnerabilityA remote code execution vulnerability exists in the way that Word handles specially crafted Word files. The vulnerability could allow remote code execution if a user opens a specially crafted Word file with a malformed record. Users whose accounts are configured to have...
Last Update Date: 28 Jan 2011 Release Date: 10 Dec 2008 4565 Views

RISK: Medium Risk

Medium Risk

Microsoft Internet Explorer XML Parsing Code Execution Vulnerability

A remote code execution vulnerability exists as an invalid pointer reference in the data binding function of Internet Explorer. When data binding is enabled (which is the default state), it is possible under certain conditions for an object to be released without updating the array length, ...
Last Update Date: 28 Jan 2011 Release Date: 10 Dec 2008 4549 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Media Products Code Execution Vulnerabilities (10 December 2008)

1. SPN VulnerabilityA credential reflection vulnerability exists in the Windows Media components that could allow an attacker to execute code with the same rights as the local user or with Windows Media Services distribution credentials. The vulnerability exists due to weaknesses in Service Principal Name (SPN) ...
Last Update Date: 28 Jan 2011 Release Date: 10 Dec 2008 4489 Views

RISK: Medium Risk

Medium Risk

Microsoft Internet Explorer Code Execution Vulnerabilities (10 December 2008)

1. Parameter Validation Memory Corruption VulnerabilityA remote code execution vulnerability exists in the way Internet Explorer handles certain navigation methods. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code...
Last Update Date: 28 Jan 2011 Release Date: 10 Dec 2008 4509 Views

RISK: Medium Risk

Medium Risk

Sun Java JDK / JRE Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Sun Java, which could be exploited by attackers or malicious users to bypass security restrictions, disclose sensitive information, cause a denial of service, or take complete control of an affected system.1. Due to JRE creating temporary files...
Last Update Date: 28 Jan 2011 Release Date: 5 Dec 2008 4796 Views

RISK: Medium Risk

Medium Risk

BitDefenderAntivirus PDF Processing Memory Corruption Vulnerability

It has discovered a vulnerability in BitDefender Antivirus, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system.The vulnerability is caused due to a boundary error in the "pdf.xmd" module...
Last Update Date: 28 Jan 2011 Release Date: 24 Nov 2008 4868 Views

RISK: Medium Risk

Medium Risk

AppleiPhone / iPod touch Multiple Vulnerabilities

Some weaknesses, security issues, and vulnerabilities have been reported in Apple iPhone and iPod touch, which can be exploited by malicious people to bypass certain security restrictions, disclose potential sensitive information, conduct spoofing attacks, to cause a DoS (Denial of Service), or...
Last Update Date: 28 Jan 2011 Release Date: 24 Nov 2008 4868 Views

RISK: Medium Risk

Medium Risk

Adobe AIR Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe AIR, which can be exploited by malicious people to compromise a user's system.1. Due to multiple unspecified input validation errors in the parsing of SWF files which can be exploited to potentially execute arbitrary code.2...
Last Update Date: 28 Jan 2011 Release Date: 19 Nov 2008 4887 Views

RISK: Medium Risk

Medium Risk

Apple Safari Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple Safari, which could be exploited by attackers to disclose sensitive information, bypass security restrictions, cause a denial of service or compromise an affected system. These issues are caused by buffer overflow, uninitialized memory access, memory corruption, ...
Last Update Date: 28 Jan 2011 Release Date: 17 Nov 2008 4903 Views