Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Microsoft Visio Viewer VSD File Format Memory Corruption Vulnerability

A remote code execution vulnerability exists in the way that Microsoft Visio validates attributes when handling specially crafted Visio files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete...
Last Update Date: 9 May 2012 16:06 Release Date: 9 May 2012 4147 Views

RISK: High Risk

High Risk

Microsoft Office Excel Multiple Vulnerabilities

Excel File Format Memory Corruption Vulnerability A remote code execution vulnerability exists in the way that Microsoft Excel handles specially crafted Excel files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, ...
Last Update Date: 9 May 2012 15:57 Release Date: 9 May 2012 4158 Views

RISK: High Risk

High Risk

Microsoft Word RTF Mismatch Vulnerability

A remote code execution vulnerability exists in the way that affected Microsoft Office software parses specially crafted Rich Text Format (RTF) data. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, ...
Last Update Date: 9 May 2012 15:55 Release Date: 9 May 2012 4127 Views

RISK: Medium Risk

Medium Risk

Apple iOS Remote Code Execution and Address Bar Urls Spoofing Vulnerabilities

Two vulnerabilities were identified in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. A remote user can create a specially crafted file that, when loaded by...
Last Update Date: 8 May 2012 12:40 Release Date: 8 May 2012 5110 Views

RISK: Medium Risk

Medium Risk

Apple Mac OS X FileVault Plain Text Password Logging Vulnerability

A security issue has been identified in Apple Mac OS X, which can be exploited by malicious people with physical access to bypass certain security restrictions.   The security issue is caused due to the debug switch being enabled within FileVault when using "Legacy ...
Last Update Date: 8 May 2012 12:33 Release Date: 8 May 2012 4419 Views

RISK: Extremely High Risk

Extremely High Risk

Adobe Flash Player Object Confusion Vulnerability

A vulnerability has been identified in Adobe Flash Player, which can be exploited by remote users to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
Last Update Date: 7 May 2012 12:40 Release Date: 7 May 2012 4481 Views

RISK: High Risk

High Risk

VMware ESX Server / ESXi Multiple Vulnerabilities

Multiple vulnerabilities have been identified in VMware ESX Server and VMware ESXi, which can be exploited by malicious users to escalated privileges, cause a DoS (Denial of Service) and potentially compromise a vulnerable system. An errors when handling RPC commands can be exploited to cause...
Last Update Date: 7 May 2012 12:39 Release Date: 7 May 2012 4541 Views

RISK: High Risk

High Risk

Cisco Products Multiple Vulnerabilities

Mulitple vulnerabilities have been identified in various Cisco products, which can be exploited by malicious users execute arbitrary code, cause a denial-of-service condition and bypass security restrictions.
Last Update Date: 4 May 2012 12:12 Release Date: 4 May 2012 5074 Views

RISK: Medium Risk

Medium Risk

HP Systems Insight Manager Multiple Vulnerabilities

Multiple vulnerabilities have been identified in HP Systems Insight Manager, which can be exploited by malicious, local users to potentially gain escalated privileges and by malicious people to disclose sensitive information, conduct cross-site scripting and cross-site request forgery attacks, ...
Last Update Date: 2 May 2012 12:06 Release Date: 2 May 2012 4411 Views

RISK: Medium Risk

Medium Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to compromise a user's system. A use-after-free error exists in floats handling and within the xml parser. An error exists within the IPC validation. ...
Last Update Date: 2 May 2012 12:03 Release Date: 2 May 2012 4395 Views