Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Microsoft Visual Studio Add-In Vulnerability

An elevation of privilege vulnerability exists in Visual Studio due to the insecure loading of add-ins from within Visual Studio. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated privileges. An attacker could then install programs; view, change, or...
Last Update Date: 14 Mar 2012 12:18 Release Date: 14 Mar 2012 4565 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Kernel-Mode Drivers PostMessage Function Vulnerability

An elevation of privilege vulnerability exists in the way that the Windows kernel-mode driver manages the PostMessage function. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data...
Last Update Date: 14 Mar 2012 12:18 Release Date: 14 Mar 2012 4544 Views

RISK: High Risk

High Risk

Microsoft Windows DNS Server Denial of Service Vulnerability

A denial of service vulnerability exists in the way that the DNS server improperly handles objects in memory when looking up the resource record of a domain. An attacker that successfully exploited this vulnerability could cause the DNS server on the target system to stop responding and automatically restart...
Last Update Date: 14 Mar 2012 12:17 Release Date: 14 Mar 2012 4332 Views

RISK: High Risk

High Risk

Microsoft Windows Remote Desktop and Terminal Server Multiple Vulnerabilities

Remote Desktop Protocol Vulnerability A remote code execution vulnerability exists in the way that the Remote Desktop Protocol accesses an object in memory that has been improperly initialized or has been deleted. An attacker who successfully exploited this vulnerability could run abitrary code on the target system. ...
Last Update Date: 14 Mar 2012 12:16 Release Date: 14 Mar 2012 4568 Views

RISK: Medium Risk

Medium Risk

Citrix XenServer Workload Balancing Component Denial of Service Vulnerability

A vulnerability has been identified in Citrix XenServer, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an unspecified error in the Workload Balancing component.
Last Update Date: 14 Mar 2012 09:39 Release Date: 14 Mar 2012 4512 Views

RISK: Medium Risk

Medium Risk

Apple Safari Multiple Vulnerabilities

Multipule vulnerabilities were reported in Apple Safari. A remote user can spoof URLs, bypass cookie restrictions and  obtain HTTP authentication credentials. A remote user can create a specially crafted URL containing International Domain Name (IDN) characters to load a spoofed site that appears to...
Last Update Date: 13 Mar 2012 10:37 Release Date: 13 Mar 2012 4257 Views

RISK: Medium Risk

Medium Risk

Google Chrome Three Unspecified Code Execution Vulnerabilities

Three vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system. The vulnerabilities are caused due to unspecified errors when loading certain plug-ins and handling GPU memory. No further information is currently available.
Last Update Date: 13 Mar 2012 10:32 Release Date: 13 Mar 2012 4352 Views

RISK: High Risk

High Risk

VMware ESX Server / VirtualCenter Multiple Vulnerabilities

Multiple vulnerabilities have been identified in ESX Server and VirtualCenter, which can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause...
Last Update Date: 12 Mar 2012 11:06 Release Date: 12 Mar 2012 4353 Views

RISK: High Risk

High Risk

Google Chrome Code Execution Vulnerabilities

Two vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to compromise a user's system.   The vulnerabilities are caused due to unspecified errors when handling certain JavaScript and navigating history.   Successful exploitation allows execution of arbitrary code.
Last Update Date: 12 Mar 2012 11:03 Release Date: 12 Mar 2012 4252 Views

RISK: High Risk

High Risk

Apple iOS Multiple Vulnerabilities

Multiple vulnerabilities have identified in Apple iOS. A remote user can conduct cross-site scripting attacks, obtain potentially sensitive information and cause arbitrary code to be executed on the target user's system. A local user can bypass the screen lock.A remote user...
Last Update Date: 9 Mar 2012 11:28 Release Date: 9 Mar 2012 4959 Views