Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Microsoft Windows Remote Desktop and Terminal Server Multiple Vulnerabilities

Remote Desktop Protocol Vulnerability A remote code execution vulnerability exists in the way that the Remote Desktop Protocol accesses an object in memory that has been improperly initialized or has been deleted. An attacker who successfully exploited this vulnerability could run abitrary code on the target system. ...
Last Update Date: 14 Mar 2012 12:16 Release Date: 14 Mar 2012 4644 Views

RISK: Medium Risk

Medium Risk

Citrix XenServer Workload Balancing Component Denial of Service Vulnerability

A vulnerability has been identified in Citrix XenServer, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an unspecified error in the Workload Balancing component.
Last Update Date: 14 Mar 2012 09:39 Release Date: 14 Mar 2012 4589 Views

RISK: Medium Risk

Medium Risk

Apple Safari Multiple Vulnerabilities

Multipule vulnerabilities were reported in Apple Safari. A remote user can spoof URLs, bypass cookie restrictions and  obtain HTTP authentication credentials. A remote user can create a specially crafted URL containing International Domain Name (IDN) characters to load a spoofed site that appears to...
Last Update Date: 13 Mar 2012 10:37 Release Date: 13 Mar 2012 4330 Views

RISK: Medium Risk

Medium Risk

Google Chrome Three Unspecified Code Execution Vulnerabilities

Three vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system. The vulnerabilities are caused due to unspecified errors when loading certain plug-ins and handling GPU memory. No further information is currently available.
Last Update Date: 13 Mar 2012 10:32 Release Date: 13 Mar 2012 4426 Views

RISK: High Risk

High Risk

VMware ESX Server / VirtualCenter Multiple Vulnerabilities

Multiple vulnerabilities have been identified in ESX Server and VirtualCenter, which can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause...
Last Update Date: 12 Mar 2012 11:06 Release Date: 12 Mar 2012 4426 Views

RISK: High Risk

High Risk

Google Chrome Code Execution Vulnerabilities

Two vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to compromise a user's system.   The vulnerabilities are caused due to unspecified errors when handling certain JavaScript and navigating history.   Successful exploitation allows execution of arbitrary code.
Last Update Date: 12 Mar 2012 11:03 Release Date: 12 Mar 2012 4328 Views

RISK: High Risk

High Risk

Apple iOS Multiple Vulnerabilities

Multiple vulnerabilities have identified in Apple iOS. A remote user can conduct cross-site scripting attacks, obtain potentially sensitive information and cause arbitrary code to be executed on the target user's system. A local user can bypass the screen lock.A remote user...
Last Update Date: 9 Mar 2012 11:28 Release Date: 9 Mar 2012 5035 Views

RISK: Medium Risk

Medium Risk

Joomla! Multiple Vulnerabilities

Two vulnerabilities have been identified in Joomla!, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. Certain input passed to the Highlight plugin is not properly sanitised before being returned to the user. This can be exploited to execute...
Last Update Date: 8 Mar 2012 12:15 Release Date: 8 Mar 2012 4430 Views

RISK: High Risk

High Risk

Apple Safari Plug-in Unloading Vulnerability

A vulnerability has been identified in Apple Safari, which can be exploited by malicious people to compromise a user's system.  The vulnerability is caused due to plug-ins being unloaded when navigating to a new page while the user interacts with the plug-in...
Last Update Date: 8 Mar 2012 12:15 Release Date: 8 Mar 2012 4354 Views

RISK: High Risk

High Risk

FreeType Multilpe Vulnerabilities

Multiple vulnerabilities have been identified in FreeType, which can be exploited by malicious people to potentially compromise an application using the library. An error in src/type1/t1parse.c when processing dictionaries can be exploited to cause heap-based memory corruption via a specially...
Last Update Date: 8 Mar 2012 12:14 Release Date: 8 Mar 2012 4321 Views