Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Fraudulent SSL Digital Certificates affect multiple Internet Applications and Network devices

DigiNotar is a Dutch certification authority (CA) for issuing the SSL and EVSSL digital certificate, many internet application and network devices are preloaded the DigiNotar's root certificate in the trusted root certification authorities. The list of known fraudulent certificates issued by DigiNotarby contains some...
Last Update Date: 21 Sep 2011 Release Date: 16 Sep 2011 5637 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to conduct spoofing and cross-site scripting attacks, disclose sensitive information, bypass certain security restrictions, and compromise a user...
Last Update Date: 20 Sep 2011 11:48 Release Date: 20 Sep 2011 5239 Views

RISK: Medium Risk

Medium Risk

Oracle Fusion Middleware & Application Server Vulnerability

 A vulnerability have been identified in Oracle Fusion Middleware & Application Server, which can be exploited by remote attacker cause denial of service attack.
Last Update Date: 19 Sep 2011 12:18 Release Date: 19 Sep 2011 5476 Views

RISK: High Risk

High Risk

Adobe Reader and Acrobat Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Reader and Acrobat, which can be exploited by remote attacker cause the application to crash and compromise a vulnerable system.
Last Update Date: 14 Sep 2011 12:09 Release Date: 14 Sep 2011 4934 Views

RISK: Medium Risk

Medium Risk

Microsoft SharePoint Multiple Elevation of Privilege Vulnerabilities

XSS in SharePoint Calendar Vulnerability A cross-site scripting vulnerability exists in Microsoft SharePoint 2010 that could result in information disclosure or elevation of privilege if a user clicks a specially crafted URL containing malicious JavaScript elements. Due to the vulnerability, when the malicious JavaScript is...
Last Update Date: 14 Sep 2011 11:58 Release Date: 14 Sep 2011 4658 Views

RISK: High Risk

High Risk

Microsoft Office Multiple Remote Code Execution Vulnerabilities

Office Component Insecure Library Loading Vulnerability A remote code execution vulnerability exists in the way that Microsoft Office handles the loading of DLL files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view...
Last Update Date: 14 Sep 2011 11:55 Release Date: 14 Sep 2011 4591 Views

RISK: High Risk

High Risk

Microsoft Excel Multiple Remote Code Execution Vulnerabilities

A remote code execution vulnerabilities exists in the way that Microsoft Excel handles specially crafted Excel files. An attacker who successfully exploited this vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or...
Last Update Date: 14 Sep 2011 11:52 Release Date: 14 Sep 2011 4627 Views

RISK: High Risk

High Risk

Microsoft Windows Components Insecure Library Loading Vulnerability

A remote code execution vulnerability exists in the way that certain Windows components handle the loading of DLL files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data...
Last Update Date: 14 Sep 2011 11:48 Release Date: 14 Sep 2011 4612 Views

RISK: Medium Risk

Medium Risk

Microsoft WINS Local Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists in WINS, allowing arbitrary code to be executed in the context of the local system. The vulnerability is caused when the WINS server improperly processes a sequence of specially crafted packets received on the loopback interface. A local attacker who successfully...
Last Update Date: 14 Sep 2011 11:45 Release Date: 14 Sep 2011 4919 Views

RISK: High Risk

High Risk

Wireshark Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. An error within the processing of certain IKE packets can be exploited to cause an infinite loop...
Last Update Date: 12 Sep 2011 10:22 Release Date: 12 Sep 2011 5083 Views