Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Microsoft Windows Data Access Components Insecure Library Loading Vulnerability

A remote code execution vulnerability exists in the way that the Windows Data Access Tracing component handles the loading of DLL files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, ...
Last Update Date: 10 Aug 2011 11:52 Release Date: 10 Aug 2011 5249 Views

RISK: High Risk

High Risk

Microsoft Windows DNS Server Multiple Vulnerabilities

DNS NAPTR Query Vulnerability A remote code execution vulnerability exists in the way that the Windows DNS Server improperly handles a specially crafted NAPTR query string in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the system. An attacker could...
Last Update Date: 10 Aug 2011 11:52 Release Date: 10 Aug 2011 5362 Views

RISK: High Risk

High Risk

Microsoft Internet Explorer Multiple Vulnerabilities

Window Open Race Condition Vulnerability A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that may have been corrupted due to a race condition. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the...
Last Update Date: 10 Aug 2011 11:47 Release Date: 10 Aug 2011 5060 Views

RISK: High Risk

High Risk

Apple QuickTime Multiple Vulnerabilities

Multiple vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system. An error within the processing of GIF files can be exploited to cause a heap-based buffer overflow by tricking a user into opening a...
Last Update Date: 9 Aug 2011 Release Date: 5 Aug 2011 5469 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, and compromise a user's system. An unspecified error exists when confirming an extension install via a browser dialog.An unspecified...
Last Update Date: 4 Aug 2011 09:57 Release Date: 4 Aug 2011 5807 Views

RISK: High Risk

High Risk

Apple iWork Numbers / Pages Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple iWork, which can be exploited by malicious people to compromise a user's system. An error in iWork Numbers when handling Excel files can be exploited to cause a buffer overflow via a specially crafted file. An error in...
Last Update Date: 27 Jul 2011 09:21 Release Date: 27 Jul 2011 13156 Views

RISK: High Risk

High Risk

Oracle Solaris Adobe Flash Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Flash Player included in Solaris, which can be exploited by malicious people to disclose potentially sensitive information and compromise a user's system.   For more information, please refer to SA11051601
Last Update Date: 26 Jul 2011 12:16 Release Date: 26 Jul 2011 5926 Views

RISK: High Risk

High Risk

Apple Safari Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple Safari, which can be exploited by malicious people to disclose sensitive information, manipulate certain data, conduct cross-site scripting and spoofing attacks, bypass certain security restrictions, and compromise a user's system. An error within...
Last Update Date: 22 Jul 2011 12:12 Release Date: 22 Jul 2011 5495 Views

RISK: High Risk

High Risk

Foxit Reader ActiveX Control "OpenFile()" Buffer Overflow Vulnerability

A vulnerability has been identified in Foxit Reader, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in the FoxitReaderOCX ActiveX control when processing the "OpenFile()" method. This can be exploited...
Last Update Date: 22 Jul 2011 11:45 Release Date: 22 Jul 2011 5718 Views

RISK: High Risk

High Risk

Oracle Solaris Multiple Vulnerabilities

Multiple vulnerabilities have been reported in Oracle Solaris, which can be exploited by malicious and local users to cause a DoS (Denial of Service), gain escalated privileges or potentially compromise a vulnerable system. An unspecified error in fingerd can be exploited to cause the system to...
Last Update Date: 21 Jul 2011 10:21 Release Date: 21 Jul 2011 5655 Views