Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Microsoft Windows Msxml2.XMLHTTP.3.0 Response Handling Memory Corruption Vulnerability ( 11 August 2010 )

A remote code execution vulnerability exists in the way that Microsoft XML Core Services handles HTTP responses. The vulnerability could allow remote code execution if a user browses a Web site that contains specially crafted content or opens specially crafted HTML e-mail. An attacker who successfully...
Last Update Date: 28 Jan 2011 Release Date: 11 Aug 2010 4426 Views

RISK: Medium Risk

Medium Risk

Microsoft Internet Explorer Multiple Vulnerabilities ( 11 August 2010 )

1. Event Handler Cross-Domain VulnerabilityAn information disclosure vulnerability exists in Internet Explorer that could allow script to gain access to a browser window in another domain or Internet Explorer zone. An attacker could exploit the vulnerability by constructing a specially crafted Web page that could allow...
Last Update Date: 28 Jan 2011 Release Date: 11 Aug 2010 4160 Views

RISK: Medium Risk

Medium Risk

Microsoft Office Excel Memory Corruption Vulnerability ( 11 August 2010 )

A remote code execution vulnerability exists in the way that Microsoft Office Excel handles specially crafted Excel files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; ...
Last Update Date: 28 Jan 2011 Release Date: 11 Aug 2010 4118 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Movie Maker Memory Corruption Vulnerability ( 11 August 2010 )

A remote code execution vulnerability exists in the way that Windows Movie Maker handles specially crafted project files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; ...
Last Update Date: 28 Jan 2011 Release Date: 11 Aug 2010 4194 Views

RISK: Medium Risk

Medium Risk

Microsoft .NET Framework Common Language Runtime and Silverlight Multiple Vulnerabilities ( 11 August 2010 )

1. Microsoft Silverlight Memory Corruption VulnerabilityA remote code execution vulnerability exists in the way that Microsoft Silverlight handles pointers. The vulnerability could allow remote code execution if a user visit a specially crafted Web site that contains Silverlight content.2. Microsoft Silverlight and Microsoft .NET...
Last Update Date: 28 Jan 2011 Release Date: 11 Aug 2010 4288 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Cinepak Codec Decompression Vulnerability ( 11 August 2010 )

A remote code execution vulnerability exists in the way the Cinepak codec handles supported format files. This vulnerability could allow code execution if a user opened a specially crafted media file. If a user is logged on with administrative user rights, an attacker who successfully exploited this...
Last Update Date: 28 Jan 2011 Release Date: 11 Aug 2010 4292 Views

RISK: Medium Risk

Medium Risk

Foxit Reader Compact Font Format Memory Corruption Vulnerability

A vulnerability has been identified in Foxit Reader, which could be exploited by attackers to potentially compromise a vulnerable system. This issue is caused by a memory corruption error when processing Compact Font Format (CFF) data within a PDF document, which could be exploited by...
Last Update Date: 28 Jan 2011 Release Date: 9 Aug 2010 4312 Views

RISK: Medium Risk

Medium Risk

Adobe Acrobat and Reader Font Parsing Integer Overflow Vulnerability

A vulnerability has been identified in Adobe Acrobat and Reader, which could be exploited by attackers to potentially compromise a vulnerable system. This issue is caused by an integer overflow error in the "CoolType.dll" module when processing a PDF document containing a TrueType Font...
Last Update Date: 28 Jan 2011 Release Date: 5 Aug 2010 4482 Views

RISK: Medium Risk

Medium Risk

OpenOffice.org Impress File Processing Buffer Overflow Vulnerabilities

Two vulnerabilitieshave been identified in OpenOffice.org, which could be exploited by attackers to compromise a vulnerable system. These issues are caused by buffer overflow errors in Impress when processing malformed documents, which could be exploited by attackers to crash an affected application or execute arbitrary...
Last Update Date: 28 Jan 2011 Release Date: 5 Aug 2010 4413 Views

RISK: Medium Risk

Medium Risk

Apple iOS Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple iOS for iPhone, iPad and iPod, which could be exploited by remote attackers to take complete control of a vulnerable device.1. Caused by a memory corruption error when processing Compact Font Format (CFF) data within a...
Last Update Date: 28 Jan 2011 Release Date: 4 Aug 2010 5218 Views