Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Microsoft Windows Help Center URL Validation Vulnerability ( 14 July 2010 )

An unauthenticated remote code execution vulnerability exists in the way that the Microsoft Help and Support Center validates specially crafted URLs. This vulnerability could allow remote code execution if a user views a specially crafted Web page using a Web browser or clicks a specially crafted link in an...
Last Update Date: 28 Jan 2011 Release Date: 14 Jul 2010 4183 Views

RISK: Medium Risk

Medium Risk

Microsoft Office Access ActiveX Controls Multiple Vulnerabilities ( 14 July 2010 )

1. Access ActiveX Control VulnerabilityA remote code execution vulnerability exists in Access ActiveX controls due to the way that multiple ActiveX controls are loaded by Internet Explorer. An attacker who successfully exploited this vulnerability could run arbitrary code as the logged-on user. If a user...
Last Update Date: 28 Jan 2011 Release Date: 14 Jul 2010 4190 Views

RISK: Medium Risk

Medium Risk

Microsoft Outlook SMB Attachment Vulnerability( 14 July 2010 )

A remote code execution vulnerability exists in the way that Microsoft Office Outlook verifies attachments in a specially crafted e-mail message. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change...
Last Update Date: 28 Jan 2011 Release Date: 14 Jul 2010 4160 Views

RISK: Medium Risk

Medium Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilitieshave been identified in Google Chrome, which could be exploited by attackers to gain knowledge of sensitive information, cause a denial of service or compromise a vulnerable system.1. An unspecified error related to WebGL can be exploited to trigger an OOB read.2...
Last Update Date: 28 Jan 2011 Release Date: 6 Jul 2010 4367 Views

RISK: Medium Risk

Medium Risk

Kingsoft Office 2010 Document Processing Buffer Overflow Vulnerability

A vulnerability has been identified in Kingsoft Office 2010, which could be exploited by attackers to compromise a vulnerable system. This issue is caused by a buffer overflow error when processing malformed Writer documents, which could be exploited by attackers to execute arbitrary commands by tricking a...
Last Update Date: 28 Jan 2011 Release Date: 30 Jun 2010 4480 Views

RISK: Medium Risk

Medium Risk

Adobe Acrobat and Reader Multiple Code Execution Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Reader and Acrobat, which could be exploited by attackers to cause a denial of service or compromise a vulnerable system. These issues are caused by memory corruptions, invalid pointers, uninitialized memory, array-indexing and use-after...
Last Update Date: 28 Jan 2011 Release Date: 30 Jun 2010 4571 Views

RISK: Medium Risk

Medium Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which could be exploited by attackers to gain knowledge of sensitive information or compromise a vulnerable system.1. An input validation error related to "application/json" responses, which could allow cross site scripting attacks....
Last Update Date: 28 Jan 2011 Release Date: 28 Jun 2010 4358 Views

RISK: Medium Risk

Medium Risk

HP-UX Kerberos Multiple Vulnerabilities

Multiple vulnerabilities have been identified in HP-UX, which could be exploited by attackers to cause a denial of service or compromise a vulnerable system. These issues are caused by errors in Kerberos. .
Last Update Date: 28 Jan 2011 Release Date: 25 Jun 2010 4420 Views

RISK: Medium Risk

Medium Risk

Mozilla Products Multiple Vulnerabilities

Multiple vulnerabilitieshave been identified in Mozilla Firefox, Thunderbird and SeaMonkey, which could be exploited by attackers to manipulate or disclose certain data, bypass security restrictions or compromise a vulnerable system.1. Due to memory corruption errors in the browser and JavaScript engines when parsing malformed...
Last Update Date: 28 Jan 2011 Release Date: 24 Jun 2010 4472 Views

RISK: Medium Risk

Medium Risk

Apple iPhone and iPod touch iOS Multiple Vulnerabilities

Multiple vulnerabilitieshave been identified in Apple iPhone and iPod touch iOS, which could be exploited by attackers to disclose sensitive information, bypass security restrictions or compromise an affected system.1. An security issue is caused due to the Application Sandbox not properly restricting access to the...
Last Update Date: 28 Jan 2011 Release Date: 23 Jun 2010 4689 Views