Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Microsoft Hyper-V Instruction Set Validation Vulnerability

A denial of service vulnerability exists in Hyper-V on Windows Server 2008 and Windows Server 2008 R2. The vulnerability is due to insufficient validation of specific sequences of machine instructions by Hyper-V. An attacker who successfully exploited this vulnerability could cause the affected Hyper...
Last Update Date: 28 Jan 2011 Release Date: 10 Feb 2010 4191 Views

RISK: Medium Risk

Medium Risk

Microsoft Kerberos Null Pointer Dereference Vulnerability

A denial of service vulnerability exists in implementations of Kerberos. The vulnerability is due to improper handling of Ticket-Granting-Ticket renewal requests by a client on a remote, non-Windows realm in a mixed-mode Kerberos implementation. An attacker who successfully exploited...
Last Update Date: 28 Jan 2011 Release Date: 10 Feb 2010 4241 Views

RISK: Medium Risk

Medium Risk

Microsoft Data Analyzer ActiveX Control Vulnerability

A remote code execution vulnerability exists in the Microsoft Data Analyzer ActiveX Control. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this...
Last Update Date: 28 Jan 2011 Release Date: 10 Feb 2010 4216 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Local Privilege Elevation Vulnerability

An elevation of privilege vulnerability exists because the Windows Client/Server Run-time Subsystem (CSRSS) does not properly terminate user processes when a user logs out. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then...
Last Update Date: 28 Jan 2011 Release Date: 10 Feb 2010 4233 Views

RISK: Medium Risk

Medium Risk

Microsoft Internet Explorer Information Disclosure Vulnerability

A vulnerability has been identified in Microsoft Internet Explorer, which could be exploited by attackers to access files with an already known filename and location.The vulnerability exists due to content being forced to render incorrectly from local files in such a way that information can be exposed...
Last Update Date: 28 Jan 2011 Release Date: 4 Feb 2010 4322 Views

RISK: Medium Risk

Medium Risk

Apple iPhone and iPod Touch Multiple Vulnerabilities

Multiple vulnerabilitieshave been identified in Apple iPhone and iPod touch, which could be exploited by attackers to bypass security restrictions, gain knowledge of sensitive information, cause a denial of service or compromise a vulnerable system.1. Due to a buffer overflow error when processing malformed...
Last Update Date: 28 Jan 2011 Release Date: 4 Feb 2010 4354 Views

RISK: Medium Risk

Medium Risk

VMware Products Java JRE Multiple Code Execution Vulnerabilities

Multiple vulnerabilities have been identified in various VMware products, which could be exploited by attackers to bypass security restrictions, disclose sensitive information, cause a denial of service, or compromise an affected system. These issues are caused by errors in Java JRE.
Last Update Date: 28 Jan 2011 Release Date: 2 Feb 2010 4401 Views

RISK: Medium Risk

Medium Risk

Apache mod_proxy "ap_proxy_send_fb()" Integer Overflow Vulnerability

A vulnerability has been identified in Apache, which could be exploited by remote attackers to cause a denial of service or compromise a vulnerable web server. This issue is caused by an integer overflow error in the "ap_proxy_send_fb()" [modules/proxy/proxy_util.c] ...
Last Update Date: 28 Jan 2011 Release Date: 29 Jan 2010 4522 Views

RISK: Medium Risk

Medium Risk

Google Chrome Memory Corruption and Security Bypass Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which could be exploited by remote attackers to bypass restrictions, gain knowledge of sensitive information, cause a denial of service or potentially compromise a vulnerable system.1. Due to an unspecified error which could allow web sites...
Last Update Date: 28 Jan 2011 Release Date: 27 Jan 2010 4438 Views

RISK: Medium Risk

Medium Risk

Microsoft Internet Explorer Multiple Vulnerabilities ( 22 January 2010 )

1. XSS Filter Script Handling Vulnerability An XSS filter bypass vulnerability exists in the way that Internet Explorer 8 disables an HTML attribute in otherwise appropriately filtered HTTP response data. The vulnerability could allow initially disabled scripts to run in the wrong security context, leading to information...
Last Update Date: 28 Jan 2011 Release Date: 22 Jan 2010 4264 Views