Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

FreeType BDF Glyph Processing Buffer Overflow Vulnerability

A vulnerability has been identified in FreeType, which can be exploited by malicious people to potentially compromise an application using the library.   The vulnerability is caused due to an error in the "_bdf_parse_glyphs()" function (src/bdf/bdflib.c) when processing glyph...
Last Update Date: 28 Dec 2012 12:02 Release Date: 28 Dec 2012 4050 Views

RISK: Medium Risk

Medium Risk

GNU grep Long Line Handling Integer Overflow Vulnerability

A vulnerability has been identified in grep, which can be exploited by malicious people to potentially compromise a user's system.   The vulnerability is caused due to an integer overflow error when parsing very long lines and can be exploited to cause a heap-based buffer...
Last Update Date: 28 Dec 2012 12:02 Release Date: 28 Dec 2012 4033 Views

RISK: Medium Risk

Medium Risk

VMware vCenter Server Appliance Directory Traversal Vulnerability

Two vulnerabilities have been identified in VMware vCenter Server Appliance, which can be exploited by remote authenticated user to view files on the target system.A remote authenticated user can supply a specially crafted request to retrieve arbitrary files from the target system.A remote authenticated user...
Last Update Date: 24 Dec 2012 11:11 Release Date: 24 Dec 2012 4157 Views

RISK: Medium Risk

Medium Risk

IBM InfoSphere Streams Java Multiple Vulnerabilities

Multiple vulnerabilities have been indentified in IBM InfoSphere Streams, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
Last Update Date: 21 Dec 2012 17:21 Release Date: 21 Dec 2012 4107 Views

RISK: High Risk

High Risk

Adobe Shockwave Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Shockwave Player. which can be exploited by remote user to compromise a vulnerable system. A remote user can create specially crafted Shockwave content that specifies an older version (10.x) of Shockwave and, when loaded by the...
Last Update Date: 21 Dec 2012 17:19 Release Date: 21 Dec 2012 4141 Views

RISK: High Risk

High Risk

Nagios history.cgi "get_history()" Buffer Overflow Vulnerability

A vulnerability has been identified in Nagios, which can be exploited by malicious people to compromise a vulnerable system.   The vulnerability is caused due to a boundary error within the "get_history()" function (history.c) within history.cgi when handling certain parameters, ...
Last Update Date: 20 Dec 2012 10:12 Release Date: 20 Dec 2012 5509 Views

RISK: Medium Risk

Medium Risk

Oracle Solaris Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Java included in Solaris, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and potentially compromise a vulnerable system.   For more information, please refer to...
Last Update Date: 20 Dec 2012 10:12 Release Date: 20 Dec 2012 3926 Views

RISK: Medium Risk

Medium Risk

RealPlayer Multiple Vulnerabilities

Multiple vulnerabilities have been indentified in RealPlayer, which can be exploited by malicious people to compromise a user's system. An error when handling RealAudio files may result in dereferencing an invalid pointer, and can be exploited to cause a buffer overflow. Successful exploitation of...
Last Update Date: 18 Dec 2012 09:56 Release Date: 18 Dec 2012 4119 Views

RISK: Medium Risk

Medium Risk

VMware View Connection/Security Server Directory Traversal Vulnerability

A vulnerability has been identified in VMware View, which can be exploited by malicious people to disclose sensitive information. The vulnerability is caused due to an error within the View Connection Server and View Security Server and can be exploited to disclose arbitrary files via directory traversal attacks...
Last Update Date: 17 Dec 2012 10:52 Release Date: 17 Dec 2012 4178 Views

RISK: High Risk

High Risk

Adobe Camera Raw Plug-in TIFF Image Processing Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Camera Raw Plug-in, which can be exploited by malicious people to compromise a user's system.An error in the "Camera Raw.8bi" plug-in when processing a LZW compressed TIFF image can be...
Last Update Date: 14 Dec 2012 11:03 Release Date: 14 Dec 2012 4259 Views