Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Apache HTTP Server `httpOnly´ Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apache HTTP Server, which can be exploited by malicious people to disclose potentially sensitive information and cause a DoS (Denial of Service).An error when handling the "%{cookiename}C" log format string when using a threaded MPM can...
Last Update Date: 22 May 2012 Release Date: 30 Jan 2012 5004 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, where some have unknown impacts and others can be exploited by malicious people to bypass certain security restrictions, and compromise a user's system. An error exists when loading links from internal pages, and related...
Last Update Date: 17 May 2012 18:00 Release Date: 17 May 2012 4575 Views

RISK: Medium Risk

Medium Risk

OpenOffice.org Multiple Vulnerabilities

Multiple vulnerabilities have been identified in OpenOffice.org. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted file that, when loaded by the target user, will trigger an integer...
Last Update Date: 17 May 2012 15:44 Release Date: 17 May 2012 4562 Views

RISK: Medium Risk

Medium Risk

Apple QuickTime Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on...
Last Update Date: 17 May 2012 15:43 Release Date: 17 May 2012 4399 Views

RISK: Medium Risk

Medium Risk

RealPlayer Multiple Vulnerabilities

Multiple vulnerabilities have been identified in RealPlayer, which can be exploited by malicious people to compromise a user's system.   An error within the handling of MP4 files can be exploited to corrupt memory, the parsing of RealMedia ASMRuleBook can be exploited to execute arbitrary code...
Last Update Date: 17 May 2012 15:42 Release Date: 17 May 2012 4473 Views

RISK: Medium Risk

Medium Risk

Adobe Photoshop CS5 Collada File Processing Buffer Overflow Vulnerability

A vulnerability has been identified in Adobe Photoshop CS5, which can be exploited by malicious people to compromise a user's system.  The vulnerability is caused due to a boundary error in the U3D.8BI plug-in when processing certain Collada file elements. This...
Last Update Date: 16 May 2012 11:52 Release Date: 16 May 2012 4567 Views

RISK: High Risk

High Risk

Opera URL Parsing Code Execution Vulnerability

A vulnerability has been identified in Opera, which can be exploited by remote attacker to compromise a user's system. An out-of-bounds write error when parsing the URL can be exploited to corrupt memory via a specially crafted URL.
Last Update Date: 14 May 2012 11:06 Release Date: 14 May 2012 4780 Views

RISK: High Risk

High Risk

Apple Mac OS X Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple Mac OS X, which can be exploited by malicious people to execute arbitrary code, obtain sensitive information, operate with elevated privileges, cause a denial-of-service condition or compromise a user's system.
Last Update Date: 11 May 2012 11:25 Release Date: 11 May 2012 4585 Views

RISK: High Risk

High Risk

Apple Safari Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple Safari, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.
Last Update Date: 11 May 2012 11:22 Release Date: 11 May 2012 4587 Views

RISK: Medium Risk

Medium Risk

Adobe Shockwave Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Shockwave Player, which can be exploited by malicious people to compromise a user's system. Several unspecified error can be exploited to corrupt memory. Successful exploitation of the vulnerabilities may allow execution of arbitrary code.
Last Update Date: 10 May 2012 18:54 Release Date: 10 May 2012 4438 Views