Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

HP OpenView Storage Data Protector Code Execution Vulnerabilities

Multiple vulnerabilities have been identified in HP OpenView Storage Data Protector, which could be exploited by remote attackers to gain knowledge of sensitive information or compromise a vulnerable system. These issues are caused by buffer overflows and directory traversal errors in the Backup Client Service (OmniInet....
Last Update Date: 3 May 2011 17:51 Release Date: 3 May 2011 6595 Views

RISK: High Risk

High Risk

Mozilla Products Mulitple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox, Thunderbird and SeaMonkey, which could be exploited by attackers to manipulate or disclose certain data, bypass security restrictions or compromise a vulnerable system. These issues are caused by memory corruptions, dangling pointers, input validation errors, ...
Last Update Date: 3 May 2011 17:49 Release Date: 3 May 2011 6216 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilites

Multiple vulnerabilities have been identified in Google Chrome, which could be exploited by remote attackers to bypass security restrictions, disclose sensitive information, conduct spoofing attacks, and compromise a vulnerable system. An unspecified error related to a stale pointer exists within the handling of floating objects...
Last Update Date: 29 Apr 2011 11:43 Release Date: 29 Apr 2011 6119 Views

RISK: High Risk

High Risk

Oracle Products Multiple Vulnerabilies

Multiple vulnerabilities have been identified in various Oracle products and components, which could be exploited by attackers to cause a denial of service, disclose sensitive information or compromise a vulnerable system.
Last Update Date: 21 Apr 2011 12:23 Release Date: 21 Apr 2011 6171 Views

RISK: High Risk

High Risk

Apple iTunes WebKit Multiple Vulnerabilities

Two vulnerabilities have been identified in Apple iTunes, which could be exploited by remote attackers to compromise a vulnerable system. Due to a use-after-free error in WebKit when handling text nodes, which could be exploited to execute arbitrary code via a malicious web...
Last Update Date: 21 Apr 2011 12:22 Release Date: 21 Apr 2011 5987 Views

RISK: High Risk

High Risk

Wireshark Multiple Code Execution and Denial of Service Vulnerabilities

Multiple vulnerabilities have been identified in Wireshark, which could be exploited by attackers to cause a denial of service or compromise a vulnerable system. A buffer overflow error in the DECT dissector when processing malformed data, which could allow code execution via malformed packets or a malicious...
Last Update Date: 20 Apr 2011 10:27 Release Date: 20 Apr 2011 5961 Views

RISK: High Risk

High Risk

Google Chrome GPU Process Vulnerability

Multiple vulnerabilities have been identified in Google Chrome, which could be exploited by remote attackers to compromise a vulnerable system. An off-by-three error in the GPU process, which could be exploited by remote attackers to execute arbitrary code via a malicious web page...
Last Update Date: 19 Apr 2011 11:31 Release Date: 19 Apr 2011 6042 Views

RISK: High Risk

High Risk

Apple iOS Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple iOS for iPhone, iPod and iPad, which could be exploited by remote attackers to bypass restrictions, gain knowledge of sensitive information, or compromise a vulnerable device. 1. A use-after-free error in WebKit when...
Last Update Date: 19 Apr 2011 Release Date: 15 Apr 2011 6077 Views

RISK: Medium Risk

Medium Risk

VLC Media Player "MP4_ReadBox_skcr()" Heap Corruption Vulnerability

A vulnerability has been identified in VLC Media Player, which could be exploited by remote attackers to compromise a vulnerable system. This issue is caused by a heap corruption error in the "MP4_ReadBox_skcr()" [modules/demux/mp4/libmp4.c] function when processing...
Last Update Date: 19 Apr 2011 Release Date: 12 Apr 2011 5433 Views

RISK: High Risk

High Risk

Apple Safari WebKit Multiple Vulnerabilities

Two vulnerabilities have been identified in Apple Safari, which could be exploited by remote attackers to compromise a vulnerable system.A use-after-free error in WebKit when handling text nodes, which could be exploited to execute arbitrary code via a malicious web page...
Last Update Date: 19 Apr 2011 Release Date: 15 Apr 2011 5906 Views