Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Apple Safari Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple Safari, which could be exploited by remote attackers to obtain sensitive information, bypass security restrictions or compromise a vulnerable system. These issues are caused by errors in ImageIO, libxml, and WebKit, which could allow attackers to execute...
Last Update Date: 11 Mar 2011 10:50 Release Date: 11 Mar 2011 6185 Views

RISK: High Risk

High Risk

Apple Mac OS X Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple Mac OS X, which could be exploited by remote attackers or malicious users to manipulate or gain knowledge of sensitive information, bypass restrictions, cause a denial of service or compromise a vulnerable system. These issues are caused by errors...
Last Update Date: 10 Mar 2011 14:43 Release Date: 10 Mar 2011 5659 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which could be exploited by remote attackers to bypass restrictions, disclose sensitive information, cause a denial of service or execute arbitrary code. These issues are caused by access and input validation errors, use-after-free...
Last Update Date: 10 Mar 2011 12:27 Release Date: 10 Mar 2011 5717 Views

RISK: Medium Risk

Medium Risk

Joomla Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Joomla, which could be exploited by attackers or malicious users to gain unauthorized access, manipulate or gain knowledge of certain information and data, or cause a denial of service. These issues are caused by input validation errors that could allow...
Last Update Date: 10 Mar 2011 12:26 Release Date: 10 Mar 2011 5820 Views

RISK: Medium Risk

Medium Risk

Foxit Reader "createDataObject()" Arbitrary File Creation Vulnerability

A vulnerability has been identified in Foxit Reader, which could be exploited by remote attackers to compromise a vulnerable system. This issue is caused by an input validation error when handling arguments supplied via the "createDataObject()" method, which could allow attackers to create a file...
Last Update Date: 9 Mar 2011 10:18 Release Date: 9 Mar 2011 5494 Views

RISK: High Risk

High Risk

Microsoft Office Groove Insecure Library Loading Vulnerability

A remote code execution vulnerability exists in the way that Microsoft Groove 2007 handles the loading of DLL files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, ...
Last Update Date: 9 Mar 2011 10:18 Release Date: 9 Mar 2011 5746 Views

RISK: High Risk

High Risk

Microsoft Windows Remote Desktop Insecure Library Loading Vulnerability

A remote code execution vulnerability exists in the way that Windows Remote Desktop Client handles the loading of DLL files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change...
Last Update Date: 9 Mar 2011 09:55 Release Date: 9 Mar 2011 5601 Views

RISK: High Risk

High Risk

Microsoft Windows Media Multiple Vulnerabilities

A remote code execution vulnerability exists in the way that Microsoft DirectShow handles the loading of DLL files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or...
Last Update Date: 9 Mar 2011 09:54 Release Date: 9 Mar 2011 5506 Views

RISK: High Risk

High Risk

Apple iTunes Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple iTunes, which could be exploited by remote attackers to obtain sensitive information, bypass security restrictions or compromise a vulnerable system. These issues are caused by errors in ImageIO, libxml and WebKit.
Last Update Date: 4 Mar 2011 10:52 Release Date: 4 Mar 2011 5822 Views

RISK: High Risk

High Risk

Mozilla Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox, Thunderbird and SeaMonkey, which could be exploited by attackers to manipulate or disclose certain data, bypass security restrictions or compromise a vulnerable system.Due to memory corruption errors in the browser engine when parsing malformed data, which...
Last Update Date: 3 Mar 2011 10:59 Release Date: 3 Mar 2011 5797 Views