Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Asterisk UPDTL Buffer Overflow Vulnerabilities

 Multiple vulnerabilities have been identified in Asterisk, which could be exploited by remote attackers to cause a denial of service or execute arbitrary code. These issues are caused by stack and heap overflow errors in the UDPTL decoding routines, which could be exploited by remote attackers...
Last Update Date: 23 Feb 2011 15:24 Release Date: 23 Feb 2011 5706 Views

RISK: High Risk

High Risk

Adobe Flash Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Flash Player, which could be exploited by remote attackers to compromise a vulnerable system. These issues are caused by input validation errors, memory corruptions, and integer overflow errors when processing malformed Flash content, which could...
Last Update Date: 16 Feb 2011 Release Date: 10 Feb 2011 5489 Views

RISK: High Risk

High Risk

Microsoft Windows SMB "mrxsmb.sys" Remote Heap Overflow Vulnerability

A vulnerability has been identified in Microsoft Windows, which could be exploited by remote attackers to cause a denial of service or take complete control of a vulnerable system. This issue is caused by a heap overflow error in the "BowserWriteErrorLogEntry()" function within...
Last Update Date: 16 Feb 2011 17:01 Release Date: 16 Feb 2011 6316 Views

RISK: High Risk

High Risk

VMware Products Code Execution and Security Bypass Vulnerabilities

Multiple vulnerabilities have been identified in various VMware products, which could be exploited by attackers or malicious users to bypass security restrictions, gain knowledge of certain information, cause a denial of service or execute arbitrary code. These issues are caused by errors in...
Last Update Date: 16 Feb 2011 Release Date: 14 Feb 2011 5979 Views

RISK: Medium Risk

Medium Risk

Novell iPrint Server LPD Code Execution Vulnerability

A vulnerability has been identified in Novell iPrint for Linux Open Enterprise Server, which could be exploited by remote attackers to take complete control of a vulnerable system. This issue is caused by a buffer overflow error in LPD when processing malformed data, which could be exploited...
Last Update Date: 11 Feb 2011 17:46 Release Date: 11 Feb 2011 5805 Views

RISK: Medium Risk

Medium Risk

HP-UX CDE Calendar Manager Buffer Overflow Vulnerability

A vulnerability has been identified in HP-UX, which could be exploited by remote attackers to take complete control of a vulnerable system. This issue is caused by a buffer overflow error in the CMSD server (rpc.cmsd) within the CDE Calendar Manager when...
Last Update Date: 11 Feb 2011 17:41 Release Date: 11 Feb 2011 6023 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which could be exploited by remote attackers to cause a denial of service or execute arbitrary code. Due to a stale pointer related to animation event handling, which could allow code execution.Due to a use...
Last Update Date: 11 Feb 2011 Release Date: 10 Feb 2011 5666 Views

RISK: High Risk

High Risk

RealPlayer Predictable Temporary File Cross Domain Scripting Vulnerability

A vulnerability has been identified in RealPlayer, which could be exploited by remote attackers to compromise a vulnerable system. This issue is caused by an error within the temporary file naming scheme used by the application to store references to RM files, which could...
Last Update Date: 11 Feb 2011 Release Date: 10 Feb 2011 5669 Views

RISK: High Risk

High Risk

Adobe Acrobat and Reader Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Acrobat and Reader, which could be exploited by malicious users to gain elevated privileges, or by remote attackers to gain knowledge of sensitive information or compromise a vulnerable system. These issues are caused by insecure permissions...
Last Update Date: 11 Feb 2011 Release Date: 10 Feb 2011 5598 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows LSASS Length Validation Vulnerability( 09 February 2011 )

An elevation of privilege vulnerability exists in the way that the Microsoft Windows Local Security Authority Subsystem Service (LSASS) processes specially crafted authentication requests. The vulnerability could allow an attacker to run code with elevated privileges. An attacker who successfully exploited this vulnerability...
Last Update Date: 11 Feb 2011 Release Date: 9 Feb 2011 4996 Views