Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

IBM Lotus Notes "cai" URI and iCal Remote Code Execution Vulnerabilities

Two vulnerabilities have been identified in IBM Lotus Notes, which could be exploited by remote attackers to compromise a vulnerable system. 1. An input validation error when processing "cai" URIs, which could allow attackers to execute arbitrary code. 2. A buffer overflow...
Last Update Date: 8 Feb 2011 15:27 Release Date: 8 Feb 2011 5625 Views

RISK: High Risk

High Risk

IBM Lotus Domino Multiple Remote Buffer Overflow Vulnerabilities

Multiple vulnerabilities have been identified in IBM Lotus Domino, which could be exploited by remote attackers to compromise a vulnerable server. 1. A stack overflow error related to MIME handling, which could be exploited by remote unauthenticated attackers to execute arbitrary code. 2. An...
Last Update Date: 8 Feb 2011 15:25 Release Date: 8 Feb 2011 5715 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which could be exploited by remote attackers to bypass restrictions, gain knowledge of sensitive information, cause a denial of service or execute arbitrary code. 1. A race condition within audio handling, which could...
Last Update Date: 7 Feb 2011 16:55 Release Date: 7 Feb 2011 5484 Views

RISK: High Risk

High Risk

HP OpenView Performance Insight Server Hiden Account Vulnerability

A vulnerability has been identified in HP OpenView Performance Insight Server, which could be exploited by remote attackers to take complete control of an affected system. This issue is caused due to a hidden account present within the "com.trinagy.security....
Last Update Date: 2 Feb 2011 15:42 Release Date: 2 Feb 2011 5578 Views

RISK: High Risk

High Risk

Oracle Solaris Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Oracle Solaris, which could be exploited by attackers or malicious users to cause a denial of service, gain knowledge of sensitive information or take complete control of a vulnerable system. These issues are caused by errors in the...
Last Update Date: 1 Feb 2011 Release Date: 20 Jan 2011 7281 Views

RISK: High Risk

High Risk

Oracle Open Office and StarOffice/StarSuite Code Execution Vulnerabilities

Two vulnerabilities have been identified in Oracle Open Office and StarOffice/StarSuite, which could be exploited by attackers to compromise a vulnerable system.
Last Update Date: 1 Feb 2011 Release Date: 20 Jan 2011 7084 Views

RISK: High Risk

High Risk

Oracle Database Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Oracle Database, which could be exploited by attackers or malicious users to cause a denial of service, gain knowledge of sensitive information or execute arbitrary code. These issues are caused by errors in the Client System Analyzer, ...
Last Update Date: 1 Feb 2011 Release Date: 20 Jan 2011 7074 Views

RISK: Medium Risk

Medium Risk

HP OpenView Storage Data Protector Remote Code Execution Vulnerability

A vulnerability has been identified in HP OpenView Storage Data Protector, which could be exploited by remote attackers to take complete control of a vulnerable system. This issue is caused by an error when processing user-supplied data, which could allow remote unauthenticated attackers...
Last Update Date: 1 Feb 2011 Release Date: 21 Jan 2011 7124 Views

RISK: Medium Risk

Medium Risk

Trend Micro Control Manager "mrf.exe" Remote Buffer Overflow Vulnerability

A vulnerability has been identified in Trend Micro Control Manager, which could be exploited by remote attackers to take complete control of a vulnerable system. This issue is caused by a buffer overflow error in the "mrf.exe" TMI service module when displaying...
Last Update Date: 1 Feb 2011 Release Date: 21 Jan 2011 7754 Views

RISK: High Risk

High Risk

Linksys WRT54GC Web Management Interface Buffer Overflow Vulnerability

A vulnerability has been identified in Linksys WRT54GC, which could be exploited by malicious people to take complete control of a vulnerable system. This issue is caused by a boundary error when handling HTTP POST requests sent to the web-based management interface. ...
Last Update Date: 1 Feb 2011 Release Date: 24 Jan 2011 6566 Views