Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Microsoft Internet Explorer Multiple Vulnerabilities

1. HTML Object/Element Memory Corruption VulnerabilityA remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has not been correctly initialized or has been deleted. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a...
Last Update Date: 28 Jan 2011 Release Date: 15 Dec 2010 4664 Views

RISK: Medium Risk

Medium Risk

Microsoft Microsoft Office Graphics Filters Multiple Vulnerabilities

1. CGM Image Converter Buffer Overrun VulnerabilityA remote code execution vulnerability exists in the way that Microsoft Office allocates buffer size when handling CGM image files. The vulnerability could allow remote code execution if a user opens an Office document containing a specially crafted CGM image. An...
Last Update Date: 28 Jan 2011 Release Date: 15 Dec 2010 4882 Views

RISK: Medium Risk

Medium Risk

Microsoft Office Publisher Multiple Vulnerabilities

A remote code execution vulnerability exists in the way that Microsoft Publisher parses Publisher files. An attacker could exploit the vulnerability by creating a specially crafted Publisher file that could be included as an e-mail attachment, or hosted on a specially crafted or compromised Web site...
Last Update Date: 28 Jan 2011 Release Date: 15 Dec 2010 4803 Views

RISK: Medium Risk

Medium Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which could be exploited by remote attackers to cause a denial of service or execute arbitrary code.1. A bad validation for message deserialization on 64-bit builds.2. An error when handling a bad extension...
Last Update Date: 28 Jan 2011 Release Date: 15 Dec 2010 4977 Views

RISK: Medium Risk

Medium Risk

Microsoft Exchange Server Infinite Loop Vulnerability

A denial of service vulnerability exists in the way that the Microsoft Exchange store processes specially crafted RPC calls. The vulnerable code path is only accessible to authenticated users. An authenticated attacker could exploit the vulnerability by sending a specially crafted network message to a computer running the...
Last Update Date: 28 Jan 2011 Release Date: 15 Dec 2010 4956 Views

RISK: Medium Risk

Medium Risk

Mozilla Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox, Thunderbird and SeaMonkey, which could be exploited by attackers to manipulate or disclose certain data, bypass security restrictions or compromise a vulnerable system.1. Due to memory corruption errors in the browser engine when parsing malformed data...
Last Update Date: 28 Jan 2011 Release Date: 13 Dec 2010 5159 Views

RISK: Medium Risk

Medium Risk

RealNetworks RealPlayer Multiple Vulnerabilities

Multiple vulnerabilities have been identified in RealPlayer, which could be exploited by remote attackers to take complete control of a vulnerable system. These issues are caused by buffer and integer overflows, array indexing, memory corruptions, invalid memory access and zone validation errors related to RealMedia...
Last Update Date: 28 Jan 2011 Release Date: 13 Dec 2010 5006 Views

RISK: Medium Risk

Medium Risk

Novell iPrint Client Multiple Remote Code Execution Vulnerabilities

Multiple vulnerabilities have been identified in Novell iPrint Client, which could be exploited by remote attackers to execute arbitrary code. These issues are caused by buffer overflow errors related to Netscape/ActiveX "printer-state-reasons", "nipplib.dll", "call-back-...
Last Update Date: 28 Jan 2011 Release Date: 10 Dec 2010 5016 Views

RISK: Medium Risk

Medium Risk

Microsoft Internet Explorer CSS Import Rule Use-after-free Vulnerability

A vulnerability has been identified in Microsoft Internet Explorer, which could be exploited by remote attackers to take complete control of a vulnerable system. This issue is caused by a use-after-free error within the "mshtml.dll" library when processing a web...
Last Update Date: 28 Jan 2011 Release Date: 10 Dec 2010 5164 Views

RISK: Medium Risk

Medium Risk

Apple QuickTime Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple QuickTime, which could be exploited by local attackers to gain knowledge of sensitive information or by remote attackers to execute arbitrary code.1. Due to a heap overflow error when processing JP2 images, which could be exploited to compromise...
Last Update Date: 28 Jan 2011 Release Date: 9 Dec 2010 5165 Views