Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Apple iOS Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple iOS for iPhone, iPod touch and iPad, which could be exploited by attackers to gain knowledge of sensitive information, bypass restrictions, cause a denial of service or compromise a vulnerable system. These issues are caused by errors in...
Last Update Date: 28 Jan 2011 Release Date: 24 Nov 2010 5804 Views

RISK: Medium Risk

Medium Risk

Apple Safari Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple Safari, which could be exploited by attackers to disclose sensitive information, bypass security restrictions or execute arbitrary code. These issues are caused by design errors, invalid casts, memory corruptions, uninitialized pointers and memory, integer overflows and...
Last Update Date: 28 Jan 2011 Release Date: 22 Nov 2010 5021 Views

RISK: Medium Risk

Medium Risk

Novell iPrint Client "GetDriverSettings()" Remote Stack Overflow Vulnerability

A vulnerability has been identified Novell iPrint Client, which could be exploited by remote attackers to execute arbitrary code. This issue is caused by a buffer overflow error in the "ienipp.ocx" ActiveX component when processing data supplied via the "GetDriverSettings()" method, ...
Last Update Date: 28 Jan 2011 Release Date: 22 Nov 2010 4999 Views

RISK: Medium Risk

Medium Risk

Adobe Acrobat and Reader Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Reader 9.4 (and earlier versions) for Windows, Macintosh and UNIX, and Adobe Acrobat 9.4 (and earlier 9.x versions) for Windows and Macintosh. These vulnerabilities could cause the application to crash...
Last Update Date: 28 Jan 2011 Release Date: 18 Nov 2010 4964 Views

RISK: Medium Risk

Medium Risk

VMware ESX / ESXi Multiple Vulnerabilities

Multiple vulnerabilities have been identified in VMware ESX/ESXi, which could be exploited by attackers to cause a denial of service or execute arbitrary code. These issues are caused by errors in COS kernel, likewisekrb5, likewiseopenldap, likewiseopen, and pamkrb5.
Last Update Date: 28 Jan 2011 Release Date: 17 Nov 2010 5017 Views

RISK: Medium Risk

Medium Risk

RealPlayer RealMedia Image Map Parsing Vulnerabilities

A vulnerability has been identified in RealPlayer which could be exploited by remote attackers to compromise a vulnerable system. The vulnerabilities are caused due to integer truncation errors when parsing image maps in RealMedia (.rm) files. This can be exploited to cause heap-based buffer...
Last Update Date: 28 Jan 2011 Release Date: 16 Nov 2010 5016 Views

RISK: Medium Risk

Medium Risk

Apple Mac OS X Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple Mac OS X, which could be exploited by remote or local attackers to disclose sensitive information, bypass security restrictions, cause a denial of service or compromise an affected system. These issues are caused by errors in AFP Server, ...
Last Update Date: 28 Jan 2011 Release Date: 12 Nov 2010 5160 Views

RISK: Medium Risk

Medium Risk

Apple QuickTime Sorenson Video 3 Array-Indexing Vulnerability

A vulnerability have been identified in Apple QuickTime, could be exploited by remote attackers to compromise an affected system. An array-indexing error when parsing Sorenson Video 3 content and can be exploited to corrupt memory during decompression via a specially crafted file.
Last Update Date: 28 Jan 2011 Release Date: 12 Nov 2010 4968 Views

RISK: Medium Risk

Medium Risk

Adobe Flash Media Server Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Flash Media Server, which could be exploited by remote attackers to cause a denial of service or take complete control of an affected system.1. Due to an unspecified memory corruption error that could lead to arbitrary code execution....
Last Update Date: 28 Jan 2011 Release Date: 11 Nov 2010 5042 Views

RISK: Medium Risk

Medium Risk

Microsoft Office Multiple Vulnerabilities( 10 November 2010 )

1. RTF Stack Buffer Overflow VulnerabilityA remote code execution vulnerability exists in the way that affected Microsoft Office software parses specially crafted Rich Text Format (RTF) data. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could...
Last Update Date: 28 Jan 2011 Release Date: 10 Nov 2010 4835 Views