Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which could be exploited by remote attackers to compromise a vulnerable system. These issues are caused by integer overflows and memory corruptions in WebKit and Flash, which could be exploited by remote attackers to compromise a vulnerable system by...
Last Update Date: 16 May 2011 14:33 Release Date: 16 May 2011 6640 Views

RISK: High Risk

High Risk

Adobe Audition Session Files Processing Memory Corruption Vulnerabilities

Two vulnerabilities have been identified in Adobe Audition, which could be exploited by attackers to compromise a vulnerable system. These issues are caused by buffer overflow and memory corruption errors when processing Session (.ses) files, which could be exploited by attackers to execute arbitrary code...
Last Update Date: 16 May 2011 14:31 Release Date: 16 May 2011 6931 Views

RISK: Medium Risk

Medium Risk

Adobe Flash Media Server Two Vulnerabilities

Two vulnerabilities have been identified in Adobe Flash Media Server, which could be exploited by attackers to cause a denial of service or compromise a vulnerable system. A memory corruption error which can lead to arbitrary code execution. An XML data corruption, leading to a denial...
Last Update Date: 16 May 2011 14:24 Release Date: 16 May 2011 6784 Views

RISK: High Risk

High Risk

Adobe Flash Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Flash Player, which could be exploited by remote attackers to compromise a vulnerable system. These issues are caused by integer overflows and memory corruption errors when processing malformed Flash content, which could be exploited by attackers to compromise a vulnerable...
Last Update Date: 16 May 2011 14:22 Release Date: 16 May 2011 6928 Views

RISK: High Risk

High Risk

HP/Palm webOS Multiple Vulnerabilities

Multiple vulnerabilities have been identified in HP/Palm webOS, which could be exploited by attackers to compromise a vulnerable system. An input validation errors in the Email application when processing JavaScript and HTML code, which could allow execution of arbitrary code. An error related to...
Last Update Date: 13 May 2011 10:33 Release Date: 13 May 2011 6708 Views

RISK: High Risk

High Risk

HP Intelligent Management Center (IMC) Multiple Vulnerabilities

Multiple vulnerabilities have been identified in HP Intelligent Management Center (IMC), which could be exploited by remote attackers to take complete control of a vulnerable system. These issues are caused by buffer overflows, memory corruptions, use-after-free and input validation errors in...
Last Update Date: 13 May 2011 10:32 Release Date: 13 May 2011 6910 Views

RISK: High Risk

High Risk

Skype for Mac Message Handling Remote Code Execution Vulnerability

A vulnerability has been identified in Skype for Mac, which could be exploited by attackers to compromise a vulnerable system. This issue is caused by a memory corruption error when processing malformed messages, which could be exploited by an attacker who is in Skype's Contact...
Last Update Date: 11 May 2011 11:18 Release Date: 11 May 2011 6587 Views

RISK: Medium Risk

Medium Risk

Microsoft PowerPoint Multiple Remote Code Execution Vulnerabilities

Presentation Memory Corruption RCE Vulnerability A remote code execution vulnerability exists in the way that Microsoft PowerPoint handles specially crafted PowerPoint files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change...
Last Update Date: 11 May 2011 10:18 Release Date: 11 May 2011 6709 Views

RISK: High Risk

High Risk

Microsoft Windows WINS Service Failed Response Vulnerability

A remote code execution vulnerability exists in the Windows Internet Name Service (WINS) due to insufficient validations for the data structures within specially crafted WINS network packets sent to the WINS service.
Last Update Date: 11 May 2011 10:18 Release Date: 11 May 2011 6550 Views

RISK: High Risk

High Risk

Adobe Photoshop File Processing Unspecified Security Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Photoshop, which could be exploited by attackers to compromise a vulnerable system. These issues are caused by unspecified errors related to file processing, which could allow attackers to execute arbitrary code by tricking a user into opening a specially crafted...
Last Update Date: 5 May 2011 09:41 Release Date: 5 May 2011 6623 Views