Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

VLC Media Player libmodplug Buffer Overflow Vulnerabilities

Multiple vulnerabilities have been identified in VLC Media Player, which could be exploited by malicious people to compromise a user's system.  The vulnerabilities are caused due to the application using a vulnerable version of the libmodplug library.  This issues are caused by the boundary errors...
Last Update Date: 4 May 2011 12:18 Release Date: 4 May 2011 6647 Views

RISK: High Risk

High Risk

Check Point SSL VPN On-Demand Applications Remote Code Execution Vulnerability

A vulnerability has been identified in Check Point products, which could be exploited by remote attackers to compromise a vulnerable system. This issue is caused by an error in the SSL Network Extender (SNX), SecureWorkSpace and Endpoint Security On-Demand application when deployed through a...
Last Update Date: 4 May 2011 12:18 Release Date: 4 May 2011 6840 Views

RISK: Medium Risk

Medium Risk

HP OpenView Storage Data Protector Code Execution Vulnerabilities

Multiple vulnerabilities have been identified in HP OpenView Storage Data Protector, which could be exploited by remote attackers to gain knowledge of sensitive information or compromise a vulnerable system. These issues are caused by buffer overflows and directory traversal errors in the Backup Client Service (OmniInet....
Last Update Date: 3 May 2011 17:51 Release Date: 3 May 2011 7392 Views

RISK: High Risk

High Risk

Mozilla Products Mulitple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox, Thunderbird and SeaMonkey, which could be exploited by attackers to manipulate or disclose certain data, bypass security restrictions or compromise a vulnerable system. These issues are caused by memory corruptions, dangling pointers, input validation errors, ...
Last Update Date: 3 May 2011 17:49 Release Date: 3 May 2011 6943 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilites

Multiple vulnerabilities have been identified in Google Chrome, which could be exploited by remote attackers to bypass security restrictions, disclose sensitive information, conduct spoofing attacks, and compromise a vulnerable system. An unspecified error related to a stale pointer exists within the handling of floating objects...
Last Update Date: 29 Apr 2011 11:43 Release Date: 29 Apr 2011 6931 Views

RISK: High Risk

High Risk

Oracle Products Multiple Vulnerabilies

Multiple vulnerabilities have been identified in various Oracle products and components, which could be exploited by attackers to cause a denial of service, disclose sensitive information or compromise a vulnerable system.
Last Update Date: 21 Apr 2011 12:23 Release Date: 21 Apr 2011 6879 Views

RISK: High Risk

High Risk

Apple iTunes WebKit Multiple Vulnerabilities

Two vulnerabilities have been identified in Apple iTunes, which could be exploited by remote attackers to compromise a vulnerable system. Due to a use-after-free error in WebKit when handling text nodes, which could be exploited to execute arbitrary code via a malicious web...
Last Update Date: 21 Apr 2011 12:22 Release Date: 21 Apr 2011 6708 Views

RISK: High Risk

High Risk

Wireshark Multiple Code Execution and Denial of Service Vulnerabilities

Multiple vulnerabilities have been identified in Wireshark, which could be exploited by attackers to cause a denial of service or compromise a vulnerable system. A buffer overflow error in the DECT dissector when processing malformed data, which could allow code execution via malformed packets or a malicious...
Last Update Date: 20 Apr 2011 10:27 Release Date: 20 Apr 2011 6704 Views

RISK: High Risk

High Risk

Google Chrome GPU Process Vulnerability

Multiple vulnerabilities have been identified in Google Chrome, which could be exploited by remote attackers to compromise a vulnerable system. An off-by-three error in the GPU process, which could be exploited by remote attackers to execute arbitrary code via a malicious web page...
Last Update Date: 19 Apr 2011 11:31 Release Date: 19 Apr 2011 6777 Views

RISK: High Risk

High Risk

Apple iOS Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple iOS for iPhone, iPod and iPad, which could be exploited by remote attackers to bypass restrictions, gain knowledge of sensitive information, or compromise a vulnerable device. 1. A use-after-free error in WebKit when...
Last Update Date: 19 Apr 2011 Release Date: 15 Apr 2011 6850 Views