Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Apple iTunes "itpc:" URL Processing Buffer Overflow Vulnerability

A vulnerability has been identified in Apple iTunes, which could be exploited by remote attackers to compromise a vulnerable system. This issue is caused by a buffer overflow error when processing malformed "itpc:" URLs, which could be exploited by attackers to crash an affected application...
Last Update Date: 28 Jan 2011 Release Date: 21 Jul 2010 4710 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Shell Shortcut Handling Vulnerability

A vulnerability has been identified in Microsoft Windows, which could be exploited by attackers or malware to compromise an affected system. This issue is caused by an error in the Windows Shell component when parsing shortcuts (*.LNK files), which could allow attackers to automatically execute a...
Last Update Date: 28 Jan 2011 Release Date: 19 Jul 2010 4538 Views

RISK: Medium Risk

Medium Risk

Sun Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in various Sun products, which could be exploited by remote or local attackers to cause a denial of service, read and manipulate certain data, disclose sensitive information, bypass security restrictions, or execute arbitrary code.These issues are caused by...
Last Update Date: 28 Jan 2011 Release Date: 16 Jul 2010 4728 Views

RISK: Medium Risk

Medium Risk

Oracle Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in various Oracle products and components, which could be exploited by attackers to cause a denial of service, disclose sensitive information or compromise a vulnerable system.
Last Update Date: 28 Jan 2011 Release Date: 14 Jul 2010 4702 Views

RISK: Medium Risk

Medium Risk

Winamp Player FLV Data Processing Integer Overflow Vulnerabilities

Multiple vulnerabilitieshave been identified in Winamp, which could be exploited by attackers to compromise a vulnerable system. These issues are caused by integer and buffer overflow errors within the "vp6.w5s" component when parsing malformed Flash Video data, which could allow attackers to execute...
Last Update Date: 28 Jan 2011 Release Date: 14 Jul 2010 4700 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Canonical Display Driver Integer Overflow Vulnerability ( 14 July 2010 )

An unauthenticated remote code execution vulnerability exists in the way that the Microsoft Canonical Display Driver (cdd.dll) parses information copied from user mode to kernel mode. Although it is possible that the vulnerability could allow code execution, successful code execution is unlikely due to...
Last Update Date: 28 Jan 2011 Release Date: 14 Jul 2010 4661 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Help Center URL Validation Vulnerability ( 14 July 2010 )

An unauthenticated remote code execution vulnerability exists in the way that the Microsoft Help and Support Center validates specially crafted URLs. This vulnerability could allow remote code execution if a user views a specially crafted Web page using a Web browser or clicks a specially crafted link in an...
Last Update Date: 28 Jan 2011 Release Date: 14 Jul 2010 4525 Views

RISK: Medium Risk

Medium Risk

Microsoft Office Access ActiveX Controls Multiple Vulnerabilities ( 14 July 2010 )

1. Access ActiveX Control VulnerabilityA remote code execution vulnerability exists in Access ActiveX controls due to the way that multiple ActiveX controls are loaded by Internet Explorer. An attacker who successfully exploited this vulnerability could run arbitrary code as the logged-on user. If a user...
Last Update Date: 28 Jan 2011 Release Date: 14 Jul 2010 4526 Views

RISK: Medium Risk

Medium Risk

Microsoft Outlook SMB Attachment Vulnerability( 14 July 2010 )

A remote code execution vulnerability exists in the way that Microsoft Office Outlook verifies attachments in a specially crafted e-mail message. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change...
Last Update Date: 28 Jan 2011 Release Date: 14 Jul 2010 4494 Views

RISK: Medium Risk

Medium Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilitieshave been identified in Google Chrome, which could be exploited by attackers to gain knowledge of sensitive information, cause a denial of service or compromise a vulnerable system.1. An unspecified error related to WebGL can be exploited to trigger an OOB read.2...
Last Update Date: 28 Jan 2011 Release Date: 6 Jul 2010 4710 Views