Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Adobe Device Central & Pixel Bender Toolkit Insecure Library Loading Vulnerability

A vulnerability has been discovered in Adobe Device Central and Adobe Pixel Bender Toolkit, which can be exploited by malicious people to compromise a user's system.1. The vulnerability is caused due to the application loading libraries (e.g. ibfs32.dll...
Last Update Date: 28 Jan 2011 Release Date: 8 Dec 2010 5873 Views

RISK: Medium Risk

Medium Risk

VMware ESX Service Console Multiple Vulnerabilities

Multiple vulnerabilities have been identified in VMware ESX, which could be exploited by attackers to bypass security restrictions, disclose or manipulate information, cause a denial of service or execute arbitrary code. These issues are caused by errors in samba, bzip2 and OpenSSL.
Last Update Date: 28 Jan 2011 Release Date: 8 Dec 2010 5662 Views

RISK: Medium Risk

Medium Risk

VMware Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in VMware products, which could be exploited by remote attackers to execute arbitrary code, or by malicious users to gain elevated privileges on a host or guest system.1. Caused by a race condition within the "vmware-mount" ...
Last Update Date: 28 Jan 2011 Release Date: 6 Dec 2010 5712 Views

RISK: Medium Risk

Medium Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which could be exploited by remote attackers to bypass restrictions, cause a denial of service, or execute arbitrary code.1. Caused by an error which could allow a website to bypass the pop-up blocker....
Last Update Date: 28 Jan 2011 Release Date: 6 Dec 2010 5677 Views

RISK: Medium Risk

Medium Risk

ProFTPD HELP Command Injection Backdoor

A backdoor has been identified in ProFTPD, which could be exploited by remote unauthenticated attackers to take complete control of a vulnerable server. This issue results from the compromise of the main FTP server and sync mirrors of the project, and the inclusion of a backdoor into...
Last Update Date: 28 Jan 2011 Release Date: 3 Dec 2010 6020 Views

RISK: Medium Risk

Medium Risk

ClamAV Multiple Vulnerabilities

Multiple vulnerabilities have been identified in ClamAV, which could be exploited by attackers or malware to cause a denial of service or execute arbitrary code.1. The errors in the "libclamav/pdf.c" file, which could be exploited to crash an affected...
Last Update Date: 28 Jan 2011 Release Date: 3 Dec 2010 5697 Views

RISK: Medium Risk

Medium Risk

AWStats Remote Code Execution and Directory Traversal Vulnerabilities

Two vulnerabilities have been identified in AWStats, which could be exploited by remote attackers to gain knowledge of sensitive information or compromise a vulnerable web server.1. An input validation error when specifying a configuration file directory on Windows, which could be exploited by attackers to...
Last Update Date: 28 Jan 2011 Release Date: 2 Dec 2010 5828 Views

RISK: Medium Risk

Medium Risk

Winamp Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Winamp, which could be exploited by attackers to execute arbitrary code.1. A buffer and integer overflow errors in the "in_midi" module when processing malformed data, which could be exploited by attackers to compromise a vulnerable system....
Last Update Date: 28 Jan 2011 Release Date: 1 Dec 2010 5805 Views

RISK: Medium Risk

Medium Risk

McAfee VirusScan Enterprise Insecure Library Loading Vulnerability

A vulnerability has been identified in McAfee VirusScan Enterprise, which can be exploited by malicious people to compromise a user's system.The vulnerability is caused due to the application loading libraries (e.g. traceapp.dll) in an insecure manner. This...
Last Update Date: 28 Jan 2011 Release Date: 30 Nov 2010 5736 Views

RISK: Medium Risk

Medium Risk

Apple iOS Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple iOS for iPhone, iPod touch and iPad, which could be exploited by attackers to gain knowledge of sensitive information, bypass restrictions, cause a denial of service or compromise a vulnerable system. These issues are caused by errors in...
Last Update Date: 28 Jan 2011 Release Date: 24 Nov 2010 6529 Views