Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Microsoft .NET Framework x64 JIT Compiler Vulnerability ( 13 October 2010 )

A remote code execution vulnerability exists in the Microsoft .NET Framework that can allow a specially crafted Microsoft .NET application to access memory in an unsafe manner, leading to arbitrary unmanaged code execution. This vulnerability only affects the x64 and Itanium architectures.
Last Update Date: 28 Jan 2011 Release Date: 13 Oct 2010 5509 Views

RISK: Medium Risk

Medium Risk

Microsoft Internet Explorer Multiple Vulnerabilities ( 13 October 2010 )

1. AutoComplete Information Disclosure VulnerabilityAn information disclosure vulnerability exists that potentially allows form data within Internet Explorer to be captured via the AutoComplete feature. An attacker could exploit the vulnerability by constructing a specially crafted Web page that could allow information disclosure if a user viewed the Web...
Last Update Date: 28 Jan 2011 Release Date: 13 Oct 2010 5517 Views

RISK: Medium Risk

Medium Risk

Foxit Reader Title Parsing Buffer Overflow Vulnerability

A vulnerability has been identified in Foxit Reader, which can be exploited by malicious people to compromise a user's system.The vulnerability is caused due to a boundary error when attempting to set the window title text and can be exploited to cause a stack-...
Last Update Date: 28 Jan 2011 Release Date: 7 Oct 2010 5708 Views

RISK: Medium Risk

Medium Risk

Adobe Acrobat and Reader Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Reader and Acrobat, which could be exploited by remote attackers to cause a denial of service or compromise a vulnerable system, or by local attackers to gain elevated privileges. These issues are caused by memory corruptions, array-indexing...
Last Update Date: 28 Jan 2011 Release Date: 6 Oct 2010 5633 Views

RISK: Medium Risk

Medium Risk

Novell iManager Tomcat Remote File Upload Vulnerability

A vulnerability has been identified in Novell iManager, which could be exploited by remote attackers to take complete control of an affected system. This issue is caused by access and input validation errors in the "nps.jar" web application when handling uploaded files via the...
Last Update Date: 28 Jan 2011 Release Date: 4 Oct 2010 5601 Views

RISK: Medium Risk

Medium Risk

Sun Solaris XServer FreeType CFF Font Parsing Vulnerability

A vulnerability has been identified in Sun Solaris and OpenSolaris, which could be exploited by attackers to compromise a vulnerable system. This issue is caused by an error in the FreeType library used by Xserver.
Last Update Date: 28 Jan 2011 Release Date: 30 Sep 2010 5545 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows ASP.NET Padding Oracle Vulnerability ( 29 September 2010 )

An information disclosure vulnerability exists in ASP.NET due to improper error handling during encryption padding verification. An attacker who successfully exploited this vulnerability could read data, such as the view state, which was encrypted by the server. This vulnerability can also be used for...
Last Update Date: 28 Jan 2011 Release Date: 29 Sep 2010 5673 Views

RISK: Medium Risk

Medium Risk

Nero Products Insecure Library Loading Vulnerabilities

Multiple vulnerabilities have been identified in Nero, which could be exploited by malicious people to compromise a user's system.1. Due to certain bundled applications loading various libraries in an insecure manner. This can be exploited to load arbitrary libraries by tricking a user...
Last Update Date: 28 Jan 2011 Release Date: 29 Sep 2010 5707 Views

RISK: Medium Risk

Medium Risk

VMware ACE Management Server Two Vulnerabilities

Two vulnerabilities have been identified in VMware ACE Management Server (AMS), which could be exploited by remote attackers to cause a denial of service or compromise a vulnerable system.
Last Update Date: 28 Jan 2011 Release Date: 27 Sep 2010 5578 Views

RISK: Medium Risk

Medium Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which could be exploited by remote attackers to compromise a vulnerable system.1. An error in Flash. 2. A bad cast with malformed SVGs.3. A buffer mismanagement error in the SPDY protocol.4...
Last Update Date: 28 Jan 2011 Release Date: 21 Sep 2010 5310 Views