Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

RealPlayer Multiple Code Execution Vulnerabilities

Multiple vulnerabilities have been identified in RealPlayer, which could be exploited by remote attackers to gain knowledge of sensitive information or compromise a vulnerable system.1. A memory corruption error when processing IVR files containing a malformed data header, which could allow attackers to execute arbitrary...
Last Update Date: 28 Jan 2011 Release Date: 30 Aug 2010 5327 Views

RISK: Medium Risk

Medium Risk

Trend Micro Internet Security Pro 2010 "UfPBCtrl.dll" ActiveX Control Vulnerability

A vulnerability has been identified in Trend Micro Internet Security Pro, which could be exploited by remote attackers to compromise a vulnerable system. This issue is caused by an error in the "extSetOwner()" function within the "UfPBCtrl.dll" ActiveX control when processing user...
Last Update Date: 28 Jan 2011 Release Date: 27 Aug 2010 5411 Views

RISK: Medium Risk

Medium Risk

Apple Mac OS X Multiple Vulnerabilities

Multiple vulnerabilitieshave been identified in Apple Mac OS X, which could be exploited by remote or local attackers to disclose sensitive information, bypass security restrictions, cause a denial of service or compromise an affected system. These issues are caused by errors in ATS, CFNetwork, ...
Last Update Date: 28 Jan 2011 Release Date: 26 Aug 2010 5363 Views

RISK: Medium Risk

Medium Risk

Insecure Library Loading Vulnerabilities

A remote attack vector for a class of vulnerabilities that affects how applications load external libraries has been identified in various applications, which could be exploited by attackers to remotely execute arbitrary code in the context of the user running the vulnerable application when the user opens a file...
Last Update Date: 28 Jan 2011 Release Date: 26 Aug 2010 5263 Views

RISK: Medium Risk

Medium Risk

Adobe Shockwave Player Multiple Vulnerabilities

Multiple vulnerabilitieshave been identified in Adobe Shockwave Player, which could be exploited by remote attackers to compromise a vulnerable system. These issues are caused by memory corruptions and integer overflow errors when processing malformed Shockwave or Director files, which could be exploited by attackers to execute arbitrary...
Last Update Date: 28 Jan 2011 Release Date: 26 Aug 2010 5349 Views

RISK: Medium Risk

Medium Risk

Google Chrome Multiple Memory Corruption and Spoofing Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which could be exploited by attackers to manipulate certain information or compromise a vulnerable system. These issues are caused by memory corruptions and input validation errors related to file dialog, SVGs, text editing, history, MIME type...
Last Update Date: 28 Jan 2011 Release Date: 23 Aug 2010 5386 Views

RISK: Medium Risk

Medium Risk

SonicWALL E-Class SSL-VPN ActiveX Control Format String Vulnerability

A vulnerability has been identified in SonicWALL E-Class SSL-VPN, which could be exploited by remote attackers to compromise an affected system. This issue is caused by a format string error in the Endpoint Interrogator/Installer ActiveX control (epi.dll) when...
Last Update Date: 28 Jan 2011 Release Date: 23 Aug 2010 5547 Views

RISK: Medium Risk

Medium Risk

Apple QuickTime Error Logging Remote Buffer Overflow Vulnerability

A vulnerability has been identified in Apple QuickTime, which could be exploited by attackers to compromise a vulnerable system. This issue is caused by a stack overflow error within QuickTime's error logging feature when processing a malformed movie file, which could be exploited by attackers...
Last Update Date: 28 Jan 2011 Release Date: 16 Aug 2010 5372 Views

RISK: Medium Risk

Medium Risk

Palm Pre webOS vCard Processing Code Execution Vulnerability

A vulnerability has been identified in Palm Pre webOS, which could be exploited by remote attackers to take complete control of a vulnerable device. This issue is caused by an error when processing messages including a specially crafted electronic business card (vCard), which could be exploited...
Last Update Date: 28 Jan 2011 Release Date: 16 Aug 2010 5432 Views

RISK: Medium Risk

Medium Risk

Opera Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Opera, which could be exploited by attackers to bypass security restrictions or compromise a vulnerable system.1. A heap overflow error when performing some painting operations on a HTML5 canvas while certain transformations are being applied, which could be exploited...
Last Update Date: 28 Jan 2011 Release Date: 13 Aug 2010 5427 Views