Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

HP-UX Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in HP-UX, which could be exploited by attackers to bypass security restrictions, disclose sensitive information, cause a denial of service, or compromise an affected system. These issues are caused by errors in Java.
Last Update Date: 28 Jan 2011 Release Date: 11 Nov 2009 4825 Views

RISK: Medium Risk

Medium Risk

HP Power Manager Unspecified Remote Code Execution Vulnerability

A vulnerability has been identified in HP Power Manager, which could be exploited by remote attackers to compromise a vulnerable system. This issue is caused by an unspecified error when processing user-supplied requests, which could allow remote attackers to execute arbitrary code.
Last Update Date: 28 Jan 2011 Release Date: 6 Nov 2009 4787 Views

RISK: Medium Risk

Medium Risk

Sun Java Multiple Code Execution and Security Bypass Vulnerabilities

Multiple vulnerabilities have been identified in Sun Java, which could be exploited by attackers to bypass security restrictions, disclose sensitive information, cause a denial of service, or compromise an affected system.1. An errors when decoding DER encoded data and parsing HTTP headers, ...
Last Update Date: 28 Jan 2011 Release Date: 5 Nov 2009 4835 Views

RISK: Medium Risk

Medium Risk

Adobe Shockwave Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Shockwave Player, which could be exploited by remote attackers to compromise a vulnerable system.1. An invalid index when handling certain Shockwave content, which could be exploited to execute arbitrary code via a specially crafted web page.2...
Last Update Date: 28 Jan 2011 Release Date: 4 Nov 2009 4790 Views

RISK: Medium Risk

Medium Risk

Mozilla Firefox Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox, which could be exploited by attackers to manipulate or disclose certain data, bypass security restrictions or compromise a vulnerable system.1. An error within the form history, which could allow malicious web sites to trick a vulnerable...
Last Update Date: 28 Jan 2011 Release Date: 29 Oct 2009 4730 Views

RISK: Medium Risk

Medium Risk

Mozilla SeaMonkey Code Execution and Spoofing Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla SeaMonkey, which could be exploited by attackers to spoof certain information, bypass security restrictions or compromise a vulnerable system.1. A memory corruption error when parsing certain regular expressions used in Proxy Auto-configuration (PAC) files...
Last Update Date: 28 Jan 2011 Release Date: 29 Oct 2009 4739 Views

RISK: Medium Risk

Medium Risk

Opera Browser Remote Code Execution and Spoofing Vulnerabilities

Three vulnerabilities have been identified in Opera, which could be exploited by remote attackers to bypass security restrictions, spoof or gain knowledge of certaine information, or compromise a vulnerable system.1. A memory corruption error when processing malformed domain names, which could lead to...
Last Update Date: 28 Jan 2011 Release Date: 29 Oct 2009 4758 Views

RISK: Medium Risk

Medium Risk

Novell eDirectory HTTP Request Remote Buffer Overflow Vulnerability

A vulnerability has been identified in Novell eDirectory, which could be exploited by remote attackers to cause a denial of service or compromise a vulnerable system. This issue is caused by a buffer overflow error in the "dhost" service when processing overly long HTTP requests, ...
Last Update Date: 28 Jan 2011 Release Date: 28 Oct 2009 4723 Views

RISK: Medium Risk

Medium Risk

SunJava System Web Server Unspecified Buffer Overflow Vulnerability

A vulnerability has been identified in Sun Java System Web Server, which could be exploited by remote attackers to cause a denial of service or compromise a vulnerable web server. This issue is caused by an unspecified buffer overflow error when processing user-supplied requests, which...
Last Update Date: 28 Jan 2011 Release Date: 27 Oct 2009 4739 Views

RISK: Medium Risk

Medium Risk

Oracle Products Code Execution and Security Bypass Vulnerabilities

Multiple vulnerabilities have been identified in various Oracle and BEA products, which could be exploited by remote or local attackers to cause a denial of service, read and manipulate certain data, disclose sensitive information, conduct SQL injection attacks, bypass security restrictions, or execute arbitrary...
Last Update Date: 28 Jan 2011 Release Date: 22 Oct 2009 5258 Views