Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

OpenOffice.org Impress File Processing Buffer Overflow Vulnerabilities

Two vulnerabilitieshave been identified in OpenOffice.org, which could be exploited by attackers to compromise a vulnerable system. These issues are caused by buffer overflow errors in Impress when processing malformed documents, which could be exploited by attackers to crash an affected application or execute arbitrary...
Last Update Date: 28 Jan 2011 Release Date: 5 Aug 2010 5395 Views

RISK: Medium Risk

Medium Risk

Apple iOS Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple iOS for iPhone, iPad and iPod, which could be exploited by remote attackers to take complete control of a vulnerable device.1. Caused by a memory corruption error when processing Compact Font Format (CFF) data within a...
Last Update Date: 28 Jan 2011 Release Date: 4 Aug 2010 6209 Views

RISK: Medium Risk

Medium Risk

Novell iPrint Client Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Novell iPrint Client, which could be exploited by remote attackers to manipulate certain data or compromise a vulnerable system.1. An unspecified error exists in the browser plugin when parsing parameter names.2. A boundary error in the ActiveX...
Last Update Date: 28 Jan 2011 Release Date: 2 Aug 2010 5306 Views

RISK: Medium Risk

Medium Risk

IBM Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in IBM Java, which could be exploited by remote attackers to bypass security restrictions, gain knowledge of sensitive information, cause a denial of service or compromise a vulnerable system.
Last Update Date: 28 Jan 2011 Release Date: 30 Jul 2010 5456 Views

RISK: Medium Risk

Medium Risk

Apple Safari Code Execution and Information Disclosure Vulnerabilities

Multiple vulnerabilities have been identified in Apple Safari, which could be exploited by attackers to gain knowledge of sensitive information or compromise a vulnerable system. These issues are caused by memory corruptions, use-after-free and information disclosure errors related to RSS feeds, AutoFill...
Last Update Date: 28 Jan 2011 Release Date: 30 Jul 2010 5713 Views

RISK: Medium Risk

Medium Risk

IBM Lotus Notes File Parsing Multiple Vulnerabilities

Multiple vulnerabilitieshave been identified in IBM Lotus Notes, which could be exploited by attackers to compromise a vulnerable system. These issues are caused by errors in the Autonomy Keyview.
Last Update Date: 28 Jan 2011 Release Date: 29 Jul 2010 5419 Views

RISK: Medium Risk

Medium Risk

Symantec Products File Parsing Multiple Vulnerabilities

Multiple vulnerabilitieshave been identified in various Symantec products, which could be exploited by attackers to cause a denial of service or compromise a vulnerable system. These issues are caused by errors in the Autonomy Keyview Filter.
Last Update Date: 28 Jan 2011 Release Date: 29 Jul 2010 5406 Views

RISK: Medium Risk

Medium Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which could be exploited by attackers to gain knowledge of sensitive information, cause a denial of service or compromise a vulnerable system.1. An unspecified error in the layout code can be exploited to disclose memory content....
Last Update Date: 28 Jan 2011 Release Date: 28 Jul 2010 5373 Views

RISK: Medium Risk

Medium Risk

Apple QuickTime Streaming Debug Error Logging Buffer Overflow Vulnerability

A vulnerability has been identified in Apple QuickTime, which could be exploited by attackers to compromise a vulnerable system. This issue is caused by a boundary error in QuickTimeStreaming.qtx when constructing a string to write to a debug log file. and cause a stack-...
Last Update Date: 28 Jan 2011 Release Date: 27 Jul 2010 5339 Views

RISK: Medium Risk

Medium Risk

Mozilla Products Multiple Vulnerabilities

Multiple vulnerabilitieshave been identified in Mozilla Firefox, Thunderbird and SeaMonkey, which could be exploited by attackers to manipulate or disclose certain data, bypass security restrictions or compromise a vulnerable system.1. Due to memory corruption errors in the browser engine when parsing malformed data, ...
Last Update Date: 28 Jan 2011 Release Date: 22 Jul 2010 5337 Views