Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Adobe InDesign CS3 INDD File Handling Buffer Overflow Vulnerability

A vulnerability has been identified in Adobe InDesign CS3, which could be exploited by attackers to compromise a vulnerable system. This issue is caused by a buffer overflow error when processing malformed INDD files, which could be exploited by attackers to execute arbitrary code by tricking a...
Last Update Date: 28 Jan 2011 Release Date: 7 Jun 2010 5529 Views

RISK: Medium Risk

Medium Risk

Adobe Reader and Acrobat "authplay.dll" Code Execution Vulnerability

A vulnerability has been identified in Adobe Reader and Acrobat, which could be exploited by remote attackers to compromise a vulnerable system. This issue is caused by a memory corruption error in the "authplay.dll" library when processing a PDF document including malformed Flash content...
Last Update Date: 28 Jan 2011 Release Date: 7 Jun 2010 5509 Views

RISK: Medium Risk

Medium Risk

F5 BIG-IP Kerberos and OpenSSL Vulnerabilities

Multiple vulnerabilities have been identified in F5 BIG-IP, which could be exploited by remote attackers to cause a denial of service or compromise a vulnerable system. These issues are caused by errors in Kerberos and OpenSSL.
Last Update Date: 28 Jan 2011 Release Date: 4 Jun 2010 5579 Views

RISK: Medium Risk

Medium Risk

Novell eDirectory Buffer Overflow and Denial of Service Vulnerabilities

Multiple vulnerabilities have been identified in Novell eDirectory, which could be exploited by remote attackers to cause a denial of service or compromise a vulnerable system.1. An error in NDSD when processing a bad verb, which could be exploited to crash an affected daemon....
Last Update Date: 28 Jan 2011 Release Date: 4 Jun 2010 5542 Views

RISK: Medium Risk

Medium Risk

VMware vMA and ESX Products krb5 Multiple Vulnerabilities

Multiple vulnerabilities have been identified in VMware vMA and various ESX products krb5, which could be exploited by attackers to disclose sensitive information, cause a denial of service, or compromise an affected system.1. Some vulnerabilities are caused due to integer underflows within the AES...
Last Update Date: 28 Jan 2011 Release Date: 31 May 2010 5478 Views

RISK: Medium Risk

Medium Risk

Adobe Photoshop CS Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Photoshop CS, which could be exploited by attackers to compromise a vulnerable system. These issues are caused by errors when processing malformed ".ASL", ".ABR", or ".GRD" files, which could be exploited by attackers to execute...
Last Update Date: 28 Jan 2011 Release Date: 28 May 2010 5385 Views

RISK: Medium Risk

Medium Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which could be exploited by attackers to bypass security restrictions, spoof the URL, or compromise a vulnerable system.1. An error related to URL canonicalization.2. An unspecified error which could allow attackers to spoof...
Last Update Date: 28 Jan 2011 Release Date: 28 May 2010 5390 Views

RISK: Medium Risk

Medium Risk

rpc.pcnfsd Syslog Format String Vulnerability

A vulnerability has been identified in HP-UX, SGI IRIX, IBM AIX and VIOS which could be exploited by attackers to cause a denial of service or compromise a vulnerable system. This issue is caused by an integer overflow error in the "rpc.pcnfsd...
Last Update Date: 28 Jan 2011 Release Date: 25 May 2010 5453 Views

RISK: Medium Risk

Medium Risk

Apple Mac OS X Multiple Java Vulnerabilities

Multiple vulnerabilitieshave been identified in Apple Mac OS X, which could be exploited by attackers to bypass security restrictions, disclose sensitive information, cause a denial of service, or compromise an affected system. These issues are caused by errors in Java.
Last Update Date: 28 Jan 2011 Release Date: 20 May 2010 5371 Views

RISK: Medium Risk

Medium Risk

Adobe Shockwave Player Multiple Code Execution Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Shockwave Player, which could be exploited by remote attackers to compromise a vulnerable system. These issues are caused by memory corruptions, integer and buffer overflows, array indexing, and signedness errors when processing malformed Shockwave or Director files, ...
Last Update Date: 28 Jan 2011 Release Date: 13 May 2010 5361 Views