Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Mozilla Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox, SeaMonkey and Thunderbird, which could be exploited by attackers to bypass security restrictions, disclose sensitive information, cause a denial of service or take complete control of an affected system.1. An error when using the canvas...
Last Update Date: 28 Jan 2011 Release Date: 14 Nov 2008 4761 Views

RISK: Medium Risk

Medium Risk

Trend Micro ServerProtect Multiple Code Execution Vulnerabilities

Multiple vulnerabilities have been identified in Trend Micro ServerProtect, which could be exploited by remote attackers to take complete control of an affected system.An access control error within an unspecified RPC interface could allow remote unauthenticated attackers to gain administrative access to a vulnerable server.Various...
Last Update Date: 28 Jan 2011 Release Date: 13 Nov 2008 4815 Views

RISK: Medium Risk

Medium Risk

Apple iLife and Aperture Image Handling Code Execution Vulnerabilities

Multiple vulnerabilities have been identified in Apple iLife and Aperture, which could be exploited by remote attackers to compromise a vulnerable system. These issues are caused by uninitialized memory access and memory corruption errors in ImageIO when processing malformed LZW-encoded TIFF images or embedded ICC profiles...
Last Update Date: 28 Jan 2011 Release Date: 12 Nov 2008 4737 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows SMB Credential Reflection Vulnerability( 12 November 2008 )

A remote code execution vulnerability exists in the way that Microsoft Server Message Block (SMB) Protocol handles NTLM credentials when a user connects to an attacker's SMB server. This vulnerability allows an attacker to replay the user's credentials back to them and execute...
Last Update Date: 28 Jan 2011 Release Date: 12 Nov 2008 4619 Views

RISK: Medium Risk

Medium Risk

Microsoft XML Core Services Multiple Vulnerabilities( 12 November 2008 )

1. MSXML Memory Corruption VulnerabilityA remote code execution vulnerability exists in the way that Microsoft XML Core Services parses XML content. The vulnerability could allow remote code execution if a user browses a Web site that contains specially crafted content or opens specially crafted HTML e-mail...
Last Update Date: 28 Jan 2011 Release Date: 12 Nov 2008 4568 Views

RISK: Medium Risk

Medium Risk

Adobe Reader/Acrobat Multiple Vulnerabilities

Multiple vulnerabilities have been identified in in Adobe Reader/Acrobat, which can be exploited by malicious people to compromise a user's system.1. A memory corruption error when passing an overly long argument to an AcroJS function, which could be exploited to crash...
Last Update Date: 28 Jan 2011 Release Date: 5 Nov 2008 4772 Views

RISK: Medium Risk

Medium Risk

Opera Command Execution and Cross-Site Scripting Vulnerabilities

Multiple vulnerabilities have been identified in Opera, which could be exploited by remote attackers to conduct cross-site scripting attacks or compromise a user's system.1. Certain parameters passed to the "History Search" functionality are not properly sanitised before being used. ...
Last Update Date: 28 Jan 2011 Release Date: 31 Oct 2008 4758 Views

RISK: Medium Risk

Medium Risk

OpenOffice WMF and EMF Handling Heap Overflow Vulnerabilities

Multiple vulnerabilities have been identified in OpenOffice, which could be exploited by remote attackers to compromise a vulnerable system.1. Due to a heap overflow error when processing malformed WMF files, which could be exploited by attackers to execute arbitrary code by tricking a user into...
Last Update Date: 28 Jan 2011 Release Date: 30 Oct 2008 4954 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Server Service Vulnerability ( 24October 2008 )

A remote code execution vulnerability exists in the Server service on Windows systems. The vulnerability is due to the service not properly handling specially crafted RPC requests. An attacker who successfully exploited this vulnerability could take complete control of an affected system.
Last Update Date: 28 Jan 2011 Release Date: 24 Oct 2008 4647 Views

RISK: Medium Risk

Medium Risk

F-Secure Products RPM File Handling Integer Overflow Vulnerability

A vulnerability has been identified in various F-Secure products, which could be exploited by attackers or malware to compromise a vulnerable system. This issue is caused by an integer overflow error when processing malformed RPM files, which could be exploited to crash an affected application...
Last Update Date: 28 Jan 2011 Release Date: 22 Oct 2008 4783 Views