Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Mozilla Products NSS Code Execution and Security Bypass Vulnerabilities

Two vulnerabilities have been identified in Mozilla Firefox, Thunderbird and Seamonkey, which could be exploited by remote attackers to bypass security restrictions or compromise a vulnerable system. These issues are caused by errors in NSS. 1. A heap overflow in a regular expression parser when...
Last Update Date: 28 Jan 2011 Release Date: 4 Aug 2009 5447 Views

RISK: Medium Risk

Medium Risk

Adobe Flash Player and AIR Multiple Code Execution Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Flash Player and AIR, which could be exploited by attackers to bypass security restrictions, disclose sensitive information or compromise a vulnerable system. These issues are caused by memory corruption, buffer overflow, privilege escalation, null pointer, sandbox...
Last Update Date: 28 Jan 2011 Release Date: 3 Aug 2009 5536 Views

RISK: Medium Risk

Medium Risk

Adobe Flash/Shockwave Player Active Template Library Vulnerability

A vulnerability has been identified in Adobe Flash/Shockwave Player, which could be exploited by remote attackers to compromise a vulnerable system. This issue is caused due to the player using vulnerable MS Active Template Libraries (ATL) and headers, which could lead to code...
Last Update Date: 28 Jan 2011 Release Date: 30 Jul 2009 5567 Views

RISK: Medium Risk

Medium Risk

BIND 9 DNS Dynamic Update Denial of Service Vulnerability

Receipt of a specially-crafted dynamic update message to a zone for which the server is the master may cause BIND 9 servers to exit. dns_db_findrdataset() fails when the prerequisite section of the dynamic update message contains a record of type "ANY" and where at...
Last Update Date: 28 Jan 2011 Release Date: 29 Jul 2009 5460 Views

RISK: Medium Risk

Medium Risk

Microsoft Internet Explorer Multiple Vulnerabilities (29 July 2009)

1. Memory Corruption VulnerabilityA remote code execution vulnerability exists in the way that Internet Explorer handles a memory object. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution...
Last Update Date: 28 Jan 2011 Release Date: 29 Jul 2009 5211 Views

RISK: Medium Risk

Medium Risk

KDE KHTML Numeric Character References Memory Corruption Vulnerability

A vulnerability has been identified in KDE, which could be exploited by malicious people to potentially compromise a user's system.The vulnerability is caused due to an error in KHTML when processing numeric character references and can be exploited to corrupt memory.
Last Update Date: 28 Jan 2011 Release Date: 28 Jul 2009 5440 Views

RISK: Medium Risk

Medium Risk

Adobe Acrobat/Reader and Flash Player Code Execution Vulnerability

A vulnerability has been identified in Adobe Acrobat, Reader and Flash Player, which could be exploited by remote attackers to compromise a vulnerable system. This issue is caused by an error in the "flash9f.dll" and "authplay.dll" modules when processing...
Last Update Date: 28 Jan 2011 Release Date: 23 Jul 2009 5416 Views

RISK: Medium Risk

Medium Risk

Mozilla Products Memory Corruption and Security Bypass Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox and Thunderbird, which could be exploited by attackers to bypass security restrictions, disclose sensitive information, cause a denial of service or compromise a vulnerable system.1. Memory corruption errors in the JavaScript and browser engines when parsing...
Last Update Date: 28 Jan 2011 Release Date: 23 Jul 2009 5376 Views

RISK: Medium Risk

Medium Risk

Google Chrome Javascript Memory Corruption Vulnerabilities

Two vulnerabilities have been identified in Google Chrome, which could be exploited by remote attackers to compromise a vulnerable system.1. A heap overflow error when evaluating a specially crafted regular expression in Javascript, which could be exploited to crash an affected browser and execute arbitrary...
Last Update Date: 28 Jan 2011 Release Date: 20 Jul 2009 5431 Views

RISK: Medium Risk

Medium Risk

Oracle Products Multiple Vulnerabilities ( 16 July 2009 )

Multiple vulnerabilities have been identified in various Oracle and BEA products, which could be exploited by remote or local attackers to cause a denial of service, read and manipulate certain data, disclose sensitive information, conduct SQL injection attacks, bypass security restrictions, or execute arbitrary...
Last Update Date: 28 Jan 2011 Release Date: 16 Jul 2009 5469 Views