Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Oracle Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in various Oracle and BEA products, which could be exploited by remote or local attackers to cause a denial of service, read and manipulate certain data, disclose sensitive information, conduct SQL injection attacks, bypass security restrictions, or execute arbitrary...
Last Update Date: 28 Jan 2011 Release Date: 17 Jul 2008 4944 Views

RISK: Medium Risk

Medium Risk

HP Oracle for OpenView Multiple Vulnerabilities

Multiple vulnerabilities have been identified in HP Oracle for OpenView (OfO) , which could be exploited by remote or local attackers to cause a denial of service, read and manipulate certain data, disclose sensitive information, conduct SQL injection attacks, bypass security restrictions, or execute...
Last Update Date: 28 Jan 2011 Release Date: 17 Jul 2008 5279 Views

RISK: Medium Risk

Medium Risk

Mozilla Firefox URI Launching and XUL Error Page Vulnerabilities

Multiple vulnerabilities have been identified in Firefox, which can be exploited by malicious people to bypass certain security restrictions, potentially conduct spoofing attacks, or compromise a user's system.1. A vulnerability can be exploited to launch e.g. "file" or...
Last Update Date: 28 Jan 2011 Release Date: 17 Jul 2008 4695 Views

RISK: Medium Risk

Medium Risk

Apple iPhone / iPod touch Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple iPhone and iPod touch, which could be exploited by remote attackers to disclose sensitive information, spoof certain data, cause a denial of service or compromise a vulnerable device.1. An error in CFNetwork when processing 502 Bad Gateway...
Last Update Date: 28 Jan 2011 Release Date: 15 Jul 2008 4672 Views

RISK: Medium Risk

Medium Risk

Apple TV Data Processing Remote Code Execution Vulnerabilities

Multiple vulnerabilities have been identified in Apple TV, which could be exploited by remote attackers to take complete control of an affected system. These issues are caused by buffer overflow and input validation errors when processing specially crafted movie files, QuickTime content or PICT images, which...
Last Update Date: 28 Jan 2011 Release Date: 14 Jul 2008 4694 Views

RISK: Medium Risk

Medium Risk

Sun Java JDK / JRE Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Sun Java, which could be exploited by malicious people to bypass certain security restrictions, disclose system information or potentially sensitive information, cause a DoS (Denial of Service), or compromise a vulnerable system.1. An error in the...
Last Update Date: 28 Jan 2011 Release Date: 10 Jul 2008 4887 Views

RISK: Medium Risk

Medium Risk

Microsoft Office Word Document Handling Code Execution Vulnerability

A vulnerability has been identified in Microsoft Office, which could be exploited by attackers to take complete control of an affected system. This issue is caused by a memory corruption error when handling malformed Word documents, which could be exploited by attackers to crash a vulnerable application...
Last Update Date: 28 Jan 2011 Release Date: 10 Jul 2008 4539 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Multiple DNS Spoofing Vulnerabilities( 09 July 2008 )

1. DNS Insufficient Socket Entropy VulnerabilityA spoofing vulnerability exists in Windows DNS client and Windows DNS server. This vulnerability could allow a remote unauthenticated attacker to quickly and reliably spoof responses and insert records into the DNS server or client cache, thereby redirecting Internet traffic.2...
Last Update Date: 28 Jan 2011 Release Date: 9 Jul 2008 4526 Views

RISK: Medium Risk

Medium Risk

Multiple DNS Implementations Cache Poisoning Vulnerabilities

Deficiencies in the DNS protocol and common DNS implementations facilitate DNS cache poisoning attacks. DNS cache poisoning (sometimes referred to as cache pollution) is an attack technique that allows an attacker to introduce forged DNS information into the cache of a caching nameserver. The general concept...
Last Update Date: 28 Jan 2011 Release Date: 9 Jul 2008 5103 Views

RISK: Medium Risk

Medium Risk

Microsoft SQL Server Multiple Vulnerabilities( 09 July 2008 )

1. Memory Page Reuse VulnerabilityAn information disclosure vulnerability exists in the way that SQL Server manages memory page reuse. An attacker with database operator access who successfully exploited this vulnerability could access customer data.2. Convert Buffer OverrunA vulnerability exists in the convert function in SQL...
Last Update Date: 28 Jan 2011 Release Date: 9 Jul 2008 4732 Views