Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

McAfee ePolicy Orchestrator "logDetail()" Format String Vulnerability

A vulnerability has been identified in McAfee ePolicy Orchestrator, which could be exploited by remote attackers to cause a denial of service or take complete control of an affected system. This issue is caused by a format string error in the "logDetail()" [applib.dll] ...
Last Update Date: 28 Jan 2011 Release Date: 14 Mar 2008 4780 Views

RISK: Medium Risk

Medium Risk

Microsoft Office Web Components Two Vulnerabilites( 12 March 2008 )

1. Office Web Components URL Parsing VulnerabilityA remote code execution vulnerability exists in the way Microsoft Office Web Components manages memory resources when parsing specially crafted URLs. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page...
Last Update Date: 28 Jan 2011 Release Date: 12 Mar 2008 4656 Views

RISK: Medium Risk

Medium Risk

Microsoft Outlook URI Vulnerability( 12 March 2008 )

A remote code execution exists in Outlook. The vulnerability could allow remote code execution if Outlook is passed a specially crafted mailto URI. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users...
Last Update Date: 28 Jan 2011 Release Date: 12 Mar 2008 4561 Views

RISK: Medium Risk

Medium Risk

RealPlayer ActiveX Control "Console" Memory Corruption Vulnerability

A vulnerability has been identified in RealPlayer, which could be exploited by remote attackers to cause a denial of service or take complete control of an affected system. This issue is caused by a memory corruption error in the "rmoc3260.dll" ActiveX control when handling...
Last Update Date: 28 Jan 2011 Release Date: 12 Mar 2008 4741 Views

RISK: Medium Risk

Medium Risk

Microsoft Excel Multiple Vulnerabilites( 12 March 2008 )

1. Excel Data Validation Record VulnerabilityA remote code execution vulnerability exists in the way Excel processes data validation records when loading Excel files into memory. An attacker could exploit the vulnerability by sending a malformed file which could be hosted on a specially crafted or compromised Web site...
Last Update Date: 28 Jan 2011 Release Date: 12 Mar 2008 4564 Views

RISK: Medium Risk

Medium Risk

Microsoft Office Multiple Memory Corruption Vulnerabilities( 12 March 2008 )

1. Microsoft Office Cell Parsing Memory Corruption VulnerabilityA remote code execution vulnerability exists in the way Microsoft Office handles specially crafted Excel files. An attacker could exploit the vulnerability by creating a malformed file which could be included as an e-mail attachment, or hosted on...
Last Update Date: 28 Jan 2011 Release Date: 12 Mar 2008 4555 Views

RISK: Medium Risk

Medium Risk

Sun Java Multiple Code Execution and Security Bypass Vulnerabilities

Multiple vulnerabilities have been identified in Sun Java, which could be exploited by remote attackers to bypass security restrictions or take complete control of an affected system. These issues are caused by unspecified errors when handling certain data or applets, which could be exploited by malicious web...
Last Update Date: 28 Jan 2011 Release Date: 6 Mar 2008 4759 Views

RISK: Medium Risk

Medium Risk

ICQ Message Handling and Conversion Remote Format String Vulnerability

A vulnerability has been identified in ICQ, which could be exploited by remote attackers to cause a denial of service or potentially take complete control of an affected system. This issue is caused by a format string error when processing and converting received HTML messages, which could...
Last Update Date: 28 Jan 2011 Release Date: 29 Feb 2008 4777 Views

RISK: Medium Risk

Medium Risk

Trend Micro OfficeScan Multiple Remote Buffer Overflow Vulnerabilities

Multiple vulnerabilities have been identified in Trend Micro OfficeScan, which could be exploited by remote attackers to cause a denial of service or take complete contol of an affected system. These issues are caused by NULL pointer dereference and buffer overflow errors in the "cgiChkMasterPwd.exe...
Last Update Date: 28 Jan 2011 Release Date: 29 Feb 2008 4788 Views

RISK: Medium Risk

Medium Risk

Symantec Products Decomposer Buffer Overflow and DoS Vulnerabilities

Multiple vulnerabilities have been identified in various Symantec products, which could be exploited by attackers or malware to cause a denial of service or take complete contol of an affected system. These issues are caused by infinite loop and buffer overflow errors in the Decomposer engine when processing...
Last Update Date: 28 Jan 2011 Release Date: 28 Feb 2008 4782 Views