Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

AppleTV Multiple Vulnerabilities

Some vulnerabilities have been reported in Apple TV, which can be exploited by malicious people to compromise a vulnerable system.1) An error in the processing of movie atoms can be exploited to cause a stack-based buffer overflow.2) An error in the...
Last Update Date: 28 Jan 2011 Release Date: 6 Oct 2008 5477 Views

RISK: Medium Risk

Medium Risk

Trend Micro OfficeScan Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Trend Micro OfficeScan, which could be exploited by remote attackers to gain knowledge of sensitive information, cause a denial of service or compromise a vulnerable system.1. Due to an unspecified buffer overflow error in certain CGI modules, which...
Last Update Date: 28 Jan 2011 Release Date: 3 Oct 2008 5466 Views

RISK: Medium Risk

Medium Risk

WinZipGDI+ Library Multiple Vulnerabilities

Multiple vulnerabilities have been identified in WinZip, which could be exploited by remote attackers to take complete control of an affected system. This issue is caused due to the application placing a vulnerable "gdiplus.dll" library in the program folder and using it on Windows...
Last Update Date: 28 Jan 2011 Release Date: 2 Oct 2008 5585 Views

RISK: Medium Risk

Medium Risk

Mac OS X Java Multiple Vulnerabilities

Some vulnerabilities have been identified in Java for Mac OS X, which can be exploited by malicious people to cause a Denial of Service, to bypass certain security restrictions, disclose system information or potentially sensitive information, or to compromise a vulnerable system.1) An...
Last Update Date: 28 Jan 2011 Release Date: 26 Sep 2008 5469 Views

RISK: Medium Risk

Medium Risk

Mozilla Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox, SeaMonkey and Thunderbird, which could be exploited by attackers to bypass security restrictions, disclose sensitive information, cause a denial of service or take complete control of an affected system.1. A stack overflow error when processing...
Last Update Date: 28 Jan 2011 Release Date: 25 Sep 2008 5390 Views

RISK: Medium Risk

Medium Risk

Cisco IOS Linecard Redundancy Unauthorized Access Vulnerability

Cisco IOS software contains a vulnerability when running on uBR10012 series devices that could allow an unauthenticated, remote attacker to gain privileged access to the device.The vulnerability exists when the device is configured for linecard redundancy, which is the default setting. The device automatically enables...
Last Update Date: 28 Jan 2011 Release Date: 25 Sep 2008 5583 Views

RISK: Medium Risk

Medium Risk

Mozilla Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox, SeaMonkey and Thunderbird, which could be exploited by attackers to bypass security restrictions, disclose sensitive information, cause a denial of service or take complete control of an affected system.1. A stack overflow error when processing...
Last Update Date: 28 Jan 2011 Release Date: 25 Sep 2008 5426 Views

RISK: Medium Risk

Medium Risk

Adobe Illustrator Unspecified Code Execution Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Illustrator CS2 for Mac, which could be exploited by attackers to compromise a vulnerable system. These issues are caused by unspecified errors when processing AI files, which could be exploited to execute arbitrary code by tricking a user into opening...
Last Update Date: 28 Jan 2011 Release Date: 18 Sep 2008 5489 Views

RISK: Medium Risk

Medium Risk

Apple Mac OS X Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple Mac OS X, which could be exploited by remote or local attackers to disclose sensitive information, bypass security restrictions, cause a denial of service or compromise an affected system. These issues are caused by buffer overflow, insecure file...
Last Update Date: 28 Jan 2011 Release Date: 17 Sep 2008 5497 Views

RISK: Medium Risk

Medium Risk

Apple iPhone Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple iPhone, which could be exploited by attackers to bypass security restrictions, poison DNS cache, cause a denial of service or compromise a vulnerable system.1. An error in the Application Sandbox that does not properly enforce access restrictions...
Last Update Date: 28 Jan 2011 Release Date: 16 Sep 2008 5764 Views