Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

IBM Lotus Notes Java Plugin Sandbox Security Bypass Vulnerability

A vulnerability has been identified in IBM Lotus Notes, which could be exploited by remote attackers to bypass security restrictions and execute arbitrary code. This issue is caused by an error in the Java Plug-in when processing specially crafted JavaScript code, which could be exploited...
Last Update Date: 28 Jan 2011 Release Date: 21 Feb 2008 5495 Views

RISK: Medium Risk

Medium Risk

Apache mod_jk2 Host Header Multiple Buffer Overflow Vulnerabilities

Multiple vulnerabilities have been identified in mod_jk2 for Apache, which could be exploited by remote attackers to cause a denial of service or compromise an affected web server. These issues are caused by buffer overflow errors when processing requests containing a malformed or overly long "Host" ...
Last Update Date: 28 Jan 2011 Release Date: 18 Feb 2008 5408 Views

RISK: Medium Risk

Medium Risk

MySQL Multiple Vulnerabilities

Multiple vulnerabilities have been identified in MySQL, which could be exploited by attackers or malicious users to bypass security restrictions, disclose sensitive information, cause a denial of service or compromise an affected system.1. Missing permission checks when handling BINLOG statements, which could be...
Last Update Date: 28 Jan 2011 Release Date: 15 Feb 2008 5415 Views

RISK: Medium Risk

Medium Risk

Cisco Unified IP Phone Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Cisco Unified IP Phones, which could be exploited by attackers to cause a denial of service or take complete control of an affected device.1. A buffer overflow error when parsing DNS responses, which could be exploited by attackers to...
Last Update Date: 28 Jan 2011 Release Date: 15 Feb 2008 5474 Views

RISK: Medium Risk

Medium Risk

Microsoft Internet Explorer Multiple Vulnerabilities( 13 February 2008 )

1. HTML Rendering Memory Corruption VulnerabilityA remote code execution vulnerability exists in the way Internet Explorer interprets HTML with certain layout combinations. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow...
Last Update Date: 28 Jan 2011 Release Date: 13 Feb 2008 5217 Views

RISK: Medium Risk

Medium Risk

Microsoft Works File Converter Multiple Vulnerabilities( 13 February 2008 )

1. Microsoft Works File Converter Input Validation VulnerabilityA remote code execution vulnerability exists in Microsoft Works File Converter due to the way that it improperly validates section length headers with the .wps format. An attacker who successfully exploited this vulnerability could take complete control of an affected...
Last Update Date: 28 Jan 2011 Release Date: 13 Feb 2008 5224 Views

RISK: Medium Risk

Medium Risk

Novell Client "EnumPrinters" Function Remote Stack Overflow Vulnerability

A vulnerability has been identified in Novell Client for Windows, which could be exploited by remote attackers to cause a denial of service or take complete control of an affected system. This issue is caused by a logical error in the "EnumPrinters" (nwspool.dll) ...
Last Update Date: 28 Jan 2011 Release Date: 13 Feb 2008 5432 Views

RISK: Medium Risk

Medium Risk

Microsoft WebDAV Mini-Redirector Heap Overflow Vulnerability( 13 February 2008 )

A remote code execution vulnerability exists in the way that the WebDAV Mini-Redirector handles responses. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or...
Last Update Date: 28 Jan 2011 Release Date: 13 Feb 2008 5270 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Vista TCP/IP Vulnerability( 13 February 2008 )

A denial of service vulnerability exists in TCP/IP processing in Windows Vista. An attacker could exploit the vulnerability by creating a specially crafted DHCP server that returns a specially crafted packet to a host, corrupting TCP/IP structures and causing the affected system to stop...
Last Update Date: 28 Jan 2011 Release Date: 13 Feb 2008 5168 Views

RISK: Medium Risk

Medium Risk

Microsoft Word Memory Corruption Vulnerability( 13 February 2008 )

A remote code execution vulnerability exists in the way that Word handles specially crafted Word files. The vulnerability could allow remote code execution if a user opens a specially crafted Word file that includes a malformed value. An attacker who successfully exploited this vulnerability could take complete control...
Last Update Date: 28 Jan 2011 Release Date: 13 Feb 2008 5205 Views