Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. A use-after-free error exists when handling the first letter. An error exists in the bundled version...
Last Update Date: 29 Mar 2012 Release Date: 23 Mar 2012 4336 Views

RISK: High Risk

High Risk

Adobe Flash Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Flash Player, which can be exploited by a remote user to cause arbitrary code executed on the target user's system. A remote user can create specially crafted Flash content that, when loaded by the target user, will...
Last Update Date: 29 Mar 2012 14:49 Release Date: 29 Mar 2012 4344 Views

RISK: Medium Risk

Medium Risk

Wireshark Denial of Service Vulnerability

Multiple vulnerabilities have been identified in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service).A NULL pointer dereference error in the ANSI A dissector can be exploited to cause a crash via a specially crafted packet.An error...
Last Update Date: 29 Mar 2012 14:49 Release Date: 29 Mar 2012 4259 Views

RISK: Medium Risk

Medium Risk

HP OpenView Network Node Manager Multiple Vulnerabilities

Multiple vulnerabilities have been identified in HP OpenView Network Node Manager, which can be exploited by attackers to cause denial of service, bypass certain security restrictions, gain escalated privileges and disclose potentially sensitive information.
Last Update Date: 29 Mar 2012 09:53 Release Date: 29 Mar 2012 4226 Views

RISK: High Risk

High Risk

Opera Multiple Vulnerabilities

Multiple vulnerabilities have been reported in Opera, which can be exploited by malicious people to conduct spoofing attacks, bypass certain security restrictions, and potentially compromise a user's system. An error when displaying the download dialog box within a small window can be exploited to...
Last Update Date: 28 Mar 2012 10:30 Release Date: 28 Mar 2012 5306 Views

RISK: Medium Risk

Medium Risk

Apache Traffic Server Host Header Buffer Overflow Vulnerability

A vulnerability has been identified in Apache Traffic Server, which can be exploited by malicious people to compromise a vulnerable system.The vulnerability is caused due to an error when parsing the "Host" HTTP header and can be exploited to cause a heap-based buffer...
Last Update Date: 27 Mar 2012 10:26 Release Date: 27 Mar 2012 4459 Views

RISK: Medium Risk

Medium Risk

GnuTLS TLS Multiple Vulnerabilities

Multiple vulnerabilities have been identified in GnuTLS, which can be exploited by malicious people to potentially compromise an application using the library. A vulnerability in GnuTLS libtasn1 Tiny ASN.1 library is caused due to certain functions (e.g. "asn1_der_decoding()") not properly checking...
Last Update Date: 22 Mar 2012 10:36 Release Date: 22 Mar 2012 4262 Views

RISK: Medium Risk

Medium Risk

Novell ZENworks Configuration Management Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Novell ZENworks Configuration Management, which can be exploited to execute arbitrary code and view files on the target system. A remote user can supply a specially crafted request (PreBoot Service Opcode 0x21) to view arbitrary files on the target system...
Last Update Date: 22 Mar 2012 10:12 Release Date: 22 Mar 2012 4289 Views

RISK: High Risk

High Risk

Adobe Photoshop TIFF Image Parsing Buffer Overflow Vulnerability

A vulnerability has been identified in Adobe Photoshop, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused due to an error when parsing TIFF images and can be exploited to cause a heap-based buffer overflow via...
Last Update Date: 22 Mar 2012 09:46 Release Date: 22 Mar 2012 4531 Views

RISK: Medium Risk

Medium Risk

VLC Media Player MMS and Real RTSP Vulnerabilities

Multiple vulnerabilities have been reported in VLC Media Player, which can be exploited by malicious people to compromise a user's system. A boundary error within the "MMSOpen()" function (modules/access/mms/mmstu.c) in the MMS access plugin...
Last Update Date: 20 Mar 2012 10:09 Release Date: 20 Mar 2012 4553 Views