Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Mozilla Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox, Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose sensitive information and compromise a user's system. Some unspecified errors can be exploited to corrupt memory. An error exists within the YARR regular expression...
Last Update Date: 22 Dec 2011 12:22 Release Date: 22 Dec 2011 4606 Views

RISK: High Risk

High Risk

VLC Media Player "get_chunk_header()" Double-Free Vulnerability

A vulnerability has been identified in VLC Media Player, which potentially can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a double-free error within the "get_chunk_header()" function (modules/demux/ty...
Last Update Date: 22 Dec 2011 11:08 Release Date: 22 Dec 2011 4399 Views

RISK: Medium Risk

Medium Risk

IrfanView Multiple Vulnerabilities

Multiple vulnerabilities have been identified in IrfanView, which can be exploited by malicious people to compromise a user's system.Due to an error when processing TIFF images with certain "Rows Per Strip" and "Samples Per Pixel" values, which can be exploited...
Last Update Date: 21 Dec 2011 10:44 Release Date: 21 Dec 2011 4535 Views

RISK: High Risk

High Risk

Microsoft Windows win32k.sys Memory Corruption Vulnerability

A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused due to an error in win32k.sys and can be exploited to corrupt memory via e.g...
Last Update Date: 20 Dec 2011 11:09 Release Date: 20 Dec 2011 4687 Views

RISK: High Risk

High Risk

Tor "buf_pullup()" Buffer Overflow Vulnerability

A vulnerability has been identified in Tor, which can be exploited by malicious people to compromise a user's system.  The vulnerability is caused due to an error within the "buf_pullup()" function (or/buffers.c) when repacking data and can be...
Last Update Date: 20 Dec 2011 11:08 Release Date: 20 Dec 2011 4362 Views

RISK: Extremely High Risk

Extremely High Risk

Adobe Acrobat and Reader PDF Data Processing Code Execution Vulnerability

A vulnerability has been identified in Adobe Acrobat and Reader, which can be exploited to cause a crash and potentially allow attackers to take control of the affected system. Notes: Vendor supplied patch is currently unavailable.  There are reports that the vulnerability is being actively exploited...
Last Update Date: 19 Dec 2011 Release Date: 7 Dec 2011 4952 Views

RISK: Medium Risk

Medium Risk

RSA SecurID Software Token Insecure Library Loading Vulnerability

A vulnerability has identified in RSA SecurID Software Token, which can be exploited by malicious people to compromise a user's system.The vulnerability is caused due to the application loading libraries (e.g. wintab32.dll) in an insecure manner. This...
Last Update Date: 16 Dec 2011 10:43 Release Date: 16 Dec 2011 4763 Views

RISK: High Risk

High Risk

GTK+ Insecure Library Loading Vulnerability

A vulnerability has been identified in GTK+, which can be exploited by malicious people to compromise an application using the library. The vulnerability is caused due to the "_gdk_input_wintab_init_check()" (gdk/win32/gdkinput-win32.c) and the "xp_theme_init()" functions (...
Last Update Date: 16 Dec 2011 Release Date: 6 Sep 2011 5102 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to conduct spoofing attacks, disclose potentially sensitive information, and compromise a user's system. An error in regex matching, libxml, PDF parser, SVG parsing, handling YUV...
Last Update Date: 15 Dec 2011 10:39 Release Date: 15 Dec 2011 4659 Views

RISK: High Risk

High Risk

Microsoft Internet Explorer Multiple Vulnerabilities

XSS Filter Information Disclosure VulnerabilityAn information disclosure vulnerability exists in Internet Explorer. An attacker could exploit the vulnerability by constructing a specially crafted Web page that contains malicious JavaScript code. An attacker who successfully exploited this vulnerability could view content from another domain or Internet Explorer zone....
Last Update Date: 14 Dec 2011 14:53 Release Date: 14 Dec 2011 4545 Views