Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Cisco IOS Multiple Vulnerabilities

Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to disclose sensitive information, manipulate certain data, or to cause a DoS (Denial of Service).1) A memory leak exists in the handling of completed PPTP sessions, which...
Last Update Date: 28 Jan 2011 Release Date: 28 Mar 2008 2455 Views

RISK: Medium Risk

Medium Risk

Mozilla Thunderbird Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Thunderbird, which could be exploited by attackers to bypass security restrictions, execute arbitrary scripting code, cause a denial of service or take complete control of an affected system.1. Due to an error in the handling of "...
Last Update Date: 28 Jan 2011 Release Date: 27 Mar 2008 2450 Views

RISK: Medium Risk

Medium Risk

Mozilla Firefox and SeaMonkey Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox and SeaMonkey, which could be exploited by attackers to bypass security restrictions, disclose sensitive information, cause a denial of service or take complete control of an affected system.1. Due to an error in the handling of...
Last Update Date: 28 Jan 2011 Release Date: 27 Mar 2008 2426 Views

RISK: Medium Risk

Medium Risk

Novell eDirectory LDAP Extended Request Buffer Overflow Vulnerability

A vulnerability has been identified in Novell eDirectory, which could be exploited by remote attackers to cause a denial of service or compromise a vulnerable system. This issue is caused by a buffer overflow error when processing overly large LDAP Extended Request messages, which could be exploited...
Last Update Date: 28 Jan 2011 Release Date: 26 Mar 2008 2451 Views

RISK: Medium Risk

Medium Risk

Apple Safari Memory Corruption and Address Bar Spoofing Vulnerabilities

Multiple vulnerabilities have been identified in Apple Safari for Windows, which could be exploited by remote attackers to spoof arbitrary web sites, cause a denial of service or compromise a vulnerable system.1. Due to a memory corruption error when handling overly long filenames, which...
Last Update Date: 28 Jan 2011 Release Date: 26 Mar 2008 2442 Views

RISK: Medium Risk

Medium Risk

Mac OS X Multiple Vulnerabilities

Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities.1. Multiple boundary errors in AFP client when processing "afp://" URLs can be exploited to cause stack-based buffer overflows when a user connects to a malicious AFP server....
Last Update Date: 28 Jan 2011 Release Date: 20 Mar 2008 2470 Views

RISK: Medium Risk

Medium Risk

MIT Kerberos Updates for Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Kerberos, which could be exploited by attackers to gain knowledge of sensitive information, cause a denial of service or take complete control of an affected system.1. Due to an errors in KDC when handling krb4 messages, which could...
Last Update Date: 28 Jan 2011 Release Date: 20 Mar 2008 2420 Views

RISK: Medium Risk

Medium Risk

Apple Safari Command Execution and Cross Site Scripting Vulnerabilities

Multiple vulnerabilities have been identified in Apple Safari, which could be exploited by remote attackers to bypass security restrictions, cause a denial of service, disclose sensitive information, or execute arbitrary code.1. Due to an error in the validation of certificates, which could...
Last Update Date: 28 Jan 2011 Release Date: 19 Mar 2008 2428 Views

RISK: Medium Risk

Medium Risk

CA BrightStor ARCserve Backup List Control Code Execution Vulnerability

A vulnerability has been identified in CA BrightStor ARCserve Backup, which could be exploited by remote attackers to cause a denial of service or take complete control of an affected system. This issue is caused by a buffer overflow error in the "ListCtrl.ocx" ActiveX...
Last Update Date: 28 Jan 2011 Release Date: 18 Mar 2008 2436 Views

RISK: Medium Risk

Medium Risk

F-Secure Products Archive Handling Code Execution Vulnerabilities

Multiple vulnerabilities have been identified in various F-Secure products, which could be exploited by attackers or malware to cause a denial of service or take complete control of an affected system. These issues are caused by memory corruption errors when processing malformed archives, which could...
Last Update Date: 28 Jan 2011 Release Date: 18 Mar 2008 2484 Views