Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Microsoft Publisher Object Handler Validation Vulnerability( 14 May 2008 )

A remote code execution vulnerability exists in the way Microsoft Publisher validates object header data. An attacker could exploit the vulnerability by sending a specially crafted Publisher file which could be included as an e-mail attachment, or hosted on a specially crafted or compromised Web site...
Last Update Date: 28 Jan 2011 Release Date: 14 May 2008 2232 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows CE Image Processing Vulnerabilities

Multiple vulnerabilities have been identified in Microsoft Windows CE, which could be exploited by attackers to take complete control of an affected device. These issues are caused by unspecified errors when processing malformed JPEG (GDI+) and GIF images, which could be exploited by attackers to...
Last Update Date: 28 Jan 2011 Release Date: 14 May 2008 2231 Views

RISK: Medium Risk

Medium Risk

Microsoft Jet Engine MDB File Parsing Stack Overflow Vulnerability( 14 May 2008 )

A buffer overrun vulnerability exists in the Microsoft Jet Database Engine (Jet) that could allow remote code execution on an affected system. An attacker could exploit the vulnerability by creating a specially crafted database query and sending it through an application that is using Jet on an...
Last Update Date: 28 Jan 2011 Release Date: 14 May 2008 2234 Views

RISK: Medium Risk

Medium Risk

Novell GroupWise "mailto:" URI Remote Buffer Overflow Vulnerability

A vulnerability has been identified in Novell GroupWise, which could be exploited by remote attackers to cause a denial of service or take complete control of an affected system. This issue is caused by a buffer overflow error when processing overly long "mailto:" URIs, which...
Last Update Date: 28 Jan 2011 Release Date: 2 May 2008 2431 Views

RISK: Medium Risk

Medium Risk

IBM Lotus Expeditor "cai:" URI Handler Command Injection Vulnerability

A vulnerability has been identified in IBM Lotus Expeditor, which could be exploited by remote attackers to take complete control of an affected system. This issue is caused by an input validation error when handling "cai" URIs and passing the "-launcher" argument to the...
Last Update Date: 28 Jan 2011 Release Date: 2 May 2008 2440 Views

RISK: Medium Risk

Medium Risk

WordPress Cookie Integrity Protection Privilege Escalation Vulnerability

A vulnerability has been identified in WordPress, which could be exploited by attackers to compromise an affected web site. This issue is caused by an error in the MAC calculation procedure when handling the "USERNAME" and "EXPIRY_TIME" parameters contained in the authentication cookie, ...
Last Update Date: 28 Jan 2011 Release Date: 29 Apr 2008 2452 Views

RISK: Medium Risk

Medium Risk

StarOffice/StarSuite Multiple Vulnerabilities

Multiple vulnerabilities have been identified in StarOffice/StarSuite, which could be exploited by attackers to cause a denial of service or compromise an affected system. These issues are caused by heap overflow and corruption errors when processing specially crafted ODF text documents with XForms, or when...
Last Update Date: 28 Jan 2011 Release Date: 29 Apr 2008 2427 Views

RISK: Medium Risk

Medium Risk

HP Software Update HPeDiag ActiveX Control Multiple Vulnerabilities

Multiple vulnerabilities have been identified in HP Software Update, which could be exploited by remote attackers to gain knowledge of sensitive information or take complete control of an affected system.1. Due to a buffer overflow error in the HPeDiag ActiveX control when handling malformed data passed...
Last Update Date: 28 Jan 2011 Release Date: 28 Apr 2008 2449 Views

RISK: Medium Risk

Medium Risk

Cisco Network Admission Control Shared Secret Vulnerability

A vulnerability has been identified in the Cisco Network Admission Control (NAC) Appliance, which could allow an attacker to obtain the shared secret that is used between the Cisco Clean Access Server (CAS) and the Cisco Clean Access Manager (CAM).
Last Update Date: 28 Jan 2011 Release Date: 25 Apr 2008 2453 Views

RISK: Medium Risk

Medium Risk

Adobe Products BMP Handling Buffer Overflow Vulnerability

A vulnerability has been identified in multiple Adobe products, which could be exploited by remote attackers to cause a denial of service or take complete control of an affected system. This issue is caused by a buffer overflow error when parsing malformed BMP images, which could be...
Last Update Date: 28 Jan 2011 Release Date: 23 Apr 2008 2429 Views