Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Wireshark Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. An error related to an uninitialised variable within the CSN.1 dissector can be exploited to cause a crash...
Last Update Date: 3 Nov 2011 11:18 Release Date: 3 Nov 2011 4678 Views

RISK: Medium Risk

Medium Risk

D-Link Products SSH Server Buffer Overflow Vulnerability

A vulnerability has been identified in multiple D-Link products, which can be exploited by malicious people to cause a DoS (Denial of Service) a vulnerable device. The vulnerability is caused due to an unspecified error within the Secure Shell (SSH) server and...
Last Update Date: 31 Oct 2011 12:47 Release Date: 31 Oct 2011 4941 Views

RISK: High Risk

High Risk

VMware Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in multiple products, which can be exploited by malicious, local users to disclose potentially sensitive information, manipulate certain data, bypass certain security restrictions, conduct spoofing attacks, conduct DNS cache poisoning attacks, cause a DoS (Denial of Service...
Last Update Date: 31 Oct 2011 12:47 Release Date: 31 Oct 2011 4806 Views

RISK: Medium Risk

Medium Risk

Cisco Security Agent Outside In Technology File Processing Vulnerabilities

Two vulnerabilities identified in Cisco Security Agent, which can be exploited by malicious people to compromise a vulnerable system.An unspecified error exists in the vswk6.dll and sccut.dll modules when handling Lotus 123 files.A second unspecified error exists in the vswk6....
Last Update Date: 28 Oct 2011 15:00 Release Date: 28 Oct 2011 4811 Views

RISK: High Risk

High Risk

Apple QuickTime Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple Quicktime, which can be exploited by malicious people to compromise a user's system.An integer overflow error when handling PICT files can be exploited via a specially crafted .pict file.A signedness error when handling font tables...
Last Update Date: 28 Oct 2011 15:00 Release Date: 28 Oct 2011 4867 Views

RISK: Medium Risk

Medium Risk

Novell iPrint Client "GetDriverSettings()" Buffer Overflow Vulnerability

A vulnerability has been identifited in Novell iPrint Client, which can be exploited by malicious people to compromise a user's system.The vulnerability is caused due to a boundary error within the "GetDriverSettings()" function in nipplib.dll. This can be exploited to...
Last Update Date: 28 Oct 2011 14:59 Release Date: 28 Oct 2011 4884 Views

RISK: Medium Risk

Medium Risk

OpenLDAP "UTF8StringNormalize()" Off-by-One Denial of Service Vulnerability

A vulnerability has been identified in OpenLDAP, which can be exploited by malicious users to cause a Denial of Service.The vulnerability is caused due to an off-by-one error in the "UTF8StringNormalize()" function when NULL terminating a string. This can be...
Last Update Date: 28 Oct 2011 14:59 Release Date: 28 Oct 2011 4787 Views

RISK: Medium Risk

Medium Risk

Winamp Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Winamp, which can be exploited by malicious people to compromise a user's system.An error in the in_midi.dll plugin when handling the "iOffsetMusic" value within the Creative Music Format (CMF) header can be exploited...
Last Update Date: 28 Oct 2011 14:58 Release Date: 28 Oct 2011 4960 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to bypass certain security restrictions, conduct spoofing attacks, conduct cross-site scripting attacks, and potentially compromise a user's system. An error within the history handling can be...
Last Update Date: 27 Oct 2011 16:48 Release Date: 27 Oct 2011 4687 Views

RISK: Medium Risk

Medium Risk

FreeType Multiple Vulnerabilities

Mulitple vulnerabilities have been identified in FreeType, which can be exploited by malicious people to compromise an application using the library. The vulnerabilities are caused due to unspecified errors.
Last Update Date: 25 Oct 2011 11:28 Release Date: 25 Oct 2011 4804 Views