Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

WordPress DukaPress Shopping Cart Plugin Vulnerability

 A vulnerability has been identified in DukaPress Shopping Cart plugin for WordPress, which can be exploited by remote attacker to compromise a user's system.
Last Update Date: 7 Sep 2011 09:54 Release Date: 7 Sep 2011 5258 Views

RISK: High Risk

High Risk

F-Secure Gadget Resource Handler ActiveX Control "initialize()" Buffer Overflow Vulnerability

A vulnerability has been identified in the F-Secure Gadget Resource Handler ActiveX Control, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in the handling of the "initialize()" ...
Last Update Date: 25 Aug 2011 09:25 Release Date: 25 Aug 2011 5298 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to bypass certain security restrictions and potentially compromise a user's system. An error related to the command line can lead to "URL parsing confusion". Note: This vulnerability affects...
Last Update Date: 24 Aug 2011 12:22 Release Date: 24 Aug 2011 5308 Views

RISK: High Risk

High Risk

RealPlayer Multiple Vulnerabilities

Multiple vulnerabilities have been identified in RealPlayer, which can be exploited by malicious people to compromise a user's system. A use-after-free error exists in pngu3267.dll within the handling of displayed dialog boxes when navigating away from a web page. ...
Last Update Date: 18 Aug 2011 12:04 Release Date: 18 Aug 2011 5598 Views

RISK: High Risk

High Risk

Mozilla Firefox / Thunderbird Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox and Thunderbird, which can be exploited by malicious people to bypass certain security restrictions, disclose certain sensitive information, and compromise a vulnerable system.   Firefox 3.6.x/Thunderbird 3.1.x: Some...
Last Update Date: 18 Aug 2011 12:01 Release Date: 18 Aug 2011 5667 Views

RISK: High Risk

High Risk

Mass Injection Attacks Targeting osCommerce Vulnerabilities

Multiple vulnerabilities have been identified in osCommerce application, which can be exploited by hackers to inject malicious content in vulnerable osCommerce websites.   A large scale injection attack targeting osCommerce websites is reported.  Injected "<iframe>" and "<script>" pointing to malicious links will infect computers...
Last Update Date: 12 Aug 2011 Release Date: 2 Aug 2011 8050 Views

RISK: High Risk

High Risk

Google Chrome Flash Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to disclose sensitive information and compromise a user's system. The vulnerabilities are caused due to a bundled vulnerable version of Adobe Flash Player.   For more information, please...
Last Update Date: 11 Aug 2011 10:32 Release Date: 11 Aug 2011 5684 Views

RISK: High Risk

High Risk

BlackBerry Enterprise Server PNG and TIFF Image Processing Vulnerabilities

Multiple vulnerabilities have been identified in BlackBerry Enterprise Server, which can be exploited by malicious people to compromise a vulnerable system. An unspecified error within the BlackBerry MDS Connection Service when processing PNG and TIFF images can be exploited when a specially crafted...
Last Update Date: 11 Aug 2011 10:31 Release Date: 11 Aug 2011 5693 Views

RISK: High Risk

High Risk

Check Point SSL VPN On-Demand Applications Unspecified Vulnerability

A vulnerability have been identified in Check Point SSL VPN On-Demand applications, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an unspecified error in the helper application (e.g...
Last Update Date: 11 Aug 2011 10:29 Release Date: 11 Aug 2011 5821 Views

RISK: High Risk

High Risk

Adobe Photoshop CS5 Code Execution Vulnerability

A vulnerability has been identified in Adobe Photoshop CS5 and CS5.1, which can be exploited by malicious people to take control of the affected system by convincing a user to open a malicious .GIF file.
Last Update Date: 10 Aug 2011 12:33 Release Date: 10 Aug 2011 5606 Views