Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Check Point SSL VPN On-Demand Applications Remote Code Execution Vulnerability

A vulnerability has been identified in Check Point products, which could be exploited by remote attackers to compromise a vulnerable system. This issue is caused by an error in the SSL Network Extender (SNX), SecureWorkSpace and Endpoint Security On-Demand application when deployed through a...
Last Update Date: 4 May 2011 12:18 Release Date: 4 May 2011 5766 Views

RISK: Medium Risk

Medium Risk

HP OpenView Storage Data Protector Code Execution Vulnerabilities

Multiple vulnerabilities have been identified in HP OpenView Storage Data Protector, which could be exploited by remote attackers to gain knowledge of sensitive information or compromise a vulnerable system. These issues are caused by buffer overflows and directory traversal errors in the Backup Client Service (OmniInet....
Last Update Date: 3 May 2011 17:51 Release Date: 3 May 2011 6192 Views

RISK: High Risk

High Risk

Mozilla Products Mulitple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox, Thunderbird and SeaMonkey, which could be exploited by attackers to manipulate or disclose certain data, bypass security restrictions or compromise a vulnerable system. These issues are caused by memory corruptions, dangling pointers, input validation errors, ...
Last Update Date: 3 May 2011 17:49 Release Date: 3 May 2011 5871 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilites

Multiple vulnerabilities have been identified in Google Chrome, which could be exploited by remote attackers to bypass security restrictions, disclose sensitive information, conduct spoofing attacks, and compromise a vulnerable system. An unspecified error related to a stale pointer exists within the handling of floating objects...
Last Update Date: 29 Apr 2011 11:43 Release Date: 29 Apr 2011 5745 Views

RISK: High Risk

High Risk

Oracle Products Multiple Vulnerabilies

Multiple vulnerabilities have been identified in various Oracle products and components, which could be exploited by attackers to cause a denial of service, disclose sensitive information or compromise a vulnerable system.
Last Update Date: 21 Apr 2011 12:23 Release Date: 21 Apr 2011 5832 Views

RISK: High Risk

High Risk

Apple iTunes WebKit Multiple Vulnerabilities

Two vulnerabilities have been identified in Apple iTunes, which could be exploited by remote attackers to compromise a vulnerable system. Due to a use-after-free error in WebKit when handling text nodes, which could be exploited to execute arbitrary code via a malicious web...
Last Update Date: 21 Apr 2011 12:22 Release Date: 21 Apr 2011 5648 Views

RISK: High Risk

High Risk

Wireshark Multiple Code Execution and Denial of Service Vulnerabilities

Multiple vulnerabilities have been identified in Wireshark, which could be exploited by attackers to cause a denial of service or compromise a vulnerable system. A buffer overflow error in the DECT dissector when processing malformed data, which could allow code execution via malformed packets or a malicious...
Last Update Date: 20 Apr 2011 10:27 Release Date: 20 Apr 2011 5612 Views

RISK: High Risk

High Risk

Google Chrome GPU Process Vulnerability

Multiple vulnerabilities have been identified in Google Chrome, which could be exploited by remote attackers to compromise a vulnerable system. An off-by-three error in the GPU process, which could be exploited by remote attackers to execute arbitrary code via a malicious web page...
Last Update Date: 19 Apr 2011 11:31 Release Date: 19 Apr 2011 5694 Views

RISK: High Risk

High Risk

Apple iOS Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple iOS for iPhone, iPod and iPad, which could be exploited by remote attackers to bypass restrictions, gain knowledge of sensitive information, or compromise a vulnerable device. 1. A use-after-free error in WebKit when...
Last Update Date: 19 Apr 2011 Release Date: 15 Apr 2011 5702 Views

RISK: Medium Risk

Medium Risk

VLC Media Player "MP4_ReadBox_skcr()" Heap Corruption Vulnerability

A vulnerability has been identified in VLC Media Player, which could be exploited by remote attackers to compromise a vulnerable system. This issue is caused by a heap corruption error in the "MP4_ReadBox_skcr()" [modules/demux/mp4/libmp4.c] function when processing...
Last Update Date: 19 Apr 2011 Release Date: 12 Apr 2011 5080 Views