Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Joomla Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Joomla, which could be exploited by attackers or malicious users to gain unauthorized access, manipulate or gain knowledge of certain information and data, or cause a denial of service. These issues are caused by input validation errors that could allow...
Last Update Date: 10 Mar 2011 12:26 Release Date: 10 Mar 2011 5469 Views

RISK: Medium Risk

Medium Risk

Foxit Reader "createDataObject()" Arbitrary File Creation Vulnerability

A vulnerability has been identified in Foxit Reader, which could be exploited by remote attackers to compromise a vulnerable system. This issue is caused by an input validation error when handling arguments supplied via the "createDataObject()" method, which could allow attackers to create a file...
Last Update Date: 9 Mar 2011 10:18 Release Date: 9 Mar 2011 5142 Views

RISK: High Risk

High Risk

Microsoft Office Groove Insecure Library Loading Vulnerability

A remote code execution vulnerability exists in the way that Microsoft Groove 2007 handles the loading of DLL files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, ...
Last Update Date: 9 Mar 2011 10:18 Release Date: 9 Mar 2011 5387 Views

RISK: High Risk

High Risk

Microsoft Windows Remote Desktop Insecure Library Loading Vulnerability

A remote code execution vulnerability exists in the way that Windows Remote Desktop Client handles the loading of DLL files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change...
Last Update Date: 9 Mar 2011 09:55 Release Date: 9 Mar 2011 5245 Views

RISK: High Risk

High Risk

Microsoft Windows Media Multiple Vulnerabilities

A remote code execution vulnerability exists in the way that Microsoft DirectShow handles the loading of DLL files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or...
Last Update Date: 9 Mar 2011 09:54 Release Date: 9 Mar 2011 5158 Views

RISK: High Risk

High Risk

Apple iTunes Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple iTunes, which could be exploited by remote attackers to obtain sensitive information, bypass security restrictions or compromise a vulnerable system. These issues are caused by errors in ImageIO, libxml and WebKit.
Last Update Date: 4 Mar 2011 10:52 Release Date: 4 Mar 2011 5467 Views

RISK: High Risk

High Risk

Mozilla Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox, Thunderbird and SeaMonkey, which could be exploited by attackers to manipulate or disclose certain data, bypass security restrictions or compromise a vulnerable system.Due to memory corruption errors in the browser engine when parsing malformed data, which...
Last Update Date: 3 Mar 2011 10:59 Release Date: 3 Mar 2011 5450 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which could be exploited by remote attackers to spoof the address bar, disclose sensitive information, cause a denial of service or execute arbitrary code. These issues are caused by input validation errors, stale pointers, out-...
Last Update Date: 2 Mar 2011 09:34 Release Date: 2 Mar 2011 5411 Views

RISK: High Risk

High Risk

Cisco Secure Desktop CSDWebInstaller ActiveX Multiple Vulnerabilities

Two vulnerabilities have been identified in Cisco Secure Desktop, which could be exploited by remote attackers to compromise a vulnerable system. An error in the "CSDWebInstallerCtrl" ActiveX control (CSDWebInstaller.ocx) when handling a Cisco-signed executable file named "inst.exe...
Last Update Date: 1 Mar 2011 17:04 Release Date: 1 Mar 2011 5599 Views

RISK: High Risk

High Risk

Citrix Secure Gateway Unspecified Remote Code Execution Vulnerability

A vulnerability has been identified in Citrix Secure Gateway, which could be exploited by remote attackers to compromise a vulnerable system. This issue is caused by an unspecified error which could result in arbitrary code being executed on the server in the context of the Secure Gateway process...
Last Update Date: 1 Mar 2011 16:47 Release Date: 1 Mar 2011 5546 Views