Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Microsoft Data Access Components Multiple Vulnerabilities

1. DSN Overflow VulnerabilityA remote code execution vulnerability exists in the way that Microsoft Data Access Components validates third-party API usage. This vulnerability could allow code execution if a user visited a specially crafted Web page. If a user is logged on with administrative user...
Last Update Date: 28 Jan 2011 Release Date: 12 Jan 2011 4671 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Backup Manager Insecure Library Loading Vulnerability

A remote code execution vulnerability exists in the way that the Microsoft Windows Backup Manager handles the loading of DLL files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or...
Last Update Date: 28 Jan 2011 Release Date: 12 Jan 2011 4646 Views

RISK: Medium Risk

Medium Risk

Microsoft Internet Explorer Circular Memory References Use-after-free Vulnerability

A vulnerability has been identified in Microsoft Internet Explorer, which could be exploited by remote attackers to take complete control of a vulnerable system. This issue is caused by a use-after-free error within the "mshtml.dll" library when handling circular references...
Last Update Date: 28 Jan 2011 Release Date: 6 Jan 2011 4899 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Graphics Rendering Engine Buffer Overflow Vulnerability

A vulnerability has been identified in Microsoft Windows, which could be exploited by attackers to take complete control of a vulnerable system. This issue is caused by a stack overflow error in the "CreateSizedDIBSECTION()" function within the "shimgvw.dll" module when parsing a...
Last Update Date: 28 Jan 2011 Release Date: 5 Jan 2011 4672 Views

RISK: Medium Risk

Medium Risk

GIMP Multiple Vulnerabilities

Multiple vulnerabilities have been identified in GIMP, which could be exploited by attackers to execute arbitrary code. These issues are caused by buffer overflow errors in the Lighting Effects, Sphere Designer, GFIG, and PSP (Paint Shop Pro) file plugins when processing malformed files...
Last Update Date: 28 Jan 2011 Release Date: 5 Jan 2011 5077 Views

RISK: Medium Risk

Medium Risk

ImgBurn Insecure Library Loading Vulnerability

A vulnerability has been discovered in ImgBurn, which can be exploited by malicious people to compromise a user's system.The vulnerability is caused due to the application loading libraries (e.g. dwmapi.dll) in an insecure manner. This can be...
Last Update Date: 28 Jan 2011 Release Date: 5 Jan 2011 4854 Views

RISK: Medium Risk

Medium Risk

VLC Media Player Real Demuxer File Handling Array Indexing Vulnerability

A vulnerability has been identified in VLC Media Player, which could be exploited by attackers to execute arbitrary code. This issue is caused by an array indexing error in the "Close()" and "DemuxAudioMethod1()" [modules/demux/real.c] functions within the...
Last Update Date: 28 Jan 2011 Release Date: 4 Jan 2011 5065 Views

RISK: Medium Risk

Medium Risk

Wireshark "dissect_enttec_dmx_data()" Buffer Overflow Vulnerability

A vulnerability has been identified in Wireshark, which could be exploited by attackers to cause a denial of service or execute arbitrary code. This issue is caused by a buffer overflow error in the "dissect_enttec_dmx_data()" [epan/dissectors/packet-enttec.c] function...
Last Update Date: 28 Jan 2011 Release Date: 4 Jan 2011 5020 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Fax Cover Page Editor Buffer Overflow Vulnerability

A vulnerability has been identified in Microsoft Windows, which could be exploited by attackers to execute arbitrary code. This issue is caused by a buffer overflow error in the Fax Cover Page Editor (fxscover.exe) utility when processing a cover file ".cov" containing...
Last Update Date: 28 Jan 2011 Release Date: 28 Dec 2010 4987 Views

RISK: Medium Risk

Medium Risk

Microsoft Internet Explorer Remote Code Execution vulnerability

A vulnerability has been identified in Microsoft Internet Explorer, which could be exploited by remote attackers to execute arbitrary code. This issue is caused by the creation of uninitialized memory during a CSS function within Internet Explorer. It is possible under certain conditions for the memory to...
Last Update Date: 28 Jan 2011 Release Date: 24 Dec 2010 4679 Views