Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which could be exploited by remote attackers to cause a denial of service or execute arbitrary code.1. A bad validation for message deserialization on 64-bit builds.2. An error when handling a bad extension...
Last Update Date: 28 Jan 2011 Release Date: 15 Dec 2010 4653 Views

RISK: Medium Risk

Medium Risk

Microsoft Exchange Server Infinite Loop Vulnerability

A denial of service vulnerability exists in the way that the Microsoft Exchange store processes specially crafted RPC calls. The vulnerable code path is only accessible to authenticated users. An authenticated attacker could exploit the vulnerability by sending a specially crafted network message to a computer running the...
Last Update Date: 28 Jan 2011 Release Date: 15 Dec 2010 4624 Views

RISK: Medium Risk

Medium Risk

Mozilla Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox, Thunderbird and SeaMonkey, which could be exploited by attackers to manipulate or disclose certain data, bypass security restrictions or compromise a vulnerable system.1. Due to memory corruption errors in the browser engine when parsing malformed data...
Last Update Date: 28 Jan 2011 Release Date: 13 Dec 2010 4846 Views

RISK: Medium Risk

Medium Risk

RealNetworks RealPlayer Multiple Vulnerabilities

Multiple vulnerabilities have been identified in RealPlayer, which could be exploited by remote attackers to take complete control of a vulnerable system. These issues are caused by buffer and integer overflows, array indexing, memory corruptions, invalid memory access and zone validation errors related to RealMedia...
Last Update Date: 28 Jan 2011 Release Date: 13 Dec 2010 4683 Views

RISK: Medium Risk

Medium Risk

Novell iPrint Client Multiple Remote Code Execution Vulnerabilities

Multiple vulnerabilities have been identified in Novell iPrint Client, which could be exploited by remote attackers to execute arbitrary code. These issues are caused by buffer overflow errors related to Netscape/ActiveX "printer-state-reasons", "nipplib.dll", "call-back-...
Last Update Date: 28 Jan 2011 Release Date: 10 Dec 2010 4699 Views

RISK: Medium Risk

Medium Risk

Microsoft Internet Explorer CSS Import Rule Use-after-free Vulnerability

A vulnerability has been identified in Microsoft Internet Explorer, which could be exploited by remote attackers to take complete control of a vulnerable system. This issue is caused by a use-after-free error within the "mshtml.dll" library when processing a web...
Last Update Date: 28 Jan 2011 Release Date: 10 Dec 2010 4811 Views

RISK: Medium Risk

Medium Risk

Apple QuickTime Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple QuickTime, which could be exploited by local attackers to gain knowledge of sensitive information or by remote attackers to execute arbitrary code.1. Due to a heap overflow error when processing JP2 images, which could be exploited to compromise...
Last Update Date: 28 Jan 2011 Release Date: 9 Dec 2010 4844 Views

RISK: Medium Risk

Medium Risk

Winamp MIDI File Processing Code Execution Vulnerability

A vulnerability has been identified in Winamp, which could be exploited by attackers to execute arbitrary code. This issue is caused by a memory corruption error in the "in_midi" module when processing malformed data within a MIDI file, which could be exploited by attackers to...
Last Update Date: 28 Jan 2011 Release Date: 9 Dec 2010 4809 Views

RISK: Medium Risk

Medium Risk

Adobe Device Central & Pixel Bender Toolkit Insecure Library Loading Vulnerability

A vulnerability has been discovered in Adobe Device Central and Adobe Pixel Bender Toolkit, which can be exploited by malicious people to compromise a user's system.1. The vulnerability is caused due to the application loading libraries (e.g. ibfs32.dll...
Last Update Date: 28 Jan 2011 Release Date: 8 Dec 2010 4882 Views

RISK: Medium Risk

Medium Risk

VMware ESX Service Console Multiple Vulnerabilities

Multiple vulnerabilities have been identified in VMware ESX, which could be exploited by attackers to bypass security restrictions, disclose or manipulate information, cause a denial of service or execute arbitrary code. These issues are caused by errors in samba, bzip2 and OpenSSL.
Last Update Date: 28 Jan 2011 Release Date: 8 Dec 2010 4671 Views