Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

ClamAV Multiple Vulnerabilities

Multiple vulnerabilities have been identified in ClamAV, which could be exploited by attackers or malware to cause a denial of service or execute arbitrary code.1. The errors in the "libclamav/pdf.c" file, which could be exploited to crash an affected...
Last Update Date: 28 Jan 2011 Release Date: 3 Dec 2010 4699 Views

RISK: Medium Risk

Medium Risk

AWStats Remote Code Execution and Directory Traversal Vulnerabilities

Two vulnerabilities have been identified in AWStats, which could be exploited by remote attackers to gain knowledge of sensitive information or compromise a vulnerable web server.1. An input validation error when specifying a configuration file directory on Windows, which could be exploited by attackers to...
Last Update Date: 28 Jan 2011 Release Date: 2 Dec 2010 4809 Views

RISK: Medium Risk

Medium Risk

Winamp Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Winamp, which could be exploited by attackers to execute arbitrary code.1. A buffer and integer overflow errors in the "in_midi" module when processing malformed data, which could be exploited by attackers to compromise a vulnerable system....
Last Update Date: 28 Jan 2011 Release Date: 1 Dec 2010 4782 Views

RISK: Medium Risk

Medium Risk

McAfee VirusScan Enterprise Insecure Library Loading Vulnerability

A vulnerability has been identified in McAfee VirusScan Enterprise, which can be exploited by malicious people to compromise a user's system.The vulnerability is caused due to the application loading libraries (e.g. traceapp.dll) in an insecure manner. This...
Last Update Date: 28 Jan 2011 Release Date: 30 Nov 2010 4695 Views

RISK: Medium Risk

Medium Risk

Apple iOS Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple iOS for iPhone, iPod touch and iPad, which could be exploited by attackers to gain knowledge of sensitive information, bypass restrictions, cause a denial of service or compromise a vulnerable system. These issues are caused by errors in...
Last Update Date: 28 Jan 2011 Release Date: 24 Nov 2010 5436 Views

RISK: Medium Risk

Medium Risk

Apple Safari Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple Safari, which could be exploited by attackers to disclose sensitive information, bypass security restrictions or execute arbitrary code. These issues are caused by design errors, invalid casts, memory corruptions, uninitialized pointers and memory, integer overflows and...
Last Update Date: 28 Jan 2011 Release Date: 22 Nov 2010 4687 Views

RISK: Medium Risk

Medium Risk

Novell iPrint Client "GetDriverSettings()" Remote Stack Overflow Vulnerability

A vulnerability has been identified Novell iPrint Client, which could be exploited by remote attackers to execute arbitrary code. This issue is caused by a buffer overflow error in the "ienipp.ocx" ActiveX component when processing data supplied via the "GetDriverSettings()" method, ...
Last Update Date: 28 Jan 2011 Release Date: 22 Nov 2010 4668 Views

RISK: Medium Risk

Medium Risk

Adobe Acrobat and Reader Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Reader 9.4 (and earlier versions) for Windows, Macintosh and UNIX, and Adobe Acrobat 9.4 (and earlier 9.x versions) for Windows and Macintosh. These vulnerabilities could cause the application to crash...
Last Update Date: 28 Jan 2011 Release Date: 18 Nov 2010 4636 Views

RISK: Medium Risk

Medium Risk

VMware ESX / ESXi Multiple Vulnerabilities

Multiple vulnerabilities have been identified in VMware ESX/ESXi, which could be exploited by attackers to cause a denial of service or execute arbitrary code. These issues are caused by errors in COS kernel, likewisekrb5, likewiseopenldap, likewiseopen, and pamkrb5.
Last Update Date: 28 Jan 2011 Release Date: 17 Nov 2010 4690 Views

RISK: Medium Risk

Medium Risk

RealPlayer RealMedia Image Map Parsing Vulnerabilities

A vulnerability has been identified in RealPlayer which could be exploited by remote attackers to compromise a vulnerable system. The vulnerabilities are caused due to integer truncation errors when parsing image maps in RealMedia (.rm) files. This can be exploited to cause heap-based buffer...
Last Update Date: 28 Jan 2011 Release Date: 16 Nov 2010 4684 Views