Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

HP Oracle for OpenView Multiple Vulnerabilities

Multiple vulnerabilities have been identified in HP Oracle for OpenView (OfO), which could be exploited by remote or local attackers to cause a denial of service, execute arbitrary commands, read and overwrite arbitrary data, disclose sensitive information, conduct SQL injection and cross site scripting...
Last Update Date: 28 Jan 2011 Release Date: 21 Jan 2008 2815 Views

RISK: Medium Risk

Medium Risk

Cisco Products CTL Provider Remote Buffer Overflow Vulnerability

A vulnerability has been identified in Cisco Unified CallManager and Unified Communications Manager, which could be exploited by remote attackers to cause a denial of service or take complete control of an affected system. This issue is caused by a heap overflow error in the CTL (Certificate...
Last Update Date: 28 Jan 2011 Release Date: 18 Jan 2008 2813 Views

RISK: Medium Risk

Medium Risk

Oracle Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in various Oracle products, which could be exploited by remote or local attackers to cause a denial of service, execute arbitrary commands, read and overwrite arbitrary data, disclose sensitive information, conduct SQL injection and cross site scripting attacks, or...
Last Update Date: 28 Jan 2011 Release Date: 17 Jan 2008 2845 Views

RISK: Medium Risk

Medium Risk

Apple iPhone / iPod touch Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple iPhone and iPod touch, which could be exploited by remote attackers to bypass security restrictions, disclose sensitive information, or take complete control of an affected device.The first issue is caused by a memory corruption error in Safari when...
Last Update Date: 28 Jan 2011 Release Date: 17 Jan 2008 3098 Views

RISK: Medium Risk

Medium Risk

Microsoft Excel Remote Code Execution Vulnerability

A vulnerability has been identified in Microsoft Excel, which could be exploited by remote attackers to take complete control of an affected system or gain the same user rights as the local user by tricking a user into opening a specially crafted Excel file.
Last Update Date: 28 Jan 2011 Release Date: 16 Jan 2008 2548 Views

RISK: Medium Risk

Medium Risk

Apple QuickTime Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple QuickTime, which could be exploited by remote attackers to cause a denial of service or take complete control of an affected system.1. Due to a memory corruption issue in QuickTime's handling of Sorenson 3 video files, ...
Last Update Date: 28 Jan 2011 Release Date: 16 Jan 2008 2834 Views

RISK: Medium Risk

Medium Risk

Apple QuickTime RTSP Response "Reason-Phrase" Buffer Overflow

A vulnerability has been identified in Apple QuickTime, which could be exploited by remote attackers to cause a denial of service or take complete control of an affected system. This issue is caused by a buffer overflow error when processing RTSP response messages and displaing the "Reason...
Last Update Date: 28 Jan 2011 Release Date: 14 Jan 2008 2804 Views

RISK: Medium Risk

Medium Risk

VMware ESX Server and VirtualCenter Multiple Vulnerabilities

Multiple vulnerabilities have been identified in VMware ESX Server and VirtualCenter, which could be exploited by attackers to bypass security restrictions, disclose sensitive information or execute arbitrary commands and scripting code. These issues are caused by errors in Tomcat, JRE, OpenPegasus, Samba, util...
Last Update Date: 28 Jan 2011 Release Date: 9 Jan 2008 2781 Views

RISK: Medium Risk

Medium Risk

VMware ESX Server Multiple Vulnerabilities

Multiple vulnerabilities have been identified in VMware ESX Server, which could be exploited by attackers to bypass security restrictions or execute arbitrary code.These issues are caused by errors in OpenPegasus, Samba, util-linux, Perl, and OpenSSL.
Last Update Date: 28 Jan 2011 Release Date: 9 Jan 2008 2821 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows LSASS Bypass Vulnerability( 09 January 2008 )

An elevation of privilege vulnerability exists in the Microsoft Windows Local Security Authority Subsystem Service (LSASS) due to its improper handling of local procedure call (LPC) requests. The vulnerability could allow an attacker to run code with elevated privileges. An attacker who successfully exploited...
Last Update Date: 28 Jan 2011 Release Date: 9 Jan 2008 2617 Views