Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Foxit Reader Title Parsing Buffer Overflow Vulnerability

A vulnerability has been identified in Foxit Reader, which can be exploited by malicious people to compromise a user's system.The vulnerability is caused due to a boundary error when attempting to set the window title text and can be exploited to cause a stack-...
Last Update Date: 28 Jan 2011 Release Date: 7 Oct 2010 4681 Views

RISK: Medium Risk

Medium Risk

Adobe Acrobat and Reader Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Reader and Acrobat, which could be exploited by remote attackers to cause a denial of service or compromise a vulnerable system, or by local attackers to gain elevated privileges. These issues are caused by memory corruptions, array-indexing...
Last Update Date: 28 Jan 2011 Release Date: 6 Oct 2010 4629 Views

RISK: Medium Risk

Medium Risk

Novell iManager Tomcat Remote File Upload Vulnerability

A vulnerability has been identified in Novell iManager, which could be exploited by remote attackers to take complete control of an affected system. This issue is caused by access and input validation errors in the "nps.jar" web application when handling uploaded files via the...
Last Update Date: 28 Jan 2011 Release Date: 4 Oct 2010 4601 Views

RISK: Medium Risk

Medium Risk

Sun Solaris XServer FreeType CFF Font Parsing Vulnerability

A vulnerability has been identified in Sun Solaris and OpenSolaris, which could be exploited by attackers to compromise a vulnerable system. This issue is caused by an error in the FreeType library used by Xserver.
Last Update Date: 28 Jan 2011 Release Date: 30 Sep 2010 4547 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows ASP.NET Padding Oracle Vulnerability ( 29 September 2010 )

An information disclosure vulnerability exists in ASP.NET due to improper error handling during encryption padding verification. An attacker who successfully exploited this vulnerability could read data, such as the view state, which was encrypted by the server. This vulnerability can also be used for...
Last Update Date: 28 Jan 2011 Release Date: 29 Sep 2010 4647 Views

RISK: Medium Risk

Medium Risk

Nero Products Insecure Library Loading Vulnerabilities

Multiple vulnerabilities have been identified in Nero, which could be exploited by malicious people to compromise a user's system.1. Due to certain bundled applications loading various libraries in an insecure manner. This can be exploited to load arbitrary libraries by tricking a user...
Last Update Date: 28 Jan 2011 Release Date: 29 Sep 2010 4675 Views

RISK: Medium Risk

Medium Risk

VMware ACE Management Server Two Vulnerabilities

Two vulnerabilities have been identified in VMware ACE Management Server (AMS), which could be exploited by remote attackers to cause a denial of service or compromise a vulnerable system.
Last Update Date: 28 Jan 2011 Release Date: 27 Sep 2010 4587 Views

RISK: Medium Risk

Medium Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which could be exploited by remote attackers to compromise a vulnerable system.1. An error in Flash. 2. A bad cast with malformed SVGs.3. A buffer mismanagement error in the SPDY protocol.4...
Last Update Date: 28 Jan 2011 Release Date: 21 Sep 2010 4334 Views

RISK: Medium Risk

Medium Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilitieshave been identified in Google Chrome, which could be exploited by attackers to bypass restrictions, crash an affected browser or compromise a vulnerable system. These issues are caused by use-after-free and input validation errors, and race conditions related to document APIs...
Last Update Date: 28 Jan 2011 Release Date: 16 Sep 2010 4339 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Uniscribe Font Parsing Engine Memory Corruption Vulnerability ( 15 September 2010 )

A remote code execution vulnerability exists in affected versions of Microsoft Windows and Microsoft Office. The vulnerability exists because Windows and Office incorrectly parse specific font types in such a way that could allow remote code execution. An attacker who successfully exploited this vulnerability could run arbitrary code...
Last Update Date: 28 Jan 2011 Release Date: 15 Sep 2010 4174 Views