Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Apple iOS for iPhone and iPod touch Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple iOS for iPhone and iPod touch, which could be exploited by attackers to disclose sensitive information, bypass security restrictions or compromise an affected system. These issues are caused by errors in VoiceOver, FaceTime, ImageIO, and WebKit, ...
Last Update Date: 28 Jan 2011 Release Date: 10 Sep 2010 4631 Views

RISK: Medium Risk

Medium Risk

Apple Safari Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple Safari, which could be exploited by remote attackers to compromise a vulnerable system.1. Due to an input validation error in WebKit's handling of floating point data types, which could be exploited by attackers to execute arbitrary...
Last Update Date: 28 Jan 2011 Release Date: 9 Sep 2010 4294 Views

RISK: Medium Risk

Medium Risk

Mozilla Products Multiple Vulnerabilities

Multiple vulnerabilitieshave been identified in Mozilla Firefox, Thunderbird and SeaMonkey, which could be exploited by attackers to manipulate or disclose certain data, bypass security restrictions or compromise a vulnerable system.1. Due to memory corruption errors in the browser engine when parsing malformed data, ...
Last Update Date: 28 Jan 2011 Release Date: 9 Sep 2010 4297 Views

RISK: Medium Risk

Medium Risk

Adobe Acrobat / Reader SING Font Buffer Overflow Vulnerability

A vulnerability has been identified in Adobe Acrobat and Reader, which could be exploited by attackers to compromise a vulnerable system. This issue is caused by a buffer overflow error in the "CoolType.dll" module when processing a PDF document containing malformed SING (Smart...
Last Update Date: 28 Jan 2011 Release Date: 9 Sep 2010 4428 Views

RISK: Medium Risk

Medium Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which could be exploited by attackers to bypass security restrictions, manipulate certain information or compromise a vulnerable system.1. A memory corruption error related to focus handling, which could be exploited to execute arbitrary code.2...
Last Update Date: 28 Jan 2011 Release Date: 6 Sep 2010 4356 Views

RISK: Medium Risk

Medium Risk

Apple iTunes Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple iTunes, which could be exploited by attackers to gain knowledge of sensitive information or compromise a vulnerable system. These issues are caused by errors in WebKit.
Last Update Date: 28 Jan 2011 Release Date: 3 Sep 2010 4365 Views

RISK: Medium Risk

Medium Risk

VMware ESX Multiple Vulnerabilities

Multiple vulnerabilitieshave been identified in VMware ESX, which could be exploited by remote attackers to bypass security restrictions, disclose sensitive information, cause a denial of service or compromise a vulnerable system. These issues are caused by errors in cpio, tar, samba, krb5 and...
Last Update Date: 28 Jan 2011 Release Date: 2 Sep 2010 4369 Views

RISK: Medium Risk

Medium Risk

Apple QuickTime "QTPlugin.ocx" Trusted Parameter Value Vulnerability

A vulnerability has been identified in Apple QuickTime, which could be exploited by remote attackers to compromise a vulnerable system. This issue is caused by a memory trust error in the "QTPlugin.ocx" plugin when using the "_Marshaled_pUnk" parameter value as a pUnknown...
Last Update Date: 28 Jan 2011 Release Date: 1 Sep 2010 4364 Views

RISK: Medium Risk

Medium Risk

RealPlayer Multiple Code Execution Vulnerabilities

Multiple vulnerabilities have been identified in RealPlayer, which could be exploited by remote attackers to gain knowledge of sensitive information or compromise a vulnerable system.1. A memory corruption error when processing IVR files containing a malformed data header, which could allow attackers to execute arbitrary...
Last Update Date: 28 Jan 2011 Release Date: 30 Aug 2010 4345 Views

RISK: Medium Risk

Medium Risk

Trend Micro Internet Security Pro 2010 "UfPBCtrl.dll" ActiveX Control Vulnerability

A vulnerability has been identified in Trend Micro Internet Security Pro, which could be exploited by remote attackers to compromise a vulnerable system. This issue is caused by an error in the "extSetOwner()" function within the "UfPBCtrl.dll" ActiveX control when processing user...
Last Update Date: 28 Jan 2011 Release Date: 27 Aug 2010 4414 Views