Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which could be exploited by attackers to gain knowledge of sensitive information or compromise a vulnerable system.1. An input validation error related to "application/json" responses, which could allow cross site scripting attacks....
Last Update Date: 28 Jan 2011 Release Date: 28 Jun 2010 4378 Views

RISK: Medium Risk

Medium Risk

HP-UX Kerberos Multiple Vulnerabilities

Multiple vulnerabilities have been identified in HP-UX, which could be exploited by attackers to cause a denial of service or compromise a vulnerable system. These issues are caused by errors in Kerberos. .
Last Update Date: 28 Jan 2011 Release Date: 25 Jun 2010 4440 Views

RISK: Medium Risk

Medium Risk

Mozilla Products Multiple Vulnerabilities

Multiple vulnerabilitieshave been identified in Mozilla Firefox, Thunderbird and SeaMonkey, which could be exploited by attackers to manipulate or disclose certain data, bypass security restrictions or compromise a vulnerable system.1. Due to memory corruption errors in the browser and JavaScript engines when parsing malformed...
Last Update Date: 28 Jan 2011 Release Date: 24 Jun 2010 4492 Views

RISK: Medium Risk

Medium Risk

Apple iPhone and iPod touch iOS Multiple Vulnerabilities

Multiple vulnerabilitieshave been identified in Apple iPhone and iPod touch iOS, which could be exploited by attackers to disclose sensitive information, bypass security restrictions or compromise an affected system.1. An security issue is caused due to the Application Sandbox not properly restricting access to the...
Last Update Date: 28 Jan 2011 Release Date: 23 Jun 2010 4710 Views

RISK: Medium Risk

Medium Risk

Opera Multiple Vulnerabilities

Multiple vulnerabilitieshave been identified in Opera, which could be exploited by attackers to bypass security restrictions or compromise a vulnerable system. These issues are caused by unspecified errors, which could allow attackers to bypass certain restrictions, disclose sensitive information or execute arbitrary code.
Last Update Date: 28 Jan 2011 Release Date: 22 Jun 2010 4401 Views

RISK: Medium Risk

Medium Risk

Novell Access Manager Administration Console File Upload Vulnerability

A vulnerability has been identified in Novell Access Manager, which could be exploited by remote attackers to compromise a vulnerable system. This issue is caused by access and input validation errors in the "PortalModuleInstallManager" component within the Admin Console on Windows when handling uploaded files, ...
Last Update Date: 28 Jan 2011 Release Date: 18 Jun 2010 4346 Views

RISK: Medium Risk

Medium Risk

Novell NetWare "CIFS.NLM" SMB Request Buffer Overflow Vulnerability

A vulnerability has been identified in Novell NetWare, which could be exploited by remote attackers to compromise a vulnerable system. This issue is caused by a buffer overflow error in the "CIFS.NLM" driver when processing SMB "Sessions Setup AndX" packets containing an...
Last Update Date: 28 Jan 2011 Release Date: 18 Jun 2010 4424 Views

RISK: Medium Risk

Medium Risk

Apple iTunes Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple iTunes, which could be exploited by remote attackers to obtain sensitive information, bypass security restrictions or compromise a vulnerable system.1. A heap overflow error within the handling of images with an embedded ColorSync profile, which could be...
Last Update Date: 28 Jan 2011 Release Date: 18 Jun 2010 4413 Views

RISK: Medium Risk

Medium Risk

Apple Mac OS X Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple Mac OS X, which could be exploited by attackers to conduct cross-site scripting attacks, bypass certain security restrictions, disclose sensitive information, cause a denial of service or compromise a vulnrable system.1. The CUPS web...
Last Update Date: 28 Jan 2011 Release Date: 17 Jun 2010 4518 Views

RISK: Medium Risk

Medium Risk

Apple Mac OS X Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple Mac OS X, which could be exploited by attackers to conduct cross-site scripting attacks, bypass certain security restrictions, disclose sensitive information, cause a denial of service or compromise a vulnrable system.1. The CUPS web...
Last Update Date: 28 Jan 2011 Release Date: 17 Jun 2010 4403 Views