Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

F5 BIG-IP Kerberos and OpenSSL Vulnerabilities

Multiple vulnerabilities have been identified in F5 BIG-IP, which could be exploited by remote attackers to cause a denial of service or compromise a vulnerable system. These issues are caused by errors in Kerberos and OpenSSL.
Last Update Date: 28 Jan 2011 Release Date: 4 Jun 2010 4516 Views

RISK: Medium Risk

Medium Risk

Novell eDirectory Buffer Overflow and Denial of Service Vulnerabilities

Multiple vulnerabilities have been identified in Novell eDirectory, which could be exploited by remote attackers to cause a denial of service or compromise a vulnerable system.1. An error in NDSD when processing a bad verb, which could be exploited to crash an affected daemon....
Last Update Date: 28 Jan 2011 Release Date: 4 Jun 2010 4471 Views

RISK: Medium Risk

Medium Risk

VMware vMA and ESX Products krb5 Multiple Vulnerabilities

Multiple vulnerabilities have been identified in VMware vMA and various ESX products krb5, which could be exploited by attackers to disclose sensitive information, cause a denial of service, or compromise an affected system.1. Some vulnerabilities are caused due to integer underflows within the AES...
Last Update Date: 28 Jan 2011 Release Date: 31 May 2010 4417 Views

RISK: Medium Risk

Medium Risk

Adobe Photoshop CS Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Photoshop CS, which could be exploited by attackers to compromise a vulnerable system. These issues are caused by errors when processing malformed ".ASL", ".ABR", or ".GRD" files, which could be exploited by attackers to execute...
Last Update Date: 28 Jan 2011 Release Date: 28 May 2010 4359 Views

RISK: Medium Risk

Medium Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which could be exploited by attackers to bypass security restrictions, spoof the URL, or compromise a vulnerable system.1. An error related to URL canonicalization.2. An unspecified error which could allow attackers to spoof...
Last Update Date: 28 Jan 2011 Release Date: 28 May 2010 4420 Views

RISK: Medium Risk

Medium Risk

rpc.pcnfsd Syslog Format String Vulnerability

A vulnerability has been identified in HP-UX, SGI IRIX, IBM AIX and VIOS which could be exploited by attackers to cause a denial of service or compromise a vulnerable system. This issue is caused by an integer overflow error in the "rpc.pcnfsd...
Last Update Date: 28 Jan 2011 Release Date: 25 May 2010 4459 Views

RISK: Medium Risk

Medium Risk

Apple Mac OS X Multiple Java Vulnerabilities

Multiple vulnerabilitieshave been identified in Apple Mac OS X, which could be exploited by attackers to bypass security restrictions, disclose sensitive information, cause a denial of service, or compromise an affected system. These issues are caused by errors in Java.
Last Update Date: 28 Jan 2011 Release Date: 20 May 2010 4399 Views

RISK: Medium Risk

Medium Risk

Adobe Shockwave Player Multiple Code Execution Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Shockwave Player, which could be exploited by remote attackers to compromise a vulnerable system. These issues are caused by memory corruptions, integer and buffer overflows, array indexing, and signedness errors when processing malformed Shockwave or Director files, ...
Last Update Date: 28 Jan 2011 Release Date: 13 May 2010 4363 Views

RISK: Medium Risk

Medium Risk

HP OpenView Network Node Manager Code Execution Vulnerabilities

Multiple vulnerabilities have been identified in HP OpenView Network Node Manager (OV NNM), which could be exploited by remote attackers to compromise a vulnerable system.1. A format string error within the "ovet_demandpoll.exe" process (invoked via the "webappmon.exe...
Last Update Date: 28 Jan 2011 Release Date: 13 May 2010 4548 Views

RISK: Medium Risk

Medium Risk

IrfanView PSD Image Parsing Multiple Vulnerabilities

Multiple vulnerabilities have been identified in IrfanView, which could be exploited by attackers to compromise a vulnerable system.1. A sign-extension error when parsing certain PSD images can be exploited to cause a heap-based buffer overflow by tricking a user into opening a...
Last Update Date: 28 Jan 2011 Release Date: 13 May 2010 4402 Views