Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Microsoft Internet Explorer VBScript Remote Code Execution Vulnerability

A vulnerability has been identified in VBScript, which could be exploited by remote attackers to compromise a vulnerable system. The vulnerability exists in the way that VBScript interacts with Windows Help files when using Internet Explorer. If a malicious Web site displayed a specially crafted dialog box...
Last Update Date: 28 Jan 2011 Release Date: 2 Mar 2010 4108 Views

RISK: Medium Risk

Medium Risk

Adobe Download Manager File Download and Execute Vulnerability

A vulnerability has been identified in Adobe Download Manager, which could be exploited by remote attackers to compromise a vulnerable system. This issue is caused by an error when processing URLs, which could be exploited by attackers to download and install unauthorized software onto a vulnerable system...
Last Update Date: 28 Jan 2011 Release Date: 26 Feb 2010 4364 Views

RISK: Medium Risk

Medium Risk

Symantec Products Client Proxy Remote Buffer Overflow Vulnerability

A vulnerability has been identified in various Symantec products, which could be exploited by remote attackers to compromise an affected system. This issue is caused by a buffer overflow error in the Client Proxy "CLIproxy.dll" ActiveX control when processing user-supplied data, ...
Last Update Date: 28 Jan 2011 Release Date: 19 Feb 2010 4252 Views

RISK: Medium Risk

Medium Risk

IBM Lotus Notes Unspecified Buffer Overflow Vulnerability

A vulnerability has been identified in IBM Lotus Notes, which can be exploited by malicious people to compromise a user's system.The vulnerability is caused due to an unspecified error and can be exploited to cause a stack-based buffer overflow.Successful exploitation allows...
Last Update Date: 28 Jan 2011 Release Date: 19 Feb 2010 4274 Views

RISK: Medium Risk

Medium Risk

Mozilla Products Code Execution and Security Bypass Vulnerabilities

Multiple vulnerabilitieshave been identified in Mozilla Firefox, Thunderbird and SeaMonkey, which could be exploited by attackers to manipulate or disclose certain data, bypass security restrictions or compromise a vulnerable system.1. Due to memory corruption errors in the JavaScript and browser engines when parsing malformed...
Last Update Date: 28 Jan 2011 Release Date: 19 Feb 2010 4284 Views

RISK: Medium Risk

Medium Risk

Novell Products Kerberos AES / RC4 Integer Underflow Vulnerabilities

Multiple vulnerabilitieshave been identified in Novell products, which could be exploited by remote attackers to cause a denial of service or compromise a vulnerable system. These issues are caused by errors in Kerberos. These issues are caused by integer underflow errors in the AES and RC4 decryption...
Last Update Date: 28 Jan 2011 Release Date: 19 Feb 2010 4359 Views

RISK: Medium Risk

Medium Risk

Adobe Acrobat and Reader PDF Handling Code Execution Vulnerability

A vulnerability has been identified in Adobe Acrobat and Reader, which could be exploited by remote attackers to compromise a vulnerable system. This issue is caused by a memory corruption error in the "authplay.dll" module when processing malformed Flash data within a PDF document...
Last Update Date: 28 Jan 2011 Release Date: 18 Feb 2010 4253 Views

RISK: Medium Risk

Medium Risk

Google Chrome Code Execution and Security Bypass Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which could be exploited by remote attackers to bypass restrictions, disclose sensitive information or compromise a vulnerable system.1. Due to an unspecified DNS and fall-back behavior of proxies, which could disclose sensitive information....
Last Update Date: 28 Jan 2011 Release Date: 12 Feb 2010 4242 Views

RISK: Medium Risk

Medium Risk

HP OpenView Network Node Manager Java JDK / JRE Multiple Vulnerabilities

Multiple vulnerabilities have been identified in in HP OpenView Network Node Manager, which can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, cause a DoS (Denial of service), or compromise a vulnerable system.The vulnerabilities are caused due to...
Last Update Date: 28 Jan 2011 Release Date: 11 Feb 2010 4295 Views

RISK: Medium Risk

Medium Risk

Panda Security ActiveScan "as2stubie.dll" File Download Vulnerability

A vulnerability has been identified in Panda Security ActiveScan, which could be exploited by remote attackers to compromise a vulnerable system. This issue is caused by an error in the "as2stubie.dll" component that fails to validate the digital signature of the "as2guiie....
Last Update Date: 28 Jan 2011 Release Date: 11 Feb 2010 4316 Views