Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

RealNetworks RealPlayer SWF Frame Handling Buffer Overflow Vulnerability

A vulnerability has been identified in RealPlayer, which potentially can be exploited by malicious people to compromise a user's system.The vulnerability is caused due to a design error within the handling of frames in Shockwave Flash (SWF) files and can be exploited to...
Last Update Date: 28 Jan 2011 Release Date: 28 Jul 2008 4891 Views

RISK: Medium Risk

Medium Risk

Bea Weblogic Apache Connector Buffer Overflow Vulnerability

A vulnerability in Bea Weblogic, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.The vulnerability is caused due to a boundary error within the Apache connector and can be exploited to cause a stack...
Last Update Date: 28 Jan 2011 Release Date: 21 Jul 2008 4852 Views

RISK: Medium Risk

Medium Risk

Mozilla Firefox for Mac OS X GIF Rendering Code Execution Vulnerability

A vulnerability has been identified in Mozilla Firefox for Mac OS X, which could be exploited by remote attackers to compromise a vulnerable system. This issue is caused by an error in the Mozilla graphics code when handling malformed GIF data, which could be exploited by attackers...
Last Update Date: 28 Jan 2011 Release Date: 18 Jul 2008 4891 Views

RISK: Medium Risk

Medium Risk

Oracle Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in various Oracle and BEA products, which could be exploited by remote or local attackers to cause a denial of service, read and manipulate certain data, disclose sensitive information, conduct SQL injection attacks, bypass security restrictions, or execute arbitrary...
Last Update Date: 28 Jan 2011 Release Date: 17 Jul 2008 4994 Views

RISK: Medium Risk

Medium Risk

HP Oracle for OpenView Multiple Vulnerabilities

Multiple vulnerabilities have been identified in HP Oracle for OpenView (OfO) , which could be exploited by remote or local attackers to cause a denial of service, read and manipulate certain data, disclose sensitive information, conduct SQL injection attacks, bypass security restrictions, or execute...
Last Update Date: 28 Jan 2011 Release Date: 17 Jul 2008 5321 Views

RISK: Medium Risk

Medium Risk

Mozilla Firefox URI Launching and XUL Error Page Vulnerabilities

Multiple vulnerabilities have been identified in Firefox, which can be exploited by malicious people to bypass certain security restrictions, potentially conduct spoofing attacks, or compromise a user's system.1. A vulnerability can be exploited to launch e.g. "file" or...
Last Update Date: 28 Jan 2011 Release Date: 17 Jul 2008 4737 Views

RISK: Medium Risk

Medium Risk

Apple iPhone / iPod touch Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple iPhone and iPod touch, which could be exploited by remote attackers to disclose sensitive information, spoof certain data, cause a denial of service or compromise a vulnerable device.1. An error in CFNetwork when processing 502 Bad Gateway...
Last Update Date: 28 Jan 2011 Release Date: 15 Jul 2008 4714 Views

RISK: Medium Risk

Medium Risk

Apple TV Data Processing Remote Code Execution Vulnerabilities

Multiple vulnerabilities have been identified in Apple TV, which could be exploited by remote attackers to take complete control of an affected system. These issues are caused by buffer overflow and input validation errors when processing specially crafted movie files, QuickTime content or PICT images, which...
Last Update Date: 28 Jan 2011 Release Date: 14 Jul 2008 4737 Views

RISK: Medium Risk

Medium Risk

Sun Java JDK / JRE Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Sun Java, which could be exploited by malicious people to bypass certain security restrictions, disclose system information or potentially sensitive information, cause a DoS (Denial of Service), or compromise a vulnerable system.1. An error in the...
Last Update Date: 28 Jan 2011 Release Date: 10 Jul 2008 4928 Views

RISK: Medium Risk

Medium Risk

Microsoft Office Word Document Handling Code Execution Vulnerability

A vulnerability has been identified in Microsoft Office, which could be exploited by attackers to take complete control of an affected system. This issue is caused by a memory corruption error when handling malformed Word documents, which could be exploited by attackers to crash a vulnerable application...
Last Update Date: 28 Jan 2011 Release Date: 10 Jul 2008 4583 Views