Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Apple iPhone / iPod touch Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple iPhone and iPod touch, which could be exploited by remote attackers to bypass security restrictions, disclose sensitive information, or take complete control of an affected device.The first issue is caused by a memory corruption error in Safari when...
Last Update Date: 28 Jan 2011 Release Date: 17 Jan 2008 4805 Views

RISK: Medium Risk

Medium Risk

Microsoft Excel Remote Code Execution Vulnerability

A vulnerability has been identified in Microsoft Excel, which could be exploited by remote attackers to take complete control of an affected system or gain the same user rights as the local user by tricking a user into opening a specially crafted Excel file.
Last Update Date: 28 Jan 2011 Release Date: 16 Jan 2008 4275 Views

RISK: Medium Risk

Medium Risk

Apple QuickTime Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple QuickTime, which could be exploited by remote attackers to cause a denial of service or take complete control of an affected system.1. Due to a memory corruption issue in QuickTime's handling of Sorenson 3 video files, ...
Last Update Date: 28 Jan 2011 Release Date: 16 Jan 2008 4566 Views

RISK: Medium Risk

Medium Risk

Apple QuickTime RTSP Response "Reason-Phrase" Buffer Overflow

A vulnerability has been identified in Apple QuickTime, which could be exploited by remote attackers to cause a denial of service or take complete control of an affected system. This issue is caused by a buffer overflow error when processing RTSP response messages and displaing the "Reason...
Last Update Date: 28 Jan 2011 Release Date: 14 Jan 2008 4592 Views

RISK: Medium Risk

Medium Risk

VMware ESX Server and VirtualCenter Multiple Vulnerabilities

Multiple vulnerabilities have been identified in VMware ESX Server and VirtualCenter, which could be exploited by attackers to bypass security restrictions, disclose sensitive information or execute arbitrary commands and scripting code. These issues are caused by errors in Tomcat, JRE, OpenPegasus, Samba, util...
Last Update Date: 28 Jan 2011 Release Date: 9 Jan 2008 4589 Views

RISK: Medium Risk

Medium Risk

VMware ESX Server Multiple Vulnerabilities

Multiple vulnerabilities have been identified in VMware ESX Server, which could be exploited by attackers to bypass security restrictions or execute arbitrary code.These issues are caused by errors in OpenPegasus, Samba, util-linux, Perl, and OpenSSL.
Last Update Date: 28 Jan 2011 Release Date: 9 Jan 2008 4709 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows LSASS Bypass Vulnerability( 09 January 2008 )

An elevation of privilege vulnerability exists in the Microsoft Windows Local Security Authority Subsystem Service (LSASS) due to its improper handling of local procedure call (LPC) requests. The vulnerability could allow an attacker to run code with elevated privileges. An attacker who successfully exploited...
Last Update Date: 28 Jan 2011 Release Date: 9 Jan 2008 4437 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows TCP/IP Multiple Vulnerabilities( 09 January 2008 )

1. Windows Kernel TCP/IP/IGMPv3 and MLDv2 VulnerabilityA remote code execution vulnerability exists in the Windows kernel due to the way that the Windows kernel handles TCP/IP structures storing the state of IGMPv3 and MLDv2 queries. Supported editions of Microsoft Windows XP, ...
Last Update Date: 28 Jan 2011 Release Date: 9 Jan 2008 4480 Views

RISK: Medium Risk

Medium Risk

PHP Multiple Vulnerabilities

Some vulnerabilities have been reported in PHP, where some have unknown impact and others can be exploited by malicious users to bypass certain security restrictions.1) An integer overflow error exists in the "chunk_split()" function.2) Integer overflow errors exists in the "...
Last Update Date: 28 Jan 2011 Release Date: 4 Jan 2008 4804 Views

RISK: Medium Risk

Medium Risk

RealPlayer Data Processing Buffer Overflow Vulnerability

A vulnerability has been identified in RealPlayer, which could be exploited by remote attackers to cause a denial of service or take complete control of an affected system. This issue is caused by an unspecified buffer overflow error when processing malformed data, which could be exploited by...
Last Update Date: 28 Jan 2011 Release Date: 4 Jan 2008 4716 Views