Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Microsoft Excel Multiple Vulnerabilites( 12 March 2008 )

1. Excel Data Validation Record VulnerabilityA remote code execution vulnerability exists in the way Excel processes data validation records when loading Excel files into memory. An attacker could exploit the vulnerability by sending a malformed file which could be hosted on a specially crafted or compromised Web site...
Last Update Date: 28 Jan 2011 Release Date: 12 Mar 2008 5212 Views

RISK: Medium Risk

Medium Risk

Microsoft Office Multiple Memory Corruption Vulnerabilities( 12 March 2008 )

1. Microsoft Office Cell Parsing Memory Corruption VulnerabilityA remote code execution vulnerability exists in the way Microsoft Office handles specially crafted Excel files. An attacker could exploit the vulnerability by creating a malformed file which could be included as an e-mail attachment, or hosted on...
Last Update Date: 28 Jan 2011 Release Date: 12 Mar 2008 5208 Views

RISK: Medium Risk

Medium Risk

Sun Java Multiple Code Execution and Security Bypass Vulnerabilities

Multiple vulnerabilities have been identified in Sun Java, which could be exploited by remote attackers to bypass security restrictions or take complete control of an affected system. These issues are caused by unspecified errors when handling certain data or applets, which could be exploited by malicious web...
Last Update Date: 28 Jan 2011 Release Date: 6 Mar 2008 5474 Views

RISK: Medium Risk

Medium Risk

ICQ Message Handling and Conversion Remote Format String Vulnerability

A vulnerability has been identified in ICQ, which could be exploited by remote attackers to cause a denial of service or potentially take complete control of an affected system. This issue is caused by a format string error when processing and converting received HTML messages, which could...
Last Update Date: 28 Jan 2011 Release Date: 29 Feb 2008 5481 Views

RISK: Medium Risk

Medium Risk

Trend Micro OfficeScan Multiple Remote Buffer Overflow Vulnerabilities

Multiple vulnerabilities have been identified in Trend Micro OfficeScan, which could be exploited by remote attackers to cause a denial of service or take complete contol of an affected system. These issues are caused by NULL pointer dereference and buffer overflow errors in the "cgiChkMasterPwd.exe...
Last Update Date: 28 Jan 2011 Release Date: 29 Feb 2008 5407 Views

RISK: Medium Risk

Medium Risk

Symantec Products Decomposer Buffer Overflow and DoS Vulnerabilities

Multiple vulnerabilities have been identified in various Symantec products, which could be exploited by attackers or malware to cause a denial of service or take complete contol of an affected system. These issues are caused by infinite loop and buffer overflow errors in the Decomposer engine when processing...
Last Update Date: 28 Jan 2011 Release Date: 28 Feb 2008 5474 Views

RISK: Medium Risk

Medium Risk

Netscape Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Netscape Navigator, which could be exploited by attackers to bypass security restrictions, disclose sensitive information, cause a denial of service or take complete control of an affected system. For additional information, see : Mozilla Firefox and SeaMonkey Multiple Vulnerabilities
Last Update Date: 28 Jan 2011 Release Date: 22 Feb 2008 5625 Views

RISK: Medium Risk

Medium Risk

IBM Lotus Notes Java Plugin Sandbox Security Bypass Vulnerability

A vulnerability has been identified in IBM Lotus Notes, which could be exploited by remote attackers to bypass security restrictions and execute arbitrary code. This issue is caused by an error in the Java Plug-in when processing specially crafted JavaScript code, which could be exploited...
Last Update Date: 28 Jan 2011 Release Date: 21 Feb 2008 5542 Views

RISK: Medium Risk

Medium Risk

Apache mod_jk2 Host Header Multiple Buffer Overflow Vulnerabilities

Multiple vulnerabilities have been identified in mod_jk2 for Apache, which could be exploited by remote attackers to cause a denial of service or compromise an affected web server. These issues are caused by buffer overflow errors when processing requests containing a malformed or overly long "Host" ...
Last Update Date: 28 Jan 2011 Release Date: 18 Feb 2008 5455 Views

RISK: Medium Risk

Medium Risk

MySQL Multiple Vulnerabilities

Multiple vulnerabilities have been identified in MySQL, which could be exploited by attackers or malicious users to bypass security restrictions, disclose sensitive information, cause a denial of service or compromise an affected system.1. Missing permission checks when handling BINLOG statements, which could be...
Last Update Date: 28 Jan 2011 Release Date: 15 Feb 2008 5456 Views