Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Lotus Notes Multiple Keyview Parsing Vulnerabilities

Multiple vulnerabilities have been identified in Lotus Notes, which can be exploited by malicious people to compromise a user's system.The vulnerabilities are caused due to various errors within certain third-party file viewers and can be exploited to cause buffer overflows when a specially...
Last Update Date: 28 Jan 2011 Release Date: 9 Apr 2008 5599 Views

RISK: Medium Risk

Medium Risk

Microsoft DNS Client DNS Spoofing Attack Vulnerability( 09 April 2008 )

A spoofing vulnerability exists in Windows DNS clients. The vulnerability could allow an unauthenticated attacker to send malicious responses to DNS requests made by vulnerable clients, thereby spoofing or redirecting Internet traffic from legitimate locations.
Last Update Date: 28 Jan 2011 Release Date: 9 Apr 2008 5393 Views

RISK: Medium Risk

Medium Risk

Opera Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Opera, which could be exploited by remote attackers to cause a denial of service or take complete control of an affected system.1. Due to an invalid memory access when handling newsfeed prompts, which could be exploited by attackers to...
Last Update Date: 28 Jan 2011 Release Date: 7 Apr 2008 5601 Views

RISK: Medium Risk

Medium Risk

Cisco Unified Communications Disaster Recovery Framework Command Execution Vulnerability

A vulnerability has been identified in various Cisco products, which could be exploited by remote attackers to cause a denial of service, disclose sensitive information, or take complete control of an affected system. This issue is caused by a design error in the Disaster Recovery Framework...
Last Update Date: 28 Jan 2011 Release Date: 7 Apr 2008 5737 Views

RISK: Medium Risk

Medium Risk

Novell Kerberos KDC Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Novell Kerberos KDC, which could be exploited by attackers to gain knowledge of sensitive information, cause a denial of service or take complete control of an affected system.1. Due to errors in KDC when handling krb4 messages, which...
Last Update Date: 28 Jan 2011 Release Date: 7 Apr 2008 5619 Views

RISK: Medium Risk

Medium Risk

Apple QuickTime Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple QuickTime, which could be exploited by remote attackers to disclose sensitive information or take complete control of an affected system. These issues are caused by memory corruption and implementation errors when processing specially crafted Java applets, data reference atoms, ...
Last Update Date: 28 Jan 2011 Release Date: 7 Apr 2008 5598 Views

RISK: Medium Risk

Medium Risk

Cisco IOS Multiple Vulnerabilities

Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to disclose sensitive information, manipulate certain data, or to cause a DoS (Denial of Service).1) A memory leak exists in the handling of completed PPTP sessions, which...
Last Update Date: 28 Jan 2011 Release Date: 28 Mar 2008 5771 Views

RISK: Medium Risk

Medium Risk

Mozilla Thunderbird Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Thunderbird, which could be exploited by attackers to bypass security restrictions, execute arbitrary scripting code, cause a denial of service or take complete control of an affected system.1. Due to an error in the handling of "...
Last Update Date: 28 Jan 2011 Release Date: 27 Mar 2008 5698 Views

RISK: Medium Risk

Medium Risk

Mozilla Firefox and SeaMonkey Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox and SeaMonkey, which could be exploited by attackers to bypass security restrictions, disclose sensitive information, cause a denial of service or take complete control of an affected system.1. Due to an error in the handling of...
Last Update Date: 28 Jan 2011 Release Date: 27 Mar 2008 5605 Views

RISK: Medium Risk

Medium Risk

Novell eDirectory LDAP Extended Request Buffer Overflow Vulnerability

A vulnerability has been identified in Novell eDirectory, which could be exploited by remote attackers to cause a denial of service or compromise a vulnerable system. This issue is caused by a buffer overflow error when processing overly large LDAP Extended Request messages, which could be exploited...
Last Update Date: 28 Jan 2011 Release Date: 26 Mar 2008 5721 Views