Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Parallels Plesk Panel Multiple Vulnerabilities

Two vulnerabilities were identified in Parallels Plesk Panel, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose potentially sensitive information. An error when parsing XML entities can be exploited to e.g. disclose data from local...
Last Update Date: 20 Jun 2014 09:23 Release Date: 20 Jun 2014 3106 Views

RISK: Medium Risk

Medium Risk

Cisco ASA WebVPN Interface Input Validation Vulnerability

A vulnerability has been identified in Cisco ASA. A remote user can obtain potentially sensitive information from the target system. A remote user can create a specially crafted Javascript file that, when loaded by the target authenticated user, will obtain potentially sensitive information from the target...
Last Update Date: 20 Jun 2014 Release Date: 19 Jun 2014 3160 Views

RISK: Medium Risk

Medium Risk

ISC BIND Denial of Service Vulnerability

A vulnerability was identified in ISC BIND. A remote user can cause denial of service conditions.A remote user can send a specially crafted query to trigger a flaw in EDNS option processing and cause the target service to crash.Both authoritative and recursive servers are affected...
Last Update Date: 18 Jun 2014 Release Date: 13 Jun 2014 3106 Views

RISK: Medium Risk

Medium Risk

PHP5 Remote Code Execution Vuilnerability

A vulnerability was identified in PHP, which causes a heap-based buffer overflow in the DNS TXT record parsing. A malicious server or man-in-the-middle attacker could possibly use this flaw to execute arbitrary code as the PHP interpreter if a PHP...
Last Update Date: 18 Jun 2014 12:34 Release Date: 18 Jun 2014 3250 Views

RISK: High Risk

High Risk

Microsoft Malware Protection Engine Denial of Service Vulnerability

A vulnerability was identified in Microsoft Malware Protection Engine. A remote or local user can cause denial of service conditions. A user can create a specially crafted file that, when scanned by the Microsoft Malware Protection Engine, will prevent the engine from monitoring the system(...
Last Update Date: 18 Jun 2014 12:34 Release Date: 18 Jun 2014 3275 Views

RISK: High Risk

High Risk

VMware vCenter Server Appliance Elevated Privileges Vulnerability

A vulnerability was identified in VMware vCenter Server Appliance. A remote authenticated user can execute commands on the target system with elevated privileges. A remote authenticated user can send specially crafted data to escape a chroot jail via the Ruby vSphere Console (RVC) and execute commands...
Last Update Date: 18 Jun 2014 12:25 Release Date: 18 Jun 2014 3174 Views

RISK: High Risk

High Risk

Oracle Database Elevation of User Privilege Vulnerabilities

Multiple vulnerabilities were identified in Oracle Database. A remote authenticated user can obtain elevated privileges on the target database.A remote authenticated user with 'CREATE SESSION' privileges can exploit flaws in the Java VM to gain administrator privileges on the target database. Note: No...
Last Update Date: 17 Jun 2014 09:42 Release Date: 17 Jun 2014 3227 Views

RISK: High Risk

High Risk

Cisco Products OpenSSL SSL/TLS Vulnerabilities

OpenSSL SSL/TLS vulnerabilities were identified in multiple Cisco products, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. The vulnerabilities are caused due to...
Last Update Date: 13 Jun 2014 14:18 Release Date: 13 Jun 2014 3674 Views

RISK: High Risk

High Risk

Mozilla Firefox / Thunderbird Multiple Vulnerabilities

Multiple vulnerabilities were identified in Mozilla Firefox / Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct clickjacking attacks. A remote user can create specially crafted content that, when loaded by the...
Last Update Date: 13 Jun 2014 Release Date: 12 Jun 2014 3161 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system. The application bundles a vulnerable version of the Adobe Flash Player...
Last Update Date: 11 Jun 2014 14:34 Release Date: 11 Jun 2014 3146 Views