Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

GnuTLS Certificate Verification Vulnerability

A vulnerability has been identified in GnuTLS, which affects certificate verification functions. An attacker could use a specially crafted X509 certificate to bypass validation checks, impersonate legitimate web sites or services, and perform man-in-the-middle attacks.
Last Update Date: 6 Mar 2014 12:13 Release Date: 6 Mar 2014 3275 Views

RISK: Medium Risk

Medium Risk

Cisco Small Business RV Series Wireless-N VPN Password Disclosure Vulnerability

A vulnerability has been identified in Cisco Small Business RV Series. A remote user can gain administrative access on the target system.   The web management interface does not properly handle authentication requests. A remote user can intercept and modify an authentication request to gain administrative privileges on...
Last Update Date: 6 Mar 2014 12:13 Release Date: 6 Mar 2014 3212 Views

RISK: Medium Risk

Medium Risk

Cisco Wireless LAN Controllers Multiple vulnerabilities

Multiple vulnerabilities have been identified in Cisco Wireless LAN Controllers. The Cisco Wireless LAN Controller (WLC) product family is affected by the following vulnerabilities: Cisco Wireless LAN Controller Denial of Service Vulnerability Cisco Wireless LAN Controller Unauthorized Access to Associated Access Points Vulnerability Cisco...
Last Update Date: 6 Mar 2014 12:12 Release Date: 6 Mar 2014 3433 Views

RISK: Medium Risk

Medium Risk

HP-UX Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in HP-UX Java, which can be exploited by malicious users to disclose sensitive information, cause a DoS (Denial of Service), manipulate certain data and compromise a vulnerable system.
Last Update Date: 6 Mar 2014 12:12 Release Date: 6 Mar 2014 3206 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Some vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.A use-after-free error exists when handling SVG images.A use-after-free error exists...
Last Update Date: 5 Mar 2014 10:15 Release Date: 5 Mar 2014 3153 Views

RISK: Medium Risk

Medium Risk

FFmpeg Remote Code Execution Vulnerability

A vulnerability was identified in FFmpeg. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the target user, will trigger a buffer overflow in the mpegts_write_pmt...
Last Update Date: 3 Mar 2014 12:23 Release Date: 3 Mar 2014 3219 Views

RISK: Medium Risk

Medium Risk

Autodesk AutoCAD Remote Code Execution Vulnerabilities

Two vulnerabilities were identified in Autodesk AutoCAD. A remote user can cause arbitrary code to be executed on the target user's system.A remote user can trigger a FAS file search path flaw to cause arbitrary VBScript code to be executed on the target user'...
Last Update Date: 3 Mar 2014 12:22 Release Date: 3 Mar 2014 3283 Views

RISK: High Risk

High Risk

Apple QuickTime Multiple Vulnerabilities

Multiple vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system.   Successful exploitation of the vulnerabilities may allow execution of arbitrary code.
Last Update Date: 27 Feb 2014 10:41 Release Date: 27 Feb 2014 3079 Views

RISK: High Risk

High Risk

Apple Safari Use-After-Free and Multiple Memory Corruption Vulnerabilities

Multiple vulnerabilities have been reported in Apple Safari, which can be exploited by malicious people to compromise a user's system.   A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption flaw in WebKit and...
Last Update Date: 27 Feb 2014 10:41 Release Date: 27 Feb 2014 3130 Views

RISK: High Risk

High Risk

Apple Mac OS X Multiple Vulnerabilities

Multiple vulnerabilities were identified in Apple OS X. A remote user can cause arbitrary code to be executed on the target user's system.   An application can bypass sandbox restrictions on the target system. A remote user can obtain potentially sensitive information.
Last Update Date: 27 Feb 2014 10:41 Release Date: 27 Feb 2014 3036 Views