Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Red Hat Enterprise Linux openldap Denial Of Service Vulnerability

A denial of service flaw was identified in the OpenLDAP server daemon (slapd) performed reference counting when using the rwm (rewrite/remap) overlay. A remote attacker able to query the OpenLDAP server could use this flaw to crash the server by immediately unbinding...
Last Update Date: 26 Feb 2014 14:40 Release Date: 26 Feb 2014 3049 Views

RISK: Medium Risk

Medium Risk

libpng Denial-Of-Service Vulnerability

A vulnerabiity was identified in libpng. Decoding a malformed .png file may cause the target application to become unresponsive. 
Last Update Date: 26 Feb 2014 14:35 Release Date: 26 Feb 2014 3042 Views

RISK: Medium Risk

Medium Risk

Mac OS X SSL/TLS Authentication Vulnerability

A vulnerability has been identified in Mac OS X, which can be exploited by remote user can decrypt SSL/TLS sessions in certain cases. A remote user with the ability to conduct a man-in-the-middle attack can exploit a connection authentication flaw...
Last Update Date: 25 Feb 2014 Release Date: 24 Feb 2014 3247 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by remote user to determine the installation path or cause arbitrary code to be executed on the target user's system.A remote user can create specially crafted content that, when loaded by the...
Last Update Date: 25 Feb 2014 Release Date: 24 Feb 2014 3151 Views

RISK: High Risk

High Risk

Linksys E-Series Routers Multiple Vulnerabilities

Multiple vulnerabilities have been identified in multiple Linksys E-Series routers, which can be exploited by malicious people to bypass certain security restrictions. The device does not properly restrict access to tmUnblock.cgi and hndUnblock.cgi, which can be exploited to inject...
Last Update Date: 25 Feb 2014 09:32 Release Date: 25 Feb 2014 3223 Views

RISK: High Risk

High Risk

Kloxo SQL Injection Vulnerability

A vulnerability has been identified in Kloxo, which can be exploited by malicious people to take full control of the server, and remotely execute arbitrary code.   According to forum vpsBoard (https://vpsboard.com/topic/3384-kloxo-installations-compromised/), ...
Last Update Date: 24 Feb 2014 18:24 Release Date: 24 Feb 2014 3539 Views

RISK: Extremely High Risk

Extremely High Risk

Adobe Flash Player Remote Code Execution Vulnerability

A vulnerability was identified in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on...
Last Update Date: 21 Feb 2014 11:56 Release Date: 21 Feb 2014 3496 Views

RISK: Extremely High Risk

Extremely High Risk

Microsoft Internet Explorer Use-After-Free Vulnerability

A vulnerability has been identified in Microsoft Internet Explorer, which can be exploited by attackers to cause arbitrary code to be executed on the target user's system. A remote user can create HTML with a specially crafted Adobe Flash object that, when loaded by the...
Last Update Date: 21 Feb 2014 Release Date: 17 Feb 2014 3755 Views

RISK: Medium Risk

Medium Risk

FFmpeg Multiple Vulnerabilities

Multiple vulnerabilities have been identified in FFmpeg, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise an application using the library. An error within the "ff_init_buffer_info()" function (libavcodec/utils.c) can be exploited...
Last Update Date: 19 Feb 2014 11:24 Release Date: 19 Feb 2014 3202 Views

RISK: High Risk

High Risk

Symantec Endpoint Protection Manager Remote Code Execution Vulnerability

A vulnerability has been identified in Symantec Endpoint Protection Manager, which could be exploited by malicious users to execute arbitrary code.   The management console for Symantec Endpoint Protection Manager does not properly handle external XML data, which could potentially allow unauthorized access to restricted server-side...
Last Update Date: 19 Feb 2014 11:23 Release Date: 19 Feb 2014 3443 Views