Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

HP Data Protector Multiple Vulnerabilities

Multiple vulnerabilities have been identified in HP Data Protector, which can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a vulnerable system.The vulnerabilities are caused due to unspecified errors.
Last Update Date: 6 Jan 2014 12:29 Release Date: 6 Jan 2014 3187 Views

RISK: High Risk

High Risk

OpenSSL Multiple Vulnerabilities

Multiple vulnerabilities have been identified in OpenSSL. A remote user may be able to conduct man-in-the-middle attacks and cause denial of service conditions. The DTLS retransmission implementation does not properly maintain data structures for digest and encryption contexts. A remote user...
Last Update Date: 3 Jan 2014 10:44 Release Date: 3 Jan 2014 3288 Views

RISK: Medium Risk

Medium Risk

cPanel Multiple Vulnerabilities

Multiple vulnerabilities were identified in cPanel. A remote authenticated user can execute arbitrary code on the target system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information.
Last Update Date: 24 Dec 2013 11:53 Release Date: 24 Dec 2013 3114 Views

RISK: Medium Risk

Medium Risk

VMware ESX Server / ESXi Virtual Machine File Descriptors Security Bypass Vulnerability

A vulnerability has been identified in VMware ESX Server and VMware ESXi, which can be exploited by malicious users to bypass certain security restrictions. The vulnerability is caused due to an error when handling certain Virtual Machine file descriptors, which can be exploited to gain read and...
Last Update Date: 24 Dec 2013 11:51 Release Date: 24 Dec 2013 3435 Views

RISK: Medium Risk

Medium Risk

RealPlayer RMP File Handling Buffer Overflow Vulnerability

A vulnerability has been identified in RealPlayer, which can be exploited by malicious people to compromise a user's system.   The vulnerability is caused due to an error when handling .RMP files and can be exploited to cause a heap-based buffer overflow.   Successful...
Last Update Date: 24 Dec 2013 11:44 Release Date: 24 Dec 2013 3183 Views

RISK: Medium Risk

Medium Risk

Cisco Unified Communications Manager DRS Vulnerability

A vulnerability has been identified in Cisco Unified Communications Manager. A remote authenticated user can obtain potentially sensitive information.   A remote authenticated user can exploit a flaw in the disaster recovery system (DRS) to obtain potentially sensitive information about DRS-related devices contained...
Last Update Date: 24 Dec 2013 Release Date: 20 Dec 2013 3137 Views

RISK: Medium Risk

Medium Risk

Apple Motion MOTN Files Processing Integer Overflow Vulnerability

A vulnerability has been identified in Apple Motion, which can be exploited by malicious people to compromise a user's system.The vulnerability is caused due to an integer overflow error when processing MOTN files and can be exploited to cause an out-of-bounds...
Last Update Date: 23 Dec 2013 15:57 Release Date: 23 Dec 2013 3227 Views

RISK: Medium Risk

Medium Risk

Google Picasa RAW Image Parsing Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Picasa, which can be exploited by malicious people to compromise a user's system.An integer underflow error within the Picasa3.exe module when parsing JPEG tags can be exploited to cause a heap-based buffer overflow via...
Last Update Date: 23 Dec 2013 12:26 Release Date: 23 Dec 2013 3312 Views

RISK: Medium Risk

Medium Risk

Splunk Enterprise Data Processing Vulnerability

A vulnerability has been identified in Splunk Enterprise. A remote user can cause denial of service conditions.   A remote user can send specially crafted data to cause the target server to become unavailable.   Systems configured as data 'receivers' on the listening or receiving port...
Last Update Date: 20 Dec 2013 10:09 Release Date: 20 Dec 2013 3067 Views

RISK: Medium Risk

Medium Risk

Asterisk Multiple Vulnerabilities

Multiple vulnerabilities have been reported in Asterisk, which can be exploited by malicious people to escalate privileges and cause a DoS (Denial of Service). A 16 bit SMS message that contains an odd message length value will cause the message decoding loop to run forever. ...
Last Update Date: 19 Dec 2013 18:10 Release Date: 19 Dec 2013 3036 Views