Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

GOM Player Unspecified Buffer Overflow Vulnerability

A vulnerability has been identified in GOM Player, which can be exploited by malicious people to compromise a user's system.The vulnerability is caused due to an unspecified error and can be exploited to cause a buffer overflow.
Last Update Date: 11 Sep 2013 10:07 Release Date: 11 Sep 2013 3341 Views

RISK: Medium Risk

Medium Risk

IBM WebSphere Application Server for z/OS JAX-WS WS-Security Vulnerability

A vulnerability has been identified in IBM WebSphere Application Server for z/OS, which is caused due to an unspecified error when using JAX-WS WS-Security configured for XML Digital Signature. No further information is currently available.
Last Update Date: 6 Sep 2013 09:52 Release Date: 6 Sep 2013 3333 Views

RISK: High Risk

High Risk

Cisco Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in various Cisco products, which can be exploited by malicious people to conduct cross-site scripting attacks, cross-site request forgery attacks, cause denial of service conditions or compromise a vulnerable system.
Last Update Date: 5 Sep 2013 Release Date: 30 Aug 2013 3341 Views

RISK: High Risk

High Risk

Polaris Products DOCX Buffer Overflow Vulnerability

A DOCX buffer overflow vulnerability has been identified in Polaris Office for Android and Samsung Galaxy S4 Polaris Viewer, which can be exploited by malicious people to compromise a vulnerable device.   Note: Vendor patch is currenlty unavailable.
Last Update Date: 5 Sep 2013 09:46 Release Date: 5 Sep 2013 3277 Views

RISK: Medium Risk

Medium Risk

cPanel Multiple Vulnerabilities

Multiple vulnerabilities have been identified in cPanel, which can be exploited by malicious, local users to disclose potentially sensitive information, bypass certain security restrictions, manipulate certain data, and gain escalated privileges and by malicious users to conduct script insertion attacks, bypass certain security restrictions...
Last Update Date: 4 Sep 2013 09:49 Release Date: 4 Sep 2013 3243 Views

RISK: Medium Risk

Medium Risk

Asterisk Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Asterisk. A remote user can cause denial of service conditions. A remote user can send a SIP ACK with SDP that is received after the channel has been terminated to cause the target service to crash. A remote user can send...
Last Update Date: 29 Aug 2013 09:35 Release Date: 29 Aug 2013 3408 Views

RISK: Medium Risk

Medium Risk

Spring Framework Multiple XML Entity References Information Disclosure Vulnerabilities

Multiple vulnerabilities have been identified in Spring Framework, which can be exploited by malicious people to disclose potentially sensitive information. The vulnerabilities are caused due to an error when processing XML data, which can be exploited to e.g. disclose contents of certain local files...
Last Update Date: 28 Aug 2013 09:29 Release Date: 28 Aug 2013 3260 Views

RISK: Medium Risk

Medium Risk

RealPlayer Multiple Vulnerabilities

Two vulnerabilities have been identified in RealPlayer, which can be exploited by malicious people to compromise a user's system.An error when handling filenames in RMP can be exploited to cause a stack-based buffer overflow.An error when parsing RealMedia files can be...
Last Update Date: 27 Aug 2013 10:16 Release Date: 27 Aug 2013 3324 Views

RISK: Medium Risk

Medium Risk

VMware Workstation and Player vmware-mount Command Vulnerability

A vulnerability has been identified in VMware Workstation and Player on Debian-based systems. which can be exploited by local user on the host operating system can obtain root privileges on the target system.On Debian-based host systens, a local user can exploit a...
Last Update Date: 26 Aug 2013 10:26 Release Date: 26 Aug 2013 3316 Views

RISK: Medium Risk

Medium Risk

Cisco Unified Communications Manager Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Cisco Unified Communications Manager. A remote authenticated user can execute arbitrary code on the target system, and cause denial of service conditions. A remote user can send a large number of TCP connections to ports 5060 or 5061 to trigger a...
Last Update Date: 22 Aug 2013 10:10 Release Date: 22 Aug 2013 3280 Views