Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

FFmpeg Multiple Vulnerabilities

Multiple vulnerabilities have been identified in FFmpeg, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise an application using the library.An error in the "tak_decode_frame()" function (libavcodec/takdec.c) can be exploited...
Last Update Date: 11 Mar 2014 10:30 Release Date: 11 Mar 2014 3969 Views

RISK: Medium Risk

Medium Risk

Wireshark Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. An error within the NFS dissector can be exploited to cause a crash. An error within the M3UA dissector...
Last Update Date: 11 Mar 2014 10:24 Release Date: 11 Mar 2014 3917 Views

RISK: Medium Risk

Medium Risk

GnuTLS Certificate Verification Vulnerability

A vulnerability has been identified in GnuTLS, which affects certificate verification functions. An attacker could use a specially crafted X509 certificate to bypass validation checks, impersonate legitimate web sites or services, and perform man-in-the-middle attacks.
Last Update Date: 6 Mar 2014 12:13 Release Date: 6 Mar 2014 4027 Views

RISK: Medium Risk

Medium Risk

Cisco Small Business RV Series Wireless-N VPN Password Disclosure Vulnerability

A vulnerability has been identified in Cisco Small Business RV Series. A remote user can gain administrative access on the target system.   The web management interface does not properly handle authentication requests. A remote user can intercept and modify an authentication request to gain administrative privileges on...
Last Update Date: 6 Mar 2014 12:13 Release Date: 6 Mar 2014 4000 Views

RISK: Medium Risk

Medium Risk

Cisco Wireless LAN Controllers Multiple vulnerabilities

Multiple vulnerabilities have been identified in Cisco Wireless LAN Controllers. The Cisco Wireless LAN Controller (WLC) product family is affected by the following vulnerabilities: Cisco Wireless LAN Controller Denial of Service Vulnerability Cisco Wireless LAN Controller Unauthorized Access to Associated Access Points Vulnerability Cisco...
Last Update Date: 6 Mar 2014 12:12 Release Date: 6 Mar 2014 4247 Views

RISK: Medium Risk

Medium Risk

HP-UX Java Multiple Vulnerabilities

Multiple vulnerabilities have been identified in HP-UX Java, which can be exploited by malicious users to disclose sensitive information, cause a DoS (Denial of Service), manipulate certain data and compromise a vulnerable system.
Last Update Date: 6 Mar 2014 12:12 Release Date: 6 Mar 2014 3978 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Some vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.A use-after-free error exists when handling SVG images.A use-after-free error exists...
Last Update Date: 5 Mar 2014 10:15 Release Date: 5 Mar 2014 3925 Views

RISK: Medium Risk

Medium Risk

FFmpeg Remote Code Execution Vulnerability

A vulnerability was identified in FFmpeg. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the target user, will trigger a buffer overflow in the mpegts_write_pmt...
Last Update Date: 3 Mar 2014 12:23 Release Date: 3 Mar 2014 4013 Views

RISK: Medium Risk

Medium Risk

Autodesk AutoCAD Remote Code Execution Vulnerabilities

Two vulnerabilities were identified in Autodesk AutoCAD. A remote user can cause arbitrary code to be executed on the target user's system.A remote user can trigger a FAS file search path flaw to cause arbitrary VBScript code to be executed on the target user'...
Last Update Date: 3 Mar 2014 12:22 Release Date: 3 Mar 2014 4104 Views

RISK: High Risk

High Risk

Apple QuickTime Multiple Vulnerabilities

Multiple vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system.   Successful exploitation of the vulnerabilities may allow execution of arbitrary code.
Last Update Date: 27 Feb 2014 10:41 Release Date: 27 Feb 2014 3883 Views