Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

ownCloud Cross-Site Scripting and Security Bypass Vulnerabilities

Two vulnerabilities have been identified in ownCloud, which can be exploited by malicious people to conduct cross-site scripting attacks and bypass certain security restrictions. An error within "user_webdavauth" can be exploited to bypass authorisation and gain access to otherwise restricted functionality. Certain unspecified...
Last Update Date: 8 Aug 2013 Release Date: 7 Aug 2013 3262 Views

RISK: Medium Risk

Medium Risk

Tor Browser Bundle "onreadystatechange" Event Handling Code Execution Vulnerability

A vulnerability has been identified in Tor Browser Bundle, which can be exploited by malicious people to compromise a user's system. An error exists when handling the "onreadystatechange" event and reloading pages.
Last Update Date: 8 Aug 2013 Release Date: 7 Aug 2013 3326 Views

RISK: High Risk

High Risk

Cisco TelePresence System Default Credentials Vulnerability

A vulnerability has been identified in Cisco TelePresence. A remote user can gain full control of the target system.   The web server contains an administrative user account with default credentials. A remote user can access the system using these authentication credentials.   Note: Vendor patch is...
Last Update Date: 8 Aug 2013 10:02 Release Date: 8 Aug 2013 3291 Views

RISK: Medium Risk

Medium Risk

PuTTY Multiple Vulnerabilities

 Vulnerabilities has been identified in PuTTY, which can be exploited by malicious people to potentially compromise a user's system. The vulnerabilities are caused due to some integer overflow errors when handling the SSH handshake and can be exploited to cause heap-based buffer overflows...
Last Update Date: 6 Aug 2013 10:26 Release Date: 6 Aug 2013 3369 Views

RISK: Medium Risk

Medium Risk

Joomla! Arbitrary File Upload Vulnerability

A vulnerability has been identified in Joomla!, which can be exploited by malicious users to compromise a vulnerable system.The vulnerability is caused due to the administrator/components/com_media/helpers/media.php script improperly validating the extension of an uploaded file. This...
Last Update Date: 5 Aug 2013 11:44 Release Date: 5 Aug 2013 3333 Views

RISK: Medium Risk

Medium Risk

Windows Phone PEAP-MS-CHAPv2 Authentication Protocol Vulnerability

A vulnerability has been identified in the PEAP-MS-CHAPv2 authentication protocol used by Windows Phone, which can be exploited by remote user can obtain authentication information.The Protected Extensible Authentication Protocol with Microsoft Challenge Handshake Authentication Protocol version 2 (PEAP-MS-CHAPv2...
Last Update Date: 5 Aug 2013 11:32 Release Date: 5 Aug 2013 3688 Views

RISK: Medium Risk

Medium Risk

VMware ESX/ESXi Server Multiple Vulnerabilities

Multiple vulnerabilities have been identified in VMware ESX/ESXi Server, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to disclose potentially sensitive information and cause a DoS (Denial of Service).
Last Update Date: 2 Aug 2013 18:51 Release Date: 2 Aug 2013 3378 Views

RISK: High Risk

High Risk

McAfee Firewall Enterprise BIND RDATA Handling Assertion Failure Denial of Service Vulnerability

A vulnerability has been identified in McAfee Firewall Enterprise, which can be exploited by malicious people to cause a DoS (Denial of Service).   For details, please refer to SA13073005.
Last Update Date: 2 Aug 2013 18:40 Release Date: 2 Aug 2013 3450 Views

RISK: Medium Risk

Medium Risk

Cisco Products Command Injection and Code Execution Vulnerabilities

Multiple vulnerabilities have been identified in various Cisco products, which can be exploited by malicious users and malicious people to compromise a vulnerable system.
Last Update Date: 2 Aug 2013 18:39 Release Date: 2 Aug 2013 3488 Views

RISK: High Risk

High Risk

Cisco Products OSPF Vulnerability

A vulnerability has been identified in various Cisco products, which can be exploited by an unauthenticated attacker to take full control of the OSPF Autonomous System (AS) domain routing table, blackhole traffic, and intercept traffic.  The attacker could trigger this vulnerability by injecting crafted...
Last Update Date: 2 Aug 2013 18:35 Release Date: 2 Aug 2013 3597 Views