Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

OpenSSL TLS Handshake Null Pointer Exception Vulnerability

A vulnerability has been identified in OpenSSL. A remote user can cause denial of service conditions.   A remote server can send specially crafted TLS handshake data to trigger a null pointer exception and cause the target client to crash.
Last Update Date: 8 Jan 2014 17:40 Release Date: 8 Jan 2014 4010 Views

RISK: High Risk

High Risk

Linksys Router Authentication Bypass Backdoor Vulnerability

A vulnerability has been identified in several Linksys Routers, which can be exploited by remote user can gain administrative access.A remote user can send specially crafted data to TCP port 32764 to execute commands on the target system with administrative privileges. Note: Vulnerability has no...
Last Update Date: 6 Jan 2014 12:33 Release Date: 6 Jan 2014 4663 Views

RISK: Medium Risk

Medium Risk

HP Data Protector Multiple Vulnerabilities

Multiple vulnerabilities have been identified in HP Data Protector, which can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a vulnerable system.The vulnerabilities are caused due to unspecified errors.
Last Update Date: 6 Jan 2014 12:29 Release Date: 6 Jan 2014 3936 Views

RISK: High Risk

High Risk

OpenSSL Multiple Vulnerabilities

Multiple vulnerabilities have been identified in OpenSSL. A remote user may be able to conduct man-in-the-middle attacks and cause denial of service conditions. The DTLS retransmission implementation does not properly maintain data structures for digest and encryption contexts. A remote user...
Last Update Date: 3 Jan 2014 10:44 Release Date: 3 Jan 2014 4045 Views

RISK: Medium Risk

Medium Risk

cPanel Multiple Vulnerabilities

Multiple vulnerabilities were identified in cPanel. A remote authenticated user can execute arbitrary code on the target system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information.
Last Update Date: 24 Dec 2013 11:53 Release Date: 24 Dec 2013 3894 Views

RISK: Medium Risk

Medium Risk

VMware ESX Server / ESXi Virtual Machine File Descriptors Security Bypass Vulnerability

A vulnerability has been identified in VMware ESX Server and VMware ESXi, which can be exploited by malicious users to bypass certain security restrictions. The vulnerability is caused due to an error when handling certain Virtual Machine file descriptors, which can be exploited to gain read and...
Last Update Date: 24 Dec 2013 11:51 Release Date: 24 Dec 2013 4243 Views

RISK: Medium Risk

Medium Risk

RealPlayer RMP File Handling Buffer Overflow Vulnerability

A vulnerability has been identified in RealPlayer, which can be exploited by malicious people to compromise a user's system.   The vulnerability is caused due to an error when handling .RMP files and can be exploited to cause a heap-based buffer overflow.   Successful...
Last Update Date: 24 Dec 2013 11:44 Release Date: 24 Dec 2013 3985 Views

RISK: Medium Risk

Medium Risk

Cisco Unified Communications Manager DRS Vulnerability

A vulnerability has been identified in Cisco Unified Communications Manager. A remote authenticated user can obtain potentially sensitive information.   A remote authenticated user can exploit a flaw in the disaster recovery system (DRS) to obtain potentially sensitive information about DRS-related devices contained...
Last Update Date: 24 Dec 2013 Release Date: 20 Dec 2013 3959 Views

RISK: Medium Risk

Medium Risk

Apple Motion MOTN Files Processing Integer Overflow Vulnerability

A vulnerability has been identified in Apple Motion, which can be exploited by malicious people to compromise a user's system.The vulnerability is caused due to an integer overflow error when processing MOTN files and can be exploited to cause an out-of-bounds...
Last Update Date: 23 Dec 2013 15:57 Release Date: 23 Dec 2013 3985 Views

RISK: Medium Risk

Medium Risk

Google Picasa RAW Image Parsing Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Picasa, which can be exploited by malicious people to compromise a user's system.An integer underflow error within the Picasa3.exe module when parsing JPEG tags can be exploited to cause a heap-based buffer overflow via...
Last Update Date: 23 Dec 2013 12:26 Release Date: 23 Dec 2013 4090 Views