Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Cisco Webex Meetings Server Input Validation Vulnerability

A vulnerability has been identified in Cisco Webex Meetings Server. A remote user can view certain files on the target system. The system does not properly validate user-supplied input. A remote user can supply a specially crafted HTTP request to a target WebEx node to...
Last Update Date: 6 May 2013 15:28 Release Date: 6 May 2013 4162 Views

RISK: Medium Risk

Medium Risk

Cisco IOS XR SNMP Processing Vulnerability

A vulnerability has been identified in Cisco IOS XR. A remote authenticated user can cause denial of service conditions.   A remote authenticated user can send specially crafted SNMP packets to cause the target SNMP process to restart.
Last Update Date: 6 May 2013 15:26 Release Date: 6 May 2013 4212 Views

RISK: Medium Risk

Medium Risk

IBM WebSphere Message Broker Java Multiple Vulnerabilities

IBM has acknowledged multiple vulnerabilities in IBM WebSphere Message Broker, which can be exploited by malicious people to disclose certain sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.   The vulnerabilities exist in the...
Last Update Date: 6 May 2013 15:26 Release Date: 6 May 2013 4300 Views

RISK: Medium Risk

Medium Risk

FortiClient VPN Client Password Disclosure Vulnerability

A vulnerability has been identified in FortiClient VPN Client, which can be exploited by remote user to obtain the target user's VPN password. A remote user that can conduct a man-in-the-middle attack and cause the VPN client to connect to...
Last Update Date: 3 May 2013 12:17 Release Date: 3 May 2013 4564 Views

RISK: Medium Risk

Medium Risk

Cisco Prime Central for Hosted Collaboration Solution Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Cisco Prime Central for Hosted Collaboration Solution, which can be exploited by remote user to conduct cross-site scripting attacks or view files on the target system.
Last Update Date: 3 May 2013 11:49 Release Date: 3 May 2013 4231 Views

RISK: Medium Risk

Medium Risk

IBM Lotus Notes Mail Client Remote Code Execution Vulnerability

A vulnerability has been identified in IBM Lotus Notes, which can be exploited by remote user to cause Java applets to be executed on the target user's system. The mail client does not filter 'applet' and 'javascript' tags in HTML-based...
Last Update Date: 3 May 2013 11:37 Release Date: 3 May 2013 4471 Views

RISK: High Risk

High Risk

Novell iPrint Client Unspecified Buffer Overflow Vulnerability

A vulnerability has been identified in Novell iPrint Client, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an unspecified error and can be exploited to cause a stack-based buffer overflow. Successful exploitation may...
Last Update Date: 3 May 2013 11:28 Release Date: 3 May 2013 4186 Views

RISK: High Risk

High Risk

HP Service Manager Multiple Vulnerabilities

Multiple vulnerabilities have been identified in HP Service Manager, which can be exploited by attacker to gain escalated privileges, conduct cross-site scripting attacks, disclose certain sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system...
Last Update Date: 2 May 2013 11:28 Release Date: 2 May 2013 4343 Views

RISK: Medium Risk

Medium Risk

Cisco IOS XR Deny Service Vulnerability

A vulnerability has been identified in Cisco IOS XR. A remote authenticated user can cause denial of service conditions. A remote authenticated user can send specially crafted SNMP packets to trigger a memory leak in the SNMP process and consume all memory allocated to the process. The...
Last Update Date: 30 Apr 2013 10:44 Release Date: 30 Apr 2013 4430 Views

RISK: High Risk

High Risk

VMware vCenter Server Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in VMware vCenter Server products, which can be exploited by attacker to bypass certain security restrictions, disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and potentially compromise a vulnerable system.The authentication mechanism...
Last Update Date: 29 Apr 2013 18:29 Release Date: 29 Apr 2013 4457 Views