A vulnerability, which was classified as critical, has been found in libwww-perl 6.04/6.05/6.06 on Perl. This issue affects the function LWP::Protocol::https. The manipulation leads to improper certificate validation.
The identification of this vulnerability is CVE-2014-3230. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in O-dyn Collabtive 1.2. It has been classified as problematic. Affected is an unknown function of the file admin.php. The manipulation of the argument desc leads to cross site scripting.
This vulnerability is traded as CVE-2014-3247. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in Cisco IOS on Cisco 2800. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component LLDP Handler. The manipulation leads to improper input validation.
This vulnerability is known as CVE-2014-3273. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Cisco ASA 9.0.1/9.1.1/9.2.0.3. Affected by this issue is some unknown functionality of the component RADIUS. The manipulation leads to improper input validation.
This vulnerability is handled as CVE-2014-3264. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Wireshark 1.2.0/1.2.1. This affects an unknown part. The manipulation leads to denial of service.
This vulnerability is uniquely identified as CVE-2009-3243. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability has been found in Wireshark 0.99.2 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to off-by-one.
This vulnerability is known as CVE-2006-4331. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Red Hat Enterprise Linux 3.0. This vulnerability affects the function shmat. The manipulation leads to deadlock.
This vulnerability was named CVE-2006-4342. The attack needs to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Cisco Router Web Setup up to 3.3.0 Build 31. It has been rated as critical. This issue affects some unknown processing of the component Web Frontend. The manipulation leads to improper privilege management.
The identification of this vulnerability is CVE-2006-3595. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Cisco IOS. It has been classified as critical. This affects the function crypto_engine_packet_callback of the component IPsec. The manipulation leads to improper input validation.
This vulnerability is uniquely identified as CVE-2014-3299. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Cisco IOS and IOS XE 15.2/15.4. Affected is an unknown function of the component NTP Service. The manipulation leads to improper access controls.
This vulnerability is traded as CVE-2014-3309. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Cisco DPC3010, DPC3212, EPC3010 and EPC3212 and classified as critical. Affected by this issue is some unknown functionality of the component HTTP Request Handler. The manipulation leads to improper input validation.
This vulnerability is handled as CVE-2014-3306. The attack may be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.