Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Avant Browser Rendering Engines Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Avant Browser, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. For more information:SA13051510SA13060601
Last Update Date: 4 Jul 2013 08:56 Release Date: 4 Jul 2013 3364 Views

RISK: Medium Risk

Medium Risk

Lookout! Mobile Security Denial-of-service Vulnerability

A vulnerability has been identified in Lookout! Mobile Security, which can be exploited by malicious people to cause a denial-of-service attack. Lookout! Mobile Security (version 8.14.1-7fe5f1) crashes if an intent is sent to com...
Last Update Date: 3 Jul 2013 12:44 Release Date: 3 Jul 2013 3474 Views

RISK: Medium Risk

Medium Risk

Symantec Security Information Manager Console Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Symantec Security Information Manager, which can be exploited by malicious users to conduct SQL injection attacks and by malicious people to disclose sensitive information and conduct cross-site scripting attacks.Certain unspecified input passed to the Java Console is not properly...
Last Update Date: 3 Jul 2013 12:39 Release Date: 3 Jul 2013 3366 Views

RISK: High Risk

High Risk

Apple OS X QuickTime Buffer Overflows Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple OS X. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the...
Last Update Date: 3 Jul 2013 12:39 Release Date: 3 Jul 2013 3502 Views

RISK: High Risk

High Risk

Kingsoft Spreadsheets Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Kingsoft Spreadsheets, which can be exploited by malicious people to potentially compromise a user's system.   Some errors within the etxrw.dll module when processing spreadsheet files can be exploited to cause a heap-based buffer overflow...
Last Update Date: 27 Jun 2013 11:12 Release Date: 27 Jun 2013 3464 Views

RISK: High Risk

High Risk

Mozilla Firefox / Thunderbird Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox / Thunderbird, which can be exploited by attackers to conduct cross site scripting, elevation of privilege, sensitive information disclosure and remote code execution.
Last Update Date: 27 Jun 2013 Release Date: 26 Jun 2013 3572 Views

RISK: High Risk

High Risk

Cisco Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Cisco Email Security Appliance, Web Security Appliance, ASA Next-Generation Firewall and Content Security Management Appliance, which can be exploited by attackers to conduct denial of service and remote code execution.
Last Update Date: 27 Jun 2013 10:58 Release Date: 27 Jun 2013 3526 Views

RISK: Medium Risk

Medium Risk

WordPress Multiple Vulnerabilities

Multiple vulnerabilities have been identified in WordPress. A remote authenticated user can obtain elevated privileges on the target application, conduct cross-site scripting and request forgery attacks, and determine the upload path. A remote user can conduct server-side request forgery (SSRF) ...
Last Update Date: 26 Jun 2013 10:56 Release Date: 26 Jun 2013 3411 Views

RISK: Medium Risk

Medium Risk

cURL Heap Overflow Vulnerability

A vulnerability has been identified in libcurl. A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to trigger a heap overflow in curl_easy_unescape() and execute arbitrary code on the target system. The code will run with...
Last Update Date: 25 Jun 2013 10:17 Release Date: 25 Jun 2013 3391 Views

RISK: Medium Risk

Medium Risk

Cisco TelePresence Systems Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Cisco TelePresence Systems products, which can be exploited by malicious people to compromise a vulnerable system or cause a DoS (Denial of Service).
Last Update Date: 21 Jun 2013 10:09 Release Date: 21 Jun 2013 3442 Views