Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Kaspersky Internet Security Kaspersky Anti-Virus NDIS 6 Filter Denial of Service Vulnerability

A vulnerability has been identified in Kaspersky Internet Security, which can be exploited by malicious people to cause a DoS (Denial of Service).   The vulnerability is caused due to an error in the Kaspersky Anti-Virus NDIS 6 Filter component when handling certain IPv6 traffic, ...
Last Update Date: 5 Mar 2013 15:19 Release Date: 5 Mar 2013 4752 Views

RISK: Medium Risk

Medium Risk

Kingsoft Office Writer 2010 RTF Buffer Overflow Vulnerability

A vulnerability has been identified in Kingsoft Office, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an unspecified error in Kingsoft Writer, which can be exploited to cause a buffer overflow by tricking a user...
Last Update Date: 4 Mar 2013 10:50 Release Date: 4 Mar 2013 4578 Views

RISK: High Risk

High Risk

Cisco Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in various Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service).
Last Update Date: 1 Mar 2013 09:29 Release Date: 1 Mar 2013 4464 Views

RISK: Extremely High Risk

Extremely High Risk

Adobe Flash Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted Flash content that, when loaded by the target user, will execute arbitrary...
Last Update Date: 28 Feb 2013 Release Date: 27 Feb 2013 3918 Views

RISK: High Risk

High Risk

Cisco ASA NAT Connections Table Memory Exhaustion Vulnerability

A vulnerability has been identified in Cisco ASA. A remote user can cause denial of service conditions.   A remote user can send specially crafted packets through the target system to consume memory allocated for the NAT connections table, which may prevent new connections from being established until...
Last Update Date: 27 Feb 2013 17:50 Release Date: 27 Feb 2013 3835 Views

RISK: High Risk

High Risk

VMware Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in VMware products, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and potentially compromise a vulnerable system.An error in the handling of the NFC (...
Last Update Date: 25 Feb 2013 15:59 Release Date: 25 Feb 2013 3817 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.An unspecified error related to web audio node can be exploited to corrupt memory.A use-after-free...
Last Update Date: 25 Feb 2013 15:59 Release Date: 25 Feb 2013 3845 Views

RISK: Extremely High Risk

Extremely High Risk

Adobe Reader / Acrobat Two Vulnerabilities

Two vulnerabilities have been identified in Adobe Acrobat/Reader. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted PDF file that, when loaded by the target user, will execute...
Last Update Date: 21 Feb 2013 Release Date: 15 Feb 2013 5686 Views

RISK: High Risk

High Risk

Mozilla Firefox, Thunderbird and Seamonkey Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox, Thunderbird and Seamonkey, which can be exploited by remote attackers to execute arbitrary code and gather sensitive information. Use-after-free, out of bounds read, and buffer overflow issues found using Address Sanitizer Phishing...
Last Update Date: 21 Feb 2013 Release Date: 20 Feb 2013 3845 Views

RISK: Medium Risk

Medium Risk

Oracle Solaris Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Oracle Solaris, which can be exploited by malicious people to bypass certain security restrictions, disclose system information, cause a DoS (Denial of Service), and compromise a user's system.
Last Update Date: 21 Feb 2013 10:25 Release Date: 21 Feb 2013 3655 Views