Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Corel PDF Fusion Multiple Vulnerabilities

Two vulnerabilities have been identified in Corel PDF Fusion, which can be exploited by malicious people to compromise a user's system. The application loads a library (wintab32.dll) in an insecure manner. This can be exploited to load arbitrary libraries by tricking...
Last Update Date: 9 Jul 2013 10:37 Release Date: 9 Jul 2013 4012 Views

RISK: High Risk

High Risk

IrfanView ANI File Processing Integer Overflow Vulnerability

A vulnerability has been identified in IrfanView, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an integer overflow error when parsing ANI images and can be exploited to cause a heap-based buffer overflow.
Last Update Date: 8 Jul 2013 09:53 Release Date: 8 Jul 2013 4077 Views

RISK: High Risk

High Risk

RealPlayer HTML Processing Denial of Service Vulnerability

A vulnerability has been identified in RealPlayer, which can be exploited by remote user to cause denial of service attack.  A remote user can create a specially crafted HTML that, when loaded by the target user, will cause the target user's application to consume...
Last Update Date: 5 Jul 2013 09:52 Release Date: 5 Jul 2013 4119 Views

RISK: Medium Risk

Medium Risk

Avant Browser Rendering Engines Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Avant Browser, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. For more information:SA13051510SA13060601
Last Update Date: 4 Jul 2013 08:56 Release Date: 4 Jul 2013 4119 Views

RISK: Medium Risk

Medium Risk

Lookout! Mobile Security Denial-of-service Vulnerability

A vulnerability has been identified in Lookout! Mobile Security, which can be exploited by malicious people to cause a denial-of-service attack. Lookout! Mobile Security (version 8.14.1-7fe5f1) crashes if an intent is sent to com...
Last Update Date: 3 Jul 2013 12:44 Release Date: 3 Jul 2013 4247 Views

RISK: Medium Risk

Medium Risk

Symantec Security Information Manager Console Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Symantec Security Information Manager, which can be exploited by malicious users to conduct SQL injection attacks and by malicious people to disclose sensitive information and conduct cross-site scripting attacks.Certain unspecified input passed to the Java Console is not properly...
Last Update Date: 3 Jul 2013 12:39 Release Date: 3 Jul 2013 4138 Views

RISK: High Risk

High Risk

Apple OS X QuickTime Buffer Overflows Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Apple OS X. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the...
Last Update Date: 3 Jul 2013 12:39 Release Date: 3 Jul 2013 4297 Views

RISK: High Risk

High Risk

Kingsoft Spreadsheets Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Kingsoft Spreadsheets, which can be exploited by malicious people to potentially compromise a user's system.   Some errors within the etxrw.dll module when processing spreadsheet files can be exploited to cause a heap-based buffer overflow...
Last Update Date: 27 Jun 2013 11:12 Release Date: 27 Jun 2013 4310 Views

RISK: High Risk

High Risk

Mozilla Firefox / Thunderbird Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox / Thunderbird, which can be exploited by attackers to conduct cross site scripting, elevation of privilege, sensitive information disclosure and remote code execution.
Last Update Date: 27 Jun 2013 Release Date: 26 Jun 2013 4356 Views

RISK: High Risk

High Risk

Cisco Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Cisco Email Security Appliance, Web Security Appliance, ASA Next-Generation Firewall and Content Security Management Appliance, which can be exploited by attackers to conduct denial of service and remote code execution.
Last Update Date: 27 Jun 2013 10:58 Release Date: 27 Jun 2013 4260 Views