Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Microsoft Windows Kernel Multiple Vulnerabilities

Windows File System Security Feature BypassA security feature bypass vulnerability exists in the Windows kernel that could allow an attacker to exploit time of check time of use (TOCTOU) issues in file path-based checks from a low integrity application. An attacker who successfully exploited this...
Last Update Date: 14 Jul 2016 Release Date: 13 Jul 2016 3931 Views

RISK: Medium Risk

Medium Risk

Microsoft .NET Framework Information Disclosure Vulnerability

An information disclosure vulnerability exists when .NET Framework improperly parses XML input containing a reference to an external entity. An attacker who successfully exploited this vulnerability could read arbitrary files via an XML external entity declaration.
Last Update Date: 14 Jul 2016 Release Date: 13 Jul 2016 4010 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Kernel-Mode Drivers Multiple Vulnerabilities

Multiple Win32k Elevation of Privilege VulnerabilitiesElevation of privilege vulnerabilities exist when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited these vulnerabilities could run arbitrary code in kernel mode. An attacker could then install programs; view, change...
Last Update Date: 14 Jul 2016 Release Date: 13 Jul 2016 3976 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Secure Kernel Mode Information Disclosure Vulnerability

 An information disclosure vulnerability exists when Windows Secure Kernel Mode improperly handles objects in memory. A locally-authenticated attacker who successfully exploited this vulnerability could be able to read sensitive information on the target system.
Last Update Date: 14 Jul 2016 Release Date: 13 Jul 2016 3868 Views

RISK: High Risk

High Risk

Microsoft Office Multiple Vulnerabilities

Multiple Microsoft Office Memory Corruption VulnerabilitiesMultiple remote code execution vulnerabilities exist in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user...
Last Update Date: 14 Jul 2016 Release Date: 13 Jul 2016 3825 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Print Spooler Multiple Vulnerabilities

Windows Print Spooler Remote Code Execution VulnerabilityA remote code execution vulnerability exists when the Windows Print Spooler service does not properly validate print drivers while installing a printer from servers. An attacker who successfully exploited this vulnerability could use it to execute arbitrary code and take control of an...
Last Update Date: 14 Jul 2016 Release Date: 13 Jul 2016 3990 Views

RISK: Medium Risk

Medium Risk

Microsoft JScript and VBScript Cumulative Security Update

Scripting Engine Memory Corruption VulnerabilityA remote code execution vulnerability exists in the way that the JScript and VBScript engines render when handling objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the...
Last Update Date: 14 Jul 2016 Release Date: 13 Jul 2016 3896 Views

RISK: High Risk

High Risk

Microsoft Edge Cumulative Security Update

Microsoft Edge Security Feature BypassA security feature bypass exists when Microsoft Edge does not properly implement Address Space Layout Randomization (ASLR). The vulnerability could allow an attacker to bypass the ASLR security feature, after which the attacker could load additional malicious code in the process in an...
Last Update Date: 14 Jul 2016 Release Date: 13 Jul 2016 3910 Views

RISK: High Risk

High Risk

Drupal Contributed Modules Arbitrary PHP Code Execution Vulnerabilities

Multiple vulnerabilities have been identified in Drupal contributed modules, which could be exploited by attackers to execute arbitrary code.
Last Update Date: 14 Jul 2016 09:25 Release Date: 14 Jul 2016 3988 Views

RISK: Medium Risk

Medium Risk

Symantec and Norton Anti-virus Products Multiple Vulnerabilities

Multiple vulnerabilities were identified in Symantec and Norton anti-virus products. Exploitation of these vulnerabilities could allow a remote attacker to take control of an affected system.
Last Update Date: 14 Jul 2016 Release Date: 6 Jul 2016 3944 Views