Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Microsoft .NET Framework Security Feature Bypass Vulnerability

null
Last Update Date: 10 Mar 2016 Release Date: 9 Mar 2016 4193 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows USB Mass Storage Class Driver Elevation of Privilege Vulnerability

This security update resolves an elevation of privilege vulnerability in Microsoft Windows when the Windows USB Mass Storage Class driver fails to properly validate objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could...
Last Update Date: 10 Mar 2016 Release Date: 9 Mar 2016 4187 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Secondary Logon Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists in Microsoft Windows if the Windows Secondary Logon Service fails to properly manage request handles in memory. An attacker who successfully exploited this vulnerability could run arbitrary code as an administrator. An attacker could then install programs; ...
Last Update Date: 10 Mar 2016 Release Date: 9 Mar 2016 4320 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists when Microsoft Windows fails to properly sanitize handles in memory. An attacker who successfully exploited the vulnerability could run arbitrary code as System. An attacker could then install programs; view, change, or delete data; ...
Last Update Date: 10 Mar 2016 Release Date: 9 Mar 2016 4120 Views

RISK: High Risk

High Risk

Microsoft Office Remote Code Execution Vulnerabilities

Multiple Microsoft Office Memory Corruption VulnerabilitiesMultiple remote code execution vulnerabilities exist in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user...
Last Update Date: 10 Mar 2016 Release Date: 9 Mar 2016 4146 Views

RISK: High Risk

High Risk

Microsoft Edge Cumulative Security Update

Multiple Microsoft Edge Memory Corruption VulnerabilitiesMultiple remote code execution vulnerabilities exist when Microsoft Edge improperly accesses objects in memory. The vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Microsoft Edge Information Disclosure VulnerabilityAn information...
Last Update Date: 10 Mar 2016 Release Date: 9 Mar 2016 3952 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Library Remote Code Execution Vulnerability

A remote code execution vulnerability exists when Microsoft Windows fails to properly validate input before loading certain libraries. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; ...
Last Update Date: 10 Mar 2016 Release Date: 9 Mar 2016 3878 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows PDF Library Remote Code Execution Vulnerabilities

Multiple remote code execution vulnerabilities exist in Microsoft Windows if a user opens a specially crafted .pdf file. An attacker who successfully exploited the vulnerabilities could cause arbitrary code to execute in the context of the current user.
Last Update Date: 10 Mar 2016 Release Date: 9 Mar 2016 4063 Views

RISK: High Risk

High Risk

Adobe Products Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Acrobat, Reader and Digital Editions. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system.
Last Update Date: 10 Mar 2016 Release Date: 9 Mar 2016 4274 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system.
Last Update Date: 10 Mar 2016 09:36 Release Date: 10 Mar 2016 4401 Views