Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Microsoft Graphics Component Information Disclosure Vulnerability

An information disclosure vulnerability exists in the Microsoft Graphics Component that could allow an attacker to more reliably predict the memory offsets of specific instructions in a given call stack. The vulnerability is caused when the Microsoft Graphics Component improperly handles the decoding of JPEG images in memory. ...
Last Update Date: 16 Dec 2014 Release Date: 10 Dec 2014 3214 Views

RISK: High Risk

High Risk

VBScript Scripting Engine Remote Code Execution Vulnerability

A remote code execution vulnerability exists in the way that the VBScript engine, when rendered in Internet Explorer, handles objects in memory. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet...
Last Update Date: 16 Dec 2014 Release Date: 10 Dec 2014 3226 Views

RISK: High Risk

High Risk

Microsoft Excel Remote Code Execution Vulnerabilities

Global Free Remote Code Execution in Excel Vulnerability A remote code execution vulnerability exists in how Microsoft Excel improperly handles objects in memory while parsing specially crafted Office files. System memory may be corrupted in such a way that an attacker could execute arbitrary code. An attacker...
Last Update Date: 16 Dec 2014 Release Date: 10 Dec 2014 3281 Views

RISK: High Risk

High Risk

Microsoft Office Remote Code Execution Vulnerability

A remote code execution vulnerability exists in the context of the current user that is caused when Microsoft Word does not properly handle objects in memory while parsing specially crafted Office files. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current...
Last Update Date: 16 Dec 2014 Release Date: 10 Dec 2014 3203 Views

RISK: High Risk

High Risk

Microsoft Word and Office Web Apps Remote Code Execution Vulnerabilities

Invalid Index Remote Code Execution Vulnerability A remote code execution vulnerability exists in how Microsoft Word improperly handles objects in memory while parsing specially crafted Office files. System memory may be corrupted in such a way that an attacker could execute arbitrary code. An attacker who successfully...
Last Update Date: 16 Dec 2014 Release Date: 10 Dec 2014 3201 Views

RISK: High Risk

High Risk

Microsoft Internet Explorer Cumulative Security Update

Multiple Memory Corruption Vulnerabilities in Internet Explorer Remote code execution vulnerabilities exist when Internet Explorer improperly accesses objects in memory. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The update addresses the...
Last Update Date: 16 Dec 2014 Release Date: 10 Dec 2014 3197 Views

RISK: Medium Risk

Medium Risk

Microsoft Exchange Server Elevation of Privilege Vulnerabilities

Outlook Web App Token Spoofing Vulnerability A token spoofing vulnerability exists in Exchange Server when Microsoft Outlook Web App (OWA) fails to properly validate a request token. An attacker who successfully exploited this vulnerability could then use the vulnerability to send email that appears to come...
Last Update Date: 16 Dec 2014 Release Date: 10 Dec 2014 3494 Views

RISK: Medium Risk

Medium Risk

OpenSSL 3.0 (SSLv3) Information Disclosure Vulnerability

A vulnerability was identified in OpenSSL (SSLv3), which could be exploited by remote attackers to decrypt SSL sessions in certain cases and disclose sensitive information.
Last Update Date: 16 Dec 2014 Release Date: 16 Oct 2014 4489 Views

RISK: Medium Risk

Medium Risk

Apache mod_proxy_fcgi Denial of Service Vulnerability

A vulnerability was identified in Apache mod_proxy_fcgi. A remote user can cause denial of service conditions.A remote FastCGI server can return specially crafted response headers to trigger a buffer overflow in handle_headers() function in 'mod_proxy_fcgi.c' and cause the target Apache server to...
Last Update Date: 16 Dec 2014 09:33 Release Date: 16 Dec 2014 3292 Views

RISK: High Risk

High Risk

Google Chrome Flash Player Multiple Vulnerabilities

Multiple vulnerabilities has been identified in Google Chrome, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system. For more information: SA14121008
Last Update Date: 10 Dec 2014 12:21 Release Date: 10 Dec 2014 3290 Views