Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Microsoft Windows DirectShow Elevation of Privilege Vulnerability

A vulnerability exists in DirectShow that could allow an elevation of privilege.
Last Update Date: 9 Jul 2014 17:19 Release Date: 9 Jul 2014 2994 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Ancillary Function Driver Elevation of Privilege Vulnerability

A vulnerability exists in the Ancillary Function Driver (AFD) that could allow elevation of privilege. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or...
Last Update Date: 9 Jul 2014 17:19 Release Date: 9 Jul 2014 3076 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows On-Screen Keyboard Elevation of Privilege Vulnerability

A vulnerability exists in the On-Screen Keyboard that could allow a local elevation of privilege.
Last Update Date: 9 Jul 2014 17:19 Release Date: 9 Jul 2014 3052 Views

RISK: High Risk

High Risk

Microsoft Windows Journal Remote Code Execution Vulnerability

A remote code execution vulnerability exists in the way that Windows Journal parses specially crafted files. The vulnerability could lead to remote code execution if a user opens a specially crafted Journal file. If a user is logged on with administrative rights, an attacker who successfully exploited...
Last Update Date: 9 Jul 2014 17:19 Release Date: 9 Jul 2014 3151 Views

RISK: High Risk

High Risk

Microsoft Internet Explorer Extended Validation (EV) Certificate Vulnerability

A security feature bypass vulnerability exists in Internet Explorer because Extended Validation (EV) SSL Certificate guidelines, which disallow the use of wildcard certificates, are not properly enforced. An attacker could bypass EV SSL certificate guidelines by using a wildcard certificate. EV SSL certificates issued...
Last Update Date: 9 Jul 2014 17:19 Release Date: 9 Jul 2014 3117 Views

RISK: Medium Risk

Medium Risk

AVG Secure Search ActiveX Control Insecure Method Vulnerability

A vulnerability was identified in AVG Secure Search toolbar. It includes an ActiveX control that provides a number of unsafe methods, which may allow a remote, unauthenticated attacker to execute arbitrary code with the privileges of the user. Note: The product is affected in Internet...
Last Update Date: 9 Jul 2014 Release Date: 8 Jul 2014 3141 Views

RISK: Medium Risk

Medium Risk

NetIQ Security Manager "DumpToFile()" Remote Code Execution Vulnerability

A vulnerability has been identified in NetIQ Security Manager, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an error in the "DumpToFile()" method within the NQMcsVarSet ActiveX control, which can be...
Last Update Date: 9 Jul 2014 Release Date: 8 Jul 2014 3144 Views

RISK: Medium Risk

Medium Risk

JBoss Enterprise Application Platform Multiple vulnerabilities

Multiple vulnerabilities were identified in Red Hat JBoss Enterprise Application Platform 6.2.4, which could be exploited by remote attackers to cause denial of service, bypass security restrictions and disclose sensitive information.
Last Update Date: 9 Jul 2014 Release Date: 8 Jul 2014 3056 Views

RISK: High Risk

High Risk

Adobe Flash Player / AIR Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Flash Player and Adobe AIR, which can be exploited by malicious people to bypass certain security restrictions. An error when handling JSONP callbacks can be exploited to provide arbitrary, otherwise restricted SWF files using certain JSONP endpoints ...
Last Update Date: 9 Jul 2014 09:36 Release Date: 9 Jul 2014 3163 Views

RISK: Medium Risk

Medium Risk

Cisco Unified Communications Domain Manager Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Cisco Unified Communications Domain Manager. A remote user can gain root access on the target system, and access and modify settings. A remote authenticated user can obtain elevated privileges on the target system. A remote authenticated user can submit a...
Last Update Date: 7 Jul 2014 Release Date: 3 Jul 2014 3131 Views