Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Microsoft Windows Ancillary Function Driver Information Disclosure Vulnerability

An information disclosure vulnerability exists when the Windows kernel-mode driver improperly handles copying data between kernel and user memory.
Last Update Date: 13 Nov 2013 17:04 Release Date: 13 Nov 2013 3349 Views

RISK: Medium Risk

Medium Risk

Microsoft Hyper-V Address Corruption Vulnerability

An elevation of privilege vulnerability exists in Hyper-V on Windows 8 and Windows Server 2012. An attacker who successfully exploited this vulnerability could execute arbitrary code as System in another virtual machine (VM) on the shared Hyper-V host. An attacker would not...
Last Update Date: 13 Nov 2013 17:03 Release Date: 13 Nov 2013 3321 Views

RISK: Medium Risk

Medium Risk

Microsoft Office Remote Code Execution Vulnerabilities

WPD File Format Memory Corruption VulnerabilityA remote code execution vulnerability exists in the way that affected Microsoft Office software parses specially crafted WordPerfect document (.wpd) files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install...
Last Update Date: 13 Nov 2013 17:03 Release Date: 13 Nov 2013 3313 Views

RISK: Medium Risk

Medium Risk

Microsoft ActiveX InformationCardSigninHelper Vulnerability

A remote code execution vulnerability exists in the InformationCardSigninHelper Class ActiveX control, icardie.dll. An attacker could exploit the vulnerability by constructing a specially crafted webpage. When a user views the webpage, the vulnerability could allow remote code execution. An attacker who successfully exploited...
Last Update Date: 13 Nov 2013 17:03 Release Date: 13 Nov 2013 3750 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Graphics Device Interface Remote Code Execution Vulnerability

A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) processes specially crafted Windows Write files in WordPad. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; ...
Last Update Date: 13 Nov 2013 17:02 Release Date: 13 Nov 2013 3362 Views

RISK: Medium Risk

Medium Risk

Microsoft Internet Explorer Cumulative Security Update

Internet Explorer Information Disclosure VulnerabilityAn information disclosure vulnerability exists in the way that Internet Explorer handles specially crafted web content when generating print previews. An attacker who successfully exploited this vulnerability could gather information from any page that the victim is viewing.Internet Explorer Information Disclosure VulnerabilityAn information...
Last Update Date: 13 Nov 2013 17:02 Release Date: 13 Nov 2013 3286 Views

RISK: Extremely High Risk

Extremely High Risk

Microsoft Internet Explorer ActiveX Control Code Execution Vulnerability

A vulnerability has been identified in Internet Explorer, which can be exploited by malicious people to compromise a user's system.   The vulnerability is caused due to an error within an ActiveX control. Successful exploitation allows execution of arbitrary code. For detail of the vulnerability...
Last Update Date: 13 Nov 2013 Release Date: 12 Nov 2013 3675 Views

RISK: Medium Risk

Medium Risk

Adobe ColdFusion Multiple Vulnerabilities

Multiple vulnerabilities have been reported in Adobe ColdFusion, which can be exploited by malicious people to conduct cross-site scripting attacks and bypass certain security restrictions. Certain unspecified input is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary...
Last Update Date: 13 Nov 2013 09:33 Release Date: 13 Nov 2013 3236 Views

RISK: High Risk

High Risk

Adobe Flash Player / AIR Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Flash Player and Adobe AIR, which can be exploited by malicious people to compromise a user's system.   Unspecified errors can be exploited to cause memory corruption.
Last Update Date: 13 Nov 2013 09:32 Release Date: 13 Nov 2013 3329 Views

RISK: Medium Risk

Medium Risk

OpenSSH AES-GCM Memory Corruption Vulnerability

A vulnerability has been identified in OpenSSH. A remote authenticated user can bypass access control restrictions.   A remote authenticated user can send specially crafted data to trigger a memory corruption flaw when an AES-GCM cipher is selected during key exchange to execute arbitrary code on...
Last Update Date: 12 Nov 2013 10:28 Release Date: 12 Nov 2013 3368 Views