Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Microsoft Windows OLE Remote Code Execution Vulnerability

A vulnerability exists in OLE that could lead to remote code execution if a user opens a file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. If a user is...
Last Update Date: 11 Sep 2013 14:48 Release Date: 11 Sep 2013 3943 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Theme File Remote Code Execution Vulnerability

A remote code execution vulnerability exists in the way that affected editions of Microsoft Windows handles certain specially crafted Windows theme files. This vulnerability could allow an attacker to execute arbitrary code if the attacker convinces a user to apply a specially crafted Windows theme. An attacker could...
Last Update Date: 11 Sep 2013 14:47 Release Date: 11 Sep 2013 3930 Views

RISK: Medium Risk

Medium Risk

Microsoft Office Remote Code Execution Vulnerabilities

XML External Entities Resolution VulnerabilityAn information disclosure vulnerability exists in the way that Microsoft Word parses specially crafted XML files containing external entities.Multiple Memory Corruption Vulnerabilities in Microsoft WordRemote code execution vulnerabilities exist in the way that affected Microsoft Office software parses specially crafted files. An attacker...
Last Update Date: 11 Sep 2013 14:47 Release Date: 11 Sep 2013 3968 Views

RISK: Medium Risk

Medium Risk

Microsoft Excel Remote Code Execution Vulnerabilities

Microsoft Office Memory Corruption VulnerabilityA remote code execution vulnerability exists in the way that Microsoft Excel parses content in Excel files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or...
Last Update Date: 11 Sep 2013 14:40 Release Date: 11 Sep 2013 4175 Views

RISK: Medium Risk

Medium Risk

Microsoft Access Remote Code Execution Vulnerabilties

Remote code execution vulnerabilities exist in the way that Microsoft Access parses content in Access files. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create...
Last Update Date: 11 Sep 2013 14:39 Release Date: 11 Sep 2013 3970 Views

RISK: Medium Risk

Medium Risk

Microsoft Office IME (Chinese) Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists in Office IME for Chinese that could allow a low-privilege user to elevate their access privileges.
Last Update Date: 11 Sep 2013 14:39 Release Date: 11 Sep 2013 3998 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Kernel-Mode Drivers Elevation of Privilege Vulnerabilties

Multiple Win32k Multiple Fetch VulnerabilitiesElevation of privilege vulnerabilities exist when the Windows kernel-mode driver improperly handles objects in memory. An attacker who successfully exploited these vulnerabilities could gain elevated privileges and read arbitrary amounts of kernel memory.Win32k Elevation of Privilege VulnerabilityAn elevation of privilege vulnerability...
Last Update Date: 11 Sep 2013 14:36 Release Date: 11 Sep 2013 3891 Views

RISK: Medium Risk

Medium Risk

Microsoft FrontPage Information Disclosure Vulnerability

An information disclosure vulnerability exists in FrontPage that could allow an attacker to disclose the contents of a file on a target system.
Last Update Date: 11 Sep 2013 14:35 Release Date: 11 Sep 2013 4093 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Service Control Manager Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists in the way that the Windows Service Control Manager (SCM) handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; ...
Last Update Date: 11 Sep 2013 14:35 Release Date: 11 Sep 2013 4061 Views

RISK: High Risk

High Risk

Adobe Flash Player / AIR Multiple Vulnerabilities

Multiple vulnerabilities have been reported in Adobe Flash Player and Adobe AIR, which can be exploited by malicious people to compromise a user's system. Another unspecified error can be exploited to cause memory corruption. An unspecified error can be exploited to cause memory corruption. ...
Last Update Date: 11 Sep 2013 14:34 Release Date: 11 Sep 2013 3928 Views