Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Adobe Flash Player / AIR Memory Corruption Vulnerability

Multiple vulnerabilities have been identified in Adobe Flash Player and Adobe AIR. A remote user can cause arbitrary code to be executed on the target user's system.   A remote user can create specially crafted content that, when loaded by the target user...
Last Update Date: 16 May 2013 Release Date: 15 May 2013 4469 Views

RISK: High Risk

High Risk

Mozilla Firefox / Thunderbird Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Mozilla Firefox / Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system, conduct cross-site scripting attacks, and obtain potentially sensitive information. A local user can obtain elevated privileges on...
Last Update Date: 15 May 2013 15:06 Release Date: 15 May 2013 4131 Views

RISK: High Risk

High Risk

Adobe Acrobat/Reader Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Acrobat/Reader. A remote user can cause arbitrary code to be executed on the target user's system, obtain potentially sensitive information, and bypass operating system blacklist controls. A remote user can create a specially crafted PDF...
Last Update Date: 15 May 2013 14:56 Release Date: 15 May 2013 4018 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Kernel-Mode Drivers Multiple Vulnerabilities

DirectX Graphics Kernel Subsystem Double Fetch VulnerabilityAn elevation of privilege vulnerability exists when the Microsoft DirectX graphics kernel subsystem (dxgkrnl.sys) improperly handles objects in memory.  Win32k Buffer Overflow VulnerabilityAn elevation of privilege vulnerability exists when the Windows kernel-mode driver improperly handles objects in...
Last Update Date: 15 May 2013 14:27 Release Date: 15 May 2013 4286 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Essentials Improper URI Handling Vulnerability

An information disclosure vulnerability exists when Windows Writer fails to properly handle a specially crafted URL. An attacker who successfully exploited the vulnerability could override Windows Writer proxy settings and overwrite files accessible to the user on the target system.
Last Update Date: 15 May 2013 14:27 Release Date: 15 May 2013 4134 Views

RISK: Medium Risk

Medium Risk

Microsoft Visio XML External Entities Resolution Vulnerability

An information disclosure vulnerability exists in the way that Microsoft Visio parses specially crafted XML files containing external entities.
Last Update Date: 15 May 2013 14:26 Release Date: 15 May 2013 4139 Views

RISK: Medium Risk

Medium Risk

Microsoft Word Shape Corruption Vulnerability

A remote code execution vulnerability exists in the way that Microsoft Word parses content in Word files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or...
Last Update Date: 15 May 2013 14:26 Release Date: 15 May 2013 4268 Views

RISK: Medium Risk

Medium Risk

Microsoft Publisher Multiple Vulnerabilities

Multiple remote code execution vulnerabilities exists in the way that Microsoft Publisher parses Publisher files. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or...
Last Update Date: 15 May 2013 14:26 Release Date: 15 May 2013 4102 Views

RISK: Medium Risk

Medium Risk

Microsoft Lync Remote Code Execution Vulnerability

A remote code execution vulnerability exists when the Lync control attempts to access an object in memory that has been deleted. An attacker could exploit the vulnerability by convincing a target user to accept an invitation to launch specially crafted content within a Lync or Communicator session. An...
Last Update Date: 15 May 2013 14:25 Release Date: 15 May 2013 4095 Views

RISK: Medium Risk

Medium Risk

Microsoft .NET Framework Multiple Vulnerabilities

XML Digital Signature Spoofing Vulnerability A spoofing vulnerability exists when the Microsoft .NET Framework fails to properly validate the signature of a specially crafted XML file. An attacker who successfully exploited this vulnerability could modify the contents of an XML file without invalidating the signature associated with...
Last Update Date: 15 May 2013 14:25 Release Date: 15 May 2013 4098 Views