Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Microsoft Office CGM File Format Memory Corruption Vulnerability

A remote code execution vulnerability exists in the way that Microsoft Office handles specially crafted Computer Graphics Metafile (CGM) graphics files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change...
Last Update Date: 15 Aug 2012 17:00 Release Date: 15 Aug 2012 4306 Views

RISK: High Risk

High Risk

Microsoft Visio DXF File Format Buffer Overflow Vulnerability

This is a remote code execution vulnerability. An attacker who successfully exploited this vulnerability could run arbitrary code as the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could...
Last Update Date: 15 Aug 2012 17:00 Release Date: 15 Aug 2012 4162 Views

RISK: High Risk

High Risk

Microsoft Exchange Server Multiple Vulnerabilities

Remote code execution vulnerabilities exist in Microsoft Exchange Server through the WebReady Document Viewing feature. These vulnerabilities could allow remote code execution as Local System if a user views a specially crafted file through Outlook Web Access in a browser. An attacker who successfully exploited the vulnerabilities could...
Last Update Date: 15 Aug 2012 16:59 Release Date: 15 Aug 2012 4089 Views

RISK: High Risk

High Risk

Microsoft Windows JavaScript Integer Overflow Remote Code Execution Vulnerability

A remote code execution vulnerability exists in the way that the JScript and VBScript engines calculate the size of an object in memory during a copy operation. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current...
Last Update Date: 15 Aug 2012 16:59 Release Date: 15 Aug 2012 4272 Views

RISK: High Risk

High Risk

Microsoft Windows Networking Components Multiple Vulnerabilities

Remote Administration Protocol Denial of Service Vulnerability A denial of service vulnerability exists in Windows networking components. The vulnerability is due to the service not properly handling specially crafted RAP requests. An attacker who successfully exploited this vulnerability could cause some of the Windows networking component to...
Last Update Date: 15 Aug 2012 16:56 Release Date: 15 Aug 2012 4273 Views

RISK: High Risk

High Risk

Microsoft Internet Explorer Multiple Vulnerabilities

Layout Memory Corruption Vulnerability A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has been deleted. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Asynchronous...
Last Update Date: 15 Aug 2012 16:56 Release Date: 15 Aug 2012 3614 Views

RISK: High Risk

High Risk

Microsoft Windows Remote Desktop Protocol Vulnerability

A remote code execution vulnerability exists in the way that the Remote Desktop Protocol accesses an object in memory after it has been deleted. An attacker who successfully exploited this vulnerability could run arbitrary code on the target system. An attacker could then install programs; view, ...
Last Update Date: 15 Aug 2012 16:50 Release Date: 15 Aug 2012 4210 Views

RISK: High Risk

High Risk

Microsoft Windows Common Controls MSCOMCTL.OCX Remote Code Execution Vulnerability

A remote code execution vulnerability exists in the Windows common controls. An attacker could exploit the vulnerability by constructing a specially crafted document or webpage. When a user opens the document or views the webpage, the vulnerability could allow remote code execution. An attacker who successfully...
Last Update Date: 15 Aug 2012 16:49 Release Date: 15 Aug 2012 4401 Views

RISK: High Risk

High Risk

Adobe Reader / Acrobat Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Reader and Adobe Acrobat, which can be exploited by malicious people to compromise a user's system. An unspecified error can be exploited to cause a stack-based buffer overflow. An unspecified error can be exploited to cause...
Last Update Date: 15 Aug 2012 15:46 Release Date: 15 Aug 2012 4615 Views

RISK: High Risk

High Risk

Adobe Shockwave Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Shockwave Player, which can be exploited by malicious people to compromise a user's system.
Last Update Date: 15 Aug 2012 12:00 Release Date: 15 Aug 2012 4466 Views