Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Microsoft Windows Kernel Multiple Vulnerabilities

User Mode Scheduler Memory Corruption Vulnerability An elevation of privilege vulnerability exists in the way that the Windows User Mode Scheduler handles system requests. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, ...
Last Update Date: 13 Jun 2012 15:28 Release Date: 13 Jun 2012 4246 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Kernel-Mode Drivers Multiple Vulnerabilities

String Atom Class Name Handling Vulnerability An elevation of privilege vulnerability exists because of the way that Windows kernel-mode drivers manage kernel-mode driver objects. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install...
Last Update Date: 13 Jun 2012 15:27 Release Date: 13 Jun 2012 4177 Views

RISK: Medium Risk

Medium Risk

Microsoft Dynamics AX Enterprise Portal XSS Vulnerability

A cross-site scripting vulnerability exists in Microsoft Dynamics AX Enterprise Portal that could result in information disclosure or elevation of privilege if a user clicks a specially crafted URL that contains malicious JavaScript elements. Because of the vulnerability, when the malicious JavaScript is...
Last Update Date: 13 Jun 2012 15:25 Release Date: 13 Jun 2012 4359 Views

RISK: Medium Risk

Medium Risk

Microsoft Lync Multiple Vulnerabilities

TrueType Font Parsing Vulnerability A remote code execution vulnerability exists in the way that affected components handle shared content that contains specially crafted TrueType fonts. The vulnerability could allow remote code execution if a user views shared content that contains specially crafted TrueType fonts. An attacker who...
Last Update Date: 13 Jun 2012 15:21 Release Date: 13 Jun 2012 4090 Views

RISK: High Risk

High Risk

Microsoft Windows .NET Framework Memory Access Vulnerability

A remote code execution vulnerability exists in the Microsoft .NET Framework due to the improper execution of a function pointer. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view...
Last Update Date: 13 Jun 2012 15:20 Release Date: 13 Jun 2012 4202 Views

RISK: High Risk

High Risk

Microsoft Internet Explorer Multiple Vulnerabilities

Center Element Remote Code Execution Vulnerability A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has been deleted. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user...
Last Update Date: 13 Jun 2012 15:18 Release Date: 13 Jun 2012 4170 Views

RISK: High Risk

High Risk

Microsoft Windows Remote Desktop Protocol Vulnerability

A remote code execution vulnerability exists in the way that the Remote Desktop Protocol accesses an object in memory that has been improperly initialized or has been deleted. An attacker who successfully exploited this vulnerability could run arbitrary code on the target system. An ...
Last Update Date: 13 Jun 2012 15:17 Release Date: 13 Jun 2012 4321 Views

RISK: High Risk

High Risk

Oracle Java SE Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Oracle Java SE. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. A local user can partially access and modify data and partially deny service on the target system. ...
Last Update Date: 13 Jun 2012 15:10 Release Date: 13 Jun 2012 4588 Views

RISK: Medium Risk

Medium Risk

Adobe ColdFusion Component Browser Vulnerability

A vulnerability has been identified in Adobe ColdFusion. A remote user can conduct HTTP response splitting attacks. A remote user can submit a specially crafted URL to cause the target server to return a split response. A remote user can exploit this to spoof content on the...
Last Update Date: 13 Jun 2012 15:09 Release Date: 13 Jun 2012 4514 Views

RISK: High Risk

High Risk

MySQL memcmp() Comparison Error Vulnerability

A vulnerability has been identified in MySQL. A remote user can bypass authentication. A remote user can trigger a flaw in comparing authentication data to bypass authentication. Versions compiled with a memcmp() function that can return an arbitrary integer (outside of -128 .. 127...
Last Update Date: 13 Jun 2012 15:08 Release Date: 13 Jun 2012 4837 Views