A security issue has been identified in the SQL Server 2008 R2 SP2 that could allow an attacker to compromise your system and gain control over it.
Link Removed
Severity Rating: Important
Revision Note: V1.0 (August 12, 2014): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow security feature bypass if a user visits a specially crafted website. In a...
Severity Rating: Critical
Revision Note: V1.0 (August 12, 2014): Bulletin published.
Summary: This security update resolves one publicly disclosed and twenty-five privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution...
Severity Rating: Important
Revision Note: V1.0 (August 12, 2014): Bulletin published.
Summary: This security update resolves one privately reported vulnerability in Microsoft SharePoint Server. An authenticated attacker who successfully exploited this vulnerability could use a specially crafted...
Original release date: January 13, 2014 | Last revised: February 05, 2014
Systems Affected
NTP servers
Overview
A Network Time Protocol (NTP) Amplification attack is an emerging form of Distributed Denial of Service (DDoS) that relies on the use of publically accessible NTP servers to...
Severity Rating: Critical
Revision Note: V1.0 (July 8, 2014): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Journal file. An attacker...
I'll give you the whole post; what this incident underlines, in my opinion, is the importance of having individual usernames in each Forum you attend, and creating passwords that are NOT names of family members or pets or such - individual passwords, too. I use Random Password Generator by...
attack
avast
community
data breach
encryption
forum
hacked
inconvenience
iobit
offline
passwords
random password
rebuilding
safety
security
sensitive data
software
support
usernames
Severity Rating:
Revision Note: V1.0 (August 4, 2013): Advisory published.
Summary: Microsoft is aware of a public report that describes a known weakness in the Wi-Fi authentication protocol known as PEAP-MS-CHAPv2 (Protected Extensible Authentication Protocol with Microsoft Challenge Handshake...
Severity Rating: Important
Revision Note: V1.0 (February 11, 2014): Bulletin published.
Summary: This security update resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sends a large number of specially crafted IPv6...
Severity Rating: Critical
Revision Note: V1.0 (February 11, 2014): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet...
Severity Rating: Important
Revision Note: V1.0 (February 11, 2014): Bulletin published.
Summary: This security update resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of...
Original release date: January 17, 2014 | Last revised: February 09, 2014
Systems Affected
Certain UDP protocols have been identified as potential attack vectors:
DNS
NTP
SNMPv2
NetBIOS
SSDP
CharGEN
QOTD
BitTorrent
Kad
Quake Network Protocol
Steam Protocol
Overview
A Distributed...
Severity Rating: Important
Revision Note: V1.0 (January 14, 2014): Bulletin published.
Summary: This security update resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to a system and runs a specially...
Original release date: January 13, 2014 | Last revised: January 14, 2014
Systems Affected
NTP servers
Overview
A Network Time Protocol (NTP) Amplification attack is an emerging form of Distributed Denial of Service (DDoS) that relies on the use of publically accessible NTP servers to...
Severity Rating: Important
Revision Note: V1.1 (December 16, 2013): Revised bulletin to announce a detection change to correct an offering issue for Windows RT (2829361) and Windows RT (2830290). This is a detection change only. There were no changes to the update files. Customers who have...
attack
detection change
drivers
elevation
important
kernel-mode
local access
microsoft
ms13-046
patch
privileges
revision
security
update
vulnerabilities
windows
windows rt
Severity Rating: Important
Revision Note: V1.0 (December 10, 2013): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Windows. The vulnerability could allow elevation of privilege if an attacker sends a specially crafted LPC port message to any LPC...
Severity Rating: Critical
Revision Note: V1.2 (October 8, 2013): Bulletin revised to announce that the 2884101 update is available via Windows Update.
Summary: This security update resolves one publicly disclosed vulnerability and nine privately reported vulnerabilities in Internet Explorer. The...
Severity Rating: Important
Revision Note: V1.2 (October 8, 2013): Bulletin revised to announce a detection change in the 2781197 package. This is a detection change only. Customers who have already successfully updated their systems do not need to take any action.
Summary: This security update...
Severity Rating: Important
Revision Note: V1.0 (October 8, 2013): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Microsoft Silverlight. The vulnerability could allow information disclosure if an attacker hosts a website that contains a specially...
Severity Rating: Important
Revision Note: V1.0 (October 8, 2013): Bulletin published.
Summary: This security update resolves two privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Office file with an...