Original release date: November 14, 2014
Systems Affected
Microsoft Windows Vista, 7, 8, 8.1, RT, and RT 8.1
Microsoft Server 2003, Server 2008, Server 2008 R2, Server 2012, and Server 2012 R2
Microsoft Windows XP and 2000 may also be affected.
Overview
A critical vulnerability in...
Original release date: November 14, 2014
Systems Affected
Microsoft Windows Vista, 7, 8, 8.1, RT, and RT 8.1
Microsoft Server 2003, Server 2008, Server 2008 R2, Server 2012, and Server 2012 R2
Overview
A vulnerability in Microsoft Windows Object Linking and Embedding (OLE) could allow...
administrator
arbitrary code
cve-2014-6332
execution
exploit
impact
internet explorer
memory
mitigation
ole
privileged access
remote code
safearrayredim
security
server 2003
server 2008
update
vbscript
vulnerability
windows
Severity Rating: Moderate
Revision Note: V1.0 (November 11, 2014): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker places a specially crafted TrueType font on a...
bulletin
compromised websites
denial of service
email threats
exploit
internet safety
it security
kernel-mode
microsoft
moderate rating
network share
november 2014
security
technical article
truetype
update
user content
vulnerability
web attack
windows
Severity Rating: Moderate
Revision Note: V1.0 (November 11, 2014): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Microsoft Input Method Editor (IME) (Japanese). The vulnerability could allow sandbox escape based on the application sandbox policy...
access
administrative
attack
cybersecurity
data
elevation
exploit
ime
japanese
microsoft
moderate
patch
privilege
protection
risk
sandbox
security
software
update
vulnerability
Severity Rating: Important
Revision Note: V1.0 (October 14, 2014): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. An elevation of privilege vulnerability exists in the way the Windows FASTFAT system driver interacts with FAT32...
arbitrary code
bulletin
driver
elevation
exploit
fastfat
fat32
important
microsoft
october 2014
patch
privately reported
privileges
risk
security
software
system driver
update
vulnerability
windows
Severity Rating: Important
Revision Note: V1.0 (October 14, 2014): Bulletin published.
Summary: This security update resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if an attacker convinces a user to open a specially crafted...
administrator rights
attack
exploit
microsoft
microsoft word
october 2014
office web apps
remote code execution
security
update
user rights
vulnerability
Severity Rating: Important
Revision Note: V1.0 (October 14, 2014): Bulletin published.
Summary: This security update resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker sends a specially crafted input/output...
Wopbot on the rampage.
Attackers have been quick to exploit the Shellshock Bash command interpreter bug disclosed yesterday by building a botnet that is currently trying to infect other servers, according to a security researcher.
The "wopbot" botnet is active and scanning the internet for...
Severity Rating: Critical
Revision Note: V1.0 (September 9, 2014): Bulletin published.
Summary: This security update resolves one publicly disclosed and thirty-six privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution...
Original release date: July 31, 2014
Systems Affected
Point-of-Sale Systems
Overview
This advisory was prepared in collaboration with the National Cybersecurity and Communications Integration Center (NCCIC), United States Secret Service (USSS), Financial Sector Information Sharing and...
Severity Rating: Important
Revision Note: V1.0 (May 13, 2014): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker runs a specially crafted application that uses...
This website is not affected by the exploit in any way.
Further information:
Last night news about a remote OpenSSL bug was disclosed on http://heartbleed.com/ which detailed out an exploit in the OpenSSL system library that handles HTTPS connections on your server. This bug impacts CentOS 6.x...
Original release date: April 08, 2014
Systems Affected
OpenSSL 1.0.1 through 1.0.1f
OpenSSL 1.0.2-beta
Overview
A vulnerability in OpenSSL could allow a remote attacker to expose sensitive data, possibly including user authentication credentials and secret keys, through incorrect memory...
credentials
cve-2014-0160
data exposure
exploit
heartbleed
impact
key material
memory
mitigation
openssl
patch
perfect forward secrecy
public access
public disclosure
revision history
security
security flaw
system administrators
tls
vulnerability
This month we release five bulletins to address 23 unique CVEs in Microsoft Windows, Internet Explorer and Silverlight. If you need to prioritize, the update for Internet Explorer addresses the issue first described in Security Advisory 2934088, so it should be at the top of your list. While...
Today we provide advance notification for the release of four bulletins for January 2014. All bulletins this month are rated Important in severity and address vulnerabilities in Microsoft Windows, Office, and Dynamics AX. The update provided in MS14-002 fully addresses the issue first described...
ans
bulletin
deployment
dynamics ax
exploit
guidance
impact
january 2014
microsoft
msrc
office
pst
risk
security
server 2003
update
vulnerabilities
windows
windows xp
Today we released Security Advisory 2896666 regarding an issue that affects customers using Microsoft Windows Vista and Windows Server 2008, Microsoft Office 2003 through 2010, and all supported versions of Microsoft Lync. We are aware of targeted attacks, largely in the Middle East and South...
advisory
anti-spyware
anti-virus
caution
computer protection
emet
exploit
firewall
malicious email
metigations
office 2003
office 2010
security
server 2008
threat monitoring
tiff codec
user awareness
user rights
vulnerability
windows vista
Severity Rating: Important
Revision Note: V1.0 (December 10, 2013): Bulletin published.
Summary: This security update resolves one publicly disclosed vulnerability in a Microsoft Office shared component that is currently being exploited. The vulnerability could allow security feature bypass if a...