Severity Rating: Critical
Revision Note: V1.0 (August 9, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet...
administrative rights
august 2016
critical
cumulative
data protection
internet explorer
ms16-095
patch management
remoteexecution
security update
system control
update
user rights
vulnerability
Severity Rating: Critical
Revision Note: V1.0 (December 8, 2015): Bulletin published.
Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet...
Severity Rating: Critical
Revision Note: V1.1 (September 8, 2015): Revised bulletin to correct the security impact and the vulnerability information for CVE-2015-2506 (from denial of service to elevation of privilege). This is an informational change only.
Summary: This security update resolves...
Original release date: September 25, 2014
Systems Affected
GNU Bash through 4.3.
Linux, BSD, and UNIX distributions including but not limited to:
CentOS 5 through 7
Debian
Mac OS X
Red Hat Enterprise Linux 4 through 7
Link Removed 10.04 LTS, 12.04 LTS, and 14.04 LTS
Overview
A critical...
apache
arbitrary code
attacks
bash
command execution
cve-2014-6271
debian
environment variables
impact
linux
mac os x
openssh
patch
red hat
remoteexecution
security
shellshock
solution
unix
vulnerability
Severity Rating: Critical
Revision Note: V1.1 (February 28, 2014): Bulletin revised to announce a detection change in the 2900986 update for Windows 8.1 for 32-bit Systems, Windows 8.1 for x64-based Systems, Windows RT 8.1, and Windows Server 2012 R2. This is a detection change only. There were...
Today we released Security Advisory 2953095 to notify customers of a vulnerability in Microsoft Word. At this time, we are aware of limited, targeted attacks directed at Microsoft Word 2010. An attacker could cause remote code execution if someone was convinced to open a specially crafted Rich...
Severity Rating: Critical
Revision Note: V1.1 (July 9, 2013): Bulletin revised to announce that Microsoft is aware of targeted attacks attempting to exploit the vulnerability described in CVE-2013-3163 through Internet Explorer 8. Applying this security update protects customers from...
Severity Rating: Critical
Revision Note: V1.0 (July 9, 2013): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted media...
Severity Rating: Critical
Revision Note: V1.0 (July 9, 2013): Bulletin published.
Summary: This security update resolves four privately reported vulnerabilities and two publicly disclosed vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The most severe...
Severity Rating: Critical
Revision Note: V1.1 (August 15, 2012): Removed erroneous FAQ for Windows 8 Release Preview and Windows Server 2012 Release Candidate releases. The Windows 8 Release Preview and Windows Server 2012 Release Candidate releases are not affected by the...
attackers
august 2012
bulletin
critical
cumulative
exploitation
internet explorer
ms12-052
privately reported
release preview
remoteexecution
security
system security
update
user rights
vulnerabilities
webpage
windows 8
windows server
Resolves vulnerabilities in Microsoft Windows that could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user.
More...
Resolves security vulnerabilities that exist in Windows Mail and in Windows Meeting Space that could allow remote code execution if a user opens a legitimate file (such as a .eml or .wcinv file) that is located in the same network directory as a...
More...
Resolves vulnerabilities in Microsoft Windows that could allow remote code execution if a user opens a specially crafted font file (such as a .fon file) in a network share, a UNC or WebDAV location, or an e-mail attachment.
More...
Revision Note: V9.0 (August 9, 2011): Added Microsoft Security Bulletin MS11-059, "Vulnerability in Data Access Components Could Allow Remote Code Execution," to the Updates relating to Insecure Library Loading section.
Summary: Microsoft is aware that research has been published...
Revision Note: V9.0 (August 9, 2011): Added Microsoft Security Bulletin MS11-059, "Vulnerability in Data Access Components Could Allow Remote Code Execution," to the Updates relating to Insecure Library Loading section. Advisory Summary:Microsoft is aware that research has been published...
Severity Rating: Critical - Revision Note: V1.0 (August 9, 2011): Bulletin published.Summary: This security update resolves two privately reported vulnerabilities in Windows DNS server. The more severe of these vulnerabilities could allow remote code execution if an attacker registers a domain...
Severity Rating: Important - Revision Note: V1.0 (August 9, 2011): Bulletin published.Summary: This security update resolves two privately reported vulnerabilities in Microsoft Visio. The vulnerabilities could allow remote code execution if a user opens a specially crafted Visio file. An...