Microsoft Windows Vista/Server 2008 nsiproxy.sys local kernel denial of service exploit.
4c62bc0bdb4613a8d22165e49dbe876c86fa1825bcd8b2047eae3fd7038cecc3
Cisco Security Advisory - The Cisco Clientless VPN solution as deployed by Cisco ASA 5500 Series Adaptive Security Appliances (Cisco ASA) uses an ActiveX control on client systems to perform port forwarding operations. Microsoft Windows-based systems that are running Internet Explorer or another browser that supports Microsoft ActiveX technology may be affected if the system has ever connected to a device that is running the Cisco Clientless VPN solution. A remote, unauthenticated attacker who could convince a user to connect to a malicious web page could exploit this issue to execute arbitrary code on the affected machine with the privileges of the web browser. The affected ActiveX control is distributed to endpoint systems by Cisco ASA. However, the impact of successful exploitation of this vulnerability is to the endpoint system only and does not compromise Cisco ASA devices. Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available.
d5eb4f15929e22adebee6cabc4901b0a19fd375282c7f4226edd361bb721237f
Technical Cyber Security Alert 2012-73A - There are multiple vulnerabilities in Microsoft Windows, Microsoft Visual Studio, and Microsoft Expression Design. Microsoft has released updates to address these vulnerabilities.
5e7d3055e03be589eac0b63294de8a037c586b48fd7bee432155f1030b760819
Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges.
e396ffc2ec0af9076c93223897d604b7ec49ecde9cd413e215fcd8fae3cd9d05
Secunia Security Advisory - Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.
35efd86b7300074fab6c890b6808a7ea68ca15d8c2d96591515d9cd15b3b5e22
Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service).
e86abc5e38a95ae5de2fb87a91ffafd9702de11be5d4ec607545bd70c072f285
Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service).
fa11eff82c3950cfeaa3ae80c30ba052e4a91ab91740f995847d3c0fbbebe505
Zero Day Initiative Advisory 12-034 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows Media Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ASX meta files. When the code within wmp.dll attempts to process the version string within a meta file, it copies it to a fixed-length buffer on the stack without checking that the destination can contain the input data. This can be abused remotely by attackers to execute arbitrary code under the context of the user running the media application.
a83c58db30683d599df4aeb59ef7425627e17a94a25da7f227d7ceab7170b361
Technical Cyber Security Alert 2012-45A - There are multiple vulnerabilities in Microsoft Windows, Internet Explorer, Microsoft .NET Framework, Silverlight, Office, and Microsoft Server Software. Microsoft has released updates to address these vulnerabilities.
8457d85d15912aeb51608210888694a1a98c23b89b24233876fcddaa5bc42fa9
Secunia Security Advisory - Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges.
320e11e07acc3a99807215dc85fd2bb7d959eccfcdd19d1e508f660811292f20
Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.
b7a8046a4fcd88803750a2ff00233dac8f95a51888ab3433717d4f29e597535c
Proof of concept malicious .docm file that exploits the Microsoft Windows Assembly Execution vulnerability as described in MS12-005.
98bc8a29290ece74c67173b63b552c9c368c1ca5e2dadc7cc3c95eafdc97f3a9
Technical Cyber Security Alert 2012-10A - There are multiple vulnerabilities in Microsoft Windows and Microsoft Developer Tools and Software. Microsoft has released updates to address these vulnerabilities.
c9404ef20e1ea85a0199a296f3fc29a86450d8d3d82704ffccd9b3af577075ac
Secunia Security Advisory - Parvez Anwar has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.
edbbe10ce1a486316c7bbf668a523fc52e89d99b79c1b2bbd442084283a4e5fb
Secunia Security Advisory - Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.
863727e71b5457a41c29a432aac1f3b8cf2ad54810fc7c6c2c14f7545fb2d993
Secunia Security Advisory - A weakness has been reported in Microsoft Windows, which can be exploited by malicious people to bypass certain security features.
b5afc94ac322dd5513921076204c2f24455af1d5fe508e0603a21b26d82481e2
Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.
7909289c308819317964b6764b4094755775e0af592573e7dc3f8fec970eccd5
Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges.
ccd670605d7ce8588871bd4ff27567202a99042c493b06d93dd22c3cf99326f5
Microsoft Windows Media Player version 11.0.5721.5262 remote denial of service exploit.
8f956aea0456c97de55561f1b85fde6e2d17e46339271b02a273569d29f09677
Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows Phone, which can be exploited by malicious people to cause a DoS (Denial of Service).
d601ccb7ff992a42790dba8ecaa8246e8be0d11887d8ec7d2c601ebdbaab5794
VUPEN Vulnerability Research Team discovered a vulnerability in Microsoft Windows. The vulnerability is caused by a use-after-free error in the "mshtml.dll" module when handling a specific Time behavior, which could be exploited by remote attackers to compromise a vulnerable system via a specially crafted web page.
cba9bea32ea67c8da60c966ebfc113a9ade45175f2c308da67602f022e70e159
VUPEN Vulnerability Research Team discovered a vulnerability in Microsoft Windows. The vulnerability is caused by a use-after-free error in the TIME (datime.dll) module when loaded via a specific behavior, which could be exploited by remote attackers to compromise a vulnerable system via a specially crafted web page.
363771ff8fedc0e7c3eb4df5ff9a4fe0bc4f64c4b34e44157b5e85bbbd053e8e
VUPEN Vulnerability Research Team discovered a vulnerability in Microsoft Windows Media Player. The vulnerability is caused by a buffer overflow error in the XDSCodec & Encypter/Decrypter Tagger Filters "ENCDEC.DLL" within Windows Media Player when processing certain fields within a DVR-MS (Digital Video Recording) file, which could be exploited by remote attackers to compromise a vulnerable system via a specially crafted web page or a malicious ".dvr-ms" media file.
abe71c0175b7a06c7b13a1c8e877a119177040e1b36f365f7231fe6642d78a92
Secunia Security Advisory - A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious people to potentially compromise a user's system.
131075ffe1dd1552a9660910dfa2c86dcf7daea241caf13ec67b0077448e309e
RSA, The Security Division of EMC, announces security fixes and improvements for RSA SecurID Software Token 4.1 for Microsoft Windows. This release addresses an Insecure Library Loading vulnerability within RSA SecurID Software Token for Windows. This release also provides an alternate installation package for customers who do not require the software token automation API features of the product.
173128391433f9f53094b5c9d41cdbcabc710ca350ef8bec7635e2bac54b927a
Technical Cyber Security Alert 2011-347A - There are multiple vulnerabilities in Microsoft Windows, Office, and Internet Explorer. Microsoft has released updates to address these vulnerabilities.
b9cbd618dc5ad0ab1f0332bb4d47e133da88374e06cc85472a7ccb80e850fb21