Microsoft Windows suffers from multiple use-after-free issues in jscript Array methods.
2f7ac558c542879acb965c4c06820f163464ea9dc3f6b7895a15dcadd6bca2f1
The NCC Group has discovered a remote code execution vulnerability in Microsoft Windows Remote Desktop. Unfortunately, as usual, they are withholding any details for three months.
0fa10f8bd72eefcf41477492323bf1a29066a62a63f7c0287de0cac6b2c9a5ef
Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system.
63491bc1a361b46394d0e770340bc1d62e358ab46fcf9ac1195de71f4c9f6e0e
Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.
3921be400542ad8b66f2ad3a5e76763bec88068d4951e85a0d664844d9ce23ed
Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges.
312c2d9673be9c4269e466183c43c773e722f5516f299990ed56c53da2cd58a2
Secunia Security Advisory - Multiple vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.
ea724ecfa139cce21a82d519e62f8208e1fc9f237c8b65f59575eb3205065962
Zero Day Initiative Advisory 12-129 - This vulnerability allows remote attackers to execute arbitrary code from the contact of kernelspace on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the kernel's support for TrueType font parsing of compound glyphs. A sign extension error exists in win32k.sys when processing compound glyphs having a total number of contours above 0x7FFF. This can be exploited to corrupt kernel heap memory placed below the space allocated for the "flags" buffer and potentially execute arbitrary code in kernel space.
e75b08b74f32bfc501dc8a86f8d3c57d49f38b38038de8495feb68116308083e
Secunia Security Advisory - A weakness has been reported in Microsoft Windows, which can be exploited by malicious people disclose potentially sensitive information.
4796d0ce21c4c487965b62bd65b4d33f731c699f84d8bd4b4a1f82d2d9138369
Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.
eb31dac098394e86cf2f89608ef1e4301f73852d6b43b8c79ff14612ee96867e
Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.
f8b4b359d05c886264c323f8028fcdb1516e04c4be578cae06befe12ede6c98d
Secunia Security Advisory - Dmitry Oleksiuk has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service).
9dfe533be665e7433a40ec3ac986baa81f5745ca026b7a928e26ef60f4ce56a1
Secunia Security Advisory - Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges.
773df53d4fa5b3cc45f10257b049f63fb49661244b6aeea6f5894684b20272ac
Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system.
3e6c0698f4ff554f462714ba9fb5da9f7c21d6f35cea63c9e5af6b4fd0a30f59
This Metasploit module exploits a vulnerability in OpenOffice 2.3.1 and 2.3.0 on Microsoft Windows XP SP3. By supplying a OLE file with a malformed DocumentSummaryInformation stream, an attacker can gain control of the execution flow, which results arbitrary code execution under the context of the user.
7f7fa7d76079ea7a99a629f8223bcb4b881b275d2d9b9c051e830361276e7852
Secunia Security Advisory - Dmitry Oleksiuk has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious, local users to potentially gain escalated privileges.
9fc08a4284a78e5312ea9b4ad160921e4a97faaf0041bde553152b87df38b15c
This proof of concept code demonstrates a Microsoft Windows XP keyboard layouts pool corruption vulnerability, post MS12-034. The vulnerability exists in the function win32k!ReadLayoutFile() that parses keyboard layout file data.
54effee805a222747d3e4ec5807005657d3668ba3d5cbbdb7f184fa0ed2f64c3
Secunia Security Advisory - Multiple vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to compromise a user's system.
215c25917298206231d8fa3ae5e55aa9d692f49a1b9813874c08e8bcfbe449f7
Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges.
9fe3f56b1b384bfbfa4dce83e61da818762396e24dee114131888abf1e14f0f4
Secunia Security Advisory - Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious, local users to bypass certain security restrictions and gain escalated privileges.
021af0b291c512ba86ab27f470b5eef58250a194c59d8a020deaa4fc14d87ce5
Secunia Security Advisory - A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service).
095a431916d4940def018eb172ca9d9eb56ce423b8b31672a945c26e7f23975c
Microsoft Windows XP Win32k.sys local kernel denial of service exploit.
5939e46389ff26a365dfe48334d589afc7e6280a2ffb67f3d76e85c7aebbee84
Comodo Internet Security versions until 5.9 suffered from a blue screen of death denial of service condition on Microsoft Windows 7 x64 if a 32b PE with a kernel ImageBase is executed.
1e86af280c77354ea561913520978f4b427cfd15a034c0157c849df03bb3da47
This is a proof of concept exploit for the vulnerability documented in MS11-046 for the Microsoft Windows Ancillary Function Driver (AFD).
db03166f4056e42fe514f3a64ffbe8b1395886a9e9f58f55dbe8e7302af75e70
Technical Cyber Security Alert 2012-101A - There are multiple vulnerabilities in Microsoft Windows, Internet Explorer, Microsoft .NET Framework, Microsoft Office, Microsoft Server Software, Microsoft SQL Server, Microsoft Developer Tools, and Microsoft Forefront United Access Gateway. Microsoft has released updates to address these vulnerabilities.
2151cce31ecc67c5f890478458d9f102d21fc5c5acf8bed6a032535dcfa65a58
Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to bypass certain security restrictions.
3758bbd92dc7604c222f0640c01f7c2ce25ef1b4318698e5df4cae92bf3f4b59
Red Hat Security Advisory 2012-0421-01 - Red Hat Enterprise Virtualization Manager is a visual tool for centrally managing collections of virtual machines running Red Hat Enterprise Linux and Microsoft Windows. These packages also include the Red Hat Enterprise Virtualization Manager REST API, a set of scriptable commands that give administrators the ability to perform queries and operations on Red Hat Enterprise Virtualization Manager. It was found that RESTEasy was vulnerable to XML External Entity attacks. If a remote attacker who is able to access the Red Hat Enterprise Virtualization Manager REST API submitted a request containing an external XML entity to a RESTEasy endpoint, the entity would be resolved, allowing the attacker to read files accessible to the user running the application server. This flaw affected DOM Document and JAXB input.
d2a9d377caafb6815fcd666dfd9df10b3dff9a2401747a63f81e7690560814dd