Tuesday, August 5, 2008

Microsoft Windows DirectX SAMI Code Execution

Microsoft Windows DirectX could allow a remote attacker to execute arbitrary code on the system. Read More

I am not a fan of spam. I try to keep things in perspective though. It is just email. I have filters that move it to my Junkmail folder without... Read More

Read More

Oracle WebLogic Server (formerly known as BEA WebLogic Server) is vulnerable to a buffer overflow, which would cause a denial of service and potentially remote code execution. Read More

Microsoft ActiveX Snapshot Viewer for Microsoft Access could allow a remote attacker to execute arbitrary code on the system.  Targeted exploitation was reported on July 7, but X-Force has been monitoring toolkit-related mass exploitation since July 10.  As of July 24, exploitation has continued to escalate.  See technical description for more details. Read More

At some point, the United States Customs and Border Patrol decided that the current administration's blatant disregard for the Constitution of the United States trickles down to them as well... Read More

This week Microsoft, and every company that is a partner of Microsoft, have descended upon Houston. Thankfully, I live here so I didn't have to travel far. I get to... Read More

How fast can you download all of the latest patches? Well, if you were to install Windows from scratch on a PC, then connect to the Internet to download all... Read More

Multiple vendor DNS protocol implementations could allow a remote attacker to poison the DNS cache.  Patches that resolve the vulnerability on the DNS may be rendered ineffective if the DNS is behind a NAT device that does not randomize ports. Public exploit code was made available on July 24, 2008.  At the time of this update, neither X-Force nor IBM MSS has witness any active exploitation nor the integration of this exploit into any exploit toolkits. Read More

The Microsoft Dynamics GP is vulnerable to four heap and stack-based buffer overflows. A remote attacker could overflow the buffer and execute arbitrary code or gain control of the affected system by sending malicious queries to the Distributed Process Server or Distributed Process Manager. Read More

Read More

No comments: