All Vulnerabilities

  • A denial of service vulnerability exists in the way the Local Security Authority Subsystem Service (LSASS) handles authentication requests. An attacker who successfully exploited the vulnerability could cause a denial of service on the target system's LSASS service, which triggers an automatic reboot of the system.
  • Microsoft Office Memory Corruption Vulnerability (CVE-2017-0003)
     Severity: :    
     Publish Date:  11 de stycznia de 2017
    A memory corruption vulnerability exists in Microsoft Office. An attacker who successfully exploited this vulnerability could use a specially crafted file to perform remote code execution in the security context of the current user.
  • Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2016-7283)
     Severity: :    
     Publish Date:  11 de stycznia de 2017
    Microsoft Internet Explorer is prone to a memory corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the application.
  • Microsoft Internet Explorer and Edge are prone to a memory corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the application.
  • WordPress WP-EMail Plugin SQL Injection Vulnerability
     Severity: :    
     Publish Date:  11 de stycznia de 2017
    A SQL injection vulnerability has been reported in WordPress WP-EMail Plugin. Successful exploitation of this vulnerability would allow a remote attacker to execute arbitrary SQL commands on the affected website.
  • ISC BIND rndc Control Channel Denial Of Service Vulnerability (CVE-2016-1285)
     Severity: :    
     Publish Date:  11 de stycznia de 2017
    A denial-of-service vulnerability has been reported in ISC BIND9. The vulnerability is due to improper handling of packets sent to rndc control channel interface. A remote, unauthenticated attacker could exploit this vulnerabilities by sending a maliciously crafted packet to the rndc control channel interface of a target BIND server. Successful exploitation could lead to denial-of-service conditions.
  • ISC BIND Long Name Query DOS Vulnerability (CVE-2016-2775)
     Severity: :    
     Publish Date:  11 de stycznia de 2017
    A denial-of-service vulnerability has been reported in ISC BIND's lwresd daemon. The vulnerability is due to failure to check the query length when using lightweight resolver protocol. A remote, unauthenticated attacker could exploit this vulnerability by providing large query name to the lightweight resolver. Successful exploitation could lead to denial-of-service conditions.
  • Openssl RSA Downgrade Vulnerability (CVE-2015-0204)
     Severity: :    
     Publish Date:  11 de stycznia de 2017
    The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role.
  • Ruby On Rails Action View Cross Site Scripting Vulnerability (CVE-2016-6316)
     Severity: :    
     Publish Date:  11 de stycznia de 2017
    Cross-site scripting (XSS) vulnerability in Action View in Ruby on Rails 3.x before 3.2.22.3, 4.x before 4.2.7.1, and 5.x before 5.0.0.1 might allow remote attackers to inject arbitrary web script or HTML via text declared as "HTML safe" and used as attribute values in tag handlers.
  • phpMyAdmin SQL Injection Vulnerability (CVE-2016-6611)
     Severity: :    
     Publish Date:  11 de stycznia de 2017
    phpMyAdmin is prone to a sql-injection vulnerability. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. phpMyAdmin 4.6.x versions prior to 4.6.4, 4.4.x versions prior to 4.4.15.8 and 4.0.x versions prior to 4.0.10.17 are vulnerable.