All Vulnerabilities
NTP Configuration Directive File Overwrite Vulnerability (CVE-2015-7703)
Severity:
Date Published:  09 Nov 2016
An arbitrary file overwrite vulnerability exists in the Network Time Protocol daemon (NTPD). The vulnerability is due to NTPD allowing remote clients to change the pidfile and driftfile configuration options to any arbitrary file, allowing any file on the target system to be overwritten. A remote, authenticated attacker can exploit this vulnerability by sending a crafted NTP request to the vulnerable service. Successful exploitation can cause the NTP process to write the drift value or the pid value to an arbitrary file. This can lead to data corruption or denial-of-service on the target system.
Microsoft Windows OpenType Font Information Disclosure Vulnerability (CVE-2016-72...
Severity:
Date Published:  09 Nov 2016
An information disclosure vulnerability exists when the ATMFD component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerabilities could obtain information to further compromise the affected system.
Microsoft Windows Media Foundation Memory Corruption Vulnerability (CVE-2016-7217)
Severity:
Date Published:  09 Nov 2016
A memory corruption vulnerability exists when the Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights.
Microsoft Windows Information Disclosure Vulnerability (CVE-2016-7214)
Severity:
Date Published:  09 Nov 2016
An Information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited this vulnerability could retrieve the memory address of a kernel object.
Microsoft Windows Elevation Of Privilege Vulnerability (CVE-2016-7246)
Severity:
Date Published:  09 Nov 2016
An elevation of privilege vulnerability exists when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Microsoft Windows Elevation Of Privilege Vulnerability (CVE-2016-7215)
Severity:
Date Published:  09 Nov 2016
An elevation of privilege vulnerability exists when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Microsoft Windows Common Log File System Driver Elevation Of Privilege Vulnerabil...
Severity:
Date Published:  09 Nov 2016
A memory corruption vulnerability was discovered in Microsoft Windows. It can be triggered by loading a malformed blf file. Successful exploitation of this issue might lead to local privilege escalation.
Microsoft Windows Common Log File System Driver Elevation Of Privilege Vulnerabil...
Severity:
Date Published:  09 Nov 2016
A memory corruption vulnerability was discovered in Microsoft Windows. Successful exploitation of this issue might lead to local privilege escalation.
Microsoft Windows Common Log File System Driver Elevation Of Privilege Vulnerabil...
Severity:
Date Published:  09 Nov 2016
A memory corruption vulnerability was discovered within the CLFS.SYS component of Microsoft Windows. Successful exploitation of this issue might lead to local privilege escalation.
Microsoft Windows Common Log File System Driver Elevation Of Privilege Vulnerabil...
Severity:
Date Published:  09 Nov 2016
A memory corruption vulnerability was discovered within the CLFS.SYS component of Microsoft Windows. Successful exploitation of this issue might lead to local privilege escalation.
Featured Stories
- The Mirage of AI Programming: Hallucinations and Code IntegrityThe adoption of large language models (LLMs) and Generative Pre-trained Transformers (GPTs), such as ChatGPT, by leading firms like Microsoft, Nuance, Mix and Google CCAI Insights, drives the industry towards a series of transformative changes. As the use of these new technologies becomes prevalent, it is important to understand their key behavior, advantages, and the risks they present.Read more
- Open RAN: Attack of the xAppsThis article discusses two O-RAN vulnerabilities that attackers can exploit. One vulnerability stems from insufficient access control, and the other arises from faulty message handlingRead more
- A Closer Exploration of Residential Proxies and CAPTCHA-Breaking ServicesThis article, the final part of a two-part series, focuses on the details of our technical findings and analyses of select residential proxies and CAPTCHA-solving services.Read more
- How Residential Proxies and CAPTCHA-Solving Services Become Agents of AbuseThis article, the first of a two-part series, provides insights on how abusers and cybercriminals use residential proxies and CAPTCHA-solving services to enable bots, scrapers, and stuffers, and proposes security countermeasures for organizations.Read more