All Vulnerabilities
Microsoft Internet Explorer And Edge Information Disclosure Vulnerability (CVE-20...
Severity:
Date Published:  09 Nov 2016
Microsoft Internet Explorer and Microsoft Edge have an information disclosure vulnerability which discloses the contents of its memory. An attacker could use the vulnerability to gain information about the system that could be combined with other attacks to compromise the system.
Microsoft Edge Scripting Engine Memory Corruption Vulnerability (CVE-2016-7203)
Severity:
Date Published:  09 Nov 2016
Microsoft Edge Scripting Engine is prone to a memory corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the application.
Microsoft Edge Information Disclosure Vulnerability (CVE-2016-7204)
Severity:
Date Published:  09 Nov 2016
An information disclosure vulnerability exists in Microsoft Edge Scripting Engine when dealing with different object types. An attacker who successfully exploited this vulnerability could obtain information to further compromise the system.
Oracle Database Trigger MDSYS.SDO_TOPO_DROP_FTBL SQL Injection Vulnerability
Severity:
Date Published:  09 Nov 2016
Unspecified vulnerability in the Oracle Spatial component in Oracle Database 10.1.0.5 and 10.2.0.2 allows remote authenticated users to affect confidentiality and integrity via unknown vectors. NOTE: the previous information was obtained from the January 2009 CPU. Oracle has not commented on reliable researcher claims that this issue is a SQL injection vulnerability that allows remote authenticated users to gain MDSYS privileges via the MDSYS.SDO_TOPO_DROP_FTBL trigger.
Joomla Huge-IT Video Gallery Extension SQL Injection Vulnerability (CVE-2016-1000...
Severity:
Date Published:  09 Nov 2016
SQL injection vulnerability exists in Huge-IT Video Gallery Extension. The vulnerability could allow a remote user to perform SQL injection attacks potentially allowing them access to database content and a target website can be compromised.
Joomla Huge-IT Video Gallery Extension Cross Site Scripting Vulnerability (CVE-20...
Severity:
Date Published:  09 Nov 2016
A reflected Cross Site Scripting (XSS) vulnerability has been found in the Huge-IT Video Gallery Joomla Extension. By using this vulnerability an attacker can inject malicious JavaScript code into the application, which will execute within the browser of any logged-in admin who views the page with injected code.
Joomla Huge-IT Slideshow Extension SQL Injection Vulnerability (CVE-2016-1000117)
Severity:
Date Published:  09 Nov 2016
SQL injection vulnerability exists in Huge-IT Slideshow Extension. The vulnerability could allow a remote user to perform SQL injection attacks potentially allowing them access to database content and a target website can be compromised.
Joomla Huge-IT Slideshow Extension Cross Site Scripting Vulnerability (CVE-2016-1...
Severity:
Date Published:  09 Nov 2016
A Cross Site Scripting (XSS) vulnerability has been found in the Huge-IT Joomla Extension. By using this vulnerability an attacker can inject malicious JavaScript code into the application, which will execute within the browser of any logged-in admin who views the page with injected code.
Joomla Huge-IT Catalog Extension SQLi And XSS Vulnerability (CVE-2016-1000119)
Severity:
Date Published:  09 Nov 2016
Reflected Cross Site Scripting (XSS) and SQL Injection vulnerabilities have been found in the Huge-IT catalog extension for Joomla. Successful exploitation of these vulnerabilities could allow an attacker to compromise the target website.
IBM WebSphere Application Server Cross Site Scripting Vulnerability (CVE-2016-304...
Severity:
Date Published:  09 Nov 2016
Cross-site scripting (XSS) vulnerability in the Web UI in IBM WebSphere Application Server (WAS) Liberty before 16.0.0.3 allows remote authenticated users to inject arbitrary web script or HTML via vectors involving OpenID Connect clients.
Featured Stories
- The Mirage of AI Programming: Hallucinations and Code IntegrityThe adoption of large language models (LLMs) and Generative Pre-trained Transformers (GPTs), such as ChatGPT, by leading firms like Microsoft, Nuance, Mix and Google CCAI Insights, drives the industry towards a series of transformative changes. As the use of these new technologies becomes prevalent, it is important to understand their key behavior, advantages, and the risks they present.Read more
- Open RAN: Attack of the xAppsThis article discusses two O-RAN vulnerabilities that attackers can exploit. One vulnerability stems from insufficient access control, and the other arises from faulty message handlingRead more
- A Closer Exploration of Residential Proxies and CAPTCHA-Breaking ServicesThis article, the final part of a two-part series, focuses on the details of our technical findings and analyses of select residential proxies and CAPTCHA-solving services.Read more
- How Residential Proxies and CAPTCHA-Solving Services Become Agents of AbuseThis article, the first of a two-part series, provides insights on how abusers and cybercriminals use residential proxies and CAPTCHA-solving services to enable bots, scrapers, and stuffers, and proposes security countermeasures for organizations.Read more