All Vulnerabilities
IBM WebSphere Application Server Cross Site Scripting Vulnerability (CVE-2016-304...
Severity:
Date Published:  09 Nov 2016
Cross-site scripting (XSS) vulnerability in the Web UI in IBM WebSphere Application Server (WAS) Liberty before 16.0.0.3 allows remote authenticated users to inject arbitrary web script or HTML via vectors involving OpenID Connect clients.
HP Network Node Manager ovspmd.exe Buffer Overflow Vulnerability
Severity:
Date Published:  09 Nov 2016
HP OpenView Network Node Manager (OV NNM) ovw.dll is prone to a buffer overflow vulnerability. A successful exploitation of this vulnerability could allow remote attackers to execute arbitrary code via a long message.
Microsoft Internet Explorer Information Disclosure Vulnerability (CVE-2016-3298)
Severity:
Date Published:  09 Nov 2016
An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the system.
Microsoft Edge Scripting Engine Memory Corruption Vulnerability (CVE-2016-3386)
Severity:
Date Published:  09 Nov 2016
Microsoft Edge scripting engine is prone to a memory corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the application.
Adobe Acrobat And Reader Information Disclosure Vulnerability (CVE-2016-1078)
Severity:
Date Published:  09 Nov 2016
Adobe Acrobat and Reader are prone to an information disclosure vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial of service states.
JBoss Seam Parameterized EL Expressions Remote Code Execution Vulnerability
Severity:
Date Published:  09 Nov 2016
JBoss Seam 2 (jboss-seam2), as used in JBoss Enterprise Application Platform 4.3.0 for Red Hat Linux, does not properly sanitize inputs for JBoss Expression Language (EL) expressions, which allows remote attackers to execute arbitrary code via a crafted URL. NOTE: The vulnerability exists only when the Java Security Manager is not configured properly.
Microsoft Windows PDF Library Remote Code Execution Vulnerability (CVE-2016-3374)
Severity:
Date Published:  09 Nov 2016
A remote code execution vulnerability exists in Microsoft Windows PDF library. An attacker who successfully exploited this vulnerability could cause arbitrary code to execute in the context of the current user.
An elevation of privilege vulnerability exists in Windows when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in kernel mode.
Microsoft Windows PDF Library Remote Code Execution Vulnerability (CVE-2016-3370)
Severity:
Date Published:  09 Nov 2016
A remote code execution vulnerability exists in Microsoft Windows PDF library. An attacker who successfully exploited this vulnerability could cause arbitrary code to execute in the context of the current user.
Microsoft Exchange Server Elevation Of Privilege Vulnerability (CVE-2015-1632)
Severity:
Date Published:  04 Nov 2016
Elevation of privilege vulnerability exists when Microsoft Exchange Server does not properly sanitize page content in Outlook Web App. An attacker could exploit this vulnerability by modifying certain properties within Outlook Web App and then convincing users to browse to the targeted Outlook Web App site. An attacker who successfully exploited this vulnerability could run script in the context of the current user.
Featured Stories
- The Mirage of AI Programming: Hallucinations and Code IntegrityThe adoption of large language models (LLMs) and Generative Pre-trained Transformers (GPTs), such as ChatGPT, by leading firms like Microsoft, Nuance, Mix and Google CCAI Insights, drives the industry towards a series of transformative changes. As the use of these new technologies becomes prevalent, it is important to understand their key behavior, advantages, and the risks they present.Read more
- Open RAN: Attack of the xAppsThis article discusses two O-RAN vulnerabilities that attackers can exploit. One vulnerability stems from insufficient access control, and the other arises from faulty message handlingRead more
- A Closer Exploration of Residential Proxies and CAPTCHA-Breaking ServicesThis article, the final part of a two-part series, focuses on the details of our technical findings and analyses of select residential proxies and CAPTCHA-solving services.Read more
- How Residential Proxies and CAPTCHA-Solving Services Become Agents of AbuseThis article, the first of a two-part series, provides insights on how abusers and cybercriminals use residential proxies and CAPTCHA-solving services to enable bots, scrapers, and stuffers, and proposes security countermeasures for organizations.Read more