All Vulnerabilities
Joomla Component Arbitrary File Upload Shell Vulnerability
Severity:
Date Published:  20 Oct 2016
Unrestricted file upload vulnerability in the Joomla Component allows remote attackers to execute arbitrary code by uploading a crafted file.
ISC BIND Response Handler Denial Of Service Vulnerability (CVE-2015-8000)
Severity:
Date Published:  20 Oct 2016
A denial-of-service vulnerability has been reported in BIND. The vulnerability is due to improper parsing of incoming responses, allowing malformed records to be accepted by BIND when they should not be accepted. A remote, unauthenticated attacker could exploit this vulnerability against DNS servers that perform recursive queries by crafting responses with an improper class attribute. Successful exploitation could lead to denial-of service.
ISC BIND OpenPGP Key Handler Denial Of Service Vulnerability (CVE-2015-5986)
Severity:
Date Published:  20 Oct 2016
A denial-of-service vulnerability exists in ISC BIND. The vulnerability is due to an incorrect boundary check, leading to a REQUIRE assertion failure in openpgpkey_61.c. A remote, unauthenticated attacker can exploit this vulnerability by sending crafted queries under certain circumstances. Successful exploitation will result in a denial of service condition.
Identified Suspicious Remote Desktop Protocol (RDP) Brute Force Attempt
Severity:
Date Published:  20 Oct 2016
Firefox toString console.time Privileged Javascript Injection Vulnerability
Severity:
Date Published:  20 Oct 2016
The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6 does not prevent acquisition of chrome privileges during calls to content level constructors, which allows remote attackers to bypass certain read-only restrictions and conduct cross-site scripting (XSS) attacks via a crafted web site.
Cumulative Security Update Of ActiveX Kill Bits - January 2016
Severity:
Date Published:  20 Oct 2016
This filter blocks the ActiveX control mentioned in the January 2016 security advisory of Microsoft for which new kill bits are added.
Adobe Flash Player Use After Free Vulnerability (CVE-2016-6987)
Severity:
Date Published:  20 Oct 2016
Adobe Flash Player is prone to an use after free vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial of service condition.
Adobe Flash Player Use After Free Vulnerability (CVE-2016-6981)
Severity:
Date Published:  20 Oct 2016
Adobe Flash Player is prone to an use after free vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial of service condition.
Adobe Flash Player Memory Corruption Vulnerability (CVE-2016-6986)
Severity:
Date Published:  20 Oct 2016
Adobe Flash Player is prone to a memory corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the application.
Adobe Flash Player Memory Corruption Vulnerability (CVE-2016-6985)
Severity:
Date Published:  20 Oct 2016
Adobe Flash Player is prone to a memory corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the application.
Featured Stories
- The Mirage of AI Programming: Hallucinations and Code IntegrityThe adoption of large language models (LLMs) and Generative Pre-trained Transformers (GPTs), such as ChatGPT, by leading firms like Microsoft, Nuance, Mix and Google CCAI Insights, drives the industry towards a series of transformative changes. As the use of these new technologies becomes prevalent, it is important to understand their key behavior, advantages, and the risks they present.Read more
- Open RAN: Attack of the xAppsThis article discusses two O-RAN vulnerabilities that attackers can exploit. One vulnerability stems from insufficient access control, and the other arises from faulty message handlingRead more
- A Closer Exploration of Residential Proxies and CAPTCHA-Breaking ServicesThis article, the final part of a two-part series, focuses on the details of our technical findings and analyses of select residential proxies and CAPTCHA-solving services.Read more
- How Residential Proxies and CAPTCHA-Solving Services Become Agents of AbuseThis article, the first of a two-part series, provides insights on how abusers and cybercriminals use residential proxies and CAPTCHA-solving services to enable bots, scrapers, and stuffers, and proposes security countermeasures for organizations.Read more