All Vulnerabilities
Microsoft Win32k Elevation Of Privilege Vulnerability (CVE-2016-7211)
Severity:
Date Published:  20 Oct 2016
A use-after-free vulnerability was discovered in Microsoft Windows. Successful exploitation of this issue may allow attackers to execute arbitrary code.
Mozilla Firefox Chrome Object Wrapper Security Bypass Vulnerability (CVE-2013-075...
Severity:
Date Published:  20 Oct 2016
Mozilla Firefox is prone to a security-bypass vulnerability. An attacker can exploit this issue to bypass certain security restrictions and execute arbitrary code in the context of the application.
Apple QuickTime 'moov' Atom Heap Corruption Remote Code Execution Vulnerability
Severity:
Date Published:  20 Oct 2016
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. An attacker could leverage this to execute arbitrary code under the context of the QuickTime player.
Apache Struts ExceptionDelegator Component Parameter Parsing Remote Code Execution
Severity:
Date Published:  20 Oct 2016
The ExceptionDelegator component in Apache Struts before 2.2.3.1 interprets parameter values as OGNL expressions during certain exception handling for mismatched data types of properties, which allows remote attackers to execute arbitrary Java code via a crafted parameter.
Microsoft Win32k Elevation Of Privilege Vulnerability (CVE-2016-3341)
Severity:
Date Published:  20 Oct 2016
A memory corruption vulnerability was discovered in Microsoft Windows. Successful exploitation of this issue might lead to local privilege escalation.
PHP TAR File Parsing Uninitialized Reference Vulnerability (CVE-2016-4343)
Severity:
Date Published:  12 Oct 2016
An uninitialized reference vulnerability has been found in PHP. A remote attacker can exploit this vulnerability by sending a crafted file to a service that processes tar files. A successful attack could result in arbitrary code execution on the vulnerable server.
Microsoft Windows GDI+ Information Disclosure Vulnerability (CVE-2016-3262)
Severity:
Date Published:  12 Oct 2016
An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory, allowing an attacker to retrieve information from a targeted system. An attacker who successfully exploited this vulnerability could use the retrieved information to circumvent Address Space Layout Randomization (ASLR) in Windows, which helps guard against a broad class of vulnerabilities.
Microsoft Windows GDI+ Information Disclosure Vulnerability (CVE-2016-3209)
Severity:
Date Published:  12 Oct 2016
An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory, allowing an attacker to retrieve information from a targeted system. An attacker who successfully exploited this vulnerability could use the retrieved information to circumvent Address Space Layout Randomization (ASLR) in Windows, which helps guard against a broad class of vulnerabilities.
Microsoft Win32k Elevation Of Privilege Vulnerability (CVE-2016-7191)
Severity:
Date Published:  12 Oct 2016
A use-after-free vulnerability was discovered in Microsoft Windows. Successful exploitation of this issue may allow attackers to execute arbitrary code.
Microsoft Win32k Elevation Of Privilege Vulnerability (CVE-2016-3270)
Severity:
Date Published:  12 Oct 2016
An elevation of privilege vulnerability exists in Windows when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.
Featured Stories
- The Mirage of AI Programming: Hallucinations and Code IntegrityThe adoption of large language models (LLMs) and Generative Pre-trained Transformers (GPTs), such as ChatGPT, by leading firms like Microsoft, Nuance, Mix and Google CCAI Insights, drives the industry towards a series of transformative changes. As the use of these new technologies becomes prevalent, it is important to understand their key behavior, advantages, and the risks they present.Read more
- Open RAN: Attack of the xAppsThis article discusses two O-RAN vulnerabilities that attackers can exploit. One vulnerability stems from insufficient access control, and the other arises from faulty message handlingRead more
- A Closer Exploration of Residential Proxies and CAPTCHA-Breaking ServicesThis article, the final part of a two-part series, focuses on the details of our technical findings and analyses of select residential proxies and CAPTCHA-solving services.Read more
- How Residential Proxies and CAPTCHA-Solving Services Become Agents of AbuseThis article, the first of a two-part series, provides insights on how abusers and cybercriminals use residential proxies and CAPTCHA-solving services to enable bots, scrapers, and stuffers, and proposes security countermeasures for organizations.Read more