All Vulnerabilities
Microsoft Win32k Elevation Of Privilege Vulnerability (CVE-2016-3270)
Severity:
Date Published:  12 Oct 2016
An elevation of privilege vulnerability exists in Windows when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.
Microsoft Win32k Elevation Of Privilege Vulnerability (CVE-2016-3266)
Severity:
Date Published:  12 Oct 2016
A local privilege escalation vulnerability was discovered within the Win32k-GDI component of Microsoft Windows. It can be triggered locally by manipulating the graphics properties of a window. Successful exploitation of this issue might lead to a malicious user elevating his user privileges in a vulnerable system.
Microsoft Office Memory Corruption Vulnerability (CVE-2016-7193)
Severity:
Date Published:  12 Oct 2016
An Office RTF remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle RTF files. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.
Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2016-3383)
Severity:
Date Published:  12 Oct 2016
Microsoft Internet Explorer is prone to a memory corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the application.
Microsoft Internet Explorer And Edge Memory Corruption Vulnerability (CVE-2016-33...
Severity:
Date Published:  12 Oct 2016
Microsoft Internet Explorer and Edge are prone to a memory corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the application.
Joomla Cross Site Scripting Vulnerability (CVE-2013-3059)
Severity:
Date Published:  12 Oct 2016
Cross-site scripting (XSS) vulnerability in the Voting plugin in Joomla! 2.5.x before 2.5.10 and 3.0.x before 3.0.4 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Joomla Cross Site Scripting Vulnerability (CVE-2013-3058)
Severity:
Date Published:  12 Oct 2016
Cross-site scripting (XSS) vulnerability in Joomla! 2.5.x before 2.5.10 and 3.0.x before 3.0.4 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
A command injection vulnerability exists in the DNS Tool of HP SiteScope allowing an attacker to execute arbitrary commands in the context of the service.
Apache Sling 'AbstractAuthenticationFormServlet' Open Redirection Vulnerability
Severity:
Date Published:  12 Oct 2016
Open redirect vulnerability in the AbstractAuthenticationFormServlet in the Auth Core (org.apache.sling.auth.core) bundle before 1.1.4 in Apache Sling allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the resource parameter, related to "a custom login form and XSS."
WordPress W3 Total Cache Plugin Cross Site Scripting Vulnerability
Severity:
Date Published:  12 Oct 2016
A cross-site scripting (XSS) vulnerability exists in W3 Total Cache plugin, used in WordPress and other products, allow remote attackers to execute same-origin JavaScript functions via crafted parameter.
Featured Stories
- The Mirage of AI Programming: Hallucinations and Code IntegrityThe adoption of large language models (LLMs) and Generative Pre-trained Transformers (GPTs), such as ChatGPT, by leading firms like Microsoft, Nuance, Mix and Google CCAI Insights, drives the industry towards a series of transformative changes. As the use of these new technologies becomes prevalent, it is important to understand their key behavior, advantages, and the risks they present.Read more
- Open RAN: Attack of the xAppsThis article discusses two O-RAN vulnerabilities that attackers can exploit. One vulnerability stems from insufficient access control, and the other arises from faulty message handlingRead more
- A Closer Exploration of Residential Proxies and CAPTCHA-Breaking ServicesThis article, the final part of a two-part series, focuses on the details of our technical findings and analyses of select residential proxies and CAPTCHA-solving services.Read more
- How Residential Proxies and CAPTCHA-Solving Services Become Agents of AbuseThis article, the first of a two-part series, provides insights on how abusers and cybercriminals use residential proxies and CAPTCHA-solving services to enable bots, scrapers, and stuffers, and proposes security countermeasures for organizations.Read more