All Vulnerabilities
WordPress W3 Total Cache Plugin Cross Site Scripting Vulnerability
Severity:
Date Published:  12 Oct 2016
A cross-site scripting (XSS) vulnerability exists in W3 Total Cache plugin, used in WordPress and other products, allow remote attackers to execute same-origin JavaScript functions via crafted parameter.
WordPress Piwik Plugin Persistent Cross Site Scripting Vulnerability
Severity:
Date Published:  12 Oct 2016
A cross-site scripting (XSS) vulnerability exists in Piwik plugin, used in WordPress and other products, allow remote attackers to execute same-origin JavaScript functions via crafted parameter.
WordPress MailPoet Newsletter Plugin SQL Injection Vulnerability
Severity:
Date Published:  12 Oct 2016
SQL injection vulnerability in WordPress MailPoet Newsletter Plugin allows attackers to execute arbitrary SQL commands via unspecified vectors.
WordPress Link Library Plugin Cross-Site Scripting Vulnerability
Severity:
Date Published:  12 Oct 2016
A cross-site scripting (XSS) vulnerability exists in Link Library plugin, used in WordPress, allow remote attackers to execute same-origin JavaScript functions via crafted parameter.
PhpMyAdmin Multiple Cross Site Scripting Vulnerabilities (CVE-2016-6608)
Severity:
Date Published:  12 Oct 2016
A cross-site scripting (XSS) vulnerability exists in PhpMyAdmin, allows remote attackers to execute same-origin JavaScript functions via crafted parameter.
PhpMyAdmin Multiple Cross Site Scripting Vulnerabilities (CVE-2016-5733)
Severity:
Date Published:  12 Oct 2016
A cross-site scripting (XSS) vulnerability exists in PhpMyAdmin, allow remote attackers to execute same-origin JavaScript functions via crafted parameter.
Joomla Component Huge-IT Video Gallery SQL Injection Vulnerability (CVE-2016-1000...
Severity:
Date Published:  12 Oct 2016
SQL injection vulnerability in Joomla! allows attackers to execute arbitrary SQL commands via unspecified vectors.
VMware vCenter Java JMX Server Insecure Configuration Java Code Execution Vulnera...
Severity:
Date Published:  12 Oct 2016
VMware vCenter Server contains a remotely accessible JMX RMI service that is not securely configured. An unauthenticated remote attacker that is able to connect to the service may be able use it to execute arbitrary code on the vCenter server. By exploiting known methods, it is possible to remotely load an MLet file from an attacker controlled web server that points at a jar file.
NTP Unrestricted Query Reflected Denial Of Service Vulnerability
Severity:
Date Published:  12 Oct 2016
The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.
Cross-site scripting (XSS) vulnerability in admin/home/homepage/search in the web app in Adobe Connect before 9.4 allows remote attackers to inject arbitrary web script or HTML via the query parameter.
Featured Stories
- The Mirage of AI Programming: Hallucinations and Code IntegrityThe adoption of large language models (LLMs) and Generative Pre-trained Transformers (GPTs), such as ChatGPT, by leading firms like Microsoft, Nuance, Mix and Google CCAI Insights, drives the industry towards a series of transformative changes. As the use of these new technologies becomes prevalent, it is important to understand their key behavior, advantages, and the risks they present.Read more
- Open RAN: Attack of the xAppsThis article discusses two O-RAN vulnerabilities that attackers can exploit. One vulnerability stems from insufficient access control, and the other arises from faulty message handlingRead more
- A Closer Exploration of Residential Proxies and CAPTCHA-Breaking ServicesThis article, the final part of a two-part series, focuses on the details of our technical findings and analyses of select residential proxies and CAPTCHA-solving services.Read more
- How Residential Proxies and CAPTCHA-Solving Services Become Agents of AbuseThis article, the first of a two-part series, provides insights on how abusers and cybercriminals use residential proxies and CAPTCHA-solving services to enable bots, scrapers, and stuffers, and proposes security countermeasures for organizations.Read more