All Vulnerabilities
Cross-site scripting (XSS) vulnerability in admin/home/homepage/search in the web app in Adobe Connect before 9.4 allows remote attackers to inject arbitrary web script or HTML via the query parameter.
Microsoft Internet Explorer And Edge Memory Corruption Vulnerability (CVE-2016-32...
Severity:
Date Published:  12 Oct 2016
Microsoft Internet Explorer and Edge are prone to a memory corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the application.
LANDesk Management Suite Multiple Remote File Inclusion Vulnerabilities
Severity:
Date Published:  12 Oct 2016
LANDesk Management Suite is vulnerable to multiple remote file inclusion vulnerabilities. The vulnerabilities are due to insufficient input validation in frm_coremainfrm.aspx, sm_actionfrm.asp and frm_splitfrm.aspx files. Successful exploitation could lead to arbitrary code execution.
Apache Tomcat Limited Directory Traversal Vulnerability (CVE-2015-5174)
Severity:
Date Published:  12 Oct 2016
Directory traversal vulnerability in Apache Tomcat allows remote attackers to read arbitrary files via unspecified vectors related to ServletContext.
Zend Framework SQL Injection Vulnerability (CVE-2016-4861)
Severity:
Date Published:  12 Oct 2016
Zend Framework is prone to an SQL injection vulnerability by the implementation of ORDER BY and GROUP BY in Zend_Db_Select, when a combination of SQL expressions and comments are used.
ISC BIND TKEY Query Handling Denial Of Service Vulnerability (CVE-2015-5477)
Severity:
Date Published:  12 Oct 2016
named in ISC BIND 9.x before 9.9.7-P2 and 9.10.x before 9.10.2-P3 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via TKEY queries.
Adobe RoboHelp Server Authentication Bypass Vulnerability
Severity:
Date Published:  12 Oct 2016
Unrestricted file upload vulnerability in the RoboHelpServer Servlet (robohelp/server) in Adobe RoboHelp Server 8 allows remote attackers to execute arbitrary code by uploading a Java Archive (.jsp) file during a PUBLISH action, then accessing it via a direct request to the file in the robohelp/robo/reserved/web directory under its sessionid subdirectory, as demonstrated by the vd_adobe module in VulnDisco Pack Professional 8.7 through 8.11.
Microsoft Windows Graphics Component RCE Vulnerability (CVE-2016-0170)
Severity:
Date Published:  12 Oct 2016
A buffer overrun vulnerability was discovered in Microsoft Windows while handling malformed EMF file which will lead to a heap corruption. Successful exploitation of this issue could allow attackers to execute arbitrary code on the system.
ISC BIND Assertion Failure Denial Of Service Vulnerability (CVE-2016-2776)
Severity:
Date Published:  12 Oct 2016
buffer.c in named in ISC BIND 9 before 9.9.9-P3, 9.10.x before 9.10.4-P3, and 9.11.x before 9.11.0rc3 does not properly construct responses, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.
Microsoft Internet Explorer And Edge Information Disclosure Vulnerability (CVE-20...
Severity:
Date Published:  05 Oct 2016
An information disclosure vulnerability exists when Internet Explorer improperly discloses the contents of its memory. An attacker could use the vulnerability to gain information about the system that could be combined with other attacks to compromise the system.
Featured Stories
- The Mirage of AI Programming: Hallucinations and Code IntegrityThe adoption of large language models (LLMs) and Generative Pre-trained Transformers (GPTs), such as ChatGPT, by leading firms like Microsoft, Nuance, Mix and Google CCAI Insights, drives the industry towards a series of transformative changes. As the use of these new technologies becomes prevalent, it is important to understand their key behavior, advantages, and the risks they present.Read more
- Open RAN: Attack of the xAppsThis article discusses two O-RAN vulnerabilities that attackers can exploit. One vulnerability stems from insufficient access control, and the other arises from faulty message handlingRead more
- A Closer Exploration of Residential Proxies and CAPTCHA-Breaking ServicesThis article, the final part of a two-part series, focuses on the details of our technical findings and analyses of select residential proxies and CAPTCHA-solving services.Read more
- How Residential Proxies and CAPTCHA-Solving Services Become Agents of AbuseThis article, the first of a two-part series, provides insights on how abusers and cybercriminals use residential proxies and CAPTCHA-solving services to enable bots, scrapers, and stuffers, and proposes security countermeasures for organizations.Read more