All Vulnerabilities
Microsoft Internet Explorer And Edge Information Disclosure Vulnerability (CVE-20...
Severity:
Date Published:  05 Oct 2016
An information disclosure vulnerability exists when Internet Explorer improperly discloses the contents of its memory. An attacker could use the vulnerability to gain information about the system that could be combined with other attacks to compromise the system.
SQL injection vulnerability in Drupal 6.22 allows attackers to execute arbitrary SQL commands via unspecified vectors.
Microsoft IIS MDAC msadcs.dll RDS Arbitrary Remote Command Execution (CVE-1999-10...
Severity:
Date Published:  05 Oct 2016
The Remote Data Service (RDS) DataFactory component of Microsoft Data Access Components (MDAC) in IIS 3.x and 4.x exposes unsafe methods, which allows remote attackers to execute arbitrary commands.
Microsoft SQL Server 'sa' Login With 'Null' Password Vulnerability
Severity:
Date Published:  05 Oct 2016
The "sa" account is installed with a default null password on (1) Microsoft SQL Server 2000, (2) SQL Server 7.0, and (3) Data Engine (MSDE) 1.0, which allows remote attackers to gain privileges, as exploited by worms such as Voyager Alpha Force and Spida.
Microsoft SQL Server 'sa' Login With 'Null' Password Vulnerability
Severity:
Date Published:  05 Oct 2016
The "sa" account is installed with a default null password on (1) Microsoft SQL Server 2000, (2) SQL Server 7.0, and (3) Data Engine (MSDE) 1.0, which allows remote attackers to gain privileges, as exploited by worms such as Voyager Alpha Force and Spida.
GNU Wget Arbitrary Commands Execution Vulnerability (CVE-2016-4971)
Severity:
Date Published:  05 Oct 2016
An arbitrary file overwrite vulnerability exist in the GNU Wget. The vulnerability is due to Wget trusting the filename provided by an FTP server when the original request is redirected from an HTTP server. A remote attacker can exploit this vulnerability by enticing a user to request a file over HTTP and sending an HTTP redirect to an FTP location hosting a malicious file intended to overwrite a user file such as .bashrc or .wgetrc. Upon successful exploitation, the commands contained in the downloaded file will be executed.
GlassFish Java EE Application Server Arbitrary File Read Vulnerability
Severity:
Date Published:  05 Oct 2016
Administration Console of Oracle GlassFish Server is prone to a directory traversal vulnerability. An attacker can exploit this vulnerability to access sensitive data on the target server.
Adobe Flash Player Memory Corruption Vulnerability (CVE-2016-4275)
Severity:
Date Published:  05 Oct 2016
Adobe Flash Player is prone to an unspecified memory corruption vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial of service states.
Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2016-3288)
Severity:
Date Published:  05 Oct 2016
Microsoft Internet Explorer is prone to an unspecified memory corruption vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial of service states.
RealNetworks Helix Server NTLM Authentication Heap Buffer Overflow Vulnerability ...
Severity:
Date Published:  05 Oct 2016
RealNetworks Helix Server and Helix Mobile Server are prone to a remote heap buffer-overflow vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the application or cause denial-of-service condition.
Featured Stories
- The Mirage of AI Programming: Hallucinations and Code IntegrityThe adoption of large language models (LLMs) and Generative Pre-trained Transformers (GPTs), such as ChatGPT, by leading firms like Microsoft, Nuance, Mix and Google CCAI Insights, drives the industry towards a series of transformative changes. As the use of these new technologies becomes prevalent, it is important to understand their key behavior, advantages, and the risks they present.Read more
- Open RAN: Attack of the xAppsThis article discusses two O-RAN vulnerabilities that attackers can exploit. One vulnerability stems from insufficient access control, and the other arises from faulty message handlingRead more
- A Closer Exploration of Residential Proxies and CAPTCHA-Breaking ServicesThis article, the final part of a two-part series, focuses on the details of our technical findings and analyses of select residential proxies and CAPTCHA-solving services.Read more
- How Residential Proxies and CAPTCHA-Solving Services Become Agents of AbuseThis article, the first of a two-part series, provides insights on how abusers and cybercriminals use residential proxies and CAPTCHA-solving services to enable bots, scrapers, and stuffers, and proposes security countermeasures for organizations.Read more