All Vulnerabilities
RealNetworks Helix Server NTLM Authentication Heap Buffer Overflow Vulnerability ...
Severity:
Date Published:  05 Oct 2016
RealNetworks Helix Server and Helix Mobile Server are prone to a remote heap buffer-overflow vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the application or cause denial-of-service condition.
Microsoft Windows Kernel Elevation Of Privilege Vulnerability (CVE-2016-3371)
Severity:
Date Published:  05 Oct 2016
A local privilege escalation vulnerability was discovered in Microsoft Windows. It allows normal users to gain administrator privileges.
ElasticSearch Snapshot API Directory Traversal Vulnerability (CVE-2015-5531)
Severity:
Date Published:  05 Oct 2016
Directory traversal vulnerability in Elasticsearch before 1.6.1 allows remote attackers to read arbitrary files via unspecified vectors related to snapshot API calls.
Microsoft .NET Framework ASP.NET Padding Oracle Information Disclosure Vulnerabil...
Severity:
Date Published:  05 Oct 2016
Microsoft .NET Framework 1.1 SP1, 2.0 SP1 and SP2, 3.5, 3.5 SP1, 3.5.1, and 4.0, as used for ASP.NET in Microsoft Internet Information Services (IIS), provides detailed error codes during decryption attempts, which allows remote attackers to decrypt and modify encrypted View State (aka __VIEWSTATE) form data, and possibly forge cookies or read application files, via a padding oracle attack, aka "ASP.NET Padding Oracle Vulnerability."
Adobe Flash Player Heap Overflow Vulnerability (CVE-2016-1101)
Severity:
Date Published:  05 Oct 2016
Adobe Flash Player is prone to a heap overflow vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial of service condition.
Microsoft Windows Graphics Component Information Disclosure Vulnerability (CVE-20...
Severity:
Date Published:  05 Oct 2016
An information disclosure vulnerability was discovered within Internet explorer when handling a specially crafted EMF file. A successful exploitation of this issue would allow an attacker to disclose information on the remote filesystem through a malicious web page.
Microsoft Office Memory Corruption Vulnerability (CVE-2016-0010)
Severity:
Date Published:  05 Oct 2016
A memory corruption vulnerability exists in Microsoft Office. An attacker who successfully exploited this vulnerability could use a specially crafted file to perform remote code execution in the security context of the current user.
There is an unknown Java unserialization vulnerability in third-party Java libraries that could be used to remotely exploit Java based web applications. Serialization is a process in which an object is converted to a stream of bytes in order to store or transmit that object to memory or a file. The process in which serialized data is extracted is called unserialization and it can lead to major security issues if not handled properly.
Microsoft Internet Explorer And Edge Memory Corruption Vulnerability (CVE-2016-32...
Severity:
Date Published:  05 Oct 2016
Microsoft Internet Explorer and Edge are prone to an unspecified memory corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected application.
Microsoft Windows PDF Information Disclosure Vulnerability (CVE-2016-3215)
Severity:
Date Published:  05 Oct 2016
Microsoft Windows PDF is prone to a remote information-disclosure vulnerability. Attackers can exploit this issue to gain access to sensitive information that may aid in further attacks.
Featured Stories
- The Mirage of AI Programming: Hallucinations and Code IntegrityThe adoption of large language models (LLMs) and Generative Pre-trained Transformers (GPTs), such as ChatGPT, by leading firms like Microsoft, Nuance, Mix and Google CCAI Insights, drives the industry towards a series of transformative changes. As the use of these new technologies becomes prevalent, it is important to understand their key behavior, advantages, and the risks they present.Read more
- Open RAN: Attack of the xAppsThis article discusses two O-RAN vulnerabilities that attackers can exploit. One vulnerability stems from insufficient access control, and the other arises from faulty message handlingRead more
- A Closer Exploration of Residential Proxies and CAPTCHA-Breaking ServicesThis article, the final part of a two-part series, focuses on the details of our technical findings and analyses of select residential proxies and CAPTCHA-solving services.Read more
- How Residential Proxies and CAPTCHA-Solving Services Become Agents of AbuseThis article, the first of a two-part series, provides insights on how abusers and cybercriminals use residential proxies and CAPTCHA-solving services to enable bots, scrapers, and stuffers, and proposes security countermeasures for organizations.Read more