All Vulnerabilities

Symfony HttpCache Class Remote Code Execution Vulnerability (CVE-2015-2308)
 Severity:    
 Date Published:  15 Sep 2016
Eval injection vulnerability in the HttpCache class in HttpKernel in Symfony 2.x before 2.3.27, 2.4.x and 2.5.x before 2.5.11, and 2.6.x before 2.6.6 allows remote attackers to execute arbitrary PHP code via a language="php" attribute of a SCRIPT element.
WordPress Video Player Multiple SQL injection Vulnerabilities
 Severity:    
 Date Published:  15 Sep 2016
A blind SQL injection vulnerability is found in WordPress Video Player which allows attackers to execute arbitrary SQL commands via unknown parameters.
PHP 'main/rfc1867.c' Remote Denial Of Service Vulnerability
 Severity:    
 Date Published:  07 Sep 2016
Algorithmic complexity vulnerability in the multipart_buffer_headers function in main/rfc1867.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote attackers to cause a denial of service (CPU consumption) via crafted form data that triggers an improper order-of-growth outcome.
Microsoft .NET framework is prone to a memory corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the application.
Microsoft .NET Framework and Silverlight do not properly validate arguments to unspecified networking API functions, which allows remote attackers to execute arbitrary code via a crafted XAML browser application or crafted .NET Framework application.
Joomla com_registrationpro SQL injection Vulnerability
 Severity:    
 Date Published:  07 Sep 2016
An SQL injection vulnerability has been detected in Joomla Event Registration Pro extension which allows attackers to execute arbitrary SQL commands via unknown parameters.
Buffer overflow in the Cookie parser in Fortinet FortiOS 4.x before 4.1.11, 4.2.x before 4.2.13, and 4.3.x before 4.3.9 and FortiSwitch before 3.4.3 allows remote attackers to execute arbitrary code via a crafted HTTP request, aka EGREGIOUSBLUNDER.
Adobe Flash Player Use After Free Vulnerability (CVE-2016-0959)
 Severity:    
 Date Published:  07 Sep 2016
Adobe Flash Player is prone to a use after free vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial of service condition.
Adobe Acrobat And Reader Memory Corruption Vulnerability (CVE-2016-1082)
 Severity:    
 Date Published:  07 Sep 2016
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial of service states.
Adobe Acrobat And Reader Memory Corruption Vulnerability (CVE-2016-1081)
 Severity:    
 Date Published:  07 Sep 2016
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial of service states.