All Vulnerabilities

Microsoft Edge Memory Corruption Vulnerability (CVE-2016-7286)
 Severity:    
 Date Published:  21 Dec 2016
Microsoft Edge is prone to a memory corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the application.
PHP cURL Lib NULL Byte Injection Vulnerability
 Severity:    
 Date Published:  21 Dec 2016
The php_handler function in sapi/apache2handler/sapi_apache2.c in PHP when the Apache HTTP Server 2.4.x is used, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via pipelined HTTP requests that result in a "deconfigured interpreter."
Internet Explorer CCaret Use After Free Vulnerability (CVE-2013-0090)
 Severity:    
 Date Published:  21 Dec 2016
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CCaret Use After Free Vulnerability."
OpenSSL OCSP Status Request Denial Of Service Vulnerability (CVE-2016-6304)
 Severity:    
 Date Published:  21 Dec 2016
A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support.
A remote code vulnerability exists when Windows fails to validate the authenticity of a module before loading it in run-time. An attacker who successfully exploited the vulnerability could execute arbitrary code in the context of the user running the affected application.
A remote code vulnerability exists when Windows fails to validate the authenticity of a module before loading it in run-time. An attacker who successfully exploited the vulnerability could execute arbitrary code in the context of the user running the affected application.
A remote code vulnerability exists when Windows fails to validate the authenticity of a module before loading it in run-time. An attacker who successfully exploited the vulnerability could execute arbitrary code in the context of the user running the affected application.
Tomcat JSP Source Code Exposure Vulnerability (CVE-2002-1148)
 Severity:    
 Date Published:  21 Dec 2016
The default servlet (org.apache.catalina.servlets.DefaultServlet) in Tomcat 4.0.4 and 4.1.10 and earlier allows remote attackers to read source code for server files via a direct request to the servlet.
Microsoft Office OLE DLL Side Loading Vulnerability (CVE-2016-7275)
 Severity:    
 Date Published:  21 Dec 2016
A remote code execution vulnerability exists when Microsoft Office fails to validate the authenticity of a module before loading it at run-time. An attacker who successfully exploited the vulnerability could execute arbitrary code in the context of the user running the affected application.
Microsoft Windows OpenType Font Parsing Vulnerability (CVE-2016-7256)
 Severity:    
 Date Published:  21 Dec 2016
A remote code vulnerability exists when Microsoft Windows fails to properly parse OpenType fonts. An attacker who successfully exploited this vulnerability could take control of the affected system.

Featured Stories