Nagios XI is prone to a SQL injection vulnerability. A remote, unauthenticated attacker can exploit this vulnerability by sending an HTTP request with a malicious SQL query to the target server. Successful exploitation could lead to the disclosure of sensitive information from the database such as API keys for administrative users.
A file name information disclosure vulnerability was discovered within Internet Explorer. The issue lies in the fact that Internet Explorer's behavior changes when dealing with URIs that point to existing local files versus URIs that point to non-existent files. It allows malicious pages to enumerate the existence of files in the victim's file system. This vulnerability was triggered only by local pages or ones opened from a network share.
Adobe Flash Player is prone to a use after free vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial of service condition.
A remote code execution vulnerability exists in RESTWS module for the Drupal. A remote unauthenticated attacker could exploit this vulnerability by sending a crafted HTTP request to the target server. Successful exploitation could allow the attacker to execute arbitrary code in the context of the web server.
An information disclosure vulnerability exists in Internet Explorer when Hyperlink Object Library improperly discloses the contents of its memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the system.
Oracle Database and Enterprise Manager Grid Control is prone to a remote code-execution vulnerability. Successful exploits will allow attackers to execute arbitrary code within the context of the application.