All Vulnerabilities

Adobe Flash Player Use After Free Vulnerability (CVE-2016-7858)
 Severity:    
 Date Published:  16 Nov 2016
Adobe Flash Player is prone to a use after free vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial of service condition.
Adobe Flash Player Use After Free Vulnerability (CVE-2016-7857)
 Severity:    
 Date Published:  16 Nov 2016
Adobe Flash Player is prone to a use after free vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial of service condition.
Adobe Flash Player Type Confusion Vulnerability (CVE-2016-7865)
 Severity:    
 Date Published:  16 Nov 2016
Adobe Flash Player is prone to a type confusion vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial of service states.
Adobe Flash Player Type Confusion Vulnerability (CVE-2016-7861)
 Severity:    
 Date Published:  16 Nov 2016
Adobe Flash Player is prone to a type confusion vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial of service states.
Adobe Flash Player Type Confusion Vulnerability (CVE-2016-7860)
 Severity:    
 Date Published:  16 Nov 2016
Adobe Flash Player is prone to a type confusion vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial of service states.
Adobe Flash Player Use After Free Vulnerability (CVE-2016-7855)
 Severity:    
 Date Published:  16 Nov 2016
Adobe Flash Player is prone to a use after free vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial of service condition.
A memory corruption vulnerability was discovered within the CLFS.SYS component of Microsoft Windows. Successful exploitation of this issue might lead to local privilege escalation.
Oracle Database Server SQL Injection Flaw in Oracle Workspace Manager
 Severity:    
 Date Published:  16 Nov 2016
SQL injection vulnerability in Workspace Manager for Oracle Database before OWM 10.2.0.4.1, OWM 10.1.0.8.0, and OWM 9.2.0.8.0 allows attackers to execute arbitrary SQL commands via the FINDRICSET procedure in the LT package. NOTE: this is probably covered by CVE-2007-5510, but there are insufficient details to be certain.
A privilege escalation vulnerability exists when Microsoft Internet Explorer or Edge fails to properly secure private namespace. An attacker who successfully exploited this vulnerability could gain elevated permissions on the namespace directory of a vulnerable system and gain elevated privileges.
Adobe Acrobat And Reader Memory Corruption Vulnerability (CVE-2016-6960)
 Severity:    
 Date Published:  16 Nov 2016
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial of service states.