All Vulnerabilities

  • Joomla Topics SQL Injection Vulnerability
     Severity:    
     Publish Date:  24 November 2016
    < div id="listDescVul"class="pane showpane noborder" >
    SQL injection vulnerability in Joomla allows attackers to execute arbitrary SQL commands via unspecified vectors.
  • Identified Suspicious Command Injection Attack
     Severity:    
     Publish Date:  24 November 2016
    < div id="listDescVul"class="pane showpane noborder" >
    Command injection is an attack technique that allows an attacker to inject and execute commands in the vulnerable application. An attacker can exploit command injection vulnerability with a command sequence appended to the appropriate format or escape string to execute arbitrary commands. Successful exploitation results in a system compromise, disclosure or modification of data.
  • Identified Suspicious Command Injection Attack
     Severity:    
     Publish Date:  24 November 2016
    < div id="listDescVul"class="pane showpane noborder" >
    Command injection is an attack technique that allows an attacker to inject and execute commands in the vulnerable application. An attacker can exploit command injection vulnerability with a command sequence appended to the appropriate format or escape string to execute arbitrary commands. Successful exploitation results in a system compromise, disclosure or modification of data.
  • < div id="listDescVul"class="pane showpane noborder" >
    vbscript.dll in Microsoft VBScript 5.6 through 5.8, as used with Internet Explorer 6 through 11 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "VBScript Memory Corruption Vulnerability."
  • < div id="listDescVul"class="pane showpane noborder" >
    Multiple elevation of privilege vulnerabilities exist when the Windows VHDMP kernel driver fails to properly handle user access to certain files. An attacker who successfully exploited the vulnerabilities could manipulate files in locations not intended to be available to the user.
  • < div id="listDescVul"class="pane showpane noborder" >
    Multiple elevation of privilege vulnerabilities exist when the Windows VHDMP kernel driver fails to properly handle user access to certain files. An attacker who successfully exploited the vulnerabilities could manipulate files in locations not intended to be available to the user.
  • < div id="listDescVul"class="pane showpane noborder" >
    Multiple elevation of privilege vulnerabilities exist when the Windows VHDMP kernel driver fails to properly handle user access to certain files. An attacker who successfully exploited the vulnerabilities could manipulate files in locations not intended to be available to the user.
  • Ознакомиться со статьей   
  • < div id="listDescVul"class="pane showpane noborder" >
    A remote code execution vulnerability exists in ImageMagick and GraphicsMagick when software fails to parse the crafted image file properly. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.
  • Magento SQL Injection Vulnerability
     Severity:    
     Publish Date:  24 November 2016
    < div id="listDescVul"class="pane showpane noborder" >
    SQL injection vulnerability in Magento 1.9.1.0 CE and 1.14.1.0 EE allows remote attackers to execute arbitrary SQL commands.
  • OpenSSL SSL3_AL_WARNING Remote Denial Of Service Vulnerability (CVE-2016-8610)
     Severity:    
     Publish Date:  16 November 2016
    < div id="listDescVul"class="pane showpane noborder" >
    A denial of service flaw was found in the way the SSL/TLS protocol, defined processing of ALERT packets during an SSL handshake. An attacker could use this flaw to DoS servers compiled against cryptographic libraries, which do not allocate an extra thread to process ClientHello packets.