All Vulnerabilities

Joomla Topics SQL Injection Vulnerability
 Severity:    
 Date Published:  24 Nov 2016
SQL injection vulnerability in Joomla allows attackers to execute arbitrary SQL commands via unspecified vectors.
Identified Suspicious Command Injection Attack
 Severity:    
 Date Published:  24 Nov 2016
Command injection is an attack technique that allows an attacker to inject and execute commands in the vulnerable application. An attacker can exploit command injection vulnerability with a command sequence appended to the appropriate format or escape string to execute arbitrary commands. Successful exploitation results in a system compromise, disclosure or modification of data.
Identified Suspicious Command Injection Attack
 Severity:    
 Date Published:  24 Nov 2016
Command injection is an attack technique that allows an attacker to inject and execute commands in the vulnerable application. An attacker can exploit command injection vulnerability with a command sequence appended to the appropriate format or escape string to execute arbitrary commands. Successful exploitation results in a system compromise, disclosure or modification of data.
vbscript.dll in Microsoft VBScript 5.6 through 5.8, as used with Internet Explorer 6 through 11 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "VBScript Memory Corruption Vulnerability."
Multiple elevation of privilege vulnerabilities exist when the Windows VHDMP kernel driver fails to properly handle user access to certain files. An attacker who successfully exploited the vulnerabilities could manipulate files in locations not intended to be available to the user.
Multiple elevation of privilege vulnerabilities exist when the Windows VHDMP kernel driver fails to properly handle user access to certain files. An attacker who successfully exploited the vulnerabilities could manipulate files in locations not intended to be available to the user.
Multiple elevation of privilege vulnerabilities exist when the Windows VHDMP kernel driver fails to properly handle user access to certain files. An attacker who successfully exploited the vulnerabilities could manipulate files in locations not intended to be available to the user.
A remote code execution vulnerability exists in ImageMagick and GraphicsMagick when software fails to parse the crafted image file properly. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.
Magento SQL Injection Vulnerability
 Severity:    
 Date Published:  24 Nov 2016
SQL injection vulnerability in Magento 1.9.1.0 CE and 1.14.1.0 EE allows remote attackers to execute arbitrary SQL commands.
A denial of service flaw was found in the way the SSL/TLS protocol, defined processing of ALERT packets during an SSL handshake. An attacker could use this flaw to DoS servers compiled against cryptographic libraries, which do not allocate an extra thread to process ClientHello packets.