All Vulnerabilities

Adobe Reader DC Memory Corruption Vulnerability (CVE-2016-1077)
 Severity:    
 Date Published:  15 Sep 2016
Adobe Acrobat and Reader is prone to a memory corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial of service condition.
Adobe Acrobat and Reader are prone to an information disclosure vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial of service states.
Adobe Acrobat and Reader are prone to an information disclosure vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial of service states.
Adobe Flash Player Use After Free Vulnerability (CVE-2016-4231)
 Severity:    
 Date Published:  15 Sep 2016
Adobe Flash Player is prone to a use after free vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial of service condition.
Adobe Flash Player Sensitive Data Exposure Vulnerability (CVE-2016-4232)
 Severity:    
 Date Published:  15 Sep 2016
Adobe Flash Player is prone to an unspecified sensitive data exposure vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial of service states.
WordPress Fastest Cache Plugin Local File Inclusion Vulnerability
 Severity:    
 Date Published:  15 Sep 2016
Fastest Cache WordPress plugin is vulnerable to Local File Inclusion vulnerability.An attacker can exploit this issue to run arbitrary PHP code on the target system.
WordPress Email Users Plugin Cross Site Scripting Vulnerability
 Severity:    
 Date Published:  15 Sep 2016
A Cross-Site Scripting vulnerability was found in the Email Users WordPress Plugin. This vulnerability allows an attacker to perform a actions such as stealing Administrators' session tokens. An attacker has to lure the user into opening a malicious website to exploit this vulnerability.
WordPress Easy Forms For MailChimp Local File Inclusion Vulnerability
 Severity:    
 Date Published:  15 Sep 2016
Easy Forms for MailChimp WordPress plugin is vulnerable to Local File Inclusion vulnerability.An attacker can exploit this issue to run arbitrary PHP code on the target system.
WordPress Cross-Site Scripting (XSS) Vulnerability
 Severity:    
 Date Published:  15 Sep 2016
Multiple cross-site scripting (XSS) vulnerabilities in wp-includes/class-wp-theme.php in WordPress before 4.4.1 allow remote attackers to inject arbitrary web script or HTML via a (1) stylesheet name or (2) template name to wp-admin/customize.php. References
WordPress Contact Form To Email Plugin Cross Site Scripting Vulnerability
 Severity:    
 Date Published:  15 Sep 2016
A reflected Cross Site Scripting (XSS) vulnerability has been found in the Contact Form to Email WordPress Plugin. By using this vulnerability an attacker can inject malicious JavaScript code into the application, which will execute within the browser of any logged-in admin who views the page with injected code.