All Vulnerabilities

Microsoft .NET framework is prone to a memory corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the application.
Microsoft .NET Framework and Silverlight do not properly validate arguments to unspecified networking API functions, which allows remote attackers to execute arbitrary code via a crafted XAML browser application or crafted .NET Framework application.
Joomla com_registrationpro SQL injection Vulnerability
 Severity:    
 Date Published:  07 Sep 2016
An SQL injection vulnerability has been detected in Joomla Event Registration Pro extension which allows attackers to execute arbitrary SQL commands via unknown parameters.
Buffer overflow in the Cookie parser in Fortinet FortiOS 4.x before 4.1.11, 4.2.x before 4.2.13, and 4.3.x before 4.3.9 and FortiSwitch before 3.4.3 allows remote attackers to execute arbitrary code via a crafted HTTP request, aka EGREGIOUSBLUNDER.
Adobe Flash Player Use After Free Vulnerability (CVE-2016-0959)
 Severity:    
 Date Published:  07 Sep 2016
Adobe Flash Player is prone to a use after free vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial of service condition.
Adobe Acrobat And Reader Memory Corruption Vulnerability (CVE-2016-1082)
 Severity:    
 Date Published:  07 Sep 2016
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial of service states.
Adobe Acrobat And Reader Memory Corruption Vulnerability (CVE-2016-1081)
 Severity:    
 Date Published:  07 Sep 2016
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial of service states.
Adobe Acrobat And Reader Memory Corruption Vulnerability (CVE-2016-1076)
 Severity:    
 Date Published:  07 Sep 2016
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial of service states.
Adobe Acrobat And Reader Memory Corruption Vulnerability (CVE-2016-1074)
 Severity:    
 Date Published:  07 Sep 2016
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial of service states.
Adobe Acrobat And Reader Memory Corruption Vulnerability (CVE-2016-1072)
 Severity:    
 Date Published:  07 Sep 2016
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial of service states.