All Vulnerabilities

It is possible to delete arbitrary files on a web server by using ImageMagick's 'ephemeral' pseudo protocol, which deletes files after reading.
Adobe Acrobat And Reader Use After Free Vulnerability (CVE-2016-1070)
 Severity:    
 Date Published:  24 Aug 2016
Adobe Acrobat and Reader is prone to a use after free vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial of service condition.
A remote code execution vulnerability exists in Microsoft Windows Graphics Component when it improperly handles specially crafted EMF files. An attacker who successfully exploited this vulnerability could cause arbitrary code to execute in the context of the current user.
Adobe Acrobat And Reader Use After Free Vulnerability (CVE-2016-1046)
 Severity:    
 Date Published:  24 Aug 2016
Adobe Acrobat and Reader are prone to a use after free vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial of service condition.
Adobe Acrobat And Reader Security Bypass Vulnerability (CVE-2016-1039)
 Severity:    
 Date Published:  24 Aug 2016
Adobe Acrobat and Reader are prone to a security bypass vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial of service condition.
A remote code execution vulnerability exists in Windows due to the way Windows Uniscribe handles objects in memory. An attacker who successfully exploited these vulnerabilities could obtain information to further compromise the user's system.
A remote code execution vulnerability exists in Windows due to the way Windows Uniscribe handles objects in memory. An attacker who successfully exploited these vulnerabilities could obtain information to further compromise the user's system.
A remote code execution vulnerability exists in Windows due to the way Windows Uniscribe handles objects in memory. An attacker who successfully exploited these vulnerabilities could obtain information to further compromise the user's system.
A remote code execution vulnerability exists in Windows due to the way Windows Uniscribe handles objects in memory. An attacker who successfully exploited these vulnerabilities could obtain information to further compromise the user's system.
A remote code execution vulnerability exists in Windows due to the way Windows Uniscribe handles objects in memory. An attacker who successfully exploited these vulnerabilities could obtain information to further compromise the user's system.