All Vulnerabilities

Adobe Acrobat And Reader Memory Corruption Vulnerability (CVE-2016-6943)
 Severity:    
 Date Published:  20 Oct 2016
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat And Reader Memory Corruption Vulnerability (CVE-2016-6942)
 Severity:    
 Date Published:  20 Oct 2016
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat And Reader Memory Corruption Vulnerability (CVE-2016-6940)
 Severity:    
 Date Published:  20 Oct 2016
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat And Reader Heap Overflow Vulnerability (CVE-2016-6939)
 Severity:    
 Date Published:  20 Oct 2016
Adobe Acrobat and Reader are prone to an unspecified heap overflow vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Microsoft Office Memory Corruption Vulnerability (CVE-2016-3316)
 Severity:    
 Date Published:  20 Oct 2016
A memory corruption vulnerability exists in Microsoft Office. An attacker who successfully exploited this vulnerability could use a specially crafted file to perform remote code execution in the security context of the current user.
Microsoft Windows RPC Downgrade Vulnerability (CVE-2016-0128)
 Severity:    
 Date Published:  20 Oct 2016
An elevation of privilege vulnerability exists in the Security Account Manager (SAM) and Local Security Authority (Domain Policy) (LSAD) remote protocols when they accept authentication levels that do not protect the RPC channel adequately. An attacker who successfully exploited this vulnerability could gain access to the SAM database.
Microsoft Windows PDF Remote Code Execution Vulnerability (CVE-2016-3203)
 Severity:    
 Date Published:  20 Oct 2016
A remote code execution vulnerability exists in Microsoft Windows PDF. An attacker who successfully exploited this vulnerability could cause arbitrary code to execute in the context of the current user.
Apache Traffic Server 2.0.x and 3.0.x before 3.0.4 and 3.1.x before 3.1.3 does not properly allocate heap memory, which allows remote attackers to cause a denial of service (daemon crash) via a long HTTP Host header.
Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname.
Joomla Core Remote Code Execution Vulnerability (CVE-2015-8562)
 Severity:    
 Date Published:  20 Oct 2016
Joomla is prone to a vulnerability that allow remote attacker to execute the arbitrary code, as application fails to sanitize user-supplied input. An attacker can leverage this issue to obtain sensitive information, modify data or upload web shell.