All Vulnerabilities

An information disclosure vulnerability exists when Internet Explorer and Microsoft Edge improperly discloses the contents of its memory. An attacker could use the vulnerability to gain information about the system that could be combined with other attacks to compromise the system.
Adobe Acrobat And Reader Security Bypass Vulnerability (CVE-2016-1038)
 Severity:    
 Date Published:  24 Aug 2016
Adobe Acrobat and Reader are prone to a security bypass vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial of service condition.
A remote code execution vulnerability exists in Microsoft Windows Graphics Component when it improperly handles specially crafted EMF files. An attacker who successfully exploited this vulnerability could cause arbitrary code to execute in the context of the current user.
Adobe Acrobat And Reader Use After Free Vulnerability (CVE-2016-1046)
 Severity:    
 Date Published:  24 Aug 2016
Adobe Acrobat and Reader are prone to a use after free vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial of service condition.
Adobe Acrobat And Reader Security Bypass Vulnerability (CVE-2016-1039)
 Severity:    
 Date Published:  24 Aug 2016
Adobe Acrobat and Reader are prone to a security bypass vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial of service condition.
A remote code execution vulnerability exists in Windows due to the way Windows Uniscribe handles objects in memory. An attacker who successfully exploited these vulnerabilities could obtain information to further compromise the user's system.
A remote code execution vulnerability exists in Windows due to the way Windows Uniscribe handles objects in memory. An attacker who successfully exploited these vulnerabilities could obtain information to further compromise the user's system.
A remote code execution vulnerability exists in Windows due to the way Windows Uniscribe handles objects in memory. An attacker who successfully exploited these vulnerabilities could obtain information to further compromise the user's system.
A remote code execution vulnerability exists in Windows due to the way Windows Uniscribe handles objects in memory. An attacker who successfully exploited these vulnerabilities could obtain information to further compromise the user's system.
A remote code execution vulnerability exists in Windows due to the way Windows Uniscribe handles objects in memory. An attacker who successfully exploited these vulnerabilities could obtain information to further compromise the user's system.