All Vulnerabilities

Joomla Component Arbitrary File Upload Shell Vulnerability
 Severity:    
 Date Published:  20 Oct 2016
Unrestricted file upload vulnerability in the Joomla Component allows remote attackers to execute arbitrary code by uploading a crafted file.
ISC BIND Response Handler Denial Of Service Vulnerability (CVE-2015-8000)
 Severity:    
 Date Published:  20 Oct 2016
A denial-of-service vulnerability has been reported in BIND. The vulnerability is due to improper parsing of incoming responses, allowing malformed records to be accepted by BIND when they should not be accepted. A remote, unauthenticated attacker could exploit this vulnerability against DNS servers that perform recursive queries by crafting responses with an improper class attribute. Successful exploitation could lead to denial-of service.
ISC BIND OpenPGP Key Handler Denial Of Service Vulnerability (CVE-2015-5986)
 Severity:    
 Date Published:  20 Oct 2016
A denial-of-service vulnerability exists in ISC BIND. The vulnerability is due to an incorrect boundary check, leading to a REQUIRE assertion failure in openpgpkey_61.c. A remote, unauthenticated attacker can exploit this vulnerability by sending crafted queries under certain circumstances. Successful exploitation will result in a denial of service condition.
Firefox toString console.time Privileged Javascript Injection Vulnerability
 Severity:    
 Date Published:  20 Oct 2016
The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6 does not prevent acquisition of chrome privileges during calls to content level constructors, which allows remote attackers to bypass certain read-only restrictions and conduct cross-site scripting (XSS) attacks via a crafted web site.
Cumulative Security Update Of ActiveX Kill Bits - January 2016
 Severity:    
 Date Published:  20 Oct 2016
This filter blocks the ActiveX control mentioned in the January 2016 security advisory of Microsoft for which new kill bits are added.
Adobe Flash Player Use After Free Vulnerability (CVE-2016-6987)
 Severity:    
 Date Published:  20 Oct 2016
Adobe Flash Player is prone to an use after free vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial of service condition.
Adobe Flash Player Use After Free Vulnerability (CVE-2016-6981)
 Severity:    
 Date Published:  20 Oct 2016
Adobe Flash Player is prone to an use after free vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial of service condition.
Adobe Flash Player Memory Corruption Vulnerability (CVE-2016-6986)
 Severity:    
 Date Published:  20 Oct 2016
Adobe Flash Player is prone to a memory corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the application.
Adobe Flash Player Memory Corruption Vulnerability (CVE-2016-6985)
 Severity:    
 Date Published:  20 Oct 2016
Adobe Flash Player is prone to a memory corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the application.

Featured Stories