All Vulnerabilities

WordPress Core Ajax Handlers Path Traversal Vulnerability
 Severity:    
 Date Published:  21 Sep 2016
WordPress Core is prone to a directory traversal vulnerability. A successful exploit of this vulnerability could allow attackers to read arbitrary files on the computer.
WordPress All In One SEO Pack Plugin Persistent XSS Vulnerability
 Severity:    
 Date Published:  21 Sep 2016
A cross-site scripting (XSS) vulnerability exists in All In One SEO Pack plugin, used in WordPress, allow remote attackers to execute same-origin JavaScript functions via crafted parameter.
WordPress Activity Log Plugin Cross-Site Scripting Vulnerability
 Severity:    
 Date Published:  21 Sep 2016
A cross-site scripting (XSS) vulnerability exists in WordPress Activity Log plugin, allow remote attackers to execute same-origin JavaScript functions via crafted parameter. A successful attack could lead sensitive information disclosure.
SAP NetWeaver Java AS Multiple XSS Vulnerabilities
 Severity:    
 Date Published:  21 Sep 2016
SAP NetWeaver 7.4 is prone to a cross-site scripting vulnerability. An anonymous attacker can use a special HTTP request to hijack session data of administrators or users of the web resource.
Nagios XI 'nagiosim.php' SQL Injection Vulnerability
 Severity:    
 Date Published:  21 Sep 2016
Nagios XI is prone to a SQL injection vulnerability. A remote, unauthenticated attacker can exploit this vulnerability by sending an HTTP request with a malicious SQL query to the target server. Successful exploitation could lead to the disclosure of sensitive information from the database such as API keys for administrative users.
Joomla SecurityCheck SQL Injection Vulnerability
 Severity:    
 Date Published:  21 Sep 2016
SQL injection vulnerability in Joomla SecurityCheck extension allows attackers to execute arbitrary SQL commands via unspecified vectors.
Joomla com_threate SQL Injection Vulnerability
 Severity:    
 Date Published:  21 Sep 2016
SQL injection vulnerability in Joomla allows attackers to execute arbitrary SQL commands via unspecified vectors.
A file name information disclosure vulnerability was discovered within Internet Explorer. The issue lies in the fact that Internet Explorer's behavior changes when dealing with URIs that point to existing local files versus URIs that point to non-existent files. It allows malicious pages to enumerate the existence of files in the victim's file system. This vulnerability was triggered only by local pages or ones opened from a network share.
Adobe Flash Player Use After Free Vulnerability (CVE-2016-4227)
 Severity:    
 Date Published:  21 Sep 2016
Adobe Flash Player is prone to a use after free vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial of service condition.
Microsoft Edge Memory Corruption Vulnerability (CVE-2016-0191)
 Severity:    
 Date Published:  21 Sep 2016
Microsoft Edge is prone to an unspecified memory corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected application.

Featured Stories