In August, Facebook introduced a hugely controversial data sharing plan to start harvesting data from its WhatsApp messaging app from September 25 for delivering more relevant ads on the social network.
Many users were not happy with the move, because there was no real way of opting out from the data sharing – WhatsApp users could only do so within a short period – and even if users did opt
A remote code execution vulnerability exists in Microsoft PowerPoint. The vulnerability is due to a use-after-free error in Microsoft PowerPoint while handling a specially crafted PPT file. A remote attacker can exploit this vulnerability by enticing a target user to open a specially crafted PPT file.
An elevation of privilege vulnerability exists in Microsoft Windows. The vulnerability is due to improper handling of objects in memory. The attacker must entice the victim to run an executable file to exploit this vulnerability.
A memory corruption vulnerability has been reported in Microsoft Edge. The vulnerability is due to improper handling of objects in memory. A remote attacker could exploit the vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
A memory corruption vulnerability exists in Microsoft Windows. The vulnerability is due to an error in the way the Windows Animation Manager handles objects in memory. A remote attacker could exploit this vulnerability by enticing a target user to open a malicious webpage.
An remote code execution vulnerability exists within Microsoft Windows. The vulnerability is due to an error in parsing a malformed JPG file. A remote attacker can exploit this issue by enticing a target victim to open a specially crafted JPG file.
An information disclosure vulnerability has been reported in Microsoft Windows. The vulnerability is due to an error in the way the Open Type Font (OTF) driver handles objects in memory. A remote attacker could exploit this vulnerability by enticing a target user to open a specially crafted OTF file.
An insecure deserialization vulnerability has been reported in the RMI registry of HPE Network Automation. The vulnerability is due to the deserialization of untrusted data. A remote attacker can exploit this vulnerability by sending a request with crafted serialized data to the exposed RMI registry. Successful exploitation would result in the execution of arbitrary code under the context of the RMI registry process.
A remote code execution vulnerability exists in Microsoft Edge. The vulnerability is due to the way that objects are handled in memory. A remote unauthenticated attacker could exploit this vulnerability by enticing the target user to open a specially crafted web page.
A remote code execution vulnerability has been reported in Microsoft Internet Explorer. The vulnerability is due to handling HTML classid attributes. A remote attacker can exploit this issue by enticing a target victim to open a specially crafted web page. Successful exploitation could cause memory corruption in a way that would allow attackers to execute code on the target.