An information disclosure vulnerability has been reported in Windows Crypto driver running in kernel mode improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user system.
Monthly Archives: December 2016
Microsoft Edge Memory Corruption (MS16-145: CVE-2016-7286; CVE-2016-7286)
A remote code execution vulnerability exists in Microsoft Edge. The vulnerability is due to a memory corruption when handling certain objects in JavaScript. A remote attacker can exploit this issue by enticing a target victim to open a specially crafted web page that could cause memory corruption in a way that would allow attackers to execute code on the target system.
Microsoft Browser Information Disclosure (MS16-145: CVE-2016-7280; CVE-2016-7280)
An information disclosure vulnerability was discovered in Microsoft Edge. The vulnerability is due to an improper content validation under specific conditions in Microsoft Browser XSS Filter. An attacker who exploited the vulnerability could run arbitrary JavaScript that could lead to an information disclosure.
Squid Proxy ESI Response Processing Denial of Service (CVE-2016-4555)
A denial of service vulnerability has been reported in the Edge Side Includes (ESI) component of the Squid proxy. The vulnerability is due to incorrect pointer handling when processing ESI responses. A remote attacker could exploit this vulnerability by sending crafted ESI response data to the target system.
Microsoft Windows Win32k Elevation of Privilege (MS16-151: CVE-2016-7259; CVE-2016-7259)
An elevation of privilege vulnerability exists in Microsoft Windows. The vulnerability is caused when the Windows kernel-mode fails to properly handle objects in memory. Successful exploitation would lead to write access violation.
Microsoft Office Memory Corruption (MS16-148: CVE-2016-7289; CVE-2016-7289)
An Out-of-Bounds-Read vulnerability exists in Microsoft Office. The vulnerability is due to an error in the way Microsoft Office improperly handles objects in memory while parsing specially crafted files. A remote attacker can exploit this vulnerability by enticing a victim to open a specially crafted file that could grant an attacker remote code execution.
Microsoft Windows Installer Elevation of Privilege (MS16-149: CVE-2016-7292; CVE-2016-7292)
An elevation of privilege vulnerability exists in the Windows Installer. The vulnerability is due to the Windows Installer failing to properly sanitize input leading to an insecure library loading behavior. A attacker could run arbitrary code with elevated system privileges.
Microsoft Windows Uniscribe Remote Code Execution (MS16-147: CVE-2016-7274; CVE-2016-7274)
A remote code execution vulnerability exists in Microsoft Windows. The vulnerability is due to the way Windows Uniscribe handles objects in the memory. A remote attacker can exploit this vulnerability by enticing the target user to open a specially crafted ttf file.
TP-LINK TD-W8151N Denial Of Service
TP-LINK TD-W8151N suffers from a denial of service vulnerability.
Kaspersky Lab Threat Review for 2016: servers for sale, global botnets and a strong focus on mobile
In 2016, the world’s biggest cyber threats were related to money, information and a desire to disrupt.