A vulnerability in the Winbox service in MikroTik RouterOS 5.15 and earlier allows remote attackers to cause a denial of service (CPU consumption), read the router version, and possibly have additional impact via a request to download the router’s DLLs or plugins.
Category Archives: Checkpoint
Checkpoint
Netsparker Web Scanner
A reconnaissance tool is designed to gather information from servers. Such scans might indicate an attempt to disclose sensitive information. Remote attackers can use Netsparker to detect vulnerabilities on a target server.
Memcached process_bin_append_prepend Integer Overflow (CVE-2016-8704)
An integer overflow vulnerability exists in memcached. This vulnerability is due to a lack of bounds checking in the process_bin_append_prepend function while processing commands that append or prepend data to existing key-value pairs. A remote unauthenticated attacker can exploit these vulnerabilities by sending a specially crafted packet to memcached.
Imagemagick Compressed TIFF File Conversion Remote Code Execution (CVE-2016-8707)
An out-of-bounds write vulnerability exists in ImageMagick’s convert utility. The vulnerability is due to improper handling of TIFF image data when deflating an Adobe Deflate compressed TIFF image.A remote attacker could exploit this vulnerability by providing a specially crafted TIFF image to a target.
PHPMailer Mail Form Remote Code Execution (CVE-2016-10033)
A remote code execution vulnerability exists in PHPMailer. The vulnerability is due to lack of email address validation. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected system.
Mikrotik Router Remote Denial Of Service (CVE-2012-6050)
A vulnerability in the Winbox service in MikroTik RouterOS 5.15 and earlier allows remote attackers to cause a denial of service (CPU consumption), read the router version, and possibly have additional impact via a request to download the router’s DLLs or plugins.
WooCommerce Tax Rates Cross-Site Scripting
A cross-site scripting vulnerability exists in the WooCommerce WordPress plugin. This vulnerability is triggered when the WooCommerce tax rates setting incorrectly processes user-supplied data. A remote attacker may exploit this vulnerability by uploading a malicious .csv file into the application. The file then injects malicious code triggering the attack, thereby allowing the attacker to gain full control of the web server.
FreePBX Framework remotemod Parameter Remote Command Execution
A remote command execution vulnerability exists in FreePBX. The vulnerability is due to lack of sanitization for ‘remotemod’ parameter. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary command in the security context of the affected service.
OpenSSL tls_get_message_body Function init_msg Structure Use After Free (CVE-2016-6309)
A use-after-free vulnerability has been reported in the tls_get_message_body function of OpenSSL. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted message to the vulnerable server. Successful exploitation allows the attacker to execute arbitrary code on the system.
Memcached process_bin_update body_len Integer Overflow (CVE-2016-8705)
An integer overflow vulnerability exists in memcached. This vulnerability is due to an integer overflow in the process_bin_update() function while processing multiple commands and the body_len parameter of a Memcached binary protocol packet. A remote unauthenticated attacker can exploit these vulnerabilities by sending a specially crafted packet to memcached. This can lead to a buffer overflow and possible code execution in the context of the user. If code execution is unsuccessful, a denial of service condition may result.