Category Archives: Checkpoint

Checkpoint

HPE Network Automation RMI Registry Insecure Deserialization (CVE-2016-4385)

An insecure deserialization vulnerability has been reported in the RMI registry of HPE Network Automation. The vulnerability is due to the deserialization of untrusted data. A remote attacker can exploit this vulnerability by sending a request with crafted serialized data to the exposed RMI registry. Successful exploitation would result in the execution of arbitrary code under the context of the RMI registry process.

Black Hole Exploit Kit Website Redirection

Black Hole Exploit Kit exploit kit is a web exploit kit that operates by delivering malicious payload to the victim’s computer. Remote attackers can infect users with Black Hole EK by redirecting them to a malicious web page. Successful infection will allow the attacker to download additional malware to the target.