A remote code execution vulnerability exists in Microsoft PowerPoint. The vulnerability is due to a use-after-free error in Microsoft PowerPoint while handling a specially crafted PPT file. A remote attacker can exploit this vulnerability by enticing a target user to open a specially crafted PPT file.
Category Archives: Checkpoint
Checkpoint
IBM WebSphere WASPostParam cookie Untrusted Java Deserialization (CVE-2016-5983)
A remote code execution vulnerability has been reported in IBM WebSphere. The vulnerability is due to an untrusted deserialization of data when the WASPostParam cookie is present in the request. A remote, authenticated attacker can exploit this vulnerability by sending a request containing a malicious WASPostParam value to the target server.
Microsoft Browser Memory Corruption (MS16-142: CVE-2016-7195; CVE-2016-7195)
A remote code execution vulnerability has been reported in Microsoft Internet Explorer. The vulnerability is due to handling HTML classid attributes. A remote attacker can exploit this issue by enticing a target victim to open a specially crafted web page. Successful exploitation could cause memory corruption in a way that would allow attackers to execute code on the target.
Microsoft Browser Remote Code Execution (MS16-129: CVE-2016-7241; CVE-2016-7241)
A remote code execution vulnerability exists in Microsoft Edge. The vulnerability is due to the way that objects are handled in memory. A remote unauthenticated attacker could exploit this vulnerability by enticing the target user to open a specially crafted web page.
HPE Network Automation RMI Registry Insecure Deserialization (CVE-2016-4385)
An insecure deserialization vulnerability has been reported in the RMI registry of HPE Network Automation. The vulnerability is due to the deserialization of untrusted data. A remote attacker can exploit this vulnerability by sending a request with crafted serialized data to the exposed RMI registry. Successful exploitation would result in the execution of arbitrary code under the context of the RMI registry process.
Microsoft Windows Open Type Font Information Disclosure (MS16-132: CVE-2016-7210; CVE-2016-7210)
An information disclosure vulnerability has been reported in Microsoft Windows. The vulnerability is due to an error in the way the Open Type Font (OTF) driver handles objects in memory. A remote attacker could exploit this vulnerability by enticing a target user to open a specially crafted OTF file.
Microsoft Windows File Manager Remote Code Execution (MS16-130: CVE-2016-7212; CVE-2016-7212)
An remote code execution vulnerability exists within Microsoft Windows. The vulnerability is due to an error in parsing a malformed JPG file. A remote attacker can exploit this issue by enticing a target victim to open a specially crafted JPG file.
Black Hole Exploit Kit Website Redirection
Black Hole Exploit Kit exploit kit is a web exploit kit that operates by delivering malicious payload to the victim’s computer. Remote attackers can infect users with Black Hole EK by redirecting them to a malicious web page. Successful infection will allow the attacker to download additional malware to the target.
Joomla Core Unauthorized Account Creation (CVE-2016-8870)
A vulnerability exists in Joomla Core. The vulnerability is due to insufficient validation during user registration. Unauthorized attackers can remotly exploit this vulnerability to create any account in a Joomla system.
Joomla Core Privilege Escalation (CVE-2016-8869)
A privilege escalation vulnerability exists in Joomla Core. Unauthorized remote attackers may leverage this vulnerability to gain administrative access to the vulnerable server.