A remote code execution vulnerability has been reported in Microsoft Internet Explorer. The vulnerability is due to handling HTML classid attributes. A remote attacker can exploit this issue by enticing a target victim to open a specially crafted web page. Successful exploitation could cause memory corruption in a way that would allow attackers to execute code on the target.
Category Archives: Checkpoint
Checkpoint
Microsoft Browser Remote Code Execution (MS16-129: CVE-2016-7241; CVE-2016-7241)
A remote code execution vulnerability exists in Microsoft Edge. The vulnerability is due to the way that objects are handled in memory. A remote unauthenticated attacker could exploit this vulnerability by enticing the target user to open a specially crafted web page.
HPE Network Automation RMI Registry Insecure Deserialization (CVE-2016-4385)
An insecure deserialization vulnerability has been reported in the RMI registry of HPE Network Automation. The vulnerability is due to the deserialization of untrusted data. A remote attacker can exploit this vulnerability by sending a request with crafted serialized data to the exposed RMI registry. Successful exploitation would result in the execution of arbitrary code under the context of the RMI registry process.
Microsoft Windows Open Type Font Information Disclosure (MS16-132: CVE-2016-7210; CVE-2016-7210)
An information disclosure vulnerability has been reported in Microsoft Windows. The vulnerability is due to an error in the way the Open Type Font (OTF) driver handles objects in memory. A remote attacker could exploit this vulnerability by enticing a target user to open a specially crafted OTF file.
Microsoft Windows File Manager Remote Code Execution (MS16-130: CVE-2016-7212; CVE-2016-7212)
An remote code execution vulnerability exists within Microsoft Windows. The vulnerability is due to an error in parsing a malformed JPG file. A remote attacker can exploit this issue by enticing a target victim to open a specially crafted JPG file.
Microsoft Windows Animation Manager Memory Corruption (MS16-132: CVE-2016-7205; CVE-2016-7205)
A memory corruption vulnerability exists in Microsoft Windows. The vulnerability is due to an error in the way the Windows Animation Manager handles objects in memory. A remote attacker could exploit this vulnerability by enticing a target user to open a malicious webpage.
Microsoft Edge Memory Corruption (MS16-132: CVE-2016-7217; CVE-2016-7217)
A memory corruption vulnerability has been reported in Microsoft Edge. The vulnerability is due to improper handling of objects in memory. A remote attacker could exploit the vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Black Hole Exploit Kit Website Redirection
Black Hole Exploit Kit exploit kit is a web exploit kit that operates by delivering malicious payload to the victim’s computer. Remote attackers can infect users with Black Hole EK by redirecting them to a malicious web page. Successful infection will allow the attacker to download additional malware to the target.
Joomla Core Unauthorized Account Creation (CVE-2016-8870)
A vulnerability exists in Joomla Core. The vulnerability is due to insufficient validation during user registration. Unauthorized attackers can remotly exploit this vulnerability to create any account in a Joomla system.
Joomla Core Privilege Escalation (CVE-2016-8869)
A privilege escalation vulnerability exists in Joomla Core. Unauthorized remote attackers may leverage this vulnerability to gain administrative access to the vulnerable server.