A remote code execution vulnerability has been reported in Microsoft Windows Graphics Component. The vulnerability is due to the improper handling of objects in the memory.A remote attackers could exploit this vulnerability by enticing users to view a specially crafted web page, or a document file. Successful exploitation would allow the attacker to execute arbitrary code in the context of the system.
Category Archives: Checkpoint
Checkpoint
ASUSWRT LAN Backdoor Remote Command Execution (CVE-2014-9583)
A remote command execution vulnerability exists in Asuswrt. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary commands on the affected system.
Adobe IExternalizable Interface Use After Free Code Execution (CVE-2016-7855)
A Use After Free vulnerability exists in Adobe IExternalizable Interface. The vulnerability is due to a reuse of a freed Adobe Acrobat and Reader handles objects in memory. A remote attacker can exploit this vulnerability by enticing the user to open a specially crafted SWF file.
PHP 7 Uninitialized Value Remote Code Execution
A Remote Code Execution vulnerability exists in PHP 7. A remote attacker can exploit this vulnerability by sending specially crafted input to the inf variable.
Transport Layer Security (TLS) Version 1.1
Transport Layer Security (TLS) is a cryptographic protocol meant to provide security and data integrity for communications over TCP/IP networks. TLSv1.1 is considered obsolete and insecure, and is deprecated in favor of a more advanced TLS protocol. This protection will detect and block any use of TLSv1.1 protocol.
Transport Layer Security (TLS) Version 1.0
Transport Layer Security (TLS) is a cryptographic protocol meant to provide security and data integrity for communications over TCP/IP networks. TLSv1.0 is considered obsolete and insecure, and is deprecated in favor of a more advanced TLS protocol. This protection will detect and block any use of TLSv1.0 protocol.
Transport Layer Security (TLS) Version 1.2
Transport Layer Security (TLS) is a cryptographic protocol meant to provide security and data integrity for communications over TCP/IP networks. This protection will detect and block any use of TLSv1.2 protocol.
PHP 7 Unserialization Exception Infinite Loop Denial of Service (CVE-2016-7479)
A Denial of Service vulnerability exists in PHP 7. A remote attacker can exploit this vulnerability by sending specially crafted input to the unserialize() function.
Adobe Reader and Acrobat Memory Corruption (APSB16-33: CVE-2016-6960; CVE-2016-6960)
A memory corruption vulnerability exists in Adobe Acrobat and Reader. The vulnerability is due to an error while loading a PDF containing a malicious JavaScript code. A remote attacker may exploit this issue by enticing a target user to open a malicious PDF file with an affected version of Adobe Reader or Acrobat.
PHP 7 Unserialization Hash Table Resize Use After Free
A Use After Free vulnerability exists in PHP 7. A remote attacker can exploit this vulnerability by sending specially crafted input to the unserialize() function.