A memory corruption vulnerability exists in Adobe Acrobat and Reader. The vulnerability is due to an error while loading a PDF containing a malicious JavaScript code. A remote attacker may exploit this issue by enticing a target user to open a malicious PDF file with an affected version of Adobe Reader or Acrobat.
Category Archives: Checkpoint
Checkpoint
PHP 7 Unserialization Hash Table Resize Use After Free
A Use After Free vulnerability exists in PHP 7. A remote attacker can exploit this vulnerability by sending specially crafted input to the unserialize() function.
Adobe Flash Player Memory Corruption (APSB16-32: CVE-2016-6986; CVE-2016-6986)
A memory corruption vulnerability exists in Adobe Flash Player. The vulnerability is due to an error in Adobe Flash Player while parsing a specially crafted SWF file. A remote attacker can exploit this issue by enticing a victim to open a specially crafted SWF file.
Adobe Flash Player Memory Corruption (APSB16-32: CVE-2016-6982; CVE-2016-6982)
A memory corruption vulnerability exists in Adobe Flash Player. The vulnerability is due to an error in Adobe Flash Player while parsing a specially crafted SWF file. A remote attacker can exploit this issue by enticing a victim to open a specially crafted SWF file.
Adobe Flash Player Memory Corruption (APSB16-32: CVE-2016-6985; CVE-2016-6985)
A memory corruption vulnerability exists in Adobe Flash Player. The vulnerability is due to an error in Adobe Flash Player while parsing a specially crafted SWF file. A remote attacker can exploit this issue by enticing a victim to open a specially crafted SWF file.
Adobe Flash Player Use After Free Code Execution (APSB16-32: CVE-2016-6981; CVE-2016-6981)
A remote code execution vulnerability exists in Adobe Flash Player. The vulnerability is due to a use-after-free error in Adobe Flash Player while handling a specially crafted SWF file. A remote attacker can exploit this vulnerability by enticing a target user to open a specially crafted SWF file with an affected version of Flash Player.
PHP 7 Unserialization Malicious toString Remote Code Execution (CVE-2016-7478)
A Remote Code Execution vulnerability exists in PHP 7. A remote attacker can exploit this vulnerability by sending specially crafted input to the unserialize() function.
Adobe Acrobat and Reader Use After Free (APSB16-33: CVE-2016-6946; CVE-2016-6946)
A use after free vulnerability exists in Adobe Acrobat and Reader. The vulnerability is due to an error in the way Adobe Acrobat and Reader handles objects in memory. A remote attacker can exploit this vulnerability by enticing the user to open a specially crafted PDF file, potentially leading to to arbitrary code execution.
Microsoft Excel Files Containing Malicious Macro
Microsoft Excel files might contain a malicious macros. A remote attacker could send spam e-mails including those macros, and use social engineering in order to convince users to manually enable them. This would allow the malicious code to run and infect the target system.
Microsoft Windows Kernel Local Elevation of Privilege (MS16-124: CVE-2016-0079; CVE-2016-0079)
An elevation of privilege vulnerability exists in Microsoft Windows. The vulnerability is due to the way Windows kernel API improperly allows a user to access sensitive registry information. A remote attacker can exploit this vulnerability by enticing a user to run a specially crafted executable.