A memory corruption vulnerability has been reported in Adobe Flash Player. The vulnerability is due to an error in Adobe Flash Player while parsing a specially crafted SWF file. A remote attacker can exploit this issue by enticing a victim to open a specially crafted SWF file.
Category Archives: Checkpoint
Checkpoint
Adobe Flash Player Type Confusion (APSB16-29: CVE-2016-4280; CVE-2016-4280)
A remote code execution vulnerability has been reported in Adobe Flash Player. The vulnerability is due to a type confusion condition while handling a malformed SWF file. A remote attacker can exploit this issue by enticing a victim to open a specially crafted SWF file. Successful exploitation would allow an attacker to execute arbitrary code on the target.
Adobe Flash Player Memory Corruption (APSB16-29: CVE-2016-4276; CVE-2016-4276)
A memory corruption vulnerability exists in Adobe Flash Player. The vulnerability is due to an error in Adobe Flash Player while parsing a specially crafted SWF file. A remote attacker can exploit this issue by enticing a victim to open a specially crafted SWF file.
Adobe Flash Player Security Bypass (APSB16-29: CVE-2016-4277; CVE-2016-4277)
A security bypass vulnerability exists in Adobe Flash Player. The vulnerability is due to insufficient security restrictions while handling specially crafted URL of a HTTP request to SWF file. Successful exploitation could lead to information disclosure.
Adobe Flash Player Memory Corruption (APSB16-29: CVE-2016-4281; CVE-2016-4281)
A memory corruption vulnerability exists in Adobe Flash Player. The vulnerability is due to an error in Adobe Flash Player while parsing a specially crafted SWF file. A remote attacker can exploit this issue by enticing a victim to open a specially crafted SWF file.
Suspicious Microsoft Publisher Mail Attachment
Microsoft Office Publisher files might contain a malicious downloader. A remote attacker could send spam e-mails including those downloaders, and use social engineering in order to convince users to manually enable them. This would allow the malicious code to run and infect the target system.
MySQL Remote Root Code Execution (CVE-2016-6662)
A code execution vulnerability exists in MySQL database server. Successful exploitation could allow a remote attacker to shut down the database, modify its content, or execute arbitrary code on the affected servers.
Microsoft Browser Information Disclosure (MS16-104: CVE-2016-3351; CVE-2016-3351)
An information disclosure vulnerability has been reported in Microsoft Internet Explorer and EDGE browsers. The vulnerability is due to improperly handling requests for module resources. A remote attacker can exploit this issue by enticing a user to open a specially crafted web-page with an affected version of Internet Explorer or EDGE.
Microsoft Windows Elevation of Privilege (MS16-111: CVE-2016-3306; CVE-2016-3306)
An elevation of privilege vulnerability exists in Microsoft Windows Server. The vulnerability is caused when Microsoft Windows fails to handle executable programs being ran by two users. A remote attacker can exploit this issue by enticing a victim to run a specially crafted file.
Linux Kernel x86-64 IA32SysCall Privilege Escalation (CVE-2010-3301)
An old vulnerability has been reintroduced in certain versions of the Linux Kernel that could be exploited by local unprivileged users to elevate their default system designated privileges to the higher kernel level privileges. The vulnerability is due to an error that kernel does not zero-extend x86_64 registers in the 32bit entry path on x86_64 platforms. An attacker could elevate their local privilege resulting in a privilege escalation.