An elevation of privilege vulnerability exists in Microsoft Windows. The vulnerability is due to an error in the way windows kernel handles session objects in concurrent logins. Successful exploitation may lead to a malicious user gaining access to a victim user’s session.
Category Archives: Checkpoint
Checkpoint
Microsoft Windows Elevation of Privilege (MS16-111: CVE-2016-3373; CVE-2016-3373)
An elevation of privilege vulnerability exists in Microsoft Windows. A malicious user can bypass a security check in Windows to read and write registry hive files under a hidden registry hive which could enable an elevation of privilege. Successful exploitation could allow an attacker to run arbitrary code or access protected files with elevated privileges.
Microsoft Office Memory Corruption (MS16-107: CVE-2016-3362; CVE-2016-3362)
A remote code execution vulnerability exists in Microsoft Office. The vulnerability is due to an error in the way Microsoft Office improperly handles objects in memory while parsing specially crafted files. A remote attacker can exploit this issue by enticing a victim to open a specially crafted file.
Microsoft Windows GDI Component Information Disclosure (MS16-106: CVE-2016-3355; CVE-2016-3355)
An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory. A remote attacker could exploit this vulnerability by enticing a target user to open a malicious executable file. Successful exploitation of this issue can lead to local privilege escalation.
Microsoft Office Memory Corruption (MS16-107: CVE-2016-3358; CVE-2016-3358)
A remote code execution vulnerability exists in Microsoft Office. The vulnerability is due to an error in the way Microsoft Office improperly handles objects in memory while parsing specially crafted files. A remote attacker can exploit this issue by enticing a victim to open a specially crafted file.
Microsoft Office Memory Corruption (MS16-107: CVE-2016-3364; CVE-2016-3364)
A remote code execution vulnerability exists in Microsoft Office. The vulnerability is due to an error in the way Microsoft Office improperly handles objects in memory while parsing specially crafted files. A remote attacker can exploit this issue by enticing a victim to open a specially crafted file.
Microsoft Browser Information Disclosure (MS16-104: CVE-2016-3351; CVE-2016-3351)
An information disclosure vulnerability has been reported in Microsoft Internet Explorer and EDGE browsers. The vulnerability is due to improperly handling requests for module resources. A remote attacker can exploit this issue by enticing a user to open a specially crafted web-page with an affected version of Internet Explorer or EDGE.
PHP TAR File Parsing Uninitialized Reference (CVE-2016-4343)
An uninitialized reference vulnerability exists in PHP. A remote attacker can exploit this vulnerability by uploading a crafted TAR file to a vulnerable PHP application. A successful attack will result in remote code execution under the context of the service running PHP. Unsuccessful exploitation will cause the web application to terminate abnormally.
NewsGator FeedDemon Stack Buffer Overflow (CVE-2009-0546)
This module exploits a buffer overflow vulnerability in FeedDemon. When the application is used to import a specially crafted opml file, a buffer overflow occurs allowing arbitrary code execution.
FreeBSD bspatch Utility Remote Code Execution (CVE-2014-9862)
A remote code execution vulnerability has been reported in the bspatch utility in FreeBSD. The vulnerability is due to improper validation on the numbers of bytes to read from diff and extra stream values. A remote attacker can exploit this vulnerability by enticing the target user to download and apply a crafted patch file.