Category Archives: Checkpoint

Checkpoint

HPE Data Protector EXEC_BAR domain Buffer Overflow (CVE-2016-2006)

A buffer overflow vulnerability has been found in the Omnilnet.exe component of HPE Data Protector. This vulnerability is due to lack of boundary checks on the domain field in EXEC_BAR requests. A remote, unauthenticated attacker could exploit this vulnerability by sending malformed requests to a HPE Data Protector service potentially leading to arbitrary code execution under the context of System.

Command Injection Over HTTP

A command Injection over HTTP vulnerability has been reported. A remote attacker can exploit this issue by sending a specially crafted request to the victim. Successful exploitation would allow an attacker to execute arbitrary code on the target machine.

PHP Exif_Process_User_Comment Null Pointer Dereference (CVE-2016-6292)

A denial of service vulnerability exists in the Exif module of PHP. The vulnerability is due to a null pointer dereference in exif_process_user_comment when trying to handle JIS encoded user comment Exif tags when multi-byte string support is enabled in PHP. A remote, unauthenticated attacker can exploit this vulnerability by having the target PHP application process Exif data on a maliciously crafted image. Successful exploitation would cause the PHP interpreter to crash, leading to a denial of service condition.

Micro Focus Rumba WallData.Macro PlayMacro Memory Corruption

A buffer overflow vulnerability has been reported in the WallData.Macro ActiveX control of Micro Focus Rumba. The vulnerability is due to a lack of bounds checking on an argument passed into the PlayMacro() function. A remote, unauthenticated attacker could exploit this vulnerability by enticing a victim user to browse to a malicious web page potentially leading to arbitrary code execution under the context of the user.

Phishing URL Attack Attempt

Phishing URL attack attempt to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity. The attacker uses embedded redirection links in order to gain the victim’s account information.

Moxa SoftCMS CGI Program SQL Injection (CVE-2016-5792)

A SQL injection vulnerability has been reported in Moxa SoftCMS. The vulnerability is due to insufficient input validation on user supplied input. A remote attacker can exploit this vulnerability by providing a crafted input to the product. Successful exploitation would allow the attacker to perform SQL injection and possibly code execution.

WordPress Admin API Directory Traversal (CVE-2016-6896)

A directory traversal vulnerability has been reported in WordPress. This vulnerability is due to incorrect validation of a user supplied path for directory traversal characters. An authenticated user with subscriber privileges could exploit this vulnerability by sending specially crafted requests to the Admin API. Successful exploitation results in a Denial of Service condition.