An information disclosure vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to the way Internet Explorer improperly handles objects in memory. A remote attacker can exploit this issue by enticing a user to open a specially crafted swf file with an affected version of Internet Explorer.
Category Archives: Checkpoint
Checkpoint
Adobe Acrobat and Reader Use After Free (APSB16-14: CVE-2016-1054; CVE-2016-1054)
A use after free vulnerability exists in Adobe Acrobat and Reader. The vulnerability is due to an error in the way Adobe Acrobat and Reader handles objects in memory. A remote attacker can exploit this vulnerability by enticing the user to open a specially crafted PDF file.
Apache ActiveMQ Fileserver Multi Methods Directory Traversal (CVE-2016-3088)
A directory traversal vulnerability exists in Apache ActiveMQ. The vulnerability is due to insufficient input validation in the destination header when processing a MOVE request or in the file upload functionality when processing a PUT request. A remote, unauthenticated attacker may exploit this vulnerability by sending a file with a PUT request, followed by a crafted MOVE request to the server or by sending a malicious file using a crafted PUT request to replace executable components of ActiveMQ.
Microsoft Office Memory Corruption (MS16-099: CVE-2016-3317; CVE-2016-3317)
A remote code execution vulnerability has been reported in Microsoft Office. The vulnerability is caused when Microsoft Office does not properly handle rich text format files in memory. A remote attacker can exploit this issue by enticing a user to open a specially crafted file with an affected version of Microsoft Office.
Adobe Reader and Acrobat Security Bypass (APSB16-26 : CVE-2016-4215; CVE-2016-4215)
This vulnerability is an instance of same-origin policy violation. An attacker can exploit this vulnerability by enticing a user to open a maliciously crafted PDF file. Successful exploitation can trick embedded JavaScript code to run in the wrong context, potentially leading to a security bypass.
Microsoft Edge PDF Remote Code Execution (MS16-096: CVE-2016-3319; CVE-2016-3319)
A remote code execution vulnerability exists in Microsoft Edge. The vulnerability is due to the way Edge improperly accesses objects in memory. A remote attacker can exploit this issue by enticing a target victim to open a specially crafted PDF file.
Adobe Acrobat and Reader Memory Corruption (APSB16-14: CVE-2016-1071; CVE-2016-1071)
A memory corruption vulnerability has been reported in Adobe Reader and Acrobat. The vulnerability is due to an error in Adobe Reader and Acrobat while parsing a corrupted PDF file. A remote attacker may exploit this vulnerability by enticing a target user to open a specially crafted PDF file.
Adobe Acrobat and Reader Memory Corruption (APSB14-15: CVE-2016-1067; CVE-2016-1067; CVE-2016-1068; CVE-2016-1069)
This vulnerability is an instance of a use after free vulnerability. A constraint for exploitation of this vulnerability is that the memory area of the freed object is reused by another object. A remote attacker may exploit this vulnerability by enticing a target user to open a specially crafted PDF file.
Adobe Flash Player Memory Corruption (APSB16-25: CVE-2016-4188; CVE-2016-4188)
A memory corruption vulnerability exists in Adobe Flash Player. The vulnerability is due to an error in Adobe Flash Player while parsing a specially crafted SWF file. A remote attacker can exploit this issue by enticing a victim to open a specially crafted SWF file.
Adobe Acrobat and Reader Use-After-Free (APSB16-14: CVE-2016-1066; CVE-2016-1066)
A use after free vulnerability exists in Adobe Acrobat and Reader. The vulnerability is due to an error in the way Adobe Acrobat and Reader handles objects in memory. A remote attacker can exploit this vulnerability by enticing the user to open a specially crafted PDF file.