A remote code execution vulnerability exists in Adobe Flash Player. The vulnerability is due to a use-after-free error in Adobe Flash Player while handling a specially crafted SWF file. A remote attacker can exploit this vulnerability by enticing a target user to open a specially crafted SWF file with an affected version of Flash Player.
Category Archives: Checkpoint
Checkpoint
Adobe Flash Player Use After Free Code Execution (APSB16-25: CVE-2016-4222; CVE-2016-4222)
A remote code execution vulnerability exists in Adobe Flash Player. The vulnerability is due to a use-after-free error in Adobe Flash Player while handling a specially crafted SWF file. A remote attacker can exploit this vulnerability by enticing a target user to open a specially crafted SWF file with an affected version of Flash Player.
Adobe Flash Player Memory Corruption (APSB16-25: CVE-2016-4232; CVE-2016-4232)
A memory leak vulnerability exists in Adobe Flash Player. The vulnerability is due to a dangling reference error in Adobe Flash Player while handling a specially crafted SWF file. A remote attacker can exploit this vulnerability by enticing a target user to open a specially crafted SWF file with an affected version of Flash Player.
Adobe Flash Player Use After Free Code Execution (APSB16-25: CVE-2016-4174; CVE-2016-4174)
A remote code execution vulnerability has been reported in Adobe Flash Player. The vulnerability is due to a use-after-free error in Adobe Flash Player while handling a specially crafted SWF file. A remote attacker can exploit this vulnerability by enticing a target user to open a specially crafted SWF file with an affected version of Flash Player.
Adobe Flash Player Use After Free Code Execution (APSB16-25: CVE-2016-4173; CVE-2016-4173)
A remote code execution vulnerability exists in Adobe Flash Player. The vulnerability is due to a use-after-free error in Adobe Flash Player while handling a specially crafted SWF file. A remote attacker can exploit this vulnerability by enticing a target user to open a specially crafted SWF file with an affected version of Flash Player.
Adobe Flash Player Memory Corruption (APSB16-25: CVE-2016-4182; CVE-2016-4182)
A memory corruption vulnerability exists in Adobe Flash Player. The vulnerability is due to an error in Adobe Flash Player while parsing a specially crafted SWF file. A remote attacker can exploit this issue by enticing a victim to open a specially crafted SWF file.
Tiki Wiki ELFinder Unauthenticated File Upload
An unauthenticated file upload vulnerability exists in Tiki Wiki. By uploading a malicious file to Tiki Wiki, a remote attacker can exploit this vulnerability for execution of arbitrary code in the security context of the web server.
CGI Namespace Conflict Man-In-The-Middle (httpoxy; CVE-2016-5385; CVE-2016-5386; CVE-2016-5387; CVE-2016-5388; CVE-2016-1000109; CVE-2016-1000110)
Namespace conflict related to HTTP proxy headers allows an attacker to configure the HTTP_PROXY environment variable. A successful exploitation might allow an attacker to launch a man-in-the-middle attack and redirect traffic to an arbitrary host.
Magnitude Exploit Kit Redirection
Magnitude exploit kit is a web exploit kit that operates by delivering malicious payload to the victim’s computer. Remote attackers can infect users with Magnitude exploit kit by enticing them to visit a malicious web page. Successful infection will allow the attacker to perform Remote Code Execution on the victim’s computer.
Liferay Portal User Account Stored Cross Site Scripting (CVE-2016-3670)
A persistent XSS vulnerability exists in the user account creation process in Liferay Portal. The vulnerability is due to insufficient input validation of the firstName, middleName and lastName parameters. Successful exploitation could allow the attacker to inject arbitrary script code into a user profile.