Category Archives: Checkpoint

Checkpoint

Shopware getTemplateName Local File Inclusion (CVE-2016-3109)

A local file inclusion vulnerability has been reported in Shopware. This vulnerability is due to insufficient input validation in the getTemplateName() method. A remote unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could lead to information disclosure and achieve arbitrary code execution.

Microsoft Internet Explorer Memory Corruption (MS16-084: CVE-2016-3242; CVE-2016-3242)

A memory corruption vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to an error while handling certain objects when processing HTML and script code. A remote attacker can exploit this issue by enticing a target victim to open a specially crafted web page that could cause memory corruption in a way that would allow attackers to execute code on the target system.

Microsoft Internet Explorer Memory Corruption (MS16-084: CVE-2016-3240; CVE-2016-3240)

A memory corruption vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to an error while handling certain objects when processing HTML and script code. A remote attacker can exploit this issue by enticing a target victim to open a specially crafted web page that could cause memory corruption in a way that would allow attackers to execute code on the target system.

Microsoft Internet Explorer Memory Corruption (MS16-084: CVE-2016-3241; CVE-2016-3241)

A memory corruption vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to an error while handling certain objects when processing HTML and script code. A remote attacker can exploit this issue by enticing a target victim to open a specially crafted web page that could cause memory corruption in a way that would allow attackers to execute code on the target system.

Internet Explorer Malformed IFRAME Buffer Overflow (MS04-040: CVE-2004-1050; CVE-2004-1050)

Internet Explorer (IE) is a popular web browser developed by Microsoft corporation. A buffer overflow vulnerability has been reported in Microsoft Internet Explorer. The vulnerability is in the way Microsoft Internet Explorer parses certain parameters of an IFRAME tag. An attacker can exploit this vulnerability to create a denial of service condition or to execute arbitrary code in the context of the currently logged in user. Successful exploitation of this vulnerability may allow execution of arbitrary code on a vulnerable system.