A remote code execution vulnerability exists in ImageMagick and GraphicsMagick. The vulnerability is due to an error in the way the programs handle specially crafted files. A remote attacker can exploit this issue by enticing a user to open a specially crafted file that could run arbitrary code in the context of the current user.
Category Archives: Checkpoint
Checkpoint
Trane comfort Link II DSS services handling remote code execution (CVE-2015-2868)
An exploitable remote code execution vulnerability exists in the Trane ComfortLink II DSS service. An attacker who can connect to the DSS service on the Trane ComfortLink II device can send an overly long request that can overflow a fixed size stack buffer, resulting in arbitrary code execution.
Adobe Acrobat and Reader Heap Overflow (APSB17-01: CVE-2017-2959)
A heap overflow vulnerability exists in Adobe Reader. The vulnerability is due to an error in the way Adobe Acrobat and Reader handles objects in memory. A remote attacker could trigger this issue via a specially crafted JPG file.
F5 Multiple Products iControl iCall Script Privilege Escalation (CVE-2015-3628)
A privilege escalation vulnerability exists in the iControl API in multiple F5 products. The vulnerability is due to insufficient validation of iCall scripts in incomming SOAP requests. A remote, authenticated attacker can exploit this vulnerability by sending malicious SOAP requests to the server.
WordPress REST API Content Injection
A content injection vulnerability exists in WordPress REST API. A remote attacker may exploit this vulnerability by sending a malicious request to the server. Successful exploitation would allow an attacker to inject and change content.
Microsoft Windows SMB2 Tree Connect Response Stack Overflow (CVE-2017-0016)
A stack overflow vulnerability exists in Microsoft Windows. The vulnerability is due lack of sanity over Tree Connect response messages. Successful exploitation of this issue may allow attackers to execute arbitrary code.
Chrome Fake Font Malware Installer
A misleading popup window, disguising as a Chrome error message, is used to trick a user into installing malware, leading to loss of data, or allowing the attacker to run arbitrary code on the infected machine.
Suspicious Metadata Mail Phishing Containing Archive Attachment
Suspicious Mail containing archive attachment was observed as part of phishing campaigns. A remote attacker could send spam e-mails including those files. This would allow the malicious code to run and infect the target system.
Cisco WebEx Meetings Server and Center Remote Code Execution (CVE-2017-3823)
A remote code execution vulnerability exists in Cisco WebEx Meetings Server and WebEx Meetings Center browser extensions. The vulnerability is due to a design weakness in the API response parser within the extensions.A remote unauthenticated attacker could exploit this vulnerability by enticing a user open a maliciously crafted web page or link.
ISC BIND TKEY Query Response Assertion Failure Denial of Service (CVE-2016-9131)
A denial-of-service vulnerability has been reported in ISC BIND. The vulnerability is due to a defect that can cause named service to exit with an assertion failure while processing a crafted DNS response packet. A remote, unauthenticated attacker could exploit this vulnerability by providing a specially crafted response to the vulnerable server. Successful exploitation could lead to denial-of-service condition.