An information disclosure vulnerability has been reported in Microsoft Internet Explorer. The vulnerability is due to an error in Microsoft Internet Explorer while handling URIs. A remote attacker can exploit this issue by enticing a user to open a specially crafted web-page with an affected version of Internet Explorer.
Monthly Archives: August 2016
Microsoft Edge PDF Remote Code Execution (MS16-096: CVE-2016-3319; CVE-2016-3319)
A remote code execution vulnerability exists in Microsoft Edge. The vulnerability is due to the way Edge improperly accesses objects in memory. A remote attacker can exploit this issue by enticing a target victim to open a specially crafted PDF file.
Microsoft Internet Explorer Memory Corruption (MS16-095: CVE-2016-3322; CVE-2016-3322)
A use after free vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to the mishandling of cached objects in complex webpages. A remote attacker can exploit this issue by enticing a target victim to open a specially crafted web page that could allow attackers to execute code on the target system.
Microsoft Internet Explorer Memory Corruption (MS16-095: CVE-2016-3289; CVE-2016-3289)
A use after free vulnerability was discovered within Microsoft Internet Explorer. The root cause comes from dll file triggering a use after free condition. A successful exploitation of this issue could allow an attacker to execute arbitrary code on the remote system.
Microsoft Windows Graphics Component Remote Code Execution (MS16-097: CVE-2016-3304; CVE-2016-3304)
A remote code execution vulnerability exists in Microsoft Graphics Component. The vulnerability is due to the way Microsoft Windows improperly handles specially crafted EMF files. A remote attacker can exploit this issue by enticing a victim to open a specially crafted EMF files.
Microsoft Edge Use After Free (MS16-095: CVE-2016-3326; CVE-2016-3326)
A use after free vulnerability exists in Microsoft Edge. The vulnerability is due to incorrect memory handling leading to a use after free condition when processing a maliciously crafted file. Successful exploitation of this issue could allow an attacker to execute arbitrary code on the remote system.
Adobe Acrobat and Reader Memory Corruption (APSB16-14: CVE-2016-1071; CVE-2016-1071)
A memory corruption vulnerability has been reported in Adobe Reader and Acrobat. The vulnerability is due to an error in Adobe Reader and Acrobat while parsing a corrupted PDF file. A remote attacker may exploit this vulnerability by enticing a target user to open a specially crafted PDF file.
Adobe Reader and Acrobat Security Bypass (APSB16-26 : CVE-2016-4215; CVE-2016-4215)
This vulnerability is an instance of same-origin policy violation. An attacker can exploit this vulnerability by enticing a user to open a maliciously crafted PDF file. Successful exploitation can trick embedded JavaScript code to run in the wrong context, potentially leading to a security bypass.
Microsoft Office Memory Corruption (MS16-099: CVE-2016-3317; CVE-2016-3317)
A remote code execution vulnerability has been reported in Microsoft Office. The vulnerability is caused when Microsoft Office does not properly handle rich text format files in memory. A remote attacker can exploit this issue by enticing a user to open a specially crafted file with an affected version of Microsoft Office.
Apache ActiveMQ Fileserver Multi Methods Directory Traversal (CVE-2016-3088)
A directory traversal vulnerability exists in Apache ActiveMQ. The vulnerability is due to insufficient input validation in the destination header when processing a MOVE request or in the file upload functionality when processing a PUT request. A remote, unauthenticated attacker may exploit this vulnerability by sending a file with a PUT request, followed by a crafted MOVE request to the server or by sending a malicious file using a crafted PUT request to replace executable components of ActiveMQ.