A memory corruption vulnerability exist in Adobe Flash Player. The vulnerability is caused by a crafted SWF file which causes an out of bounds memory access. A remote attacker can exploit this issue in order to trigger an access violation exception.
Category Archives: Checkpoint
Checkpoint
ManageEngine OpManager APMIntegBusinessViewHandler OPM_BVNAME SQL Injection
This vulnerability is due to insufficient validation of the OPM_BVNAME parameter when processing requests sent to APMIntegBusinessViewHandler servlet. A remote, unauthenticated attacker could exploit this vulnerability by sending a web request with a malicious SQL query to the target server. Successful exploitation could lead to arbitrary code execution in the security context of SYSTEM.
Adobe Flash Player Security Bypass (APSB16-29: CVE-2016-4277; CVE-2016-4277)
A security bypass vulnerability exists in Adobe Flash Player. The vulnerability is due to insufficient security restrictions while handling specially crafted URL of a HTTP request to SWF file. Successful exploitation could lead to information disclosure.
Adobe Flash Player Memory Corruption (APSB16-29: CVE-2016-4276; CVE-2016-4276)
A memory corruption vulnerability exists in Adobe Flash Player. The vulnerability is due to an error in Adobe Flash Player while parsing a specially crafted SWF file. A remote attacker can exploit this issue by enticing a victim to open a specially crafted SWF file.
MySQL Remote Root Code Execution (CVE-2016-6662)
A code execution vulnerability exists in MySQL database server. Successful exploitation could allow a remote attacker to shut down the database, modify its content, or execute arbitrary code on the affected servers.
Adobe Flash Player Memory Corruption (APSB16-29: CVE-2016-4281; CVE-2016-4281)
A memory corruption vulnerability exists in Adobe Flash Player. The vulnerability is due to an error in Adobe Flash Player while parsing a specially crafted SWF file. A remote attacker can exploit this issue by enticing a victim to open a specially crafted SWF file.
Suspicious Microsoft Publisher Mail Attachment
Microsoft Office Publisher files might contain a malicious downloader. A remote attacker could send spam e-mails including those downloaders, and use social engineering in order to convince users to manually enable them. This would allow the malicious code to run and infect the target system.
Microsoft Windows Elevation of Privilege (MS16-111: CVE-2016-3373; CVE-2016-3373)
An elevation of privilege vulnerability exists in Microsoft Windows. A malicious user can bypass a security check in Windows to read and write registry hive files under a hidden registry hive which could enable an elevation of privilege. Successful exploitation could allow an attacker to run arbitrary code or access protected files with elevated privileges.
Microsoft Office Memory Corruption (MS16-107: CVE-2016-3362; CVE-2016-3362)
A remote code execution vulnerability exists in Microsoft Office. The vulnerability is due to an error in the way Microsoft Office improperly handles objects in memory while parsing specially crafted files. A remote attacker can exploit this issue by enticing a victim to open a specially crafted file.
Microsoft Windows GDI Component Information Disclosure (MS16-106: CVE-2016-3355; CVE-2016-3355)
An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory. A remote attacker could exploit this vulnerability by enticing a target user to open a malicious executable file. Successful exploitation of this issue can lead to local privilege escalation.