Displaying 21 - 40 of 38219

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

A memory corruption vulnerability has been reported in Windows Media Foundation component of Microsoft Windows. The vulnerability is due to improper handling of objects in memory. A remote attacker can exploit this vulnerability by enticing a user to open a specially crafted QuickTime media file. Successful exploitation could result in the execution of arbitrary code within the context of the user...

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

A remote command injection vulnerability exists in D-Link DIR-859 routers due to lack of user input validation. By exploiting the flaw, a remote unauthenticated attacker may execute arbitrary system commands by sending a crafted UPnP SUBSCRIBE request.

CVSS: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

This strike exploits a vulnerability in Apple Safari WebKit. Specifically the vulnerability exists in WebKits WebCore::FormSubmission::create method. An attacker can craft javascript in such a way that when invoking the create method in a form a Use-After-Free condition can occur. This can lead to a denial of service or potentially allow for remote code execution on the vulnerable system.

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

An out-of-bounds read vulnerability exists in OpenSMTPD versions before 6.6.4 due to a logical flaw, causing a server to read multi-line error messages. The attacker-controlled message error may contain directives that get stored in an envelope file, then executed by the vulnerable server. An attacker may obtain command execution or escalate privileges by either causing a vulnerable server to bounce...

CVSS: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

This strike exploits a vulnerability in Apple Safari WebKit. Specifically the vulnerability exists in WebKits WebCore::RenderObject::previousSibling method. An attacker can craft javascript in such a way that when invoking the create method in a form a Use-After-Free condition can occur. This can lead to a denial of service or potentially allow for remote code execution on the vulnerable system....

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

An unauthenticated remote command injection vulnerability exists in DrayTek Vigor2960 1.3.1 Beta, Vigor3900 1.4.4 Beta, Vigor300B 1.3.3 Beta, 1.4.2.1 Beta and 1.4.4 Beta routers, due to lack of user input sanitization. By sending a crafted keyPath HTTP parameter, a remote unauthenticated attacker may execute commands as the systems superuser.

CVSS: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

This strike exploits a stack-based buffer overflow vulnerability in Memcached. This vulnerability is due to a lack of bounds checking in the try read command binary function while processing binary commands. A remote, unauthenticated attacker could exploit this vulnerability by sending a specially crafted packet to the vulnerable service. Successful exploitation could result in code execution in the...

This strikes simulates Andariel 2017 Command and Control traffic after installing Rifdoor module.

This strike simulates Andariel-2019 Command and Control traffic after installing the Signed Rifdoor module. This Strike sends data over TCP port 443, although many packet capture tools like Wireshark will call this encrypted data, this is not actually SSL Encrypted Data. These are encrypted/encoded command and control exchanges, but they are not SSL.

This strike simulates Andariel-2019 Command and Control traffic after installing proto module by sending Base64 encoded host Mac address.

This strike simulates Andariel-2019 Command and Control traffic after installing ApolloZeus Loader module. This Strike sends data over TCP port 443, although many packet capture tools like Wireshark will call this encrypted data, this is not actually SSL Encrypted Data. These are encrypted/encoded command and control exchanges, but they are not SSL.

CVSS: 9.0 (AV:N/AC:L/Au:S/C:C/I:C/A:C)

This strike exploits a script injection vulnerability in Apache Solr via dataConfig parameter in the DataImportHandler module. DataImportHandler DIH module allows the user to pull in data from databases and other sources. The dataConfig parameter allows to specify the entire DIH config as a request parameter. Since a DIH config can contain scripts, this allows the attacker to construct a threatening...

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

This strike exploits an insecure deserialization vulnerability in Oracle Coherence library, which is used in popular products such as Oracle WebLogic Server. Coherence Library is a key component for Oracle to implement highly reliable and scalable cluster computing. The vulnerability is a result of insufficient validation of T3 requests. The server allows deserialization of classes in objects...

CVSS: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)

A type confusion vulnerability exists in V8 JavaScript engine in Google Chrome prior to 80.0.3987.122. The vulnerability may be triggered by changing array elements types e.g. from SmallInteger to Double after optimization takes place. By successfully exploiting this flaw, an attacker can execute arbitrary code in the context or the Chromes renderer process.

CVSS: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

This strike exploits a virtualenv variable path loading vulnerability inside Microsoft Visual Code Studio. Specifically, the vulnerability is due to how VSCode selects and loads the virtualenv from a project folder. This project folder can be loaded without user interaction only requiring for the user to click on the python .py file to execute the code. By adding a malicious folder to the workspace...

CVSS: 9.0 (AV:N/AC:L/Au:N/C:P/I:P/A:C)

An OS command injection vulnerability exists in Dell KACE K1000 versions before 6.4.120822, due to lack of sanitization of user-supplied data. By sending a crafted kuid parameter in a HTTP request to /service/krashrpt.php, a remote unauthenticated attacker may execute arbitrary OS commands as the user www.

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

A PHP code injection vulnerability exists in Horde Groupware Webmail Edition 5.2.22 due to lack of user-supplied data sanitization. Remote authenticated attackers may send a crafted quote parameter in a HTTP request to mnemo/data.php to achieve PHP code execution.

CVSS: 9.0 (AV:N/AC:L/Au:N/C:P/I:P/A:C)

An arbitrary file upload vulnerability exists in WordPress Cherry Plugin versions before 1.7, due to lack of authentication for file import actions. By exploiting this flaw, a remote unauthenticated attacker may execute arbitrary PHP code by uploading a webshell with a crafted HTTP POST request.

CVSS: 9.0 (AV:N/AC:L/Au:S/C:C/I:C/A:C)

An OS command injection vulnerability exists in Sangoma Asterisk, due to lack of user input validation on Asterisk Manager Interface. By sending a crafted AMI action request with a Data parameter, a remote authenticated attacker may execute arbitrary commands on the target server.

CVSS: 9.0 (AV:N/AC:L/Au:S/C:C/I:C/A:C)

A remote code execution vulnerability exists in Microsoft Exchange Server due to a hardcoded validation key. A remote authenticated attacker may send a crafted serialized ViewState object, which gets deserialized on the server to achieve remote code execution as the SYSTEM user.

Pages