Displaying 221 - 240 of 38146
Last import : Jun 17 17:00

CVSS: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

This strike exploits a security bypass vulnerability in Apache HTTP Server module mod proxy. The vulnerability is due to an input validation error in mod proxy when handling certain directives in the configuration. This vulnerability could be exploited by an attacker to bypass proxy configuration settings.

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits a vulnerability in InduSofts Web Studio where a user may use a directory traversal exploit to clobber arbitrary files.

This strike sends a malware sample that contains a trojan targeted at mobile devices running Android OS named KungFu.B and has the md5 sum 45f86e5027495dc33d168f4f4704779c.

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits the Wide Area Network Emulator WANem. By combining a privelage escalation vulnerability with the dosu binary file as setuid root that executes commands supplied as its argument with the ability to inject commands into the pc parameter remotely, a user is able to gain root access remotely.

This strike sends a malware sample that contains a trojan targeted at mobile devices running Android OS named Dougalek.A and has the md5 sum 857ee29d88796e1f1b7b440dc9eadc77.

This strike sends a malware sample that contains a trojan targeted at mobile devices running Android OS named Dougalek.A and has the md5 sum e8237a583fe7b2362b4addf01518600bw.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a string format error where a user may pass string modifiers which can be used to clobber memory.

This strike sends a malware sample that contains a trojan targeted at mobile devices running Android OS named Dougalek.A and has the md5 sum 857ee29d88796e1f1b7b440dc9eadc77.

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike targets a stack buffer overflow in Free Download Manager. If the Authorization headers value is greater than 1332 characters, memory on a stack buffer is overwritten, which can lead to a denial of service.

CVSS: 9.0 (AV:N/AC:L/Au:S/C:C/I:C/A:C)

Zenoss contains a flaw that is triggered when input passed via the daemon parameter to the zport/About/showDaemonXMLConfig script is not properly sanitized. This could allow an authenticated user to execute arbitrary shell commands.

This strike sends a malware sample that contains a trojan targeted at mobile devices running Android OS named KungFu.B and has the md5 sum 079455de5891f7e1bb19017c77f1bec0.

This strike sends a malware sample that contains a trojan targeted at mobile devices running Android OS named SMSZombie.A and has the md5 sum b6cacc0cf7bad179d6bde68f5c013e6e.

This strike sends a malware sample that contains a trojan targeted at mobile devices running Android OS named Dougalek.A and has the md5 sum 9d1625aa79b55a79064dac7a0ecc2f91.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a buffer overflow vulnerability in Novell Groupwise. The vulnerability is due to failure to validate token values when parsing Novell Address Book .nab files. By enticing a user to open a crafted file with the vulnerabile application, an attacker could execute arbitrary code on the users system.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a vulnerability in EGallery. The vulnerability allows unauthenticated file uploads which can result in arbitrary code execution.

This strike sends a malware sample that contains a trojan targeted at mobile devices running Android OS named SMSZombie.A and has the md5 sum cafffdee7479a8816f4551ac8c3a0178.

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits a stack buffer overflow in HP OpenViews Network Node Manager application jovgraph.exe. A user may supply an overly long argument to a request which clobbers a stack buffer.

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Exploits a buffer overflow vulnerability in Adobe Acrobat and Acrobat Reader when parsing the U3D Texture Image URL field.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a vulnerability in Trend Micros Internet Security Pro 2010. When calling the extSetOwner method, a user can use memory at a specific address.This value can then later be used as a function pointer to access arbitrary memory addresses or execute code.

This strike sends a malware sample that contains a trojan targeted at mobile devices running Android OS named Dougalek.A and has the md5 sum c2dfe44d9f130033ecd89ba33f8a2e0a.

Pages