Displaying 38141 - 38146 of 38146
Last import : Jun 17 17:00

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a vulnerability in Edraw PDF Viewers ActiveX control pdfviewer.ocx. Specifically the FtpConnect, and FtpDownloadFile functions allow for the connection to an FTP server, and download of a file to a specified directory on the users local Machine.

This strike sends a malware sample detected by Symantec as Trojan Horse. The MD5 hash of this sample is c7f098961b74bef075c1bf368269261f.

CVSS: 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)

A vulnerability exists in the Linux kernel which refers to an insufficient boundary validation when defragmenting an SMB Transaction2 response. A specially crafted SMB Transaction2 response can trigger an out of boundary write when the kernel copies a defragmented packet. If an attacker is able to control a Samba server or to intercept and modify the SMB traffic, he can attempt to exploit this...

This strike sends a malware sample detected by Mcafee as PWS-Zbot.gen.anq, Microsoft as VirTool:Win32/Obfuscator.PN, Kaspersky as HEUR:Trojan.Win32.Generic, Symantec as Trojan.Gen.2, Bitdefender as Gen:Heur.PIF.3. The MD5 hash of this sample is 75a83a9d15782b2eefb3b4a854c2a64f.

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits an elevation-of-privilege vulnerability inside Apple CUPS. The vulnerability is due to improper processing of certain requests in the add job method. An attacker could exploit this vulnerability in order to gain root privileges and execute malicious code on the target Machine.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a buffer overflow vulnerability in Poster Software PUBLISH-iT. When processing the styl Entry Name field of a PUI file, the value is copied into a fixed length buffer without verification. Successful exploitation may result in execution of arbitrary code or abnormal termination of PUBLISH-iT.