Displaying 38141 - 38146 of 38146
Last import : Jun 17 17:00

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits a Remote Code Execution vulnerability in Samba. An attacker could exploit this vulnerability by uploading a shared library file to a writable Samba share, followed by accessing the file path via named pipe. * NOTE: When running this strike in OneArm mode, the target system must have /share configured with write permissions and be available via SMB as \share.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

A memory corruption vulnerability exists in Macrovision InstallShield Update Service ActiveX control implemented in isusweb.dll. The vulnerability is due to a design error while processing calls to a method of the ActiveX control. A remote attacker can exploit this vulnerability by enticing the target user to open a malicious webpage, potentially allowing arbitrary code to be injected and executed in...

CVSS: 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)

A vulnerability exists in the Linux kernel which refers to an insufficient boundary validation when defragmenting an SMB Transaction2 response. A specially crafted SMB Transaction2 response can trigger an out of boundary write when the kernel copies a defragmented packet. If an attacker is able to control a Samba server or to intercept and modify the SMB traffic, he can attempt to exploit this...

This strike sends a malware sample detected by Mcafee as PWS-Zbot.gen.anq, Microsoft as VirTool:Win32/Obfuscator.PN, Kaspersky as HEUR:Trojan.Win32.Generic, Symantec as Trojan.Gen.2, Bitdefender as Gen:Heur.PIF.3. The MD5 hash of this sample is 75a83a9d15782b2eefb3b4a854c2a64f.

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits an elevation-of-privilege vulnerability inside Apple CUPS. The vulnerability is due to improper processing of certain requests in the add job method. An attacker could exploit this vulnerability in order to gain root privileges and execute malicious code on the target Machine.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a buffer overflow vulnerability in Poster Software PUBLISH-iT. When processing the styl Entry Name field of a PUI file, the value is copied into a fixed length buffer without verification. Successful exploitation may result in execution of arbitrary code or abnormal termination of PUBLISH-iT.

Pages