Displaying 38141 - 38146 of 38146
Last import : Jun 17 17:00

CVSS: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

This strike exploits an information disclosure vulnerability in Red Hat JBoss Seam XML XEE. This vulnerability is due to improper handling XML files. A remote attacker can take advantage of this vulnerability to gain arbitrary files on the target system.

CVSS: 5.8 (AV:N/AC:M/Au:N/C:P/I:N/A:P)

This strike exploits a remote command execution vulnerability in GitList. The vulnerability is due to improper sanitization of user-controlled values passed in search queries. By exploiting this vulnerability, a remote, unauthenticated attacker can execute arbitrary operating system commands on the target server.

This strike sends a malware sample detected by Mcafee as PWS-Zbot.gen.anq, Microsoft as VirTool:Win32/Obfuscator.PN, Kaspersky as HEUR:Trojan.Win32.Generic, Symantec as Trojan.Gen.2, Bitdefender as Gen:Heur.PIF.3. The MD5 hash of this sample is 75a83a9d15782b2eefb3b4a854c2a64f.

CVSS: 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)

A vulnerability exists in the Linux kernel which refers to an insufficient boundary validation when defragmenting an SMB Transaction2 response. A specially crafted SMB Transaction2 response can trigger an out of boundary write when the kernel copies a defragmented packet. If an attacker is able to control a Samba server or to intercept and modify the SMB traffic, he can attempt to exploit this...

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a buffer overflow vulnerability in Poster Software PUBLISH-iT. When processing the styl Entry Name field of a PUI file, the value is copied into a fixed length buffer without verification. Successful exploitation may result in execution of arbitrary code or abnormal termination of PUBLISH-iT.

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits an elevation-of-privilege vulnerability inside Apple CUPS. The vulnerability is due to improper processing of certain requests in the add job method. An attacker could exploit this vulnerability in order to gain root privileges and execute malicious code on the target Machine.