Displaying 38141 - 38146 of 38146
Last import : Feb 18 09:20

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a Use-After-Free error triggered because of an error Microsoft Scripting Runtime Object Library . If a user opens a specially crafted web page, on a vulnerable Machine, a Use-After-Free memory corruption is trigered that can lead to arbitrary code execution using local privileges. All versions of Microsoft Windows are vulnerable to this attack.

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits a buffer overflow in 3S Smart Software Solutions CoDeSys Gateway Server. An overly long filename field in certain messages sent to the Gateway Server service will cause a stack buffer overflow when parsed. Successful exploitation could result in the execution of arbitrary code or abnormal termination of the Gateway Server service, causing a denial of service condition.

This strike sends a malware sample detected by Mcafee as PWS-Zbot.gen.anq, Microsoft as VirTool:Win32/Obfuscator.PN, Kaspersky as HEUR:Trojan.Win32.Generic, Symantec as Trojan.Gen.2, Bitdefender as Gen:Heur.PIF.3. The MD5 hash of this sample is 75a83a9d15782b2eefb3b4a854c2a64f.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

A remote denial of service vulnerability exists in the Linux Kernel. The vulnerability is due to an implementation flaw which may result in a buffer overflow in the NFS subsystem of the Linux Kernel. By sending Access Control List ACL NFS requests to a target host, an attacker may exploit this vulnerability to cause kernel panic, leading to a system wide denial of service condition. Exploiting this...

CVSS: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

This strike exploits an authentication bypass vulnerability in OpenEMR. The vulnerability is due to improper HTTP parameter extraction. An attacker could exploit this vulnerability in order to obtain unauthorized access.

CVSS: 7.5 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits a stack buffer overflow vulnerability in Easy File Sharing Web Server. The vulnerability is due to a lack of boundary checking on user input when requesting sendmail.ghp resource. By exploiting this vulnerability, an attacker could execute arbitrary code in the security context of user. NOTE: Strike will launch calc.exe when run in OneArm mode. Verified against Easy File Sharing...

Pages