Displaying 38141 - 38146 of 38146
Last import : Jun 17 17:00

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a vulnerability in Edraw PDF Viewers ActiveX control pdfviewer.ocx. Specifically the FtpConnect, and FtpDownloadFile functions allow for the connection to an FTP server, and download of a file to a specified directory on the users local Machine.

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits an elevation-of-privilege vulnerability inside Apple CUPS. The vulnerability is due to improper processing of certain requests in the add job method. An attacker could exploit this vulnerability in order to gain root privileges and execute malicious code on the target Machine.

This strike sends a malware sample detected by Mcafee as PWS-Zbot.gen.anq, Microsoft as VirTool:Win32/Obfuscator.PN, Kaspersky as HEUR:Trojan.Win32.Generic, Symantec as Trojan.Gen.2, Bitdefender as Gen:Heur.PIF.3. The MD5 hash of this sample is 75a83a9d15782b2eefb3b4a854c2a64f.

CVSS: 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)

A vulnerability exists in the Linux kernel which refers to an insufficient boundary validation when defragmenting an SMB Transaction2 response. A specially crafted SMB Transaction2 response can trigger an out of boundary write when the kernel copies a defragmented packet. If an attacker is able to control a Samba server or to intercept and modify the SMB traffic, he can attempt to exploit this...

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits an integer overflow vulnerability in Sun Java Runtime Environment software. The vulnerability is due to insufficient validation while decompressing Pack200 jar.pack.gz files. A remote attacker can exploit this vulnerability by enticing a target user to open a crafted HTML file. Successful exploitation may lead to arbitrary code execution on the target. In an attack case where...

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a buffer overflow vulnerability in Poster Software PUBLISH-iT. When processing the styl Entry Name field of a PUI file, the value is copied into a fixed length buffer without verification. Successful exploitation may result in execution of arbitrary code or abnormal termination of PUBLISH-iT.

Pages