Эксплоит, использующий уязвимость в JRE (Java Runtime Environment) для загрузки на зараженный компьютер других вредоносных программ. Является JAR-архивом, содержащим набор Java-классов (class-файлы)....
26.03.2018 HP Intelligent Management Center Arbitrary File Upload Exploit ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = GreatRanking HttpFingerprint = { :pattern => [ /Apache-Coyote/ ] } include Msf::Exploit::Remote::HttpClient include Msf::Exploit::FileDropper def initialize(info = {}) super&...26.01.2018 HPSBMA02485 SSRT090252 rev.1 - HP Power Manager, Remote Execution of Arbitrary Code -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c01971741 Version: 1 HPSBMA02485 SSRT090252 rev.1 - HP Power Manager, Remote Execution of Arbitrary Code NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2010-01-19 Last Updated: 2010-01-19 Potential Security Impact: Remote execution of arbitrary code Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP Power Manager. The vulnerabi...03.03.2018 [RHSA-2010:0130-01] Moderate: java-1.5.0-ibm security update Red Hat Security Advisory - Moderate: java-1.5.0-ibm security update19.03.2018 Liquid XML Studio 2010 <= v8.061970 - (LtXmlComHelp8.dll) OpenFile() Remote Heap Overflow Exploit Цель: Liquid XML Studio 2010 Воздействие: Выполнение произвольного кода01.04.2018 [RHSA-2010:0339-01] Important: java-1.6.0-openjdk security update Red Hat Security Advisory - Important: java-1.6.0-openjdk security update01.04.2018 CVE-2010-0843 Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.28.10.2018 Троян Koobface нацелился на "маководов" Обнаружена кроссплатформенная модификация известного видеотрояна, загрузочная часть которой является Java-апплетом. Далее29.04.2018 [RHSA-2010:0383-01] Critical: java-1.6.0-ibm security update Red Hat Security Advisory - Critical: java-1.6.0-ibm security update01.08.2018 Java the Target of Choice for Exploit Kits in 2011 Exploiting vulnerabilities in operating systems and programs is currently one of the most popular weapons in the cybercriminals’ arsenal21.07.2018 [RHSA-2010:0549-01] Critical: java-1.6.0-ibm security update Red Hat Security Advisory - Critical: java-1.6.0-ibm security update
Нет комментариев. Почему бы Вам не оставить свой?
Вы не можете отправить комментарий анонимно, пожалуйста зарегистрируйтесь.