Executive Summary

Informations
NameCVE-2012-0507First vendor Publication2012-06-07
VendorCveLast vendor Modification2014-02-06

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score10Attack RangeNetwork
Cvss Impact Score10Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0507

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:21410
 
Oval ID: oval:org.mitre.oval:def:21410
Title: RHSA-2012:0139: java-1.6.0-sun security update (Critical)
Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.
Family: unix Class: patch
Reference(s): RHSA-2012:0139-01
CVE-2011-3563
CVE-2011-3571
CVE-2011-5035
CVE-2012-0498
CVE-2012-0499
CVE-2012-0500
CVE-2012-0501
CVE-2012-0502
CVE-2012-0503
CVE-2012-0505
CVE-2012-0506
CVE-2012-0507
Version: 159
Platform(s): Red Hat Enterprise Linux 6
Product(s): java-1.6.0-sun
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21404
 
Oval ID: oval:org.mitre.oval:def:21404
Title: RHSA-2012:0514: java-1.6.0-ibm security update (Critical)
Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.
Family: unix Class: patch
Reference(s): RHSA-2012:0514-03
CVE-2011-3563
CVE-2011-5035
CVE-2012-0497
CVE-2012-0498
CVE-2012-0499
CVE-2012-0500
CVE-2012-0501
CVE-2012-0502
CVE-2012-0503
CVE-2012-0505
CVE-2012-0506
CVE-2012-0507
Version: 159
Platform(s): Red Hat Enterprise Linux 6
Product(s): java-1.6.0-ibm
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21398
 
Oval ID: oval:org.mitre.oval:def:21398
Title: RHSA-2012:0508: java-1.5.0-ibm security update (Critical)
Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.
Family: unix Class: patch
Reference(s): RHSA-2012:0508-03
CVE-2011-3389
CVE-2011-3557
CVE-2011-3560
CVE-2011-3563
CVE-2012-0498
CVE-2012-0499
CVE-2012-0501
CVE-2012-0502
CVE-2012-0503
CVE-2012-0505
CVE-2012-0506
CVE-2012-0507
Version: 159
Platform(s): Red Hat Enterprise Linux 6
Product(s): java-1.5.0-ibm
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21340
 
Oval ID: oval:org.mitre.oval:def:21340
Title: RHSA-2012:0135: java-1.6.0-openjdk security update (Critical)
Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.
Family: unix Class: patch
Reference(s): RHSA-2012:0135-01
CESA-2012:0135
CVE-2011-3563
CVE-2011-3571
CVE-2011-5035
CVE-2012-0497
CVE-2012-0501
CVE-2012-0502
CVE-2012-0503
CVE-2012-0505
CVE-2012-0506
CVE-2012-0507
Version: 133
Platform(s): Red Hat Enterprise Linux 6
CentOS Linux 6
Product(s): java-1.6.0-openjdk
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:20754
 
Oval ID: oval:org.mitre.oval:def:20754
Title: RHSA-2012:0322: java-1.6.0-openjdk security update (Important)
Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.
Family: unix Class: patch
Reference(s): RHSA-2012:0322-01
CVE-2011-3563
CVE-2011-3571
CVE-2011-5035
CVE-2012-0497
CVE-2012-0501
CVE-2012-0502
CVE-2012-0503
CVE-2012-0505
CVE-2012-0506
CVE-2012-0507
Version: 133
Platform(s): Red Hat Enterprise Linux 5
Product(s): java-1.6.0-openjdk
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:19848
 
Oval ID: oval:org.mitre.oval:def:19848
Title: HP-UX Running Java, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.
Family: unix Class: vulnerability
Reference(s): CVE-2012-0507
Version: 6
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:15473
 
Oval ID: oval:org.mitre.oval:def:15473
Title: USN-1373-2 -- OpenJDK 6 (ARM) vulnerabilities
Description: openjdk-6b18: Open Source Java implementation Details: USN 1373-1 fixed vulnerabilities in OpenJDK 6 in Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04 for all architectures except for ARM . This provides the corresponding OpenJDK 6 update for use with the ARM architecture in Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04. Original advisory Multiple vulnerabilities in OpenJDK 6 for the ARM architecture have been fixed.
Family: unix Class: patch
Reference(s): USN-1373-2
CVE-2011-5035
CVE-2011-3563
CVE-2012-0497
CVE-2012-0501
CVE-2012-0502
CVE-2012-0503
CVE-2012-0505
CVE-2012-0506
CVE-2012-0507
Version: 5
Platform(s): Ubuntu 11.04
Ubuntu 10.04
Ubuntu 10.10
Product(s): OpenJDK
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:15326
 
Oval ID: oval:org.mitre.oval:def:15326
Title: USN-1373-1 -- OpenJDK 6 vulnerabilities
Description: openjdk-6: Open Source Java implementation Multiple OpenJDK 6 vulnerabilities have been fixed.
Family: unix Class: patch
Reference(s): USN-1373-1
CVE-2011-5035
CVE-2011-3563
CVE-2012-0497
CVE-2012-0501
CVE-2012-0502
CVE-2012-0503
CVE-2012-0505
CVE-2012-0506
CVE-2012-0507
Version: 5
Platform(s): Ubuntu 11.04
Ubuntu 11.10
Ubuntu 10.04
Ubuntu 10.10
Product(s): OpenJDK
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:15259
 
Oval ID: oval:org.mitre.oval:def:15259
Title: DSA-2420-1 openjdk-6 -- several
Description: Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform. CVE-2011-3377 The Iced Tea browser plugin included in the openjdk-6 package does not properly enforce the Same Origin Policy on web content served under a domain name which has a common suffix with the required domain name. CVE-2011-3563 The Java Sound component did not properly check for array boundaries. A malicious input or an untrusted Java application or applet could use this flaw to cause Java Virtual Machine to crash or disclose portion of its memory. CVE-2011-5035 The OpenJDK embedded web server did not guard against an excessive number of a request parameters, leading to a denial of service vulnerability involving hash collisions. CVE-2012-0497 It was discovered that Java2D did not properly check graphics rendering objects before passing them to the native renderer. This could lead to JVM crash or Java sandbox bypass. CVE-2012-0501 The ZIP central directory parser used by java.util.zip.ZipFile entered an infinite recursion in native code when processing a crafted ZIP file, leading to a denial of service. CVE-2012-0502 A flaw was found in the AWT KeyboardFocusManager class that could allow untrusted Java applets to acquire keyboard focus and possibly steal sensitive information. CVE-2012-0503 The java.util.TimeZone.setDefault method lacked a security manager invocation, allowing an untrusted Java application or applet to set a new default time zone. CVE-2012-0505 The Java serialization code leaked references to serialization exceptions, possibly leaking critical objects to untrusted code in Java applets and applications. CVE-2012-0506 It was discovered that CORBA implementation in Java did not properly protect repository identifiers on certain Corba objects. This could have been used to perform modification of the data that should have been immutable. CVE-2012-0507 The AtomicReferenceArray class implementation did not properly check if the array is of an expected Object[] type. A malicious Java application or applet could use this flaw to cause Java Virtual Machine to crash or bypass Java sandbox restrictions
Family: unix Class: patch
Reference(s): DSA-2420-1
CVE-2011-3377
CVE-2011-3563
CVE-2011-5035
CVE-2012-0497
CVE-2012-0501
CVE-2012-0502
CVE-2012-0503
CVE-2012-0505
CVE-2012-0506
CVE-2012-0507
Version: 5
Platform(s): Debian GNU/Linux 6.0
Debian GNU/kFreeBSD 6.0
Product(s): openjdk-6
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23749
 
Oval ID: oval:org.mitre.oval:def:23749
Title: ELSA-2012:0508: java-1.5.0-ibm security update (Critical)
Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.
Family: unix Class: patch
Reference(s): ELSA-2012:0508-03
CVE-2011-3389
CVE-2011-3557
CVE-2011-3560
CVE-2011-3563
CVE-2012-0498
CVE-2012-0499
CVE-2012-0501
CVE-2012-0502
CVE-2012-0503
CVE-2012-0505
CVE-2012-0506
CVE-2012-0507
Version: 53
Platform(s): Oracle Linux 6
Product(s): java-1.5.0-ibm
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23720
 
Oval ID: oval:org.mitre.oval:def:23720
Title: ELSA-2012:0135: java-1.6.0-openjdk security update (Critical)
Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.
Family: unix Class: patch
Reference(s): ELSA-2012:0135-01
CVE-2011-3563
CVE-2011-3571
CVE-2011-5035
CVE-2012-0497
CVE-2012-0501
CVE-2012-0502
CVE-2012-0503
CVE-2012-0505
CVE-2012-0506
CVE-2012-0507
Version: 45
Platform(s): Oracle Linux 6
Product(s): java-1.6.0-openjdk
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23638
 
Oval ID: oval:org.mitre.oval:def:23638
Title: ELSA-2012:0139: java-1.6.0-sun security update (Critical)
Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.
Family: unix Class: patch
Reference(s): ELSA-2012:0139-01
CVE-2011-3563
CVE-2011-3571
CVE-2011-5035
CVE-2012-0498
CVE-2012-0499
CVE-2012-0500
CVE-2012-0501
CVE-2012-0502
CVE-2012-0503
CVE-2012-0505
CVE-2012-0506
CVE-2012-0507
Version: 53
Platform(s): Oracle Linux 6
Product(s): java-1.6.0-sun
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23323
 
Oval ID: oval:org.mitre.oval:def:23323
Title: ELSA-2012:0514: java-1.6.0-ibm security update (Critical)
Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.
Family: unix Class: patch
Reference(s): ELSA-2012:0514-03
CVE-2011-3563
CVE-2011-5035
CVE-2012-0497
CVE-2012-0498
CVE-2012-0499
CVE-2012-0500
CVE-2012-0501
CVE-2012-0502
CVE-2012-0503
CVE-2012-0505
CVE-2012-0506
CVE-2012-0507
Version: 53
Platform(s): Oracle Linux 6
Product(s): java-1.6.0-ibm
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23287
 
Oval ID: oval:org.mitre.oval:def:23287
Title: ELSA-2012:0322: java-1.6.0-openjdk security update (Important)
Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.
Family: unix Class: patch
Reference(s): ELSA-2012:0322-01
CVE-2011-3563
CVE-2011-3571
CVE-2011-5035
CVE-2012-0497
CVE-2012-0501
CVE-2012-0502
CVE-2012-0503
CVE-2012-0505
CVE-2012-0506
CVE-2012-0507
Version: 45
Platform(s): Oracle Linux 5
Product(s): java-1.6.0-openjdk
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27922
 
Oval ID: oval:org.mitre.oval:def:27922
Title: ELSA-2012-0135 -- java-1.6.0-openjdk security update (critical)
Description: [1:1.6.0.0-1.43.1.10.6] - Updated to IcedTea6 1.10.6 - Resolves: rhbz#787144 - Security fixes - S7082299: Fix in AtomicReferenceArray - S7088367: Fix issues in java sound - S7110683: Issues with some KeyboardFocusManager method - S7110687: Issues with TimeZone class - S7110700: Enhance exception throwing mechanism in ObjectStreamClass - S7110704: Issues with some method in corba - S7112642: Incorrect checking for graphics rendering object - S7118283: Better input parameter checking in zip file processing - S7126960: Add property to limit number of request headers to the HTTP Server - Bug fixes - RH580478: Desktop files should not use hardcoded path - Removed upstreamed patch7 - java-1.6.0-openjdk-6_2-Z-rmi-fix.patch
Family: unix Class: patch
Reference(s): ELSA-2012-0135
CVE-2011-3563
CVE-2012-0497
CVE-2012-0501
CVE-2012-0502
CVE-2012-0503
CVE-2012-0505
CVE-2012-0506
CVE-2011-3571
CVE-2011-5035
CVE-2012-0507
Version: 2
Platform(s): Oracle Linux 6
Product(s): java-1.6.0-openjdk
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27767
 
Oval ID: oval:org.mitre.oval:def:27767
Title: ELSA-2012-0322 -- java-1.6.0-openjdk security update (important)
Description: [1.6.0.0-1.25.1.10.6.0.1.el5_8] - Add oracle-enterprise.patch [1:1.6.0.0-1.25.1.10.6] - Updated to IcedTea6 1.10.6 - Resolves: rhbz#787142 - Security fixes - S7082299: Fix in AtomicReferenceArray - S7088367: Fix issues in java sound - S7110683: Issues with some KeyboardFocusManager method - S7110687: Issues with TimeZone class - S7110700: Enhance exception throwing mechanism in ObjectStreamClass - S7110704: Issues with some method in corba - S7112642: Incorrect checking for graphics rendering object - S7118283: Better input parameter checking in zip file processing - S7126960: Add property to limit number of request headers to the HTTP Server - Bug fixes - RH580478: Desktop files should not use hardcoded path - Removed and deleted upstreamed patch7 - name-rmi-fix.patch - Removed and deleted upstreamed Hugepages patches: - Source100: 7034464-hugepage.patch - Source101: 7037939-hugepage.patch - Source102: 7043564-hugepage.patch
Family: unix Class: patch
Reference(s): ELSA-2012-0322
CVE-2011-3563
CVE-2012-0497
CVE-2012-0501
CVE-2012-0502
CVE-2012-0503
CVE-2012-0505
CVE-2012-0506
CVE-2011-3571
CVE-2011-5035
CVE-2012-0507
Version: 2
Platform(s): Oracle Linux 5
Product(s): java-1.6.0-openjdk
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application11
Application52

SAINT Exploits

DescriptionLink
Java SE AtomicReferenceArray Unsafe Security BypassMore info here

ExploitDB Exploits

idDescription
2012-03-30Java AtomicReferenceArray Type Violation Vulnerability

OpenVAS Exploits

DateDescription
2012-08-31Name : VMSA-2012-0013 VMware vSphere and vCOps updates to third party libraries.
File : nvt/gb_VMSA-2012-0013.nasl
2012-08-22Name : Oracle Java SE Java Runtime Environment Code Execution Vulnerability - (Windows)
File : nvt/gb_oracle_java_se_code_exec_vuln_win.nasl
2012-04-09Name : Java Runtime Environment Multiple Vulnerabilities (MAC OS X)
File : nvt/gb_jre_mult_vuln_macosx.nasl
2012-03-12Name : Debian Security Advisory DSA 2420-1 (openjdk-6)
File : nvt/deb_2420_1.nasl
2012-03-09Name : Ubuntu Update for openjdk-6 USN-1373-1
File : nvt/gb_ubuntu_USN_1373_1.nasl
2012-03-07Name : Ubuntu Update for openjdk-6b18 USN-1373-2
File : nvt/gb_ubuntu_USN_1373_2.nasl

Information Assurance Vulnerability Management (IAVM)

DateDescription
2012-09-13IAVM : 2012-A-0147 - Multiple Vulnerabilities in VMware vCenter Server 4.1
Severity : Category I - VMSKEY : V0033793
2012-09-13IAVM : 2012-A-0148 - Multiple Vulnerabilities in VMware ESXi 4.1 and ESX 4.1
Severity : Category I - VMSKEY : V0033794

Snort® IPS/IDS

DateDescription
2014-02-21Styx exploit kit eot outbound connection
RuleID : 29453 - Revision : 1 - Type : EXPLOIT-KIT
2014-02-21Styx exploit kit landing page request
RuleID : 29452 - Revision : 1 - Type : EXPLOIT-KIT
2014-02-21Styx exploit kit outbound jar request
RuleID : 29451 - Revision : 2 - Type : EXPLOIT-KIT
2014-02-21Styx exploit kit outbound connection attempt
RuleID : 29450 - Revision : 1 - Type : EXPLOIT-KIT
2014-02-21Styx exploit kit landing page
RuleID : 29449 - Revision : 1 - Type : EXPLOIT-KIT
2014-02-21Styx exploit kit landing page
RuleID : 29448 - Revision : 1 - Type : EXPLOIT-KIT
2014-02-21Styx exploit kit jar outbound connection
RuleID : 29446 - Revision : 2 - Type : EXPLOIT-KIT
2014-02-21Styx exploit kit fonts download page
RuleID : 29445 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Goon/Infinity exploit kit payload download attempt
RuleID : 28795 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit landing page request
RuleID : 28478 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit outbound pdf request
RuleID : 28477 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Multiple exploit kit Payload detection - readme.dll
RuleID : 27898 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Multiple exploit kit Payload detection - calc.dll
RuleID : 27897 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Multiple exploit kit Payload detection - contacts.dll
RuleID : 27896 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Multiple exploit kit Payload detection - info.dll
RuleID : 27895 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Multiple exploit kit Payload detection - about.dll
RuleID : 27894 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit malicious redirection attempt
RuleID : 27815 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit landing page request
RuleID : 27814 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit landing page with payload
RuleID : 27813 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Gong Da exploit kit possible jar download
RuleID : 27706 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Gong Da exploit kit Java exploit requested
RuleID : 27705 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Gong Da exploit kit Java exploit requested
RuleID : 27704 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Gong Da exploit kit plugin detection
RuleID : 27703 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Gong Da exploit kit landing page
RuleID : 27702 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Gong Da Jar file download
RuleID : 27701 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10iFramer toolkit injected iframe detected - specific structure
RuleID : 27271 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page retrieval
RuleID : 27072 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page retrieval
RuleID : 27071 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit JNLP request
RuleID : 27070 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit landing page - specific structure
RuleID : 27067 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit plugin detection connection jovf
RuleID : 27042-community - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit plugin detection connection jovf
RuleID : 27042 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit plugin detection connection jlnp
RuleID : 27041-community - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit plugin detection connection jlnp
RuleID : 27041 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit plugin detection connection jorg
RuleID : 27040-community - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit plugin detection connection jorg
RuleID : 27040 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Goon/Infinity/Redkit exploit kit short jar request
RuleID : 26808 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10Redkit exploit kit landing page
RuleID : 26807 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Redkit exploit kit short JNLP request
RuleID : 26806 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Redkit exploit kit encrypted binary download
RuleID : 26805 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Multiple exploit kit landing page - specific structure
RuleID : 26653 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10iFramer injection - specific structure
RuleID : 26617 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Multiple exploit kit successful redirection - jnlp bypass
RuleID : 26541 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10iFramer injection - specific structure
RuleID : 26540 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit java payload detection
RuleID : 26512 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Sakura exploit kit redirection structure
RuleID : 26511 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit pdf payload detection
RuleID : 26510 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Multiple exploit kit java payload detection
RuleID : 26509 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Multiple exploit kit Payload detection - info.dll
RuleID : 26508 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit landing page - specific structure
RuleID : 26507 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit jar file redirection
RuleID : 26506 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit jar file downloaded
RuleID : 26434 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Redkit exploit kit landing page
RuleID : 26384 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Redkit exploit kit landing page
RuleID : 26383 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Redkit exploit kit java exploit request
RuleID : 26377 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Redkit exploit kit landing page redirection
RuleID : 26351 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10TDS redirection - may lead to exploit kit
RuleID : 26350 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Redkit exploit kit obfuscated portable executable
RuleID : 26349 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Redkit exploit kit java exploit delivery
RuleID : 26348 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Redkit exploit kit java exploit request
RuleID : 26347 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Redkit exploit kit payload requested
RuleID : 26346 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Redkit exploit kit landing page
RuleID : 26345 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Redkit exploit kit landing page redirection
RuleID : 26344 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Nuclear exploit kit landing page
RuleID : 26343 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Nuclear exploit kit landing page - specific structure
RuleID : 26342 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Nuclear exploit kit landing page
RuleID : 26341 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page retrieval - ff.php
RuleID : 26339 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10IFRAMEr injection detection - leads to exploit kit
RuleID : 26338 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page - specific structure
RuleID : 26337 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit redirection page
RuleID : 26297 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit landing page
RuleID : 26296 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit malicious jar download
RuleID : 26256 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit redirection page
RuleID : 26254 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit MyApplet class retrieval
RuleID : 26229 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit redirection page
RuleID : 26228 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page retrieval
RuleID : 26227 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit landing page
RuleID : 26091 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit landing page
RuleID : 26090 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit Portable Executable download
RuleID : 26056 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit malicious class file download
RuleID : 26055 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit malicious class file download
RuleID : 26054 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit malicious class file download
RuleID : 26053 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit malicious class file download
RuleID : 26052 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit malicious jar file download
RuleID : 26051 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit SWF file download
RuleID : 26050 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit EOT file download
RuleID : 26049 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit PDF exploit
RuleID : 26048 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit redirection structure
RuleID : 26047 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit landing page
RuleID : 26046 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit iframe redirection attempt
RuleID : 26033 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit landing page
RuleID : 26031 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Gong Da exploit kit redirection page received
RuleID : 26013 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Redkit exploit kit landing page
RuleID : 25989 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Redkit exploit kit landing page
RuleID : 25988 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Redkit exploit kit three number PDF Request
RuleID : 25972 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Redkit exploit kit redirection
RuleID : 25971 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit Portable Executable download
RuleID : 25968 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit malicious class file download
RuleID : 25967 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit malicious class file download
RuleID : 25966 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit malicious class file download
RuleID : 25965 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit malicious class file download
RuleID : 25964 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit SWF file download
RuleID : 25963 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit EOT file download
RuleID : 25962 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit former location - has been removed
RuleID : 25960 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit malicious class file download
RuleID : 25959 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit malicious class file download
RuleID : 25958 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit malicious class file download
RuleID : 25957 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit malicious class file download
RuleID : 25956 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit malicious jar file download
RuleID : 25955 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit SWF file download
RuleID : 25954 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit landing page
RuleID : 25953 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit landing page
RuleID : 25952 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit EOT file download
RuleID : 25951 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit PDF exploit
RuleID : 25950 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit java exploit retrieval
RuleID : 25862 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit java exploit retrieval
RuleID : 25861 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit landing page
RuleID : 25860 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit malicious jar file download
RuleID : 25859 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit Java exploit download
RuleID : 25858 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit PDF exploit
RuleID : 25857 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10Multiple exploit kit 32-alpha jar request
RuleID : 25798 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit redirection successful
RuleID : 25611 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit EOT file download
RuleID : 25598 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit EOT file download
RuleID : 25597 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit EOT file download
RuleID : 25596 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit java exploit retrieval
RuleID : 25595 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit java exploit retrieval
RuleID : 25594 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit java exploit retrieval
RuleID : 25593 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page - specific structure
RuleID : 25591 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit landing page - specific structure
RuleID : 25590 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Cool Exploit Kit SWF file download
RuleID : 25576 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Cool Exploit Kit SWF file download
RuleID : 25575 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Cool Exploit Kit SWF file download
RuleID : 25574 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Cool Exploit Kit SWF file download
RuleID : 25573 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit landing page
RuleID : 25569 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page retrieval
RuleID : 25568 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Multiple Exploit Kit Payload detection - setup.exe
RuleID : 25526 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit java exploit retrieval
RuleID : 25510 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit pdf exploit retrieval
RuleID : 25509 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit java exploit retrieval
RuleID : 25508 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit pdf exploit retrieval
RuleID : 25507 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit EOT file download
RuleID : 25506 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit EOT file download
RuleID : 25505 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit redirection successful
RuleID : 25388 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Multiple exploit kit Payload detection - readme.exe
RuleID : 25387 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Multiple exploit kit Payload detection - about.exe
RuleID : 25386 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Multiple exploit kit Payload detection - calc.exe
RuleID : 25385 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Multiple exploit kit Payload detection - contacts.exe
RuleID : 25384 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Multiple exploit kit Payload detection - info.exe
RuleID : 25383 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Multiple exploit kit malicious jar file dropped
RuleID : 25382 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit java exploit retrieval
RuleID : 25328 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit pdf exploit retrieval
RuleID : 25327 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit java exploit retrieval
RuleID : 25326 - Revision : 10 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit pdf exploit retrieval
RuleID : 25325 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit landing page detected
RuleID : 25324 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit EOT file download
RuleID : 25323 - Revision : 10 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit EOT file download
RuleID : 25322 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10Redkit exploit kit redirection attempt
RuleID : 25255 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit portable executable download request
RuleID : 25140 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit eot outbound connection
RuleID : 25139 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit pdf outbound connection
RuleID : 25138 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit jar outbound connection
RuleID : 25137 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit plugin detection connection
RuleID : 25136 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10Styx Exploit Kit outbound connection
RuleID : 25135 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit 32-bit font file download
RuleID : 25056 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit 64-bit font file download
RuleID : 25055 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Redkit outbound class retrieval
RuleID : 25053 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Redkit exploit kit Java Exploit requested - 3 digit
RuleID : 25052 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Redkit exploit kit landing page redirection
RuleID : 25051 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit requesting payload
RuleID : 25045 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit url structure detected
RuleID : 25043 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit landing page in an email
RuleID : 24865 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit landing page - specific-structure
RuleID : 24864 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit landing page in an email
RuleID : 24863 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit landing page - specific-structure
RuleID : 24862 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit landing page in an email
RuleID : 24861 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit landing page - specific-structure
RuleID : 24860 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit 64-bit font file download
RuleID : 24784 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit 32-bit font file download
RuleID : 24783 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit outbound request
RuleID : 24782 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit outbound request
RuleID : 24781 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit - PDF Exploit
RuleID : 24780 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit - PDF Exploit
RuleID : 24779 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10Cool exploit kit landing page - Title
RuleID : 24778 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit redirection successful
RuleID : 24638 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit redirection page - specific structure
RuleID : 24637 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit redirection page - specific structure
RuleID : 24636 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit landing page download attempt
RuleID : 24608 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit landing page received - specific structure
RuleID : 24593 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page download attempt
RuleID : 24548 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page download attempt
RuleID : 24547 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit landing page download attempt
RuleID : 24546 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Blackhole admin page outbound access attempt
RuleID : 24544 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Blackhole admin page inbound access attempt
RuleID : 24543 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit fallback executable download
RuleID : 24501 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Blackhole - Cookie Set
RuleID : 24475 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit landing page Received
RuleID : 24228 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 - URI Structure
RuleID : 24227 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit landing page received
RuleID : 24226 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Blackhole possible email Landing to 8 chr folder
RuleID : 24171 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page with specific structure
RuleID : 24054 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page with specific structure
RuleID : 24053 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page with specific structure - fewbgazr catch
RuleID : 23962 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page with specific structure - hwehes
RuleID : 23850 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackhole redirection attempt
RuleID : 23849 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackhole redirection attempt
RuleID : 23848 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Blackhole redirection page
RuleID : 23797 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page with specific structure - Math.round catch
RuleID : 23786 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page with specific structure - Math.floor catch
RuleID : 23785 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page
RuleID : 23781 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page request - tkr
RuleID : 23622 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page with specific structure - prototype catch ...
RuleID : 23619 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Redkit exploit kit landing page Received - applet and flowbit
RuleID : 23225 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Redkit exploit kit landing page Requested - 8Digit.html
RuleID : 23224 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Redkit exploit kit landing page Received - applet and code
RuleID : 23223 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10Redkit exploit kit landing page Received - applet and 5 digit jar attempt
RuleID : 23222 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10Redkit Jar File Naming Algorithm
RuleID : 23221 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10Redkit exploit kit Java Exploit Requested - 5 digit jar
RuleID : 23220 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Redkit exploit kit Java Exploit request to .class file
RuleID : 23219 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Redkit Repeated Exploit Request Pattern
RuleID : 23218 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page download attempt
RuleID : 23159 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page with specific structure - prototype catch
RuleID : 23158 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Nuclear Pack exploit kit binary download
RuleID : 23157 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10Nuclear Pack exploit kit landing page
RuleID : 23156 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10Blackhole redirection attempt
RuleID : 22949 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Blackhole Exploit Kit javascript service method
RuleID : 22088 - Revision : 12 - Type : EXPLOIT-KIT
2014-01-10Blackhole landing redirection page
RuleID : 22041 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Blackhole suspected landing page
RuleID : 22040 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Blackhole suspected landing page
RuleID : 22039 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit landing page with specific structure - Loading
RuleID : 21876 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10Possible exploit kit post compromise activity - taskkill
RuleID : 21875 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Possible exploit kit post compromise activity - StrReverse
RuleID : 21874 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Java JRE sandbox breach attempt
RuleID : 21869 - Revision : 4 - Type : FILE-OTHER
2014-01-10Phoenix exploit kit post-compromise behavior
RuleID : 21860 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Oracle Java JRE sandbox Atomic breach attempt
RuleID : 21667 - Revision : 7 - Type : FILE-JAVA
2014-01-10Oracle Java JRE sandbox Atomic breach attempt
RuleID : 21666 - Revision : 6 - Type : FILE-JAVA
2014-01-10Oracle Java JRE sandbox Atomic breach attempt
RuleID : 21665 - Revision : 5 - Type : FILE-JAVA
2014-01-10Oracle Java JRE sandbox Atomic breach attempt
RuleID : 21664 - Revision : 5 - Type : FILE-JAVA
2014-01-10Blackhole exploit kit landing page with specific structure - catch
RuleID : 21661 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page Requested - /Index/index.php
RuleID : 21660 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page Requested - /Home/index.php
RuleID : 21659 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page
RuleID : 21658 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page - specific structure
RuleID : 21657 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page with specific structure - prototype catch
RuleID : 21646-community - Revision : 14 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page with specific structure - prototype catch
RuleID : 21646 - Revision : 14 - Type : EXPLOIT-KIT
2014-01-10Phoenix exploit kit landing page
RuleID : 21640 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page with specific structure - BBB
RuleID : 21581 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page with specific header
RuleID : 21549 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page with specific header
RuleID : 21539 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page with specific structure - prototype catch
RuleID : 21492-community - Revision : 20 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page with specific structure - prototype catch
RuleID : 21492 - Revision : 20 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit JavaScript carat string splitting with hostile applet
RuleID : 21438-community - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit JavaScript carat string splitting with hostile applet
RuleID : 21438 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit URL - search.php?page=
RuleID : 21348 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit URL - .php?page=
RuleID : 21347 - Revision : 10 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit malicious jar download
RuleID : 21346 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit malicious jar request
RuleID : 21345 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit pdf download
RuleID : 21344 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit pdf request
RuleID : 21343 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit response
RuleID : 21259 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit control panel access
RuleID : 21141 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page
RuleID : 21045 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page
RuleID : 21044 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit post-compromise download attempt - .php?e=
RuleID : 21043 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit post-compromise download attempt - .php?f=
RuleID : 21042 - Revision : 10 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit URL - main.php?page=
RuleID : 21041 - Revision : 11 - Type : EXPLOIT-KIT

Metasploit Database

idDescription
2012-02-14 Java AtomicReferenceArray Type Violation Vulnerability

Nessus® Vulnerability Scanner

DateDescription
2014-11-08Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2013-1455.nasl - Type : ACT_GATHER_INFO
2014-01-27Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201401-30.nasl - Type : ACT_GATHER_INFO
2013-07-12Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2012-0322.nasl - Type : ACT_GATHER_INFO
2013-07-12Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2012-0135.nasl - Type : ACT_GATHER_INFO
2013-06-05Name : The remote host has a virtualization management application installed that is...
File : vmware_vcenter_vmsa-2012-0013.nasl - Type : ACT_GATHER_INFO
2013-02-22Name : The remote Unix host contains a programming platform that is affected by mult...
File : oracle_java_cpu_feb_2012_unix.nasl - Type : ACT_GATHER_INFO
2013-01-25Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_java-1_6_0-ibm-120427.nasl - Type : ACT_GATHER_INFO
2012-04-25Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2012-0514.nasl - Type : ACT_GATHER_INFO
2012-04-24Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2012-0508.nasl - Type : ACT_GATHER_INFO
2012-04-05Name : The remote host has a version of Java that is affected by multiple vulnerabil...
File : macosx_java_10_6_update7.nasl - Type : ACT_GATHER_INFO
2012-04-05Name : The remote host has a version of Java that is affected by multiple vulnerabil...
File : macosx_java_10_7_2012-001.nasl - Type : ACT_GATHER_INFO
2012-03-01Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1373-2.nasl - Type : ACT_GATHER_INFO
2012-02-29Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2420.nasl - Type : ACT_GATHER_INFO
2012-02-27Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1373-1.nasl - Type : ACT_GATHER_INFO
2012-02-22Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2012-0322.nasl - Type : ACT_GATHER_INFO
2012-02-17Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2012-0139.nasl - Type : ACT_GATHER_INFO
2012-02-16Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2012-0135.nasl - Type : ACT_GATHER_INFO
2012-02-15Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2012-0135.nasl - Type : ACT_GATHER_INFO
2012-02-15Name : The remote Windows host contains a programming platform that is affected by m...
File : oracle_java_cpu_feb_2012.nasl - Type : ACT_GATHER_INFO

Internal Sources (Detail)

SourceUrl
BIDhttp://www.securityfocus.com/bid/52161
CONFIRMhttp://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html
https://bugzilla.redhat.com/show_bug.cgi?id=788994
DEBIANhttp://www.debian.org/security/2012/dsa-2420
MISChttp://blogs.technet.com/b/mmpc/archive/2012/03/20/an-interesting-case-of-jre...
http://krebsonsecurity.com/2012/03/new-java-attack-rolled-into-exploit-packs/
http://weblog.ikvm.net/PermaLink.aspx?guid=cd48169a-9405-4f63-9087-798c4a1866d3
REDHAThttp://rhn.redhat.com/errata/RHSA-2013-1455.html
SECUNIAhttp://secunia.com/advisories/48589
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/48950

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
DateInformations
2014-11-08 13:30:00
  • Multiple Updates
2014-02-21 21:20:35
  • Multiple Updates
2014-02-17 11:07:44
  • Multiple Updates
2014-02-07 13:19:57
  • Multiple Updates
2014-01-19 21:28:26
  • Multiple Updates
2013-11-11 12:39:47
  • Multiple Updates
2013-10-31 13:19:11
  • Multiple Updates
2013-05-10 22:33:01
  • Multiple Updates
2013-02-15 13:20:26
  • Multiple Updates
2012-12-06 13:20:10
  • Multiple Updates