Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name TA15-119A First vendor Publication 2015-04-29
Vendor US-CERT Last vendor Modification 2015-04-29
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Overview

Cyber threat actors continue to exploit unpatched software to conduct attacks against critical infrastructure organizations. As many as 85 percent of targeted attacks are preventable [1].


This Alert provides information on the 30 most commonly exploited vulnerabilities used in these attacks, along with prevention and mitigation recommendations.


It is based on analysis completed by the Canadian Cyber Incident Response Centre (CCIRC) and was developed in collaboration with our partners from Canada, New Zealand, the United Kingdom, and the Australian Cyber Security Centre.


Description


Unpatched vulnerabilities allow malicious actors entry points into a network. A set of vulnerabilities are consistently targeted in observed attacks.


Impact


A successful network intrusion can have severe impacts, particularly if the compromise becomes public and sensitive information is exposed. Possible impacts include:



  • Temporary or permanent loss of sensitive or proprietary information,

  • Disruption to regular operations,

  • Financial losses relating to restoring systems and files, and

  • Potential harm to an organization’s reputation.


Solution


Maintain up-to-date software.


The attack vectors frequently used by malicious actors such as email attachments, compromised “watering hole” websites, and other tools often rely on taking advantage of unpatched vulnerabilities found in widely used software applications. Patching is the process of repairing vulnerabilities found in these software components.


It is necessary for all organizations to establish a strong ongoing patch management process to ensure the proper preventive measures are taken against potential threats. The longer a system remains unpatched, the longer it is vulnerable to being compromised. Once a patch has been publicly released, the underlying vulnerability can be reverse engineered by malicious actors in order to create an exploit. This process has been documented to take anywhere from 24-hours to four days. Timely patching is one of the lowest cost yet most effective steps an organization can take to minimize its exposure to the threats facing its network.


Patch commonly exploited vulnerabilities.


Executives should ensure their organization’s information security professionals have patched the following software vulnerabilities. Please see patching information for version specifics.
























































































Microsoft

CVE



Affected Products



Patching Information


CVE-2006-3227 ​Internet Explorer Microsoft Malware Protection Encyclopedia Entry

CVE-2008-2244



Office Word



Microsoft Security Bulletin MS08-042



CVE-2009-3129



Office
Office for Mac
Open XML File Format Converter for Mac
Office Excel Viewer
Excel
Office Compatibility Pack for Word, Excel, and PowerPoint



Microsoft Security Bulletin MS09-067


​CVE-2009-3674 ​Internet Explorer ​Microsoft Security Bulletin MS09-072
CVE-2010-0806​ ​Internet Explorer Microsoft Security Bulletin MS10-018

CVE-2010-3333



Office
Office for Mac
Open XML File Format Converter for Mac



Microsoft Security Bulletin MS10-087



CVE-2011-0101



Excel




Microsoft Security Bulletin MS11-021



CVE-2012-0158



Office
SQL Server
BizTalk Server
Commerce Server
Visual FoxPro
Visual Basic



Microsoft Security Bulletin MS12-027



CVE-2012-1856



Office
SQL Server
Commerce Server
Host Integration Server
Visual FoxPro Visual Basic



Microsoft Security Bulletin MS12-060


​CVE-2012-4792 ​Internet Explorer ​Microsoft Security Bulletin MS13-008
CVE-2013-0074 ​Silverlight and Developer Runtime Microsoft Security Bulletin MS13-022
CVE-2013-1347 ​Internet Explorer Microsoft Security Bulletin MS13-038
CVE-2014-0322​ ​​Internet Explorer Microsoft Security Bulletin MS14-012

CVE-2014-1761



Microsoft Word
Office Word Viewer
Office Compatibility Pack
Office for Mac
Word Automation Services on SharePoint Server
Office Web Apps
Office Web Apps Server




​CVE-2014-1776 ​Internet Explorer Microsoft Security Bulletin MS14-021


​Windows Microsoft Security Bulletin MS14-060

 

 


















Oracle

CVE



Affected Products



Patching Information



CVE-2012-1723



Java Development Kit, SDK, and JRE





CVE-2013-2465



Java Development Kit and JRE



Oracle Java SE Critical Patch Update Advisory - June 2013



 

 
































































Adobe

CVE



Affected Products



Patching Information


​CVE-2009-3953
Reader

Acrobat ​

Adobe Security Bulletin APSB10-02​
​CVE-2010-0188
​Reader

Acrobat

Adobe Security Bulletin APSB10-07
CVE-2010-2883
Reader

Acrobat ​

Adobe Security Bulletin APSB10-21
CVE-2011-0611
​Flash Player

AIR

Reader

Acrobat




​CVE-2011-2462
Reader

Acrobat ​

Adobe Security Bulletin APSB11-30
​CVE-2013-0625 ColdFusion​ Adobe Security Bulletin APSB13-03
CVE-2013-0632 ​ColdFusion Adobe Security Bulletin APSB13-03
​CVE-2013-2729
​Reader

Acrobat

Adobe Security Bulletin APSB13-15
​CVE-2013-3336 ​ColdFusion Adobe Security Bulletin APSB13-13
CVE-2013-5326

 



​ColdFusion Adobe Security Bulletin APSB13-27

CVE-2014-0564



Flash Player
AIR
AIR SDK & Compiler



Adobe Security Bulletin APSB14-22



 















OpenSSL

CVE



Affected Product



Patching Information



CVE-2014-0160



OpenSSL



CERT Vulnerability Note VU#720951



 

 

Implement the following four mitigation strategies.


As part of a comprehensive security strategy, network administrators should implement the following four mitigation strategies, which can help prevent targeted cyber attacks.



























Ranking



Mitigation Strategy



Rationale



1



Use application whitelisting to help prevent malicious software and unapproved programs from running.



Application whitelisting is one of the best security strategies as it allows only specified programs to run, while blocking all others, including malicious software.



2



Patch applications such as Java, PDF viewers, Flash, web browsers and Microsoft Office.



Vulnerable applications and operating systems are the target of most attacks. Ensuring these are patched with the latest updates greatly reduces the number of exploitable entry points available to an attacker.



3



Patch operating system vulnerabilities.



4



Restrict administrative privileges to operating systems and applications based on user duties.



Restricting these privileges may prevent malware from running or limit its capability to spread through the network.




It is recommended that users review US-CERT Security Tip (ST13-003) and CCIRC’s Mitigation Guidelines for Advanced Persistent Threats for additional background information and to assist in the detection of, response to, and recovery from malicious activity linked to advance persistent threats [2, 3].


Original Source

Url : http://www.us-cert.gov/cas/techalerts/TA15-119A.html

CWE : Common Weakness Enumeration

% Id Name
23 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
23 % CWE-94 Failure to Control Generation of Code ('Code Injection')
18 % CWE-399 Resource Management Errors
9 % CWE-416 Use After Free
5 % CWE-255 Credentials Management
5 % CWE-200 Information Exposure
5 % CWE-189 Numeric Errors (CWE/SANS Top 25)
5 % CWE-125 Out-of-bounds Read
5 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)
5 % CWE-20 Improper Input Validation

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:11586
 
Oval ID: oval:org.mitre.oval:def:11586
Title: Adobe Reader and Acrobat CoolType.dll Font Parsing Buffer Overflow Vulnerability
Description: Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information.
Family: windows Class: vulnerability
Reference(s): CVE-2010-2883
Version: 20
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows 7
Product(s): Adobe Reader
Adobe Acrobat
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:11676
 
Oval ID: oval:org.mitre.oval:def:11676
Title: Excel Record Parsing WriteAV Vulnerability
Description: Microsoft Excel 2002 SP3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted RealTimeData record, related to a stTopic field, doubly-byte characters, and an incorrect pointer calculation, aka "Excel Record Parsing WriteAV Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2011-0101
Version: 6
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows 7
Product(s): Microsoft Excel 2002
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:11931
 
Oval ID: oval:org.mitre.oval:def:11931
Title: RTF Stack Buffer Overflow Vulnerability
Description: Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via crafted RTF data, aka "RTF Stack Buffer Overflow Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2010-3333
Version: 8
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows 7
Product(s): Microsoft Office XP
Microsoft Office 2003
Microsoft Office 2007
Microsoft Office 2010
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:14175
 
Oval ID: oval:org.mitre.oval:def:14175
Title: Adobe Flash Player before 10.2.154.27 on Windows, Mac OS X, Linux, and Solaris and 10.2.156.12 and earlier on Android; Adobe AIR before 2.6.19140; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader 9.x before 9.4.4 and 10.x through 10.0.1 on Windows, Adobe Reader 9.x before 9.4.4 and 10.x before 10.0.3 on Mac OS X, and Adobe Acrobat 9.x before 9.4.4 and 10.x before 10.0.3 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content; as demonstrated by a Microsoft Office document with an embedded .swf file that has a size inconsistency in a "group of included constants," object type confusion, ActionScript that adds custom functions to prototypes, and Date objects; and as exploited in the wild in April 2011.
Description: Adobe Flash Player before 10.2.154.27 on Windows, Mac OS X, Linux, and Solaris and 10.2.156.12 and earlier on Android; Adobe AIR before 2.6.19140; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader 9.x before 9.4.4 and 10.x through 10.0.1 on Windows, Adobe Reader 9.x before 9.4.4 and 10.x before 10.0.3 on Mac OS X, and Adobe Acrobat 9.x before 9.4.4 and 10.x before 10.0.3 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content; as demonstrated by a Microsoft Office document with an embedded .swf file that has a size inconsistency in a "group of included constants," object type confusion, ActionScript that adds custom functions to prototypes, and Date objects; and as exploited in the wild in April 2011.
Family: windows Class: vulnerability
Reference(s): CVE-2011-0611
Version: 25
Platform(s): Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows Vista
Microsoft Windows Server 2003
Microsoft Windows XP
Microsoft Windows 2000
Microsoft Windows Server 2008 R2
Microsoft Windows 8
Microsoft Windows Server 2012
Microsoft Windows 8.1
Microsoft Windows Server 2012 R2
Product(s): Adobe Flash Player
Adobe Acrobat
Adobe Air
Adobe Reader
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:14562
 
Oval ID: oval:org.mitre.oval:def:14562
Title: Unspecified vulnerability in the U3D component in Adobe Reader and Acrobat 10.1.1 and earlier on Windows and Mac OS X, and Adobe Reader 9.x through 9.4.6 on UNIX, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, as exploited in the wild in December 2011.
Description: Unspecified vulnerability in the U3D component in Adobe Reader and Acrobat 10.1.1 and earlier on Windows and Mac OS X, and Adobe Reader 9.x through 9.4.6 on UNIX, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, as exploited in the wild in December 2011.
Family: windows Class: vulnerability
Reference(s): CVE-2011-2462
Version: 14
Platform(s): Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows Vista
Microsoft Windows Server 2003
Microsoft Windows XP
Microsoft Windows 2000
Product(s): Adobe Reader
Adobe Acrobat
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:15447
 
Oval ID: oval:org.mitre.oval:def:15447
Title: MSCOMCTL.OCX RCE Vulnerability - MS12-060
Description: The TabStrip ActiveX control in the Common Controls in MSCOMCTL.OCX in Microsoft Office 2003 SP3, Office 2003 Web Components SP3, Office 2007 SP2 and SP3, Office 2010 SP1, SQL Server 2000 SP4, SQL Server 2005 SP4, SQL Server 2008 SP2, SP3, R2, R2 SP1, and R2 SP2, Commerce Server 2002 SP4, Commerce Server 2007 SP2, Commerce Server 2009 Gold and R2, Host Integration Server 2004 SP1, Visual FoxPro 8.0 SP1, Visual FoxPro 9.0 SP2, and Visual Basic 6.0 Runtime allows remote attackers to execute arbitrary code via a crafted (1) document or (2) web page that triggers system-state corruption, aka "MSCOMCTL.OCX RCE Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2012-1856
Version: 9
Platform(s): Microsoft Windows 2000
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Product(s): Microsoft Host Integration Server 2004
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office 2003
Microsoft Office 2003 Web Components
Microsoft Visual FoxPro 8.0
Microsoft Visual FoxPro 9.0
Microsoft SQL Server 2000 Analysis Services
Microsoft SQL Server 2000
Microsoft SQL Server 2005
Microsoft SQL Server 2008
Microsoft SQL Server 2008 R2
Microsoft Commerce Server 2002
Microsoft Commerce Server 2007
Microsoft Commerce Server 2009
Microsoft Commerce Server 2009 R2
Microsoft Visual Basic 6.0
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:15462
 
Oval ID: oval:org.mitre.oval:def:15462
Title: MSCOMCTL.OCX RCE Vulnerability
Description: The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX controls in MSCOMCTL.OCX in the Common Controls in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Office 2003 Web Components SP3; SQL Server 2000 SP4, 2005 SP4, and 2008 SP2, SP3, and R2; BizTalk Server 2002 SP1; Commerce Server 2002 SP4, 2007 SP2, and 2009 Gold and R2; Visual FoxPro 8.0 SP1 and 9.0 SP2; and Visual Basic 6.0 Runtime allow remote attackers to execute arbitrary code via a crafted (a) web site, (b) Office document, or (c) .rtf file that triggers "system state" corruption, as exploited in the wild in April 2012, aka "MSCOMCTL.OCX RCE Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2012-0158
Version: 10
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 7
Product(s): Microsoft Office 2003
Microsoft Office 2003 Web Components
Microsoft Office 2007
Microsoft Office 2010
Microsoft SQL Server 2000 Analysis Services
Microsoft SQL Server 2000
Microsoft SQL Server 2005 Express Edition
Microsoft SQL Server 2005
Microsoft SQL Server 2008
Microsoft SQL Server 2008 R2
Microsoft BizTalk Server 2002
Microsoft Commerce Server 2002
Microsoft Commerce Server 2007
Microsoft Commerce Server 2009
Microsoft Commerce Server 2009 R2
Microsoft Visual FoxPro 8.0
Microsoft Visual FoxPro 9.0
Visual Basic 6.0 Runtime
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:16259
 
Oval ID: oval:org.mitre.oval:def:16259
Title: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE (subcomponent: Hotspot) 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
Family: windows Class: vulnerability
Reference(s): CVE-2012-1723
Version: 6
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Product(s): Java Runtime Environment
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:16361
 
Oval ID: oval:org.mitre.oval:def:16361
Title: Internet Explorer Use After Free Vulnerability - MS13-008
Description: Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated by a CDwnBindInfo object, and exploited in the wild in December 2012.
Family: windows Class: vulnerability
Reference(s): CVE-2012-4792
Version: 5
Platform(s): Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Product(s): Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
Microsoft Internet Explorer 8
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:16516
 
Oval ID: oval:org.mitre.oval:def:16516
Title: Double dereference vulnerability in Microsoft Silverlight - MS13-022
Description: Microsoft Silverlight 5, and 5 Developer Runtime, before 5.1.20125.0 does not properly validate pointers during HTML object rendering, which allows remote attackers to execute arbitrary code via a crafted Silverlight application, aka "Silverlight Double Dereference Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-0074
Version: 6
Platform(s): Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 8
Microsoft Windows Server 2012
Product(s): Microsoft Silverlight 5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:16565
 
Oval ID: oval:org.mitre.oval:def:16565
Title: Double dereference vulnerability in Microsoft Silverlight - MS13-022 (Mac OS X)
Description: Microsoft Silverlight 5, and 5 Developer Runtime, before 5.1.20125.0 does not properly validate pointers during HTML object rendering, which allows remote attackers to execute arbitrary code via a crafted Silverlight application, aka "Silverlight Double Dereference Vulnerability."
Family: macos Class: vulnerability
Reference(s): CVE-2013-0074
Version: 3
Platform(s): Apple Mac OS X
Apple Mac OS X Server
Product(s): Microsoft Silverlight 5 for Mac
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:16717
 
Oval ID: oval:org.mitre.oval:def:16717
Title: Integer overflow in Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-2727
Description: Integer overflow in Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-2727.
Family: windows Class: vulnerability
Reference(s): CVE-2013-2729
Version: 3
Platform(s): Microsoft Windows 2000
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows 8
Microsoft Windows Server 2012
Product(s): Adobe Reader
Adobe Acrobat
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:16727
 
Oval ID: oval:org.mitre.oval:def:16727
Title: Internet Explorer Use After Free Vulnerability - MS13-038
Description: Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly allocated or (2) is deleted, as exploited in the wild in May 2013.
Family: windows Class: vulnerability
Reference(s): CVE-2013-1347
Version: 5
Platform(s): Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows 7
Product(s): Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:17106
 
Oval ID: oval:org.mitre.oval:def:17106
Title: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image channel verification" in 2D.
Family: windows Class: vulnerability
Reference(s): CVE-2013-2465
Version: 8
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Product(s): Java Runtime Environment
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18954
 
Oval ID: oval:org.mitre.oval:def:18954
Title: HP-UX Running Java, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
Family: unix Class: vulnerability
Reference(s): CVE-2012-1723
Version: 12
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:19074
 
Oval ID: oval:org.mitre.oval:def:19074
Title: HP-UX Running Java5 Runtime Environment (JRE) and Java Developer Kit (JDK), Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image channel verification" in 2D.
Family: unix Class: vulnerability
Reference(s): CVE-2013-2465
Version: 12
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:19455
 
Oval ID: oval:org.mitre.oval:def:19455
Title: HP-UX Running Java7, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image channel verification" in 2D.
Family: unix Class: vulnerability
Reference(s): CVE-2013-2465
Version: 11
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:19703
 
Oval ID: oval:org.mitre.oval:def:19703
Title: HP-UX Running Java6, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image channel verification" in 2D.
Family: unix Class: vulnerability
Reference(s): CVE-2013-2465
Version: 12
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21697
 
Oval ID: oval:org.mitre.oval:def:21697
Title: RHSA-2011:0451: flash-plugin security update (Critical)
Description: Adobe Flash Player before 10.2.154.27 on Windows, Mac OS X, Linux, and Solaris and 10.2.156.12 and earlier on Android; Adobe AIR before 2.6.19140; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader 9.x before 9.4.4 and 10.x through 10.0.1 on Windows, Adobe Reader 9.x before 9.4.4 and 10.x before 10.0.3 on Mac OS X, and Adobe Acrobat 9.x before 9.4.4 and 10.x before 10.0.3 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content; as demonstrated by a Microsoft Office document with an embedded .swf file that has a size inconsistency in a "group of included constants," object type confusion, ActionScript that adds custom functions to prototypes, and Date objects; and as exploited in the wild in April 2011.
Family: unix Class: patch
Reference(s): RHSA-2011:0451-01
CVE-2011-0611
Version: 4
Platform(s): Red Hat Enterprise Linux 5
Red Hat Enterprise Linux 6
Product(s): flash-plugin
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22083
 
Oval ID: oval:org.mitre.oval:def:22083
Title: ELSA-2010:0114: acroread security and bug fix update (Critical)
Description: Unspecified vulnerability in Adobe Reader and Acrobat 8.x before 8.2.1 and 9.x before 9.3.1 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.
Family: unix Class: patch
Reference(s): ELSA-2010:0114-01
CVE-2010-0186
CVE-2010-0188
Version: 13
Platform(s): Oracle Linux 5
Product(s): acroread
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22136
 
Oval ID: oval:org.mitre.oval:def:22136
Title: RHSA-2010:0114: acroread security and bug fix update (Critical)
Description: Unspecified vulnerability in Adobe Reader and Acrobat 8.x before 8.2.1 and 9.x before 9.3.1 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.
Family: unix Class: patch
Reference(s): RHSA-2010:0114-01
CVE-2010-0186
CVE-2010-0188
Version: 29
Platform(s): Red Hat Enterprise Linux 5
Product(s): acroread
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22660
 
Oval ID: oval:org.mitre.oval:def:22660
Title: Internet Explorer Memory Corruption Vulnerability (CVE-2014-0322) - MS14-012
Description: Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via vectors involving crafted JavaScript code, CMarkup, and the onpropertychange attribute of a script element, as exploited in the wild in January and February 2014.
Family: windows Class: vulnerability
Reference(s): CVE-2014-0322
Version: 6
Platform(s): Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows 7
Microsoft Windows 8
Product(s): Microsoft Internet Explorer 9
Microsoft Internet Explorer 10
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23182
 
Oval ID: oval:org.mitre.oval:def:23182
Title: DEPRECATED: ELSA-2011:0451: flash-plugin security update (Critical)
Description: Adobe Flash Player before 10.2.154.27 on Windows, Mac OS X, Linux, and Solaris and 10.2.156.12 and earlier on Android; Adobe AIR before 2.6.19140; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader 9.x before 9.4.4 and 10.x through 10.0.1 on Windows, Adobe Reader 9.x before 9.4.4 and 10.x before 10.0.3 on Mac OS X, and Adobe Acrobat 9.x before 9.4.4 and 10.x before 10.0.3 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content; as demonstrated by a Microsoft Office document with an embedded .swf file that has a size inconsistency in a "group of included constants," object type confusion, ActionScript that adds custom functions to prototypes, and Date objects; and as exploited in the wild in April 2011.
Family: unix Class: patch
Reference(s): ELSA-2011:0451-01
CVE-2011-0611
Version: 7
Platform(s): Oracle Linux 5
Oracle Linux 6
Product(s): flash-plugin
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23213
 
Oval ID: oval:org.mitre.oval:def:23213
Title: ELSA-2011:0451: flash-plugin security update (Critical)
Description: Adobe Flash Player before 10.2.154.27 on Windows, Mac OS X, Linux, and Solaris and 10.2.156.12 and earlier on Android; Adobe AIR before 2.6.19140; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader 9.x before 9.4.4 and 10.x through 10.0.1 on Windows, Adobe Reader 9.x before 9.4.4 and 10.x before 10.0.3 on Mac OS X, and Adobe Acrobat 9.x before 9.4.4 and 10.x before 10.0.3 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content; as demonstrated by a Microsoft Office document with an embedded .swf file that has a size inconsistency in a "group of included constants," object type confusion, ActionScript that adds custom functions to prototypes, and Date objects; and as exploited in the wild in April 2011.
Family: unix Class: patch
Reference(s): ELSA-2011:0451-01
CVE-2011-0611
Version: 6
Platform(s): Oracle Linux 5
Oracle Linux 6
Product(s): flash-plugin
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23812
 
Oval ID: oval:org.mitre.oval:def:23812
Title: DEPRECATED: ELSA-2014:0376: openssl security update (Important)
Description: OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library. An information disclosure flaw was found in the way OpenSSL handled TLS and DTLS Heartbeat Extension packets. A malicious TLS or DTLS client or server could send a specially crafted TLS or DTLS Heartbeat packet to disclose a limited portion of memory per request from a connected client or server. Note that the disclosed portions of memory could potentially include sensitive information such as private keys. (CVE-2014-0160) Red Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges Neel Mehta of Google Security as the original reporter. All OpenSSL users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted.
Family: unix Class: patch
Reference(s): ELSA-2014:0376-00
CVE-2014-0160
Version: 4
Platform(s): Oracle Linux 6
Product(s): openssl
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23983
 
Oval ID: oval:org.mitre.oval:def:23983
Title: Word RTF memory corruption vulnerability (CVE-2014-1761) - MS14-017
Description: Microsoft Word 2003 SP3, 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Word Viewer; Office Compatibility Pack SP3; Office for Mac 2011; Word Automation Services on SharePoint Server 2010 SP1 and SP2 and 2013; Office Web Apps 2010 SP1 and SP2; and Office Web Apps Server 2013 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted RTF data, as exploited in the wild in March 2014.
Family: windows Class: vulnerability
Reference(s): CVE-2014-1761
Version: 5
Platform(s): Microsoft Windows 2000
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows 8.1
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Microsoft Windows Vista
Microsoft Windows XP
Product(s): Microsoft Office Compatibility Pack
Microsoft Word 2003
Microsoft Word 2007
Microsoft Word 2010
Microsoft Word 2013
Microsoft Word Viewer
Microsoft Office Web Apps 2010
Microsoft Office Web Apps Server 2013
Microsoft SharePoint Server 2010
Microsoft SharePoint Server 2013
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:24241
 
Oval ID: oval:org.mitre.oval:def:24241
Title: The TLS and DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read
Description: The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.
Family: windows Class: vulnerability
Reference(s): CVE-2014-0160
Version: 10
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows 7
Microsoft Windows Server 2008 R2
Microsoft Windows 8
Microsoft Windows Server 2012
Microsoft Windows 8.1
Microsoft Windows Server 2012 R2
Product(s): OpenSSL
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:24324
 
Oval ID: oval:org.mitre.oval:def:24324
Title: ELSA-2014:0376: openssl security update (Important)
Description: OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library. An information disclosure flaw was found in the way OpenSSL handled TLS and DTLS Heartbeat Extension packets. A malicious TLS or DTLS client or server could send a specially crafted TLS or DTLS Heartbeat packet to disclose a limited portion of memory per request from a connected client or server. Note that the disclosed portions of memory could potentially include sensitive information such as private keys. (CVE-2014-0160) Red Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges Neel Mehta of Google Security as the original reporter. All OpenSSL users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted.
Family: unix Class: patch
Reference(s): ELSA-2014:0376-00
CESA-2014:0160
CVE-2014-0160
Version: 9
Platform(s): Oracle Linux 6
CentOS Linux 6
Product(s): openssl
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:24472
 
Oval ID: oval:org.mitre.oval:def:24472
Title: Vulnerabilities in Microsoft Word could allow remote code execution (CVE-2014-1761) - MS14-017
Description: Microsoft Word 2003 SP3, 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Word Viewer; Office Compatibility Pack SP3; Office for Mac 2011; Word Automation Services on SharePoint Server 2010 SP1 and SP2 and 2013; Office Web Apps 2010 SP1 and SP2; and Office Web Apps Server 2013 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted RTF data, as exploited in the wild in March 2014.
Family: macos Class: vulnerability
Reference(s): CVE-2014-1761
Version: 3
Platform(s): Apple Mac OS X
Apple Mac OS X Server
Product(s): Microsoft Office 2011 for Mac
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:24704
 
Oval ID: oval:org.mitre.oval:def:24704
Title: Internet Explorer Memory corruption vulnerability (CVE-2014-1776) - MS14-021
Description: Use-after-free vulnerability in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to the CMarkup::IsConnectedToPrimaryMarkup function, as exploited in the wild in April 2014. NOTE: this issue originally emphasized VGX.DLL, but Microsoft clarified that "VGX.DLL does not contain the vulnerable code leveraged in this exploit. Disabling VGX.DLL is an exploit-specific workaround that provides an immediate, effective workaround to help block known attacks."
Family: windows Class: vulnerability
Reference(s): CVE-2014-1776
Version: 6
Platform(s): Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows 8.1
Product(s): Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:24718
 
Oval ID: oval:org.mitre.oval:def:24718
Title: RHSA-2014:0376: openssl security update (Important)
Description: OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library. An information disclosure flaw was found in the way OpenSSL handled TLS and DTLS Heartbeat Extension packets. A malicious TLS or DTLS client or server could send a specially crafted TLS or DTLS Heartbeat packet to disclose a limited portion of memory per request from a connected client or server. Note that the disclosed portions of memory could potentially include sensitive information such as private keys. (CVE-2014-0160) Red Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges Neel Mehta of Google Security as the original reporter. All OpenSSL users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted.
Family: unix Class: patch
Reference(s): RHSA-2014:0376-00
CVE-2014-0160
CESA-2014:0376
Version: 9
Platform(s): Red Hat Enterprise Linux 6
CentOS Linux 6
Product(s): openssl
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:26160
 
Oval ID: oval:org.mitre.oval:def:26160
Title: Windows OLE remote code execution vulnerability - CVE-2014-4114 (MS14-060)
Description: Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted OLE object in an Office document, as exploited in the wild with a "Sandworm" attack in June through October 2014, aka "Windows OLE Remote Code Execution Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2014-4114
Version: 3
Platform(s): Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows 8.1
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:26742
 
Oval ID: oval:org.mitre.oval:def:26742
Title: DEPRECATED: ELSA-2014-0376 -- openssl security update (Important)
Description: OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library. An information disclosure flaw was found in the way OpenSSL handled TLS and DTLS Heartbeat Extension packets. A malicious TLS or DTLS client or server could send a specially crafted TLS or DTLS Heartbeat packet to disclose a limited portion of memory per request from a connected client or server. Note that the disclosed portions of memory could potentially include sensitive information such as private keys. (CVE-2014-0160) Red Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges Neel Mehta of Google Security as the original reporter. All OpenSSL users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted.
Family: unix Class: patch
Reference(s): ELSA-2014-0376
CVE-2014-0160
Version: 4
Platform(s): Oracle Linux 6
Product(s): openssl
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:29321
 
Oval ID: oval:org.mitre.oval:def:29321
Title: DSA-2896-2 -- openssl -- security update
Description: A vulnerability has been discovered in OpenSSL's support for the TLS/DTLS Heartbeat extension. Up to 64KB of memory from either client or server can be recovered by an attacker. This vulnerability might allow an attacker to compromise the private key and other sensitive data in memory.
Family: unix Class: patch
Reference(s): DSA-2896-2
CVE-2014-0160
Version: 3
Platform(s): Debian GNU/Linux 7.0
Debian GNU/kFreeBSD 7.0
Product(s): openssl
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:5897
 
Oval ID: oval:org.mitre.oval:def:5897
Title: Word Record Parsing Vulnerability
Description: Microsoft Office Word 2002 SP3 allows remote attackers to execute arbitrary code via a .doc file that contains malformed data, as exploited in the wild in July 2008, and as demonstrated by attachement.doc.
Family: windows Class: vulnerability
Reference(s): CVE-2008-2244
Version: 5
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Product(s): Microsoft Excel 2002
Microsoft Word 2003
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:6521
 
Oval ID: oval:org.mitre.oval:def:6521
Title: Excel Featheader Record Memory Corruption Vulnerability
Description: Microsoft Office Excel 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Excel Viewer 2003 SP3; Office Excel Viewer SP1 and SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allows remote attackers to execute arbitrary code via a spreadsheet with a FEATHEADER record containing an invalid cbHdrData size element that affects a pointer offset, aka "Excel Featheader Record Memory Corruption Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2009-3129
Version: 8
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows 7
Product(s): Microsoft Excel 2002
Microsoft Excel 2003
Microsoft Excel 2007
Microsoft Office Excel Viewer 2003
Microsoft Office Excel Viewer
Microsoft Office Compatibility Pack
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:6570
 
Oval ID: oval:org.mitre.oval:def:6570
Title: Uninitialized Memory Corruption Vulnerability (CVE-2009-3674)
Description: Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2009-3671.
Family: windows Class: vulnerability
Reference(s): CVE-2009-3674
Version: 8
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:8242
 
Oval ID: oval:org.mitre.oval:def:8242
Title: Adobe Reader and Acrobat U3D Remote Code Execution Vulnerability
Description: The U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, 8.x before 8.2 on Windows and Mac OS X, and 7.x before 7.1.4 allows remote attackers to execute arbitrary code via malformed U3D data in a PDF document, related to a CLODProgressiveMeshDeclaration "array boundary issue," a different vulnerability than CVE-2009-2994.
Family: windows Class: vulnerability
Reference(s): CVE-2009-3953
Version: 16
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows 7
Product(s): Adobe Reader
Adobe Acrobat
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:8446
 
Oval ID: oval:org.mitre.oval:def:8446
Title: Uninitialized Memory Corruption Vulnerability (CVE-2010-0806)
Description: Use-after-free vulnerability in the Peer Objects component (aka iepeers.dll) in Microsoft Internet Explorer 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via vectors involving access to an invalid pointer after the deletion of an object, as exploited in the wild in March 2010, aka "Uninitialized Memory Corruption Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2010-0806
Version: 6
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Product(s): Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:8697
 
Oval ID: oval:org.mitre.oval:def:8697
Title: Adobe Reader and Acrobat Null Pointer Dereference Denial of Service Vulnerability
Description: Unspecified vulnerability in Adobe Reader and Acrobat 8.x before 8.2.1 and 9.x before 9.3.1 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.
Family: windows Class: vulnerability
Reference(s): CVE-2010-0188
Version: 16
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows 7
Product(s): Adobe Reader
Adobe Acrobat
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 173
Application 116
Application 1
Application 10
Application 56
Application 336
Application 1
Application 1212
Application 1
Application 4
Application 2
Application 4
Application 3
Application 1
Application 9
Application 10
Application 1
Application 2
Application 1
Application 1
Application 1
Application 1
Application 3
Application 26
Application 21
Application 1
Application 2
Application 7
Application 1
Application 6
Application 5
Application 301
Application 269
Application 189
Application 1
Application 1
Application 1
Application 1
Application 1
Application 290
Application 332
Os 3
Os 3
Os 2
Os 1
Os 2
Os 2
Os 1
Os 1
Os 1
Os 1
Os 1
Os 12
Os 2
Os 4
Os 4
Os 2
Os 1
Os 1
Os 1
Os 1
Os 1
Os 1

SAINT Exploits

Description Link
Internet Explorer iepeers.dll use-after-free vulnerability More info here
Internet Explorer CButton Use After Free Vulnerability More info here
Internet Explorer CMarkup Object Handling Use-after-free Vulnerability More info here
Adobe Reader CoolType.dll buffer overflow More info here
Microsoft Windows Common Controls MSCOMCTL.OCX Vulnerability More info here
Oracle Java Runtime Hotspot Bytecode Verifier Type Confusion More info here
Microsoft Office RTF pFragments Property Stack Buffer Overflow More info here
Oracle Java Runtime Environment AWT storeImageArray Vulnerability More info here
Windows OLE Package Manager CPackage::DoVerb() INF File Download Vulnerability More info here
Adobe Flash Player callMethod Bytecode Memory Corruption More info here
Internet Explorer CGenericElement Object Use-after-free Vulnerability More info here
Adobe Reader Libtiff TIFFFetchShortPair Stack Buffer Overflow More info here
Microsoft Word RTF Object Confusion More info here
Adobe Reader U3D Heap Overflow More info here

ExploitDB Exploits

id Description
2014-11-14 MS14-064 Microsoft Windows OLE Package Manager Code Execution Through Python
2014-10-25 Windows OLE - Remote Code Execution "Sandworm" Exploit (MS14-060)
2014-10-20 MS14-060 Microsoft Windows OLE Package Manager Code Execution
2014-10-20 Windows OLE Package Manager SandWorm Exploit
2014-04-24 Heartbleed OpenSSL - Information Leak Exploit (2) - DTLS Support
2014-04-16 MS14-012 Microsoft Internet Explorer CMarkup Use-After-Free
2014-04-14 MS14-012 Internet Explorer CMarkup Use-After-Free
2014-04-10 MS14-017 Microsoft Word RTF Object Confusion
2014-04-10 Heartbleed OpenSSL - Information Leak Exploit (1)
2014-04-09 OpenSSL 1.0.1f TLS Heartbeat Extension - Memory Disclosure (Multiple SSL/TLS ...
2014-04-08 OpenSSL TLS Heartbeat Extension - Memory Disclosure
2013-11-27 MS12-022 Microsoft Internet Explorer COALineDashStyleArray Unsafe Memory Access
2013-08-21 Adobe ColdFusion 9 Administrative Login Bypass
2013-08-19 Java storeImageArray() Invalid Array Indexing Vulnerability
2013-04-10 Adobe ColdFusion APSB13-03 Remote Exploit
2013-01-02 Microsoft Internet Explorer CButton Object Use-After-Free Vulnerability
2012-07-11 Java Applet Field Bytecode Verifier Cache Remote Code Execution
2012-01-14 Adobe Reader U3D Memory Corruption Vulnerability
2011-07-03 MS Office 2010 RTF Header Stack Overflow Vulnerability Exploit
2011-07-03 Adobe Reader X Atom Type Confusion Vulnerability Exploit
2011-04-16 Adobe Flash Player 10.2.153.1 SWF Memory Corruption Vulnerability
2010-09-25 Adobe CoolType SING Table "uniqueName" Stack Buffer Overflow
2010-12-14 Internet Explorer DHTML Behaviors Use After Free
2010-09-20 Adobe CoolType SING Table "uniqueName" Stack Buffer Overflow
2010-08-21 MS Excel Malformed FEATHEADER Record Exploit (MS09-067)
2010-03-10 Microsoft Internet Explorer iepeers.dll Use-After-Free Exploit (meta)

OpenVAS Exploits

Date Description
2012-12-13 Name : SuSE Update for java-1_6_0-openjdk openSUSE-SU-2012:0828-1 (java-1_6_0-openjdk)
File : nvt/gb_suse_2012_0828_1.nasl
2012-09-06 Name : Ubuntu Update for icedtea-web USN-1505-2
File : nvt/gb_ubuntu_USN_1505_2.nasl
2012-08-30 Name : Fedora Update for java-1.7.0-openjdk FEDORA-2012-9590
File : nvt/gb_fedora_2012_9590_java-1.7.0-openjdk_fc17.nasl
2012-08-22 Name : Oracle Java SE Java Runtime Environment Multiple Unspecified Vulnerabilities ...
File : nvt/gb_oracle_java_se_mult_unspecified_vuln_aug12_win.nasl
2012-08-15 Name : Microsoft Windows Common Controls Remote Code Execution Vulnerability (2720573)
File : nvt/secpod_ms12-060.nasl
2012-08-10 Name : Debian Security Advisory DSA 2507-1 (openjdk-6)
File : nvt/deb_2507_1.nasl
2012-08-03 Name : Mandriva Update for java-1.6.0-openjdk MDVSA-2012:095 (java-1.6.0-openjdk)
File : nvt/gb_mandriva_MDVSA_2012_095.nasl
2012-08-02 Name : SuSE Update for acroread openSUSE-SU-2012:0087-1 (acroread)
File : nvt/gb_suse_2012_0087_1.nasl
2012-07-30 Name : CentOS Update for java CESA-2012:1009 centos6
File : nvt/gb_CESA-2012_1009_java_centos6.nasl
2012-07-30 Name : CentOS Update for java CESA-2012:0730 centos5
File : nvt/gb_CESA-2012_0730_java_centos5.nasl
2012-07-30 Name : CentOS Update for java CESA-2012:0729 centos6
File : nvt/gb_CESA-2012_0729_java_centos6.nasl
2012-07-16 Name : Ubuntu Update for openjdk-6 USN-1505-1
File : nvt/gb_ubuntu_USN_1505_1.nasl
2012-06-22 Name : RedHat Update for java-1.7.0-openjdk RHSA-2012:1009-01
File : nvt/gb_RHSA-2012_1009-01_java-1.7.0-openjdk.nasl
2012-06-19 Name : Fedora Update for java-1.7.0-openjdk FEDORA-2012-9593
File : nvt/gb_fedora_2012_9593_java-1.7.0-openjdk_fc16.nasl
2012-06-19 Name : Fedora Update for java-1.6.0-openjdk FEDORA-2012-9541
File : nvt/gb_fedora_2012_9541_java-1.6.0-openjdk_fc15.nasl
2012-06-19 Name : Fedora Update for java-1.6.0-openjdk FEDORA-2012-9545
File : nvt/gb_fedora_2012_9545_java-1.6.0-openjdk_fc16.nasl
2012-06-15 Name : RedHat Update for java-1.6.0-openjdk RHSA-2012:0729-01
File : nvt/gb_RHSA-2012_0729-01_java-1.6.0-openjdk.nasl
2012-06-15 Name : RedHat Update for java-1.6.0-openjdk RHSA-2012:0730-01
File : nvt/gb_RHSA-2012_0730-01_java-1.6.0-openjdk.nasl
2012-04-11 Name : Microsoft Windows Common Controls Remote Code Execution Vulnerability (2664258)
File : nvt/secpod_ms12-027.nasl
2012-02-12 Name : Gentoo Security Advisory GLSA 201201-19 (acroread)
File : nvt/glsa_201201_19.nasl
2012-02-12 Name : Gentoo Security Advisory GLSA 201110-11 (Adobe Flash Player)
File : nvt/glsa_201110_11.nasl
2012-02-12 Name : FreeBSD Ports: acroread9
File : nvt/freebsd_acroread9.nasl
2011-12-09 Name : Adobe Reader 'U3D' Component Memory Corruption Vulnerability - Linux
File : nvt/gb_adobe_reader_u3d_mem_crptn_vuln_lin.nasl
2011-12-09 Name : Adobe Reader/Acrobat 'U3D' Component Memory Corruption Vulnerability - Windows
File : nvt/gb_adobe_prdts_u3d_mem_crptn_vuln_win.nasl
2011-12-09 Name : Adobe Reader/Acrobat 'U3D' Component Memory Corruption Vulnerability - Mac OS X
File : nvt/gb_adobe_prdts_u3d_mem_crptn_vuln_macosx.nasl
2011-05-12 Name : FreeBSD Ports: linux-flashplugin
File : nvt/freebsd_linux-flashplugin14.nasl
2011-04-22 Name : Adobe Flash Player Arbitrary Code Execution Vulnerability (Linux)
File : nvt/gb_adobe_flash_player_code_execution_vuln_apr11_lin.nasl
2011-04-22 Name : SuSE Update for flash-player SUSE-SA:2011:018
File : nvt/gb_suse_2011_018.nasl
2011-04-22 Name : Adobe Products Arbitrary Code Execution Vulnerability (Windows)
File : nvt/gb_adobe_prdts_code_execution_vuln_apr11_win.nasl
2011-04-13 Name : Microsoft Office Excel Remote Code Execution Vulnerabilities (2489279)
File : nvt/secpod_ms11-021.nasl
2011-03-09 Name : Gentoo Security Advisory GLSA 201009-05 (acroread)
File : nvt/glsa_201009_05.nasl
2011-03-09 Name : Gentoo Security Advisory GLSA 201101-08 (acroread)
File : nvt/glsa_201101_08.nasl
2010-11-10 Name : Microsoft Office Remote Code Execution Vulnerabilites (2423930)
File : nvt/secpod_ms10-087.nasl
2010-10-19 Name : SuSE Update for acroread SUSE-SA:2010:048
File : nvt/gb_suse_2010_048.nasl
2010-10-18 Name : Adobe Acrobat and Reader Multiple Vulnerabilities -Oct10 (Windows)
File : nvt/gb_adobe_prdts_mult_vuln_oct10_win.nasl
2010-09-15 Name : Adobe Acrobat and Reader SING 'uniqueName' Buffer Overflow Vulnerability (Linux)
File : nvt/gb_adobe_reader_sing_bof_vuln_lin.nasl
2010-09-15 Name : Adobe Acrobat and Reader SING 'uniqueName' Buffer Overflow Vulnerability (Win)
File : nvt/gb_adobe_prdts_sing_bof_vuln_win.nasl
2010-04-01 Name : Microsoft Internet Explorer Multiple Vulnerabilities (980182)
File : nvt/secpod_ms10-018.nasl
2010-03-10 Name : MS Internet Explorer Remote Code Execution Vulnerability (981374)
File : nvt/gb_ms_ie_remote_code_exe_vuln_981374.nasl
2010-02-26 Name : Adobe Acrobat and Reader PDF Handling Code Execution Vulnerability (Linux)
File : nvt/secpod_adobe_prdts_code_exec_vuln_feb10_lin.nasl
2010-02-26 Name : Adobe Acrobat and Reader PDF Handling Code Execution Vulnerability (Windows)
File : nvt/secpod_adobe_prdts_code_exec_vuln_feb10_win.nasl
2010-01-29 Name : SuSE Update for acroread SUSE-SA:2010:008
File : nvt/gb_suse_2010_008.nasl
2010-01-16 Name : Adobe Reader/Acrobat Multiple Vulnerabilities - Jan10 (Win)
File : nvt/gb_adobe_prdts_mult_vuln_jan10_win.nasl
2010-01-16 Name : Adobe Reader Multiple Vulnerabilities -jan10 (Linux)
File : nvt/gb_adobe_reader_mult_vuln_jan10_lin.nasl
2009-12-04 Name : MS Internet Explorer 'Style' Object Remote Code Execution Vulnerability
File : nvt/gb_ms_ie_style_object_remote_code_exec_vuln.nasl
2009-11-11 Name : Microsoft Office Excel Multiple Vulnerabilities (972652)
File : nvt/secpod_ms09-067.nasl
2008-08-19 Name : Microsoft Word Could Allow Remote Code Execution Vulnerability
File : nvt/secpod_ms_word_code_exec_vuln_900006.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
77529 Adobe Reader / Acrobat U3D Data Handling Remote Memory Corruption

A memory corruption flaw exists in Adobe Reader and Acrobat . The program fails to sanitize user-supplied input when handling U3D data, resulting in memory corruption. With a specially crafted PDF file, a context-dependent attacker can execute arbitrary code.
71766 Microsoft Office Excel RealTimeData Record Parsing WriteAV Remote Code Execution

Microsoft Excel contains a flaw related to RealTimeData Record Parsing methods. The issue is triggered when a the program uses an improperly calculated pointer in a memcpy operation with a user supplied data source. This may allow a context-dependent attacker to use a crafted Excel file to execute arbitrary code.
71686 Adobe Flash ActionScript Predefined Class Prototype Addition Remote Code Exec...

69085 Microsoft Office RTF Parsing Stack Overflow

Microsoft Office contains a flaw that may allow a remote attacker to execute arbitrary commands or code. The issue is due to a boundary error when parsing a certain control word in RTF (Rich Text Format) formatted content can be exploited to cause a stack-based buffer overflow via a specially crafted file. It may allow execution of arbitrary code.
67849 Adobe Reader / Acrobat CoolType.dll SING (Smart INdependent Glyphlets) Font u...

Acrobat and Reader are prone to an overflow condition. The application fails to properly sanitize the "uniqueName" field within the SING table structure of TrueType fonts resulting in a stack buffer overflow. With a specially crafted file, a context-dependent attacker can potentially cause arbitrary code execution.
62810 Microsoft IE iepeers.dll Use-After-Free Arbitrary Code Execution

Microsoft Windows Internet Explorer contains a flaw that may allow an attacker to gain access to unauthorized privileges. The issue is triggered when an attacker utilizes a remote memory-corruption vulnerability in Internet Explorer by inserting malicious code into a site and when Internet Explorer attempts to parse the attack page, the remote attacker to gain privileges of the currently logged-in user viewing the malicious site.
62526 Adobe Reader / Acrobat LibTiff Overflow

61690 Adobe Reader / Acrobat U3D Implementation Array Boundary Arbitrary Code Execu...

60839 Microsoft IE CAttrArray Object Circular Dereference Remote Code Execution

59860 Microsoft Office Excel BIFF File FEATHEADER cbHdrData Size Element Handling M...

Excel contains a flaw that may allow a context-dependent attacker to execute arbitrary code. The issue is triggered by a specially crafted Excel document that contains a malformed FEATHEADER object.
46914 Microsoft Word DOC File Handling Unspecified Arbitrary Code Execution

28376 Microsoft IE US-ASCII Character Set Filter Bypass XSS

Microsoft Internet Explorer contains a flaw related to the encoding Internet transmitted content into ASCII that may allow an attacker to bypass security filters, such as intrusion detection systems.

Information Assurance Vulnerability Management (IAVM)

Date Description
2014-05-01 IAVM : 2014-A-0065 - Microsoft Internet Explorer Memory Corruption Vulnerability
Severity : Category I - VMSKEY : V0050205
2014-05-01 IAVM : 2014-A-0063 - Multiple Vulnerabilities in McAfee VirusScan Enterprise for Linux
Severity : Category I - VMSKEY : V0050009
2014-05-01 IAVM : 2014-A-0062 - Multiple Vulnerabilities In McAfee Email Gateway
Severity : Category I - VMSKEY : V0050005
2014-05-01 IAVM : 2014-B-0050 - McAfee Web Gateway Information Disclosure Vulnerability
Severity : Category I - VMSKEY : V0050003
2014-04-24 IAVM : 2014-B-0046 - Multiple Vulnerabilities in HP System Management Homepage (SMH)
Severity : Category I - VMSKEY : V0049737
2014-04-17 IAVM : 2014-A-0057 - Multiple Vulnerabilities in Oracle MySQL Products
Severity : Category I - VMSKEY : V0049591
2014-04-17 IAVM : 2014-A-0053 - Multiple Vulnerabilities in Juniper Network JUNOS
Severity : Category I - VMSKEY : V0049589
2014-04-17 IAVM : 2014-A-0054 - Multiple Vulnerabilities in Oracle Database
Severity : Category I - VMSKEY : V0049587
2014-04-17 IAVM : 2014-A-0055 - Multiple Vulnerabilities in Oracle Fusion Middleware
Severity : Category I - VMSKEY : V0049585
2014-04-17 IAVM : 2014-A-0056 - Multiple Vulnerabilities in Oracle Java SE
Severity : Category I - VMSKEY : V0049583
2014-04-17 IAVM : 2014-A-0058 - Multiple Vulnerabilities in Oracle & Sun Systems Product Suite
Severity : Category I - VMSKEY : V0049579
2014-04-17 IAVM : 2014-B-0041 - Multiple Vulnerabilities in Splunk
Severity : Category I - VMSKEY : V0049577
2014-04-17 IAVM : 2014-B-0042 - Stunnel Information Disclosure Vulnerability
Severity : Category I - VMSKEY : V0049575
2014-04-10 IAVM : 2014-A-0049 - Multiple Vulnerabilities in Microsoft Office
Severity : Category II - VMSKEY : V0048675
2014-04-10 IAVM : 2014-A-0051 - OpenSSL Information Disclosure Vulnerability
Severity : Category I - VMSKEY : V0048667
2014-03-13 IAVM : 2014-A-0037 - Cumulative Security Update for Microsoft Internet Explorer
Severity : Category I - VMSKEY : V0046163
2014-01-30 IAVM : 2014-A-0017 - Multiple Vulnerabilities in Cisco TelePresence Video Communication Server
Severity : Category I - VMSKEY : V0043846
2014-01-30 IAVM : 2014-A-0019 - Multiple Vulnerabilities in VMware Fusion
Severity : Category I - VMSKEY : V0043844
2013-11-21 IAVM : 2013-A-0222 - Multiple Vulnerabilties in VMware Workstation
Severity : Category II - VMSKEY : V0042383
2013-11-14 IAVM : 2013-A-0208 - Multiple Vulnerabilities in Adobe ColdFusion
Severity : Category I - VMSKEY : V0042291
2013-03-14 IAVM : 2013-A-0064 - Microsoft Silverlight Remote Code Execution Vulnerability
Severity : Category II - VMSKEY : V0037405
2012-09-27 IAVM : 2012-A-0153 - Multiple Vulnerabilities in VMware ESX 4.0 and ESXi 4.0
Severity : Category I - VMSKEY : V0033884
2012-09-13 IAVM : 2012-A-0146 - Multiple Vulnerabilities in VMware vCenter Update Manager 4.1
Severity : Category I - VMSKEY : V0033792
2012-08-16 IAVM : 2012-A-0132 - Microsoft Windows Common Controls Remote Code Execution Vulnerability
Severity : Category II - VMSKEY : V0033659
2012-06-28 IAVM : 2012-A-0104 - Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client
Severity : Category I - VMSKEY : V0033046
2012-05-03 IAVM : 2012-B-0048 - Multiple Vulnerabilities in HP Systems Insight Manager
Severity : Category I - VMSKEY : V0032178
2012-04-12 IAVM : 2012-A-0059 - Microsoft Windows Common Controls Remote Code Execution Vulnerability
Severity : Category II - VMSKEY : V0031982

Snort® IPS/IDS

Date Description
2020-01-16 Adobe Acrobat Reader and Acrobat TTF SING table parsing remote code execution...
RuleID : 52484 - Revision : 1 - Type : FILE-PDF
2020-01-16 Adobe Acrobat Reader and Acrobat TTF SING table parsing remote code execution...
RuleID : 52483 - Revision : 1 - Type : FILE-PDF
2019-12-10 Adobe Acrobat Reader and Acrobat TTF SING table parsing remote code execution...
RuleID : 52125 - Revision : 2 - Type : FILE-PDF
2019-12-10 Adobe Acrobat Reader and Acrobat TTF SING table parsing remote code execution...
RuleID : 52124 - Revision : 2 - Type : FILE-PDF
2019-05-26 Microsoft Internet Explorer VML use after free attempt
RuleID : 49940 - Revision : 2 - Type : BROWSER-IE
2019-04-18 Microsoft Office MSCOMCTL ActiveX control tabstrip method attempt
RuleID : 49496 - Revision : 1 - Type : FILE-OFFICE
2019-04-18 Microsoft Office MSCOMCTL ActiveX control tabstrip method attempt
RuleID : 49494 - Revision : 1 - Type : FILE-OFFICE
2017-09-19 RTF obfuscation string
RuleID : 43990 - Revision : 3 - Type : INDICATOR-OBFUSCATION
2017-09-19 newlines embedded in rtf header
RuleID : 43989 - Revision : 3 - Type : INDICATOR-OBFUSCATION
2017-08-23 Microsoft Office RTF parsing remote code execution attempt
RuleID : 43679 - Revision : 1 - Type : FILE-OFFICE
2017-08-23 Microsoft Office RTF parsing remote code execution attempt
RuleID : 43678 - Revision : 1 - Type : FILE-OFFICE
2017-08-23 Microsoft Office Word SmartTag record code execution attempt
RuleID : 43675 - Revision : 3 - Type : FILE-OFFICE
2017-08-23 Microsoft Office Word SmartTag record code execution attempt
RuleID : 43674 - Revision : 3 - Type : FILE-OFFICE
2017-01-04 Microsoft Office ole object external file loading attempt
RuleID : 40885 - Revision : 1 - Type : FILE-OTHER
2017-01-04 Microsoft Office ole object external file loading attempt
RuleID : 40884 - Revision : 1 - Type : FILE-OTHER
2016-11-03 Adobe ColdFusion RDS admin bypass attempt
RuleID : 40323 - Revision : 2 - Type : SERVER-OTHER
2016-06-07 Microsoft Office ole object external file loading attempt
RuleID : 38742 - Revision : 1 - Type : FILE-OTHER
2016-06-01 Microsoft Internet Explorer onpropertychange use-after-free attempt
RuleID : 38670 - Revision : 2 - Type : BROWSER-IE
2016-06-01 Microsoft Internet Explorer onpropertychange use-after-free attempt
RuleID : 38669 - Revision : 2 - Type : BROWSER-IE
2016-04-28 Microsoft Internet Explorer deleted button use after free attempt
RuleID : 38364 - Revision : 2 - Type : BROWSER-IE
2016-04-28 Microsoft Internet Explorer deleted button use after free attempt
RuleID : 38363 - Revision : 1 - Type : BROWSER-IE
2016-03-24 Adobe Acrobat Reader X XML forms specially crafted RLE8 format BMP integer ov...
RuleID : 37829 - Revision : 2 - Type : FILE-PDF
2016-03-24 Adobe Acrobat Reader X XML forms specially crafted RLE8 format BMP integer ov...
RuleID : 37828 - Revision : 2 - Type : FILE-PDF
2016-03-24 Microsoft Office ole object external file loading attempt
RuleID : 37825 - Revision : 2 - Type : FILE-OTHER
2016-03-24 Microsoft Office ole object external file loading attempt
RuleID : 37824 - Revision : 2 - Type : FILE-OTHER
2016-03-22 Microsoft Silverlight ScriptObject untrusted pointer dereference attempt
RuleID : 37801 - Revision : 3 - Type : BROWSER-PLUGINS
2016-03-22 Microsoft Office ole object external file loading attempt
RuleID : 37727 - Revision : 2 - Type : FILE-OTHER
2016-03-22 Microsoft Office ole object external file loading attempt
RuleID : 37726 - Revision : 2 - Type : FILE-OTHER
2016-03-22 Microsoft Office ole object external file loading attempt
RuleID : 37707 - Revision : 2 - Type : FILE-OFFICE
2016-03-22 Microsoft Office ole object external file loading attempt
RuleID : 37706 - Revision : 3 - Type : FILE-OFFICE
2016-03-22 Microsoft Office ole object external file loading attempt
RuleID : 37705 - Revision : 3 - Type : FILE-OFFICE
2016-03-22 Microsoft Office ole object external file loading attempt
RuleID : 37704 - Revision : 3 - Type : FILE-OFFICE
2016-03-22 Microsoft Office ole object external file loading attempt
RuleID : 37703 - Revision : 3 - Type : FILE-OFFICE
2016-03-22 Microsoft Office ole object external file loading attempt
RuleID : 37702 - Revision : 3 - Type : FILE-OFFICE
2016-03-22 Microsoft Office ole object external file loading attempt
RuleID : 37701 - Revision : 2 - Type : FILE-OFFICE
2016-03-22 Microsoft Office ole object external file loading attempt
RuleID : 37700 - Revision : 3 - Type : FILE-OFFICE
2016-03-14 Adobe Acrobat Reader X XML forms specially crafted RLE8 format BMP integer ov...
RuleID : 36192 - Revision : 3 - Type : FILE-PDF
2016-03-14 Adobe Acrobat Reader X XML forms specially crafted RLE8 format BMP integer ov...
RuleID : 36191 - Revision : 3 - Type : FILE-PDF
2015-06-23 Adobe Acrobat Reader malformed shading modifier heap corruption attempt
RuleID : 34552 - Revision : 2 - Type : FILE-PDF
2015-04-30 Nuclear exploit kit obfuscated file download
RuleID : 33983 - Revision : 5 - Type : EXPLOIT-KIT
2015-04-30 Nuclear exploit kit landing page detected
RuleID : 33982 - Revision : 3 - Type : EXPLOIT-KIT
2015-03-31 Adobe Acrobat Reader and Acrobat TTF SING table parsing remote code execution...
RuleID : 33602 - Revision : 2 - Type : FILE-PDF
2015-03-31 Adobe Acrobat Reader and Acrobat TTF SING table parsing remote code execution...
RuleID : 33601 - Revision : 2 - Type : FILE-PDF
2015-02-18 Microsoft Internet Explorer 10 use after free attempt
RuleID : 33086 - Revision : 5 - Type : BROWSER-IE
2015-02-18 Microsoft Internet Explorer 10 use after free attempt
RuleID : 33085 - Revision : 5 - Type : BROWSER-IE
2015-01-20 Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt
RuleID : 32863 - Revision : 4 - Type : FILE-OFFICE
2015-01-20 Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt
RuleID : 32862 - Revision : 3 - Type : FILE-OFFICE
2015-01-20 Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt
RuleID : 32861 - Revision : 2 - Type : FILE-OFFICE
2015-01-20 Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt
RuleID : 32860 - Revision : 2 - Type : FILE-OFFICE
2015-01-20 Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt
RuleID : 32859 - Revision : 2 - Type : FILE-OFFICE
2015-01-20 Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt
RuleID : 32858 - Revision : 2 - Type : FILE-OFFICE
2015-01-20 Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt
RuleID : 32857 - Revision : 2 - Type : FILE-OFFICE
2014-12-02 Microsoft Internet Explorer VML use after free attempt
RuleID : 32363 - Revision : 3 - Type : BROWSER-IE
2014-12-02 Microsoft Internet Explorer VML use after free attempt
RuleID : 32362 - Revision : 3 - Type : BROWSER-IE
2014-11-25 Microsoft Office ole object external file loading attempt
RuleID : 32316 - Revision : 3 - Type : FILE-OTHER
2014-11-25 Microsoft Office ole object external file loading attempt
RuleID : 32315 - Revision : 2 - Type : FILE-OTHER
2014-11-25 Microsoft Office ole object external file loading attempt
RuleID : 32314 - Revision : 2 - Type : FILE-OTHER
2014-11-25 Microsoft Office ole object external file loading attempt
RuleID : 32313 - Revision : 4 - Type : FILE-OTHER
2014-11-25 Adobe Flash Player regex denial of service attempt
RuleID : 32308 - Revision : 2 - Type : FILE-FLASH
2014-11-25 Adobe Flash Player regex denial of service attempt
RuleID : 32307 - Revision : 2 - Type : FILE-FLASH
2014-11-25 Adobe Flash Player regex denial of service attempt
RuleID : 32306 - Revision : 3 - Type : FILE-FLASH
2014-11-25 Adobe Flash Player regex denial of service attempt
RuleID : 32305 - Revision : 3 - Type : FILE-FLASH
2014-11-25 Adobe Flash Player regex denial of service attempt
RuleID : 32304 - Revision : 2 - Type : FILE-FLASH
2014-11-25 Adobe Flash Player regex denial of service attempt
RuleID : 32303 - Revision : 3 - Type : FILE-FLASH
2014-11-25 Adobe Flash Player regex denial of service attempt
RuleID : 32302 - Revision : 2 - Type : FILE-FLASH
2014-11-25 Adobe Flash Player regex denial of service attempt
RuleID : 32301 - Revision : 3 - Type : FILE-FLASH
2014-11-19 Microsoft Office ole object external file loading attempt
RuleID : 32187 - Revision : 4 - Type : FILE-OTHER
2014-11-19 Microsoft Office ole object external file loading attempt
RuleID : 32186 - Revision : 5 - Type : FILE-OTHER
2014-11-16 Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt
RuleID : 31927 - Revision : 2 - Type : FILE-OFFICE
2014-11-16 Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt
RuleID : 31926 - Revision : 2 - Type : FILE-OFFICE
2014-11-16 Win.Trojan.Otupsys variant outbound connection
RuleID : 31716 - Revision : 2 - Type : MALWARE-CNC
2014-11-16 Adobe Acrobat Reader X XML forms specially crafted RLE8 format BMP integer ov...
RuleID : 31687 - Revision : 4 - Type : FILE-PDF
2014-11-16 Adobe Acrobat Reader X XML forms specially crafted RLE8 format BMP integer ov...
RuleID : 31686 - Revision : 3 - Type : FILE-PDF
2014-11-16 Adobe Acrobat Reader U3D CLODMeshDeceleration code execution attempt
RuleID : 31555 - Revision : 4 - Type : FILE-PDF
2014-11-16 Oracle Java field bytecode verifier cache code execution attempt
RuleID : 31512 - Revision : 3 - Type : FILE-JAVA
2014-11-16 Oracle Java field bytecode verifier cache code execution attempt
RuleID : 31511 - Revision : 3 - Type : FILE-JAVA
2014-11-16 Microsoft Office Word SmartTag record code execution attempt
RuleID : 31312 - Revision : 6 - Type : FILE-OFFICE
2014-11-16 Microsoft Office Word SmartTag record code execution attempt
RuleID : 31311 - Revision : 6 - Type : FILE-OFFICE
2014-11-16 Microsoft Office Word SmartTag record code execution attempt
RuleID : 31310 - Revision : 6 - Type : FILE-OFFICE
2014-11-16 CottonCastle exploit kit decryption page outbound request
RuleID : 31279 - Revision : 3 - Type : EXPLOIT-KIT
2014-11-16 CottonCastle exploit kit Oracle java outbound connection
RuleID : 31278 - Revision : 2 - Type : EXPLOIT-KIT
2014-11-16 CottonCastle exploit kit Oracle Java outbound connection
RuleID : 31277 - Revision : 2 - Type : EXPLOIT-KIT
2014-07-03 Adobe Acrobat Reader X XML forms specially crafted RLE8 format BMP integer ov...
RuleID : 31106 - Revision : 4 - Type : FILE-PDF
2014-07-03 Adobe Acrobat Reader X XML forms specially crafted RLE8 format BMP integer ov...
RuleID : 31105 - Revision : 4 - Type : FILE-PDF
2014-07-03 Adobe Acrobat Reader X XML forms specially crafted RLE8 format BMP integer ov...
RuleID : 31104 - Revision : 3 - Type : FILE-PDF
2014-07-03 Adobe Acrobat Reader X XML forms specially crafted RLE8 format BMP integer ov...
RuleID : 31103 - Revision : 3 - Type : FILE-PDF
2014-06-14 Shiqiang Gang malicious XLS targeted attack detection
RuleID : 30991 - Revision : 6 - Type : MALWARE-CNC
2014-06-14 Shiqiang Gang malicious XLS targeted attack detection
RuleID : 30990 - Revision : 5 - Type : MALWARE-CNC
2014-06-14 DNS request for known malware domain help.2012hi.hk
RuleID : 30989 - Revision : 3 - Type : BLACKLIST
2014-06-07 known malicious flash actionscript decryption routine
RuleID : 30901 - Revision : 3 - Type : FILE-FLASH
2014-05-31 Microsoft Internet Explorer VML use after free attempt
RuleID : 30895 - Revision : 4 - Type : BROWSER-IE
2014-05-31 Microsoft Internet Explorer VML use after free attempt
RuleID : 30894 - Revision : 4 - Type : BROWSER-IE
2014-05-31 Microsoft Internet Explorer VML use after free attempt
RuleID : 30893 - Revision : 3 - Type : BROWSER-IE
2014-05-31 Microsoft Internet Explorer VML use after free attempt
RuleID : 30892 - Revision : 3 - Type : BROWSER-IE
2014-05-28 Microsoft Internet Explorer VML use after free attempt
RuleID : 30803 - Revision : 6 - Type : BROWSER-IE
2014-05-28 Microsoft Internet Explorer VML use after free attempt
RuleID : 30794 - Revision : 7 - Type : BROWSER-IE
2014-04-25 OpenSSL TLSv1.2 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30788-community - Revision : 5 - Type : SERVER-OTHER
2014-05-24 OpenSSL TLSv1.2 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30788 - Revision : 5 - Type : SERVER-OTHER
2014-04-25 OpenSSL TLSv1.1 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30787-community - Revision : 5 - Type : SERVER-OTHER
2014-05-24 OpenSSL TLSv1.1 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30787 - Revision : 5 - Type : SERVER-OTHER
2014-04-25 OpenSSL TLSv1 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30786-community - Revision : 4 - Type : SERVER-OTHER
2014-05-24 OpenSSL TLSv1 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30786 - Revision : 4 - Type : SERVER-OTHER
2014-04-25 OpenSSL SSLv3 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30785-community - Revision : 4 - Type : SERVER-OTHER
2014-05-24 OpenSSL SSLv3 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30785 - Revision : 4 - Type : SERVER-OTHER
2014-04-25 OpenSSL TLSv1.2 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30784-community - Revision : 4 - Type : SERVER-OTHER
2014-05-24 OpenSSL TLSv1.2 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30784 - Revision : 4 - Type : SERVER-OTHER
2014-04-25 OpenSSL TLSv1.2 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30783-community - Revision : 4 - Type : SERVER-OTHER
2014-05-24 OpenSSL TLSv1.2 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30783 - Revision : 4 - Type : SERVER-OTHER
2014-04-25 OpenSSL TLSv1.1 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30782-community - Revision : 4 - Type : SERVER-OTHER
2014-05-24 OpenSSL TLSv1.1 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30782 - Revision : 4 - Type : SERVER-OTHER
2014-04-25 OpenSSL TLSv1.1 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30781-community - Revision : 5 - Type : SERVER-OTHER
2014-05-24 OpenSSL TLSv1.1 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30781 - Revision : 5 - Type : SERVER-OTHER
2014-04-25 OpenSSL TLSv1 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30780-community - Revision : 4 - Type : SERVER-OTHER
2014-05-24 OpenSSL TLSv1 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30780 - Revision : 4 - Type : SERVER-OTHER
2014-04-25 OpenSSL TLSv1 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30779-community - Revision : 4 - Type : SERVER-OTHER
2014-05-24 OpenSSL TLSv1 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30779 - Revision : 4 - Type : SERVER-OTHER
2014-04-25 OpenSSL SSLv3 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30778-community - Revision : 4 - Type : SERVER-OTHER
2014-05-24 OpenSSL SSLv3 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30778 - Revision : 4 - Type : SERVER-OTHER
2014-04-25 OpenSSL SSLv3 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30777-community - Revision : 4 - Type : SERVER-OTHER
2014-05-24 OpenSSL SSLv3 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30777 - Revision : 4 - Type : SERVER-OTHER
2014-05-17 OpenVPN OpenSSL TLSv1.2 large heartbeat response - possible ssl heartbleed at...
RuleID : 30742 - Revision : 2 - Type : SERVER-OTHER
2014-05-17 OpenVPN OpenSSL TLSv1.2 large heartbeat response - possible ssl heartbleed at...
RuleID : 30741 - Revision : 3 - Type : SERVER-OTHER
2014-05-17 OpenVPN OpenSSL TLSv1.1 large heartbeat response - possible ssl heartbleed at...
RuleID : 30740 - Revision : 2 - Type : SERVER-OTHER
2014-05-17 OpenVPN OpenSSL TLSv1.1 large heartbeat response - possible ssl heartbleed at...
RuleID : 30739 - Revision : 3 - Type : SERVER-OTHER
2014-05-17 OpenVPN OpenSSL TLSv1 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30738 - Revision : 2 - Type : SERVER-OTHER
2014-05-17 OpenVPN OpenSSL TLSv1 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30737 - Revision : 3 - Type : SERVER-OTHER
2014-05-17 OpenVPN OpenSSL SSLv3 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30736 - Revision : 2 - Type : SERVER-OTHER
2014-05-17 OpenVPN OpenSSL SSLv3 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30735 - Revision : 3 - Type : SERVER-OTHER
2014-05-17 OpenVPN OpenSSL TLSv1.2 heartbeat read overrun attempt
RuleID : 30734 - Revision : 4 - Type : SERVER-OTHER
2014-05-17 OpenVPN OpenSSL TLSv1.2 heartbeat read overrun attempt
RuleID : 30733 - Revision : 5 - Type : SERVER-OTHER
2014-05-17 OpenVPN OpenSSL TLSv1.1 heartbeat read overrun attempt
RuleID : 30732 - Revision : 4 - Type : SERVER-OTHER
2014-05-17 OpenVPN OpenSSL TLSv1.1 heartbeat read overrun attempt
RuleID : 30731 - Revision : 5 - Type : SERVER-OTHER
2014-05-17 OpenVPN OpenSSL TLSv1 heartbeat read overrun attempt
RuleID : 30730 - Revision : 4 - Type : SERVER-OTHER
2014-05-17 OpenVPN OpenSSL TLSv1 heartbeat read overrun attempt
RuleID : 30729 - Revision : 5 - Type : SERVER-OTHER
2014-05-17 OpenVPN OpenSSL SSLv3 heartbeat read overrun attempt
RuleID : 30728 - Revision : 4 - Type : SERVER-OTHER
2014-05-17 OpenVPN OpenSSL SSLv3 heartbeat read overrun attempt
RuleID : 30727 - Revision : 5 - Type : SERVER-OTHER
2014-05-17 OpenVPN OpenSSL TLSv1.2 large heartbeat response - possible ssl heartbleed at...
RuleID : 30726 - Revision : 4 - Type : SERVER-OTHER
2014-05-17 OpenVPN OpenSSL TLSv1.2 large heartbeat response - possible ssl heartbleed at...
RuleID : 30725 - Revision : 3 - Type : SERVER-OTHER
2014-05-17 OpenVPN OpenSSL TLSv1.1 large heartbeat response - possible ssl heartbleed at...
RuleID : 30724 - Revision : 4 - Type : SERVER-OTHER
2014-05-17 OpenVPN OpenSSL TLSv1.1 large heartbeat response - possible ssl heartbleed at...
RuleID : 30723 - Revision : 3 - Type : SERVER-OTHER
2014-05-17 OpenVPN OpenSSL TLSv1 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30722 - Revision : 4 - Type : SERVER-OTHER
2014-05-17 OpenVPN OpenSSL TLSv1 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30721 - Revision : 3 - Type : SERVER-OTHER
2014-05-17 OpenVPN OpenSSL SSLv3 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30720 - Revision : 4 - Type : SERVER-OTHER
2014-05-17 OpenVPN OpenSSL SSLv3 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30719 - Revision : 3 - Type : SERVER-OTHER
2014-05-17 OpenVPN OpenSSL TLSv1.2 heartbeat read overrun attempt
RuleID : 30718 - Revision : 5 - Type : SERVER-OTHER
2014-05-17 OpenVPN OpenSSL TLSv1.2 heartbeat read overrun attempt
RuleID : 30717 - Revision : 4 - Type : SERVER-OTHER
2014-05-17 OpenVPN OpenSSL TLSv1.1 heartbeat read overrun attempt
RuleID : 30716 - Revision : 5 - Type : SERVER-OTHER
2014-05-17 OpenVPN OpenSSL TLSv1.1 heartbeat read overrun attempt
RuleID : 30715 - Revision : 4 - Type : SERVER-OTHER
2014-05-17 OpenVPN OpenSSL TLSv1 heartbeat read overrun attempt
RuleID : 30714 - Revision : 5 - Type : SERVER-OTHER
2014-05-17 OpenVPN OpenSSL TLSv1 heartbeat read overrun attempt
RuleID : 30713 - Revision : 4 - Type : SERVER-OTHER
2014-05-17 OpenVPN OpenSSL SSLv3 heartbeat read overrun attempt
RuleID : 30712 - Revision : 5 - Type : SERVER-OTHER
2014-05-17 OpenVPN OpenSSL SSLv3 heartbeat read overrun attempt
RuleID : 30711 - Revision : 4 - Type : SERVER-OTHER
2014-04-15 OpenSSL Heartbleed masscan access exploitation attempt
RuleID : 30549-community - Revision : 2 - Type : SERVER-OTHER
2014-05-15 OpenSSL Heartbleed masscan access exploitation attempt
RuleID : 30549 - Revision : 2 - Type : SERVER-OTHER
2014-04-11 OpenSSL TLSv1.2 heartbeat read overrun attempt
RuleID : 30525-community - Revision : 4 - Type : SERVER-OTHER
2014-05-11 OpenSSL TLSv1.2 heartbeat read overrun attempt
RuleID : 30525 - Revision : 4 - Type : SERVER-OTHER
2014-04-11 OpenSSL TLSv1.1 heartbeat read overrun attempt
RuleID : 30524-community - Revision : 5 - Type : SERVER-OTHER
2014-05-11 OpenSSL TLSv1.1 heartbeat read overrun attempt
RuleID : 30524 - Revision : 5 - Type : SERVER-OTHER
2014-04-10 OpenSSL TLSv1.2 heartbeat read overrun attempt - vulnerable client response
RuleID : 30523-community - Revision : 9 - Type : SERVER-OTHER
2014-05-10 OpenSSL TLSv1.2 heartbeat read overrun attempt - vulnerable client response
RuleID : 30523 - Revision : 9 - Type : SERVER-OTHER
2014-04-10 OpenSSL TLSv1.1 heartbeat read overrun attempt - vulnerable client response
RuleID : 30522-community - Revision : 9 - Type : SERVER-OTHER
2014-05-10 OpenSSL TLSv1.1 heartbeat read overrun attempt - vulnerable client response
RuleID : 30522 - Revision : 9 - Type : SERVER-OTHER
2014-04-10 OpenSSL TLSv1 heartbeat read overrun attempt - vulnerable client response
RuleID : 30521-community - Revision : 9 - Type : SERVER-OTHER
2014-05-10 OpenSSL TLSv1 heartbeat read overrun attempt - vulnerable client response
RuleID : 30521 - Revision : 9 - Type : SERVER-OTHER
2014-04-10 OpenSSL SSLv3 heartbeat read overrun attempt - vulnerable client response
RuleID : 30520-community - Revision : 9 - Type : SERVER-OTHER
2014-05-10 OpenSSL SSLv3 heartbeat read overrun attempt - vulnerable client response
RuleID : 30520 - Revision : 9 - Type : SERVER-OTHER
2014-04-10 OpenSSL TLSv1.2 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30517-community - Revision : 11 - Type : SERVER-OTHER
2014-05-08 OpenSSL TLSv1.2 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30517 - Revision : 11 - Type : SERVER-OTHER
2014-04-10 OpenSSL TLSv1.1 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30516-community - Revision : 11 - Type : SERVER-OTHER
2014-05-08 OpenSSL TLSv1.1 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30516 - Revision : 11 - Type : SERVER-OTHER
2014-04-10 OpenSSL TLSv1 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30515-community - Revision : 11 - Type : SERVER-OTHER
2014-05-08 OpenSSL TLSv1 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30515 - Revision : 11 - Type : SERVER-OTHER
2014-04-10 OpenSSL SSLv3 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30514-community - Revision : 11 - Type : SERVER-OTHER
2014-05-08 OpenSSL SSLv3 large heartbeat response - possible ssl heartbleed attempt
RuleID : 30514 - Revision : 11 - Type : SERVER-OTHER
2014-04-10 OpenSSL TLSv1.2 heartbeat read overrun attempt
RuleID : 30513-community - Revision : 8 - Type : SERVER-OTHER
2014-05-08 OpenSSL TLSv1.2 heartbeat read overrun attempt
RuleID : 30513 - Revision : 8 - Type : SERVER-OTHER
2014-04-10 OpenSSL TLSv1.1 heartbeat read overrun attempt
RuleID : 30512-community - Revision : 8 - Type : SERVER-OTHER
2014-05-08 OpenSSL TLSv1.1 heartbeat read overrun attempt
RuleID : 30512 - Revision : 8 - Type : SERVER-OTHER
2014-04-10 OpenSSL TLSv1 heartbeat read overrun attempt
RuleID : 30511-community - Revision : 8 - Type : SERVER-OTHER
2014-05-08 OpenSSL TLSv1 heartbeat read overrun attempt
RuleID : 30511 - Revision : 8 - Type : SERVER-OTHER
2014-04-10 OpenSSL SSLv3 heartbeat read overrun attempt
RuleID : 30510-community - Revision : 8 - Type : SERVER-OTHER
2014-05-08 OpenSSL SSLv3 heartbeat read overrun attempt
RuleID : 30510 - Revision : 8 - Type : SERVER-OTHER
2014-05-01 multiple binary tags in close proximity - potentially malicious
RuleID : 30328 - Revision : 3 - Type : INDICATOR-OBFUSCATION
2014-05-01 multiple binary tags in close proximity - potentially malicious
RuleID : 30327 - Revision : 3 - Type : INDICATOR-OBFUSCATION
2014-04-12 Microsoft Windows common controls stack buffer overflow via malicious toolbar...
RuleID : 30166 - Revision : 2 - Type : FILE-OFFICE
2014-04-12 Microsoft Windows common controls stack buffer overflow via malicious toolbar...
RuleID : 30165 - Revision : 2 - Type : FILE-OFFICE
2014-04-12 Microsoft Windows common controls stack buffer overflow via malicious MSComct...
RuleID : 30164 - Revision : 2 - Type : FILE-OFFICE
2014-04-12 Microsoft Windows common controls stack buffer overflow via malicious MSComct...
RuleID : 30163 - Revision : 2 - Type : FILE-OFFICE
2014-04-12 Microsoft Windows common controls stack buffer overflow via malicious MSComct...
RuleID : 30162 - Revision : 2 - Type : FILE-OFFICE
2014-04-12 Microsoft Windows common controls stack buffer overflow via malicious MSComct...
RuleID : 30161 - Revision : 2 - Type : FILE-OFFICE
2014-04-12 Microsoft Windows common controls stack buffer overflow via MIME HTML documen...
RuleID : 30160 - Revision : 2 - Type : FILE-OFFICE
2014-04-12 Microsoft Windows common controls stack buffer overflow via MIME HTML documen...
RuleID : 30159 - Revision : 2 - Type : FILE-OFFICE
2014-04-12 Microsoft Windows common controls stack buffer overflow via MIME HTML documen...
RuleID : 30158 - Revision : 2 - Type : FILE-OFFICE
2014-04-12 Microsoft Windows common controls stack buffer overflow via MIME HTML documen...
RuleID : 30157 - Revision : 2 - Type : FILE-OFFICE
2014-04-12 Microsoft Windows common controls stack buffer overflow via MIME HTML documen...
RuleID : 30156 - Revision : 2 - Type : FILE-OFFICE
2014-04-12 Microsoft Windows common controls stack buffer overflow via MIME HTML documen...
RuleID : 30155 - Revision : 2 - Type : FILE-OFFICE
2014-04-12 Microsoft Windows common controls stack buffer overflow via MIME HTML documen...
RuleID : 30154 - Revision : 2 - Type : FILE-OFFICE
2014-04-12 Microsoft Windows common controls stack buffer overflow via MIME HTML documen...
RuleID : 30153 - Revision : 2 - Type : FILE-OFFICE
2014-04-10 Microsoft Internet Explorer 10 use after free attempt
RuleID : 30107 - Revision : 5 - Type : BROWSER-IE
2014-04-10 Microsoft Internet Explorer 10 use after free attempt
RuleID : 30106 - Revision : 5 - Type : BROWSER-IE
2014-04-05 Win.Trojan.Zaleelq variant outbound connection
RuleID : 30037 - Revision : 3 - Type : MALWARE-CNC
2018-06-15 Hello/LightsOut exploit kit payload download attempt
RuleID : 30003-community - Revision : 6 - Type : EXPLOIT-KIT
2014-04-03 Hello/LightsOut exploit kit payload download attempt
RuleID : 30003 - Revision : 6 - Type : EXPLOIT-KIT
2014-03-16 Microsoft Internet Explorer 10 use after free attempt
RuleID : 29820 - Revision : 7 - Type : BROWSER-IE
2014-03-16 Microsoft Internet Explorer 10 use after free attempt
RuleID : 29819 - Revision : 7 - Type : BROWSER-IE
2014-03-08 Adobe Acrobat Reader malformed shading modifier heap corruption attempt
RuleID : 29622 - Revision : 4 - Type : FILE-PDF
2014-02-21 Styx exploit kit eot outbound connection
RuleID : 29453 - Revision : 2 - Type : EXPLOIT-KIT
2014-02-21 Styx exploit kit landing page request
RuleID : 29452 - Revision : 2 - Type : EXPLOIT-KIT
2014-02-21 Styx exploit kit outbound jar request
RuleID : 29451 - Revision : 2 - Type : EXPLOIT-KIT
2014-02-21 Styx exploit kit outbound connection attempt
RuleID : 29450 - Revision : 2 - Type : EXPLOIT-KIT
2014-02-21 Styx exploit kit landing page
RuleID : 29449 - Revision : 3 - Type : EXPLOIT-KIT
2014-02-21 Styx exploit kit landing page
RuleID : 29448 - Revision : 2 - Type : EXPLOIT-KIT
2014-02-21 Styx exploit kit jar outbound connection
RuleID : 29446 - Revision : 9 - Type : EXPLOIT-KIT
2014-02-21 Styx exploit kit fonts download page
RuleID : 29445 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-30 Stamp exploit kit PDF exploit retrieval attempt
RuleID : 29131 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-30 Stamp exploit kit malicious payload download attempt
RuleID : 29130 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-30 Stamp exploit kit jar exploit download - specific structure
RuleID : 29129 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-30 Stamp exploit kit plugin detection page
RuleID : 29128 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-30 Angler exploit kit XORed payload download attempt
RuleID : 29066 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-18 Win.Trojan.Egobot variant outbound connection
RuleID : 28989 - Revision : 4 - Type : MALWARE-CNC
2014-01-11 Neutrino exploit kit initial outbound request - generic detection
RuleID : 28911 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Adobe Acrobat Reader malformed TIFF remote code execution attempt
RuleID : 28890 - Revision : 2 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader malformed TIFF remote code execution attempt
RuleID : 28889 - Revision : 2 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader malformed TIFF remote code execution attempt
RuleID : 28888 - Revision : 2 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader malformed TIFF remote code execution attempt
RuleID : 28887 - Revision : 2 - Type : FILE-PDF
2014-01-10 Adobe Flash Player ActionScript callMethod type confusion attempt
RuleID : 28698 - Revision : 5 - Type : FILE-FLASH
2014-01-10 Adobe Flash Player ActionScript callMethod type confusion attempt
RuleID : 28697 - Revision : 5 - Type : FILE-FLASH
2014-01-10 Adobe Flash Player ActionScript callMethod type confusion attempt
RuleID : 28696 - Revision : 6 - Type : FILE-FLASH
2014-01-10 Adobe Flash Player ActionScript callMethod type confusion attempt
RuleID : 28695 - Revision : 6 - Type : FILE-FLASH
2014-01-10 Adobe Acrobat Reader TTF SING table parsing remote code execution attempt
RuleID : 28657 - Revision : 5 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader TTF SING table parsing remote code execution attempt
RuleID : 28656 - Revision : 5 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader TTF SING table parsing remote code execution attempt
RuleID : 28655 - Revision : 5 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader TTF SING table parsing remote code execution attempt
RuleID : 28654 - Revision : 5 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader TTF SING table parsing remote code execution attempt
RuleID : 28653 - Revision : 5 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader TTF SING table parsing remote code execution attempt
RuleID : 28652 - Revision : 5 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader TTF SING table parsing remote code execution attempt
RuleID : 28651 - Revision : 5 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader TTF SING table parsing remote code execution attempt
RuleID : 28650 - Revision : 5 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader TTF SING table parsing remote code execution attempt
RuleID : 28649 - Revision : 5 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader TTF SING table parsing remote code execution attempt
RuleID : 28648 - Revision : 5 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader TTF SING table parsing remote code execution attempt
RuleID : 28647 - Revision : 5 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader TTF SING table parsing remote code execution attempt
RuleID : 28646 - Revision : 5 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader TTF SING table parsing remote code execution attempt
RuleID : 28645 - Revision : 5 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader TTF SING table parsing remote code execution attempt
RuleID : 28644 - Revision : 5 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader malformed shading modifier heap corruption attempt
RuleID : 28622 - Revision : 7 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader X XML forms specially crafted RLE8 format BMP integer ov...
RuleID : 28621 - Revision : 6 - Type : FILE-PDF
2014-01-10 Angler exploit kit payload download attempt
RuleID : 28616 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Angler exploit kit exploit download attempt
RuleID : 28615 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Angler exploit kit landing page
RuleID : 28614 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Angler exploit kit landing page - specific-structure
RuleID : 28613 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Multiple exploit kit Silverlight exploit download
RuleID : 28612 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Microsoft Silverlight ScriptObject untrusted pointer dereference attempt
RuleID : 28584 - Revision : 6 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Silverlight ScriptObject untrusted pointer dereference attempt
RuleID : 28583 - Revision : 6 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Silverlight ScriptObject untrusted pointer dereference attempt
RuleID : 28582 - Revision : 6 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Silverlight ScriptObject untrusted pointer dereference attempt
RuleID : 28581 - Revision : 7 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Silverlight ScriptObject untrusted pointer dereference attempt
RuleID : 28580 - Revision : 7 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Silverlight ScriptObject untrusted pointer dereference attempt
RuleID : 28579 - Revision : 7 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Office Excel RealTimeData record memory corruption attempt
RuleID : 28546 - Revision : 4 - Type : FILE-OFFICE
2014-01-10 Microsoft Office Excel RealTimeData record memory corruption attempt
RuleID : 28545 - Revision : 3 - Type : FILE-OFFICE
2014-01-10 Microsoft Office Excel RealTimeData record memory corruption attempt
RuleID : 28544 - Revision : 3 - Type : FILE-OFFICE
2014-01-10 Win.Trojan.Terminator RAT variant outbound connection
RuleID : 28482 - Revision : 4 - Type : MALWARE-CNC
2014-01-10 DNS request for known malware domain catlovers.25u.com
RuleID : 28481 - Revision : 3 - Type : BLACKLIST
2014-01-10 DNS request for known malware domain liumingzhen.myftp.org
RuleID : 28480 - Revision : 3 - Type : BLACKLIST
2014-01-10 DNS request for known malware domain liumingzhen.zapto.org
RuleID : 28479 - Revision : 3 - Type : BLACKLIST
2014-01-10 Styx exploit kit landing page request
RuleID : 28478 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Styx exploit kit outbound pdf request
RuleID : 28477 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Neutrino exploit kit outbound request by Java - generic detection
RuleID : 28476 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Neutrino exploit kit outbound request - generic detection
RuleID : 28475 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Neutrino exploit kit outbound plugin detection response - generic detection
RuleID : 28474 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Neutrino exploit kit outbound request format
RuleID : 28460 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Neutrino exploit kit outbound request format
RuleID : 28459 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Neutrino exploit kit landing page
RuleID : 28458 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Neutrino exploit kit outbound request format
RuleID : 28457 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Neutrino exploit kit outbound request format
RuleID : 28456 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Neutrino exploit kit outbound request format
RuleID : 28455 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Adobe Acrobat Reader TTF SING table parsing remote code execution attempt
RuleID : 28380 - Revision : 5 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader TTF SING table parsing remote code execution attempt
RuleID : 28379 - Revision : 5 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader TTF SING table parsing remote code execution attempt
RuleID : 28378 - Revision : 5 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader TTF SING table parsing remote code execution attempt
RuleID : 28377 - Revision : 5 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader TTF SING table parsing remote code execution attempt
RuleID : 28376 - Revision : 5 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader TTF SING table parsing remote code execution attempt
RuleID : 28375 - Revision : 5 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader TTF SING table parsing remote code execution attempt
RuleID : 28374 - Revision : 6 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader malformed shading modifier heap corruption attempt
RuleID : 28361 - Revision : 7 - Type : FILE-PDF
2014-01-10 Himan exploit kit payload - Oracle Java compromise
RuleID : 28309 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Himan exploit kit payload - Adobe Reader compromise
RuleID : 28308 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Himan exploit kit landing page
RuleID : 28307 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Neutrino exploit kit outbound request format
RuleID : 28304 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Neutrino exploit kit outbound request format
RuleID : 28298 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Oracle Java 2D ImagingLib AffineTransformOp storeImageArray memory corruption...
RuleID : 28277 - Revision : 7 - Type : FILE-JAVA
2014-01-10 Oracle Java 2D ImagingLib AffineTransformOp storeImageArray memory corruption...
RuleID : 28276 - Revision : 7 - Type : FILE-JAVA
2014-01-10 Neutrino exploit kit outbound request format
RuleID : 28275 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Neutrino exploit kit outbound request format
RuleID : 28274 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Neutrino exploit kit outbound request format
RuleID : 28273 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Adobe Acrobat Reader X XML forms specially crafted RLE8 format BMP integer ov...
RuleID : 28252 - Revision : 6 - Type : FILE-PDF
2014-01-10 Neutrino exploit kit outbound request format
RuleID : 28214 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Neutrino exploit kit outbound request format
RuleID : 28032 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Neutrino exploit kit Oracle Java exploit download attempt
RuleID : 28031 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Multiple exploit kit Payload detection - readme.dll
RuleID : 27898 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Multiple exploit kit Payload detection - calc.dll
RuleID : 27897 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Multiple exploit kit Payload detection - contacts.dll
RuleID : 27896 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Multiple exploit kit Payload detection - info.dll
RuleID : 27895 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Multiple exploit kit Payload detection - about.dll
RuleID : 27894 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Teletubbies exploit kit payload download
RuleID : 27889 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Teletubbies exploit kit payload download
RuleID : 27888 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Teletubbies exploit kit payload download
RuleID : 27885 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Teletubbies exploit kit exploit attempt for Oracle Java
RuleID : 27883 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Teletubbies exploit kit exploit attempt for Adobe Acrobat Reader 9
RuleID : 27880 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Teletubbies exploit kit exploit attempt for Adobe Acrobat Reader 8
RuleID : 27879 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Styx exploit kit malicious redirection attempt
RuleID : 27815 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Styx exploit kit landing page request
RuleID : 27814 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Styx exploit kit landing page with payload
RuleID : 27813 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Neutrino exploit kit outbound request format
RuleID : 27785 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Neutrino exploit kit Oracle Java exploit download attempt
RuleID : 27784 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Gong Da exploit kit possible jar download
RuleID : 27706 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Gong Da exploit kit Java exploit requested
RuleID : 27705 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Gong Da exploit kit Java exploit requested
RuleID : 27704 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Gong Da exploit kit plugin detection
RuleID : 27703 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Gong Da exploit kit landing page
RuleID : 27702 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Gong Da Jar file download
RuleID : 27701 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Kore exploit kit successful Java exploit
RuleID : 27697 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Kore exploit kit landing page
RuleID : 27696 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Kore exploit kit landing page
RuleID : 27695 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Oracle Java 2D ImagingLib AffineTransformOp storeImageArray memory corruption...
RuleID : 27677 - Revision : 8 - Type : FILE-JAVA
2014-01-10 Oracle Java 2D ImagingLib AffineTransformOp storeImageArray memory corruption...
RuleID : 27676 - Revision : 9 - Type : FILE-JAVA
2014-01-10 Oracle Java 2D ImagingLib AffineTransformOp storeImageArray memory corruption...
RuleID : 27675 - Revision : 8 - Type : FILE-JAVA
2014-01-10 Oracle Java 2D ImagingLib AffineTransformOp storeImageArray memory corruption...
RuleID : 27674 - Revision : 9 - Type : FILE-JAVA
2014-01-10 Oracle Java 2D ImagingLib AffineTransformOp storeImageArray memory corruption...
RuleID : 27673 - Revision : 8 - Type : FILE-JAVA
2014-01-10 Oracle Java 2D ImagingLib AffineTransformOp storeImageArray memory corruption...
RuleID : 27672 - Revision : 9 - Type : FILE-JAVA
2014-01-10 Oracle Java 2D ImagingLib AffineTransformOp storeImageArray memory corruption...
RuleID : 27622 - Revision : 10 - Type : FILE-JAVA
2014-01-10 Oracle Java 2D ImagingLib AffineTransformOp storeImageArray memory corruption...
RuleID : 27621 - Revision : 10 - Type : FILE-JAVA
2014-01-10 Osx.Trojan.Janicab file download attempt
RuleID : 27549 - Revision : 3 - Type : MALWARE-OTHER
2014-01-10 Osx.Trojan.Janicab file download attempt
RuleID : 27548 - Revision : 3 - Type : MALWARE-OTHER
2014-01-10 Osx.Trojan.Janicab outbound connection
RuleID : 27547 - Revision : 4 - Type : MALWARE-CNC
2014-01-10 Osx.Trojan.Janicab outbound connection
RuleID : 27546 - Revision : 4 - Type : MALWARE-CNC
2014-01-10 Osx.Trojan.Janicab outbound connection
RuleID : 27545 - Revision : 4 - Type : MALWARE-CNC
2014-01-10 Osx.Trojan.Janicab runtime traffic detected
RuleID : 27544 - Revision : 3 - Type : MALWARE-CNC
2014-01-10 iFramer toolkit injected iframe detected - specific structure
RuleID : 27271 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Private exploit kit outbound traffic
RuleID : 27144-community - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Private exploit kit outbound traffic
RuleID : 27144 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Private exploit kit landing page
RuleID : 27143 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Private exploit kit landing page
RuleID : 27142 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Private exploit kit landing page
RuleID : 27141 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Private exploit kit numerically named exe file dowload
RuleID : 27140 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit landing page retrieval
RuleID : 27072 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit landing page retrieval
RuleID : 27071 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Blackholev2 exploit kit JNLP request
RuleID : 27070 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Blackholev2 exploit kit landing page - specific structure
RuleID : 27067 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Styx exploit kit plugin detection connection jovf
RuleID : 27042-community - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Styx exploit kit plugin detection connection jovf
RuleID : 27042 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Styx exploit kit plugin detection connection jlnp
RuleID : 27041-community - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Styx exploit kit plugin detection connection jlnp
RuleID : 27041 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Styx exploit kit plugin detection connection jorg
RuleID : 27040-community - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Styx exploit kit plugin detection connection jorg
RuleID : 27040 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Adobe Acrobat Reader X XML forms specially crafted RLE8 format BMP integer ov...
RuleID : 26928 - Revision : 11 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader X XML forms specially crafted RLE8 format BMP integer ov...
RuleID : 26927 - Revision : 11 - Type : FILE-PDF
2014-01-10 Sweet Orange exploit kit landing page in.php base64 uri
RuleID : 26834-community - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Sweet Orange exploit kit landing page in.php base64 uri
RuleID : 26834 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Microsoft Office MSComctlLib.Toolbar ActiveX control exploit attempt
RuleID : 26832 - Revision : 5 - Type : FILE-OFFICE
2014-01-10 Goon/Infinity/Redkit exploit kit short jar request
RuleID : 26808 - Revision : 11 - Type : EXPLOIT-KIT
2014-01-10 Redkit exploit kit landing page
RuleID : 26807 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Redkit exploit kit short JNLP request
RuleID : 26806 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Redkit exploit kit encrypted binary download
RuleID : 26805 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Sweet Orange exploit kit landing page
RuleID : 26804 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Microsoft Internet Explorer null object access attempt
RuleID : 26668 - Revision : 3 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer ANIMATECOLOR SMIL access attempt
RuleID : 26666 - Revision : 5 - Type : BROWSER-IE
2014-01-10 BMP extremely large xpos opcodes
RuleID : 26665 - Revision : 6 - Type : FILE-IMAGE
2014-01-10 BMP extremely large xpos opcodes
RuleID : 26664 - Revision : 11 - Type : FILE-IMAGE
2014-01-10 Multiple exploit kit landing page - specific structure
RuleID : 26653 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Adobe Acrobat Reader X XML forms specially crafted RLE8 format BMP integer ov...
RuleID : 26652 - Revision : 11 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader X XML forms specially crafted RLE8 format BMP integer ov...
RuleID : 26651 - Revision : 11 - Type : FILE-PDF
2014-01-10 Adobe ColdFusion adminapi information disclosure attempt
RuleID : 26621 - Revision : 3 - Type : SERVER-OTHER
2014-01-10 iFramer injection - specific structure
RuleID : 26617 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Impact/Stamp exploit kit landing page
RuleID : 26600 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Impact/Stamp exploit kit landing page
RuleID : 26599 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Microsoft Internet Explorer null object access attempt
RuleID : 26572 - Revision : 5 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer null object access attempt
RuleID : 26571 - Revision : 3 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer null object access attempt
RuleID : 26570 - Revision : 5 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer null object access attempt
RuleID : 26569 - Revision : 4 - Type : BROWSER-IE
2014-01-10 Multiple exploit kit successful redirection - jnlp bypass
RuleID : 26541 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 iFramer injection - specific structure
RuleID : 26540 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Stamp exploit kit landing page
RuleID : 26536 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Multiple exploit kit landing page - specific structure
RuleID : 26535 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit java payload detection
RuleID : 26512 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Sakura exploit kit redirection structure
RuleID : 26511 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit pdf payload detection
RuleID : 26510 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Multiple exploit kit java payload detection
RuleID : 26509 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Multiple exploit kit Payload detection - info.dll
RuleID : 26508 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit landing page - specific structure
RuleID : 26507 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit jar file redirection
RuleID : 26506 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Blackholev2 exploit kit jar file downloaded
RuleID : 26434 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Redkit exploit kit landing page
RuleID : 26384 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Redkit exploit kit landing page
RuleID : 26383 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Redkit exploit kit java exploit request
RuleID : 26377 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Redkit exploit kit landing page redirection
RuleID : 26351 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 TDS redirection - may lead to exploit kit
RuleID : 26350 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Redkit exploit kit obfuscated portable executable
RuleID : 26349 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Redkit exploit kit java exploit delivery
RuleID : 26348 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Redkit exploit kit java exploit request
RuleID : 26347 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Redkit exploit kit payload requested
RuleID : 26346 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Redkit exploit kit landing page
RuleID : 26345 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Redkit exploit kit landing page redirection
RuleID : 26344 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Nuclear exploit kit landing page
RuleID : 26343 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Nuclear exploit kit landing page - specific structure
RuleID : 26342 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Nuclear exploit kit landing page
RuleID : 26341 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit landing page retrieval - ff.php
RuleID : 26339 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 IFRAMEr injection detection - leads to exploit kit
RuleID : 26338 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit landing page - specific structure
RuleID : 26337 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Styx exploit kit redirection page
RuleID : 26297 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Styx exploit kit landing page
RuleID : 26296 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit malicious jar download
RuleID : 26256 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit redirection page
RuleID : 26254 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Impact exploit kit landing page
RuleID : 26252 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Sweet Orange exploit kit landing page
RuleID : 26233 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Sweet Orange exploit kit landing page
RuleID : 26232 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit MyApplet class retrieval
RuleID : 26229 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit redirection page
RuleID : 26228 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit landing page retrieval
RuleID : 26227 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Neutrino exploit kit redirection page
RuleID : 26100 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Neutrino exploit kit redirection page
RuleID : 26099 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Neutrino exploit kit Java archive transfer
RuleID : 26098 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Neutrino exploit kit Java archive transfer
RuleID : 26097 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Neutrino exploit kit landing page
RuleID : 26096 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Neutrino exploit kit landing page
RuleID : 26095 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Sweet Orange exploit kit landing page
RuleID : 26094 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit landing page
RuleID : 26091 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Styx exploit kit landing page
RuleID : 26090 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit Portable Executable download
RuleID : 26056 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit malicious class file download
RuleID : 26055 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit malicious class file download
RuleID : 26054 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit malicious class file download
RuleID : 26053 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit malicious class file download
RuleID : 26052 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit malicious jar file download
RuleID : 26051 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit SWF file download
RuleID : 26050 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit EOT file download
RuleID : 26049 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit PDF exploit
RuleID : 26048 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit redirection structure
RuleID : 26047 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit landing page
RuleID : 26046 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Blackholev2 exploit kit iframe redirection attempt
RuleID : 26033 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Blackholev2 exploit kit landing page
RuleID : 26031 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Gong Da exploit kit redirection page received
RuleID : 26013 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Microsoft Internet Explorer userdata behavior memory corruption attempt
RuleID : 25986 - Revision : 7 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer userdata behavior memory corruption attempt
RuleID : 25985 - Revision : 9 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer userdata behavior memory corruption attempt
RuleID : 25984 - Revision : 9 - Type : BROWSER-IE
2014-01-10 Adobe ColdFusion component browser access attempt
RuleID : 25977 - Revision : 3 - Type : POLICY-OTHER
2014-01-10 Adobe ColdFusion admin API access attempt
RuleID : 25976 - Revision : 3 - Type : POLICY-OTHER
2014-01-10 Adobe ColdFusion admin interface access attempt
RuleID : 25975 - Revision : 3 - Type : POLICY-OTHER
2014-01-10 Cool exploit kit Portable Executable download
RuleID : 25968 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit malicious class file download
RuleID : 25967 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit malicious class file download
RuleID : 25966 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit malicious class file download
RuleID : 25965 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit malicious class file download
RuleID : 25964 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit SWF file download
RuleID : 25963 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit EOT file download
RuleID : 25962 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit former location - has been removed
RuleID : 25960 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit malicious class file download
RuleID : 25959 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit malicious class file download
RuleID : 25958 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit malicious class file download
RuleID : 25957 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit malicious class file download
RuleID : 25956 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit malicious jar file download
RuleID : 25955 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit SWF file download
RuleID : 25954 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit landing page
RuleID : 25953 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit landing page
RuleID : 25952 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit EOT file download
RuleID : 25951 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit PDF exploit
RuleID : 25950 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit java exploit retrieval
RuleID : 25862 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit java exploit retrieval
RuleID : 25861 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit landing page
RuleID : 25860 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit malicious jar file download
RuleID : 25859 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit Java exploit download
RuleID : 25858 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit PDF exploit
RuleID : 25857 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10 Oracle Java malicious class download attempt
RuleID : 25833 - Revision : 6 - Type : FILE-JAVA
2014-01-10 Oracle Java malicious class download attempt
RuleID : 25830 - Revision : 12 - Type : FILE-JAVA
2014-01-10 Fiesta exploit kit landing page detection - specific-structure
RuleID : 25808 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Whitehole exploit kit landing page
RuleID : 25806 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Whitehole exploit kit Java exploit retrieval
RuleID : 25805 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Whitehole exploit kit malicious jar download attempt
RuleID : 25804 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Multiple exploit kit 32-alpha jar request
RuleID : 25798 - Revision : 10 - Type : EXPLOIT-KIT
2014-01-10 Blackholev2 exploit kit redirection successful
RuleID : 25611 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit EOT file download
RuleID : 25598 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit EOT file download
RuleID : 25597 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit EOT file download
RuleID : 25596 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit java exploit retrieval
RuleID : 25595 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit java exploit retrieval
RuleID : 25594 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit java exploit retrieval
RuleID : 25593 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit landing page - specific structure
RuleID : 25591 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Blackholev2 exploit kit landing page - specific structure
RuleID : 25590 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Cool Exploit Kit SWF file download
RuleID : 25576 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Cool Exploit Kit SWF file download
RuleID : 25575 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Cool Exploit Kit SWF file download
RuleID : 25574 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Cool Exploit Kit SWF file download
RuleID : 25573 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Blackholev2 exploit kit landing page
RuleID : 25569 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit landing page retrieval
RuleID : 25568 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Multiple Exploit Kit Payload detection - setup.exe
RuleID : 25526 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit java exploit retrieval
RuleID : 25510 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit pdf exploit retrieval
RuleID : 25509 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit java exploit retrieval
RuleID : 25508 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit pdf exploit retrieval
RuleID : 25507 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit EOT file download
RuleID : 25506 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit EOT file download
RuleID : 25505 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10 JavaScript contained in an xml template embedded in a pdf attempt
RuleID : 25475 - Revision : 8 - Type : FILE-PDF
2014-01-10 Microsoft Office RTF malformed pfragments field
RuleID : 25393 - Revision : 4 - Type : FILE-OFFICE
2014-01-10 Sweet Orange exploit kit obfuscated payload download
RuleID : 25391 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Sweet Orange exploit kit landing page - specific structure
RuleID : 25390 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Sweet Orange exploit kit landing page - specific structure
RuleID : 25389 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Blackholev2 exploit kit redirection successful
RuleID : 25388 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Multiple exploit kit Payload detection - readme.exe
RuleID : 25387 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Multiple exploit kit Payload detection - about.exe
RuleID : 25386 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Multiple exploit kit Payload detection - calc.exe
RuleID : 25385 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Multiple exploit kit Payload detection - contacts.exe
RuleID : 25384 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Multiple exploit kit Payload detection - info.exe
RuleID : 25383 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Multiple exploit kit malicious jar file dropped
RuleID : 25382 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit java exploit retrieval
RuleID : 25328 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit pdf exploit retrieval
RuleID : 25327 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit java exploit retrieval
RuleID : 25326 - Revision : 10 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit pdf exploit retrieval
RuleID : 25325 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit landing page detected
RuleID : 25324 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit EOT file download
RuleID : 25323 - Revision : 10 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit EOT file download
RuleID : 25322 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10 Microsoft Office Excel IPMT record buffer overflow attempt
RuleID : 25296 - Revision : 4 - Type : FILE-OFFICE
2014-01-10 Microsoft Office Excel IPMT record buffer overflow attempt
RuleID : 25295 - Revision : 3 - Type : FILE-OFFICE
2014-01-10 Microsoft Office Excel IPMT record buffer overflow attempt
RuleID : 25294 - Revision : 4 - Type : FILE-OFFICE
2014-01-10 Microsoft Office Excel IPMT record buffer overflow attempt
RuleID : 25293 - Revision : 6 - Type : FILE-OFFICE
2014-01-10 Adobe ColdFusion Admin API arbitrary command execution attempt
RuleID : 25267 - Revision : 4 - Type : SERVER-OTHER
2014-01-10 Adobe ColdFusion Admin API arbitrary command execution attempt
RuleID : 25266 - Revision : 4 - Type : SERVER-OTHER
2014-01-10 Microsoft Internet Explorer deleted button use after free attempt
RuleID : 25235 - Revision : 4 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer deleted button use after free attempt
RuleID : 25234 - Revision : 4 - Type : BROWSER-IE
2014-01-10 Styx exploit kit portable executable download request
RuleID : 25140 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10 Styx exploit kit eot outbound connection
RuleID : 25139 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Styx exploit kit pdf outbound connection
RuleID : 25138 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Styx exploit kit jar outbound connection
RuleID : 25137 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10 Styx exploit kit plugin detection connection
RuleID : 25136 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10 Styx Exploit Kit outbound connection
RuleID : 25135 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10 Microsoft Internet Explorer deleted button use after free attempt
RuleID : 25134 - Revision : 4 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer deleted button use after free attempt
RuleID : 25133 - Revision : 4 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer deleted button use after free attempt
RuleID : 25132 - Revision : 4 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer deleted button use after free attempt
RuleID : 25131 - Revision : 4 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer deleted button use after free attempt
RuleID : 25130 - Revision : 4 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer deleted button use after free attempt
RuleID : 25129 - Revision : 4 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer deleted button use after free attempt
RuleID : 25128 - Revision : 4 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer deleted button use after free attempt
RuleID : 25127 - Revision : 4 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer deleted button use after free attempt
RuleID : 25126 - Revision : 3 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer deleted button use after free attempt
RuleID : 25125 - Revision : 4 - Type : BROWSER-IE
2014-01-10 Oracle Java field bytecode verifier cache code execution attempt
RuleID : 25123 - Revision : 10 - Type : FILE-JAVA
2014-01-10 Oracle Java field bytecode verifier cache code execution attempt
RuleID : 25122 - Revision : 9 - Type : FILE-JAVA
2014-01-10 Oracle Java field bytecode verifier cache code execution attempt
RuleID : 25121 - Revision : 5 - Type : FILE-JAVA
2014-01-10 DNS request for known malware domain losang.dynamicdns.co.uk
RuleID : 25069 - Revision : 2 - Type : BLACKLIST
2014-01-10 Win.Trojan.Riler inbound connection
RuleID : 25068 - Revision : 2 - Type : MALWARE-CNC
2014-01-10 Win.Trojan.Riler variant outbound connection
RuleID : 25067 - Revision : 3 - Type : MALWARE-CNC
2014-01-10 Cool exploit kit 32-bit font file download
RuleID : 25056 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit 64-bit font file download
RuleID : 25055 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit requesting payload
RuleID : 25045 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Sweet Orange exploit kit landing page - specific structure
RuleID : 25044 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Blackholev2 exploit kit url structure detected
RuleID : 25043 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Microsoft Office Word rtf invalid listoverridecount value attempt
RuleID : 24975 - Revision : 12 - Type : FILE-OFFICE
2014-01-10 Microsoft Office Word rtf invalid listoverridecount value attempt
RuleID : 24974 - Revision : 12 - Type : FILE-OFFICE
2014-01-10 Nuclear exploit kit landing page detected
RuleID : 24888 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Blackholev2 exploit kit landing page in an email
RuleID : 24865 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Blackholev2 exploit kit landing page - specific-structure
RuleID : 24864 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Blackholev2 exploit kit landing page in an email
RuleID : 24863 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Blackholev2 exploit kit landing page - specific-structure
RuleID : 24862 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Blackholev2 exploit kit landing page in an email
RuleID : 24861 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Blackholev2 exploit kit landing page - specific-structure
RuleID : 24860 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Sweet Orange exploit kit landing page - JAR redirection
RuleID : 24840 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Sweet Orange exploit kit landing page - specific structure
RuleID : 24839 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Sweet Orange User-Agent - contype
RuleID : 24838 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10 Sweet Orange initial landing page
RuleID : 24837 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 KaiXin exploit kit Java Class download
RuleID : 24793 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit 64-bit font file download
RuleID : 24784 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit 32-bit font file download
RuleID : 24783 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit outbound request
RuleID : 24782 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit outbound request
RuleID : 24781 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit - PDF Exploit
RuleID : 24780 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit - PDF Exploit
RuleID : 24779 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10 Cool exploit kit landing page - Title
RuleID : 24778 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 KaiXin exploit kit attack vector attempt
RuleID : 24670 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 KaiXin exploit kit attack vector attempt
RuleID : 24669 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 KaiXin exploit kit attack vector attempt
RuleID : 24668 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 KaiXin exploit kit attack vector attempt
RuleID : 24667 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Blackholev2 exploit kit redirection successful
RuleID : 24638 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Blackholev2 exploit kit redirection page - specific structure
RuleID : 24637 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Blackholev2 exploit kit redirection page - specific structure
RuleID : 24636 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10 Blackholev2 exploit kit landing page download attempt
RuleID : 24608 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Blackholev2 exploit kit landing page received - specific structure
RuleID : 24593 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit landing page download attempt
RuleID : 24548 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit landing page download attempt
RuleID : 24547 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Blackholev2 exploit kit landing page download attempt
RuleID : 24546 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Blackhole admin page outbound access attempt
RuleID : 24544 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Blackhole admin page inbound access attempt
RuleID : 24543 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Blackholev2 exploit kit fallback executable download
RuleID : 24501 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Blackhole - Cookie Set
RuleID : 24475 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10 Blackholev2 exploit kit landing page Received
RuleID : 24228 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10 Blackholev2 - URI Structure
RuleID : 24227 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10 Blackholev2 exploit kit landing page received
RuleID : 24226 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Oracle Java field bytecode verifier cache code execution attempt
RuleID : 24202 - Revision : 10 - Type : FILE-JAVA
2014-01-10 Oracle Java field bytecode verifier cache code execution attempt
RuleID : 24201 - Revision : 9 - Type : FILE-JAVA
2014-01-10 Blackhole possible email Landing to 8 chr folder
RuleID : 24171 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit landing page with specific structure
RuleID : 24054 - Revision : 10 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit landing page with specific structure
RuleID : 24053 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10 Microsoft Office MSCOMCTL ActiveX control tabstrip method attempt
RuleID : 24006 - Revision : 14 - Type : FILE-OFFICE
2014-01-10 Blackhole exploit kit landing page with specific structure - fewbgazr catch
RuleID : 23962 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit landing page with specific structure - hwehes
RuleID : 23850 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10 Blackhole redirection attempt
RuleID : 23849 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10 Blackhole redirection attempt
RuleID : 23848 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Microsoft Office MSCOMCTL ActiveX control tabstrip method arbitrary code exec...
RuleID : 23845 - Revision : 8 - Type : FILE-MULTIMEDIA
2014-01-10 Microsoft Office MSCOMCTL ActiveX control tabstrip method attempt
RuleID : 23844 - Revision : 14 - Type : FILE-OFFICE
2014-01-10 Blackhole redirection page
RuleID : 23797 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit landing page with specific structure - Math.round catch
RuleID : 23786 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit landing page with specific structure - Math.floor catch
RuleID : 23785 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit landing page
RuleID : 23781 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit landing page request - tkr
RuleID : 23622 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit landing page with specific structure - prototype catch ...
RuleID : 23619 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10 JavaScript contained in an xml template embedded in a pdf attempt
RuleID : 23612 - Revision : 11 - Type : FILE-PDF
2014-01-10 JavaScript contained in an xml template embedded in a pdf attempt
RuleID : 23611 - Revision : 10 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader malformed TIFF remote code execution attempt
RuleID : 23524 - Revision : 5 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader malformed TIFF remote code execution attempt
RuleID : 23523 - Revision : 5 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader malicious TIFF remote code execution attempt
RuleID : 23522 - Revision : 5 - Type : FILE-PDF
2014-01-10 Possible unknown malicious PDF
RuleID : 23521 - Revision : 5 - Type : FILE-PDF
2014-01-10 Possible unknown malicious PDF
RuleID : 23520 - Revision : 5 - Type : FILE-PDF
2014-01-10 Possible malicious pdf cve-2010-0188 string
RuleID : 23519 - Revision : 3 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader libtiff TIFFFetchShortPair stack buffer overflow attempt
RuleID : 23518 - Revision : 5 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader libtiff TIFFFetchShortPair stack buffer overflow attempt
RuleID : 23517 - Revision : 5 - Type : FILE-PDF
2014-01-10 Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt
RuleID : 23305 - Revision : 10 - Type : FILE-OFFICE
2014-01-10 Oracle Java field bytecode verifier cache code execution attempt
RuleID : 23277 - Revision : 9 - Type : FILE-JAVA
2014-01-10 Oracle Java field bytecode verifier cache code execution attempt
RuleID : 23276 - Revision : 9 - Type : FILE-JAVA
2014-01-10 Oracle Java field bytecode verifier cache code execution attempt
RuleID : 23275 - Revision : 9 - Type : FILE-JAVA
2014-01-10 Oracle Java field bytecode verifier cache code execution attempt
RuleID : 23274 - Revision : 9 - Type : FILE-JAVA
2014-01-10 Oracle Java field bytecode verifier cache code execution attempt
RuleID : 23273 - Revision : 11 - Type : FILE-JAVA
2014-01-10 Blackhole exploit kit landing page download attempt
RuleID : 23159 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit landing page with specific structure - prototype catch
RuleID : 23158 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10 Nuclear Pack exploit kit binary download
RuleID : 23157 - Revision : 10 - Type : EXPLOIT-KIT
2014-01-10 Nuclear Pack exploit kit landing page
RuleID : 23156 - Revision : 11 - Type : EXPLOIT-KIT
2014-01-10 Blackhole redirection attempt
RuleID : 22949 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Microsoft Office RTF malformed pfragments field
RuleID : 22102 - Revision : 8 - Type : FILE-OFFICE
2014-01-10 Microsoft Office RTF malformed pfragments field
RuleID : 22101 - Revision : 7 - Type : FILE-OFFICE
2014-01-10 Blackhole Exploit Kit javascript service method
RuleID : 22088 - Revision : 12 - Type : EXPLOIT-KIT
2014-01-10 Blackhole landing redirection page
RuleID : 22041 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Blackhole suspected landing page
RuleID : 22040 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Blackhole suspected landing page
RuleID : 22039 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt
RuleID : 21937 - Revision : 11 - Type : FILE-OFFICE
2014-01-10 Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt
RuleID : 21906 - Revision : 12 - Type : FILE-OFFICE
2014-01-10 Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt
RuleID : 21905 - Revision : 12 - Type : FILE-OFFICE
2014-01-10 Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt
RuleID : 21904 - Revision : 12 - Type : FILE-OFFICE
2014-01-10 Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt
RuleID : 21903 - Revision : 12 - Type : FILE-OFFICE
2014-01-10 Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt
RuleID : 21902 - Revision : 13 - Type : FILE-OFFICE
2014-01-10 Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt
RuleID : 21901 - Revision : 7 - Type : FILE-OFFICE
2014-01-10 Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt
RuleID : 21900 - Revision : 7 - Type : FILE-OFFICE
2014-01-10 Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt
RuleID : 21899 - Revision : 7 - Type : FILE-OFFICE
2014-01-10 Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt
RuleID : 21898 - Revision : 7 - Type : FILE-OFFICE
2014-01-10 Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt
RuleID : 21897 - Revision : 7 - Type : FILE-OFFICE
2014-01-10 Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt
RuleID : 21896 - Revision : 7 - Type : FILE-OFFICE
2014-01-10 Blackhole exploit landing page with specific structure - Loading
RuleID : 21876 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10 Possible exploit kit post compromise activity - taskkill
RuleID : 21875 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Possible exploit kit post compromise activity - StrReverse
RuleID : 21874 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Phoenix exploit kit post-compromise behavior
RuleID : 21860 - Revision : 5 - Type : MALWARE-CNC
2014-01-10 MSCOMCTL ActiveX control deserialization arbitrary code execution attempt
RuleID : 21801 - Revision : 9 - Type : FILE-OFFICE
2014-01-10 MSCOMCTL ActiveX control deserialization arbitrary code execution attempt
RuleID : 21800 - Revision : 9 - Type : FILE-OFFICE
2014-01-10 MSCOMCTL ActiveX control deserialization arbitrary code execution attempt
RuleID : 21799 - Revision : 9 - Type : FILE-OFFICE
2014-01-10 MSCOMCTL ActiveX control deserialization arbitrary code execution attempt
RuleID : 21798 - Revision : 9 - Type : FILE-OFFICE
2014-01-10 MSCOMCTL ActiveX control deserialization arbitrary code execution attempt
RuleID : 21797 - Revision : 9 - Type : FILE-OFFICE
2014-01-10 Blackhole exploit kit landing page with specific structure - catch
RuleID : 21661 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit landing page Requested - /Index/index.php
RuleID : 21660 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit landing page Requested - /Home/index.php
RuleID : 21659 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit landing page
RuleID : 21658 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit landing page - specific structure
RuleID : 21657 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit landing page with specific structure - prototype catch
RuleID : 21646-community - Revision : 16 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit landing page with specific structure - prototype catch
RuleID : 21646 - Revision : 16 - Type : EXPLOIT-KIT
2014-01-10 Phoenix exploit kit landing page
RuleID : 21640 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit landing page with specific structure - BBB
RuleID : 21581 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit landing page with specific header
RuleID : 21549 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit landing page with specific header
RuleID : 21539 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10 Possible malicious pdf cve-2010-0188 string
RuleID : 21537 - Revision : 4 - Type : FILE-PDF
2014-01-10 Blackhole exploit kit landing page with specific structure - prototype catch
RuleID : 21492-community - Revision : 22 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit landing page with specific structure - prototype catch
RuleID : 21492 - Revision : 22 - Type : EXPLOIT-KIT
2014-01-10 Possible unknown malicious PDF
RuleID : 21453 - Revision : 7 - Type : FILE-PDF
2014-01-10 Blackhole exploit kit JavaScript carat string splitting with hostile applet
RuleID : 21438-community - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit JavaScript carat string splitting with hostile applet
RuleID : 21438 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10 Possible unknown malicious PDF
RuleID : 21429 - Revision : 10 - Type : FILE-PDF
2014-01-10 Blackhole exploit kit URL - search.php?page=
RuleID : 21348 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit URL - .php?page=
RuleID : 21347 - Revision : 12 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit malicious jar download
RuleID : 21346 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit malicious jar request
RuleID : 21345 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit pdf download
RuleID : 21344 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit pdf request
RuleID : 21343 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10 Microsoft Internet Explorer orphan DOM objects memory corruption attempt
RuleID : 21272 - Revision : 5 - Type : BROWSER-IE
2014-01-10 Blackhole exploit kit response
RuleID : 21259 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Adobe Acrobat Reader malformed shading modifier heap corruption attempt
RuleID : 21253 - Revision : 13 - Type : FILE-PDF
2014-01-10 Blackhole exploit kit control panel access
RuleID : 21141 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10 Crimepack exploit kit malicious pdf request
RuleID : 21099 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Crimepack exploit kit landing page
RuleID : 21098 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Crimepack exploit kit post-exploit download request
RuleID : 21097 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Crimepack exploit kit control panel access
RuleID : 21096 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Eleanore exploit kit post-exploit page request
RuleID : 21071 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10 Eleanore exploit kit pdf exploit page request
RuleID : 21070 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Eleanore exploit kit exploit fetch request
RuleID : 21069 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 Eleanore exploit kit landing page
RuleID : 21068 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10 DNS request for known malware domain prettylikeher.com - Sykipot
RuleID : 21048 - Revision : 7 - Type : BLACKLIST
2014-01-10 known malicious SSL certificate - Sykipot C&C
RuleID : 21046 - Revision : 4 - Type : MALWARE-CNC
2014-01-10 Blackhole exploit kit landing page
RuleID : 21045 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit landing page
RuleID : 21044 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit post-compromise download attempt - .php?e=
RuleID : 21043 - Revision : 10 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit post-compromise download attempt - .php?f=
RuleID : 21042 - Revision : 11 - Type : EXPLOIT-KIT
2014-01-10 Blackhole exploit kit URL - main.php?page=
RuleID : 21041 - Revision : 12 - Type : EXPLOIT-KIT
2014-01-10 Yang Pack yg.htm landing page
RuleID : 21006 - Revision : 5 - Type : MALWARE-CNC
2014-01-10 Cute Pack cute-ie.html landing page
RuleID : 21004 - Revision : 5 - Type : MALWARE-CNC
2014-01-10 Cute Pack cute-ie.html request
RuleID : 21003 - Revision : 5 - Type : MALWARE-CNC
2014-01-10 Adobe Flash Player ActionScript callMethod type confusion attempt
RuleID : 20803 - Revision : 9 - Type : FILE-FLASH
2014-01-10 Adobe Flash Player ActionScript callMethod type confusion attempt
RuleID : 20785 - Revision : 7 - Type : FILE-FLASH
2014-01-10 Adobe Flash Player ActionScript callMethod type confusion attempt - namelist.xls
RuleID : 20784 - Revision : 7 - Type : FILE-FLASH
2014-01-10 Adobe Flash Player ActionScript callMethod type confusion attempt - dear chu.rar
RuleID : 20783 - Revision : 7 - Type : FILE-FLASH
2014-01-10 Adobe Flash Player ActionScript callMethod type confusion attempt - economy.rar
RuleID : 20782 - Revision : 7 - Type : FILE-FLASH
2014-01-10 Adobe Flash Player ActionScript callMethod type confusion attempt
RuleID : 20781 - Revision : 8 - Type : FILE-FLASH
2014-01-10 Adobe Flash Player ActionScript callMethod type confusion attempt - namelist.xls
RuleID : 20780 - Revision : 8 - Type : FILE-FLASH
2014-01-10 Adobe Flash Player ActionScript callMethod type confusion attempt - dear chu.rar
RuleID : 20779 - Revision : 8 - Type : FILE-FLASH
2014-01-10 Adobe Flash Player ActionScript callMethod type confusion attempt - economy.rar
RuleID : 20778 - Revision : 8 - Type : FILE-FLASH
2014-01-10 Adobe Acrobat Reader malformed shading modifier heap corruption attempt
RuleID : 20659 - Revision : 17 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader malicious TIFF remote code execution attempt
RuleID : 20577 - Revision : 13 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader U3D CLODMeshDeceleration code execution attempt
RuleID : 20429 - Revision : 12 - Type : FILE-PDF
2014-01-10 Win.Trojan.Taidoor variant outbound connection
RuleID : 20204 - Revision : 7 - Type : MALWARE-CNC
2014-01-10 Adobe Flash Player ActionScript callMethod type confusion attempt
RuleID : 20131 - Revision : 11 - Type : FILE-FLASH
2014-01-10 Adobe Acrobat Reader TTF SING table parsing remote code execution attempt
RuleID : 18991 - Revision : 13 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader TTF SING table parsing remote code execution attempt
RuleID : 18990 - Revision : 13 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader TTF SING table parsing remote code execution attempt
RuleID : 18989 - Revision : 13 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader TTF SING table parsing remote code execution attempt
RuleID : 18988 - Revision : 12 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader and Acrobat TTF SING table parsing remote code execution...
RuleID : 18987 - Revision : 15 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader and Acrobat TTF SING table parsing remote code execution...
RuleID : 18986 - Revision : 15 - Type : FILE-PDF
2014-01-10 Microsoft Office RTF malformed second pfragments field
RuleID : 18706 - Revision : 15 - Type : FILE-OFFICE
2014-01-10 Microsoft Office RTF malformed second pfragments field
RuleID : 18705 - Revision : 11 - Type : FILE-OFFICE
2014-01-10 Microsoft Office RTF malformed second pfragments field
RuleID : 18704 - Revision : 13 - Type : FILE-OFFICE
2014-01-10 Microsoft Office RTF malformed pfragments field
RuleID : 18703 - Revision : 12 - Type : FILE-OFFICE
2014-01-10 Microsoft Office RTF malformed pfragments field
RuleID : 18702 - Revision : 14 - Type : FILE-OFFICE
2014-01-10 Microsoft Office RTF malformed pfragments field
RuleID : 18680 - Revision : 19 - Type : FILE-OFFICE
2014-01-10 Microsoft Office Excel RealTimeData record memory corruption attempt
RuleID : 18633 - Revision : 14 - Type : FILE-OFFICE
2014-01-10 Adobe Acrobat Reader malformed TIFF remote code execution attempt
RuleID : 18585 - Revision : 13 - Type : FILE-PDF
2014-01-10 Microsoft Office Word with embedded Flash file transfer
RuleID : 18546 - Revision : 16 - Type : FILE-OFFICE
2014-01-10 Microsoft Internet Explorer invalid pointer memory corruption attempt
RuleID : 18540 - Revision : 6 - Type : SPECIFIC-THREATS
2014-01-10 Microsoft Office RTF parsing remote code execution attempt
RuleID : 18310 - Revision : 12 - Type : FILE-OFFICE
2014-01-10 Microsoft Office RTF parsing remote code execution attempt
RuleID : 18067 - Revision : 14 - Type : FILE-OFFICE
2014-01-10 Microsoft Internet Explorer userdata behavior memory corruption attempt
RuleID : 17689 - Revision : 12 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer userdata behavior memory corruption attempt
RuleID : 17688 - Revision : 13 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer invalid pointer memory corruption attempt
RuleID : 17687 - Revision : 12 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer invalid pointer memory corruption attempt
RuleID : 17686 - Revision : 12 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer invalid pointer memory corruption attempt
RuleID : 17685 - Revision : 12 - Type : BROWSER-IE
2014-01-10 Microsoft Office Word SmartTag record code execution attempt
RuleID : 17308 - Revision : 14 - Type : FILE-OFFICE
2014-01-10 Adobe Acrobat Reader TTF SING table parsing remote code execution attempt
RuleID : 17233 - Revision : 13 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader libtiff TIFFFetchShortPair stack buffer overflow attempt
RuleID : 17215 - Revision : 12 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader libtiff TIFFFetchShortPair stack buffer overflow attempt
RuleID : 17214 - Revision : 12 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader malformed TIFF remote code execution attempt
RuleID : 16490 - Revision : 15 - Type : FILE-PDF
2014-01-10 Microsoft Internet Explorer userdata behavior memory corruption attempt
RuleID : 16482 - Revision : 15 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer orphan DOM objects memory corruption attempt
RuleID : 16330 - Revision : 10 - Type : BROWSER-IE
2014-01-10 Microsoft Office Excel FeatHdr BIFF record remote code execution attempt
RuleID : 16241 - Revision : 12 - Type : FILE-OFFICE

Nessus® Vulnerability Scanner

Date Description
2016-03-04 Name : The remote VMware ESX / ESXi host is missing a security-related patch.
File : vmware_esx_VMSA-2013-0012_remote.nasl - Type : ACT_GATHER_INFO
2015-12-30 Name : The remote VMware ESXi host is missing a security-related patch.
File : vmware_VMSA-2014-0004_remote.nasl - Type : ACT_GATHER_INFO
2015-05-20 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2013-1256-1.nasl - Type : ACT_GATHER_INFO
2015-03-30 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2015-062.nasl - Type : ACT_GATHER_INFO
2015-03-12 Name : The remote host has software installed that is affected by multiple vulnerabi...
File : ibm_rational_clearquest_8_0_1_3_01.nasl - Type : ACT_GATHER_INFO
2015-01-19 Name : The remote Solaris system is missing a security patch for third-party software.
File : solaris11_openssl_20140731.nasl - Type : ACT_GATHER_INFO
2014-12-15 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201412-11.nasl - Type : ACT_GATHER_INFO
2014-11-26 Name : The remote OracleVM host is missing a security update.
File : oraclevm_OVMSA-2014-0032.nasl - Type : ACT_GATHER_INFO
2014-11-24 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201411-06.nasl - Type : ACT_GATHER_INFO
2014-11-08 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2013-1455.nasl - Type : ACT_GATHER_INFO
2014-11-08 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2013-1456.nasl - Type : ACT_GATHER_INFO
2014-11-08 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2014-0377.nasl - Type : ACT_GATHER_INFO
2014-11-08 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2014-0378.nasl - Type : ACT_GATHER_INFO
2014-11-08 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2014-0396.nasl - Type : ACT_GATHER_INFO
2014-11-08 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2014-0414.nasl - Type : ACT_GATHER_INFO
2014-11-08 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2014-0416.nasl - Type : ACT_GATHER_INFO
2014-11-06 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_flash-player-141020.nasl - Type : ACT_GATHER_INFO
2014-10-29 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2014-603.nasl - Type : ACT_GATHER_INFO
2014-10-16 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2014-1648.nasl - Type : ACT_GATHER_INFO
2014-10-15 Name : The remote Windows host contains a version of Adobe AIR that is affected by m...
File : adobe_air_apsb14-22.nasl - Type : ACT_GATHER_INFO
2014-10-15 Name : The remote Windows host has a browser plugin that is affected by multiple vul...
File : flash_player_apsb14-22.nasl - Type : ACT_GATHER_INFO
2014-10-15 Name : The remote host contains a web browser that is affected by multiple vulnerabi...
File : google_chrome_38_0_2125_104.nasl - Type : ACT_GATHER_INFO
2014-10-15 Name : The remote Mac OS X host contains a version of Adobe AIR that is affected by ...
File : macosx_adobe_air_15_0_0_293.nasl - Type : ACT_GATHER_INFO
2014-10-15 Name : The remote Mac OS X host has a browser plugin that is affected by multiple vu...
File : macosx_flash_player_15_0_0_189.nasl - Type : ACT_GATHER_INFO
2014-10-15 Name : The remote Mac OS X host contains a web browser that is affected by multiple ...
File : macosx_google_chrome_38_0_2125_104.nasl - Type : ACT_GATHER_INFO
2014-10-15 Name : The remote host has an ActiveX control installed that is affected by multiple...
File : smb_kb3001237.nasl - Type : ACT_GATHER_INFO
2014-10-15 Name : The remote Windows host is affected by a remote code execution vulnerability.
File : smb_nt_ms14-060.nasl - Type : ACT_GATHER_INFO
2014-10-10 Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL15159.nasl - Type : ACT_GATHER_INFO
2014-08-29 Name : The remote host has software installed that is affected by an information dis...
File : kaspersky_internet_security_heartbleed.nasl - Type : ACT_GATHER_INFO
2014-08-10 Name : The remote Fedora host is missing a security update.
File : fedora_2014-9308.nasl - Type : ACT_GATHER_INFO
2014-08-07 Name : The remote Windows host has an application that is affected by an information...
File : hp_loadrunner_12_00_1.nasl - Type : ACT_GATHER_INFO
2014-08-06 Name : The remote host contains software that is affected by an information disclosu...
File : hp_vca_SSRT101531-rhel.nasl - Type : ACT_GATHER_INFO
2014-08-06 Name : The remote host contains software that is affected by an information disclosu...
File : hp_vca_SSRT101531-sles.nasl - Type : ACT_GATHER_INFO
2014-08-06 Name : The remote host contains software that is affected by an information disclosu...
File : hp_vca_SSRT101531.nasl - Type : ACT_GATHER_INFO
2014-08-06 Name : The remote host contains software that is affected by an information disclosu...
File : hp_vcrm_SSRT101531.nasl - Type : ACT_GATHER_INFO
2014-07-15 Name : The remote host is affected by an information disclosure vulnerability.
File : hp_onboard_admin_heartbleed_versions.nasl - Type : ACT_GATHER_INFO
2014-07-15 Name : The remote host contains an application that is affected by an information di...
File : libreoffice_423.nasl - Type : ACT_GATHER_INFO
2014-07-15 Name : The remote host contains an application that is affected by an information di...
File : macosx_libreoffice_423.nasl - Type : ACT_GATHER_INFO
2014-07-14 Name : The remote mail server is potentially affected by multiple vulnerabilities.
File : ipswitch_imail_12_4_1_15.nasl - Type : ACT_GATHER_INFO
2014-07-10 Name : The remote Windows host has migration software installed that is affected by ...
File : hp_insight_control_server_migration_7_3_2.nasl - Type : ACT_GATHER_INFO
2014-07-08 Name : The remote mail server is affected by the Heartbleed vulnerability
File : kerio_connect_824.nasl - Type : ACT_GATHER_INFO
2014-06-30 Name : An application on the remote host is affected by an information disclosure vu...
File : attachmate_reflection_heartbleed.nasl - Type : ACT_GATHER_INFO
2014-06-30 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201406-32.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2012-33.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2012-368.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2013-437.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2013-622.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2014-277.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2014-318.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2014-398.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_3_acroread-101007.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_3_acroread-120111.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_3_flash-player-110415.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_4_acroread-120111.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_4_flash-player-110415.nasl - Type : ACT_GATHER_INFO
2014-06-12 Name : The remote Mandriva Linux host is missing a security update.
File : mandriva_MDVSA-2014-123.nasl - Type : ACT_GATHER_INFO
2014-06-02 Name : The remote HP OfficeJet printer is affected by an information disclosure vuln...
File : hp_officejet_pro_heartbleed.nasl - Type : ACT_GATHER_INFO
2014-06-02 Name : The remote web server hosts a virtual appliance that is affected by multiple ...
File : wd_arkeia_10_1_19_ver_check.nasl - Type : ACT_GATHER_INFO
2014-05-27 Name : An application on the remote host is affected by an information disclosure vu...
File : attachmate_reflection_x_heartbleed.nasl - Type : ACT_GATHER_INFO
2014-05-20 Name : A clustered file system on the remote host is affected by multiple vulnerabil...
File : ibm_gpfs_isg3T1020683.nasl - Type : ACT_GATHER_INFO
2014-05-16 Name : The host is affected by an information disclosure vulnerability.
File : bluecoat_proxy_av_3_5_1_9.nasl - Type : ACT_GATHER_INFO
2014-05-14 Name : The version of Cisco TelePresence Video Communication Server installed on the...
File : cisco-vcs-CSCuo16472.nasl - Type : ACT_GATHER_INFO
2014-05-12 Name : An application on the remote host is affected by an information disclosure vu...
File : attachmate_reflection_secure_it_for_win_client_heartbleed.nasl - Type : ACT_GATHER_INFO
2014-05-12 Name : The version of Symantec Endpoint Protection Manager installed on the remote h...
File : symantec_endpoint_prot_mgr_12_1_ru4_mp1a.nasl - Type : ACT_GATHER_INFO
2014-05-08 Name : The remote VMware ESXi 5.5 host is potentially affected by multiple vulnerabi...
File : vmware_esxi_5_5_build_1746974_remote.nasl - Type : ACT_GATHER_INFO
2014-05-06 Name : The remote host has a device management application installed that is affecte...
File : vmware_horizon_workspace_vmsa2014-0004.nasl - Type : ACT_GATHER_INFO
2014-05-05 Name : The remote host has VPN client software installed that is affected by an info...
File : smb_kb2962393.nasl - Type : ACT_GATHER_INFO
2014-05-03 Name : The remote host is affected by an information disclosure vulnerability.
File : mcafee_vsel_SB10071.nasl - Type : ACT_GATHER_INFO
2014-05-03 Name : The remote VMware ESXi host is missing one or more security-related patches.
File : vmware_VMSA-2014-0004.nasl - Type : ACT_GATHER_INFO
2014-05-02 Name : The remote host is affected by an information disclosure vulnerability.
File : mcafee_email_gateway_SB10071.nasl - Type : ACT_GATHER_INFO
2014-05-02 Name : The remote host is affected by an information disclosure vulnerability.
File : mcafee_epo_sb10071.nasl - Type : ACT_GATHER_INFO
2014-05-02 Name : The remote host is affected by an information disclosure vulnerability.
File : mcafee_firewall_enterprise_SB10071.nasl - Type : ACT_GATHER_INFO
2014-05-02 Name : The remote host is affected by an information disclosure vulnerability.
File : mcafee_ngfw_SB10071.nasl - Type : ACT_GATHER_INFO
2014-05-02 Name : The remote host is affected by an information disclosure vulnerability.
File : mcafee_web_gateway_SB10071.nasl - Type : ACT_GATHER_INFO
2014-05-01 Name : The remote host has a web browser that is affected by a memory corruption vul...
File : smb_nt_ms14-021.nasl - Type : ACT_GATHER_INFO
2014-04-30 Name : The remote Fedora host is missing a security update.
File : fedora_2014-5321.nasl - Type : ACT_GATHER_INFO
2014-04-30 Name : The remote Fedora host is missing a security update.
File : fedora_2014-5337.nasl - Type : ACT_GATHER_INFO
2014-04-29 Name : The remote host has an email security application installed that is affected ...
File : websense_email_security_heartbleed.nasl - Type : ACT_GATHER_INFO
2014-04-29 Name : The remote host contains a web application that is affected by an information...
File : websense_web_security_heartbleed.nasl - Type : ACT_GATHER_INFO
2014-04-29 Name : The remote Windows host has an application that is affected by an information...
File : blackberry_es_UDS_kb35882.nasl - Type : ACT_GATHER_INFO
2014-04-28 Name : The remote host is affected by a remote code execution vulnerability.
File : smb_kb2963983.nasl - Type : ACT_GATHER_INFO
2014-04-22 Name : An application on the remote host is affected by an information disclosure vu...
File : openvpn_2_3_3_0.nasl - Type : ACT_GATHER_INFO
2014-04-21 Name : The remote FTP server is affected by an information disclosure vulnerability.
File : filezilla_server_0944.nasl - Type : ACT_GATHER_INFO
2014-04-21 Name : The remote host has a virtualization application that is affected by multiple...
File : macosx_fusion_6_0_3.nasl - Type : ACT_GATHER_INFO
2014-04-21 Name : The remote host contains software that is affected by multiple vulnerabilities.
File : vmware_player_linux_6_0_2.nasl - Type : ACT_GATHER_INFO
2014-04-21 Name : The remote host contains software that is affected by multiple vulnerabilities.
File : vmware_player_multiple_vmsa_2014-0004.nasl - Type : ACT_GATHER_INFO
2014-04-21 Name : The remote host has a virtualization application that is affected by multiple...
File : vmware_workstation_linux_10_0_2.nasl - Type : ACT_GATHER_INFO
2014-04-21 Name : The remote host has a virtualization application that is affected by multiple...
File : vmware_workstation_multiple_vmsa_2014_0004.nasl - Type : ACT_GATHER_INFO
2014-04-18 Name : The remote Windows host has an application that is affected by multiple vulne...
File : winscp_5_5_3.nasl - Type : ACT_GATHER_INFO
2014-04-18 Name : The remote web server is affected by multiple vulnerabilities.
File : hpsmh_7_3_2.nasl - Type : ACT_GATHER_INFO
2014-04-18 Name : The remote device is missing a vendor-supplied security patch.
File : juniper_jsa10623.nasl - Type : ACT_GATHER_INFO
2014-04-18 Name : The remote device is affected by an information disclosure vulnerability.
File : junos_pulse_jsa10623.nasl - Type : ACT_GATHER_INFO
2014-04-16 Name : The remote Fedora host is missing a security update.
File : fedora_2014-4999.nasl - Type : ACT_GATHER_INFO
2014-04-16 Name : The remote web server contains an application that is affected by multiple Op...
File : splunk_603.nasl - Type : ACT_GATHER_INFO
2014-04-15 Name : The remote device is potentially affected by an information disclosure vulner...
File : bluecoat_proxy_sg_6_5_3_6.nasl - Type : ACT_GATHER_INFO
2014-04-15 Name : The remote Fedora host is missing a security update.
File : fedora_2014-4982.nasl - Type : ACT_GATHER_INFO
2014-04-14 Name : The remote service is affected by an information disclosure vulnerability.
File : openvpn_heartbleed.nasl - Type : ACT_ATTACK
2014-04-14 Name : The remote Windows host contains a program that is affected by an information...
File : stunnel_5_01.nasl - Type : ACT_GATHER_INFO
2014-04-11 Name : The remote AIX host is running a vulnerable version of OpenSSL.
File : aix_openssl_advisory7.nasl - Type : ACT_GATHER_INFO
2014-04-11 Name : The remote host is affected by an information disclosure vulnerability.
File : fortinet_FG-IR-14-011.nasl - Type : ACT_GATHER_INFO
2014-04-09 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2014-320.nasl - Type : ACT_GATHER_INFO
2014-04-09 Name : The remote Fedora host is missing a security update.
File : fedora_2014-4879.nasl - Type : ACT_GATHER_INFO
2014-04-09 Name : The remote Fedora host is missing a security update.
File : fedora_2014-4910.nasl - Type : ACT_GATHER_INFO
2014-04-08 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2014-098-01.nasl - Type : ACT_GATHER_INFO
2014-04-08 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2014-0376.nasl - Type : ACT_GATHER_INFO
2014-04-08 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2896.nasl - Type : ACT_GATHER_INFO
2014-04-08 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_5631ae98be9e11e3b5e3c80aa9043978.nasl - Type : ACT_GATHER_INFO
2014-04-08 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201404-07.nasl - Type : ACT_GATHER_INFO
2014-04-08 Name : An application installed on the remote Mac OS X host is affected by a remote ...
File : macosx_ms14-017.nasl - Type : ACT_GATHER_INFO
2014-04-08 Name : The remote service may be affected by multiple vulnerabilities.
File : openssl_1_0_1g.nasl - Type : ACT_GATHER_INFO
2014-04-08 Name : The remote service is affected by an information disclosure vulnerability.
File : openssl_heartbleed.nasl - Type : ACT_ATTACK
2014-04-08 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2014-0376.nasl - Type : ACT_GATHER_INFO
2014-04-08 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2014-0376.nasl - Type : ACT_GATHER_INFO
2014-04-08 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20140408_openssl_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2014-04-08 Name : The remote host is affected by multiple memory corruption vulnerabilities.
File : smb_nt_ms14-017.nasl - Type : ACT_GATHER_INFO
2014-04-08 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-2165-1.nasl - Type : ACT_GATHER_INFO
2014-03-24 Name : The remote Windows host is affected by a remote code execution vulnerability.
File : smb_kb2953095.nasl - Type : ACT_GATHER_INFO
2014-03-11 Name : The remote host has a web browser that is affected by multiple vulnerabilities.
File : smb_nt_ms14-012.nasl - Type : ACT_GATHER_INFO
2014-02-20 Name : The remote host is affected by a remote code execution vulnerability.
File : smb_kb2934088.nasl - Type : ACT_GATHER_INFO
2014-01-27 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201401-30.nasl - Type : ACT_GATHER_INFO
2014-01-08 Name : The remote server is affected by multiple vulnerabilities.
File : domino_9_0_1.nasl - Type : ACT_GATHER_INFO
2014-01-08 Name : The remote host has software installed that is affected by multiple vulnerabi...
File : lotus_domino_9_0_1.nasl - Type : ACT_GATHER_INFO
2013-11-14 Name : A web-based application running on the remote Windows host is affected by mul...
File : coldfusion_win_apsb13-27.nasl - Type : ACT_GATHER_INFO
2013-11-04 Name : The remote server is affected by multiple vulnerabilities.
File : domino_8_5_3fp5.nasl - Type : ACT_GATHER_INFO
2013-11-04 Name : The remote host has software installed that is affected by multiple vulnerabi...
File : lotus_domino_8_5_3_fp5.nasl - Type : ACT_GATHER_INFO
2013-11-04 Name : The remote host has software installed that is affected by multiple vulnerabi...
File : lotus_notes_8_5_3_fp5.nasl - Type : ACT_GATHER_INFO
2013-10-25 Name : The remote host has a virtualization management application installed that is...
File : vmware_vcenter_vmsa-2013-0012.nasl - Type : ACT_GATHER_INFO
2013-09-04 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2012-88.nasl - Type : ACT_GATHER_INFO
2013-09-04 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2013-204.nasl - Type : ACT_GATHER_INFO
2013-09-04 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2013-207.nasl - Type : ACT_GATHER_INFO
2013-08-23 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201308-03.nasl - Type : ACT_GATHER_INFO
2013-07-28 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2727.nasl - Type : ACT_GATHER_INFO
2013-07-28 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_java-1_4_2-ibm-130723.nasl - Type : ACT_GATHER_INFO
2013-07-26 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_java-1_6_0-ibm-130723.nasl - Type : ACT_GATHER_INFO
2013-07-26 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_java-1_7_0-ibm-130723.nasl - Type : ACT_GATHER_INFO
2013-07-26 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_java-1_7_0-openjdk-130719.nasl - Type : ACT_GATHER_INFO
2013-07-24 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_java-1_6_0-openjdk-130718.nasl - Type : ACT_GATHER_INFO
2013-07-24 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1908-1.nasl - Type : ACT_GATHER_INFO
2013-07-17 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2013-1081.nasl - Type : ACT_GATHER_INFO
2013-07-17 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1907-1.nasl - Type : ACT_GATHER_INFO
2013-07-17 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-1907-2.nasl - Type : ACT_GATHER_INFO
2013-07-16 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2722.nasl - Type : ACT_GATHER_INFO
2013-07-16 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2013-1059.nasl - Type : ACT_GATHER_INFO
2013-07-16 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2013-1060.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2012-0729.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2012-0730.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2012-1009.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2013-0957.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2013-0958.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2013-1014.nasl - Type : ACT_GATHER_INFO
2013-07-05 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2013-1014.nasl - Type : ACT_GATHER_INFO
2013-07-05 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2013-1014.nasl - Type : ACT_GATHER_INFO
2013-07-05 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20130703_java_1_6_0_openjdk_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2013-06-28 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2013-183.nasl - Type : ACT_GATHER_INFO
2013-06-21 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2013-0957.nasl - Type : ACT_GATHER_INFO
2013-06-21 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2013-0958.nasl - Type : ACT_GATHER_INFO
2013-06-21 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2013-0963.nasl - Type : ACT_GATHER_INFO
2013-06-21 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20130620_java_1_7_0_openjdk_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2013-06-21 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20130620_java_1_7_0_openjdk_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2013-06-20 Name : The remote Unix host contains a programming platform that is potentially affe...
File : oracle_java_cpu_jun_2013_unix.nasl - Type : ACT_GATHER_INFO
2013-06-20 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2013-0957.nasl - Type : ACT_GATHER_INFO
2013-06-20 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2013-0958.nasl - Type : ACT_GATHER_INFO
2013-06-19 Name : The remote host has a version of Java that is affected by multiple vulnerabil...
File : macosx_java_10_6_update16.nasl - Type : ACT_GATHER_INFO
2013-06-19 Name : The remote host has a version of Java that is affected by multiple vulnerabil...
File : macosx_java_2013-004.nasl - Type : ACT_GATHER_INFO
2013-06-19 Name : The remote Windows host contains a programming platform that is potentially a...
File : oracle_java_cpu_jun_2013.nasl - Type : ACT_GATHER_INFO
2013-06-17 Name : The remote host has an update manager installed that is affected by multiple ...
File : vmware_vcenter_update_mgr_vmsa-2012-0013.nasl - Type : ACT_GATHER_INFO
2013-06-05 Name : The remote host has a virtualization management application installed that is...
File : vmware_vcenter_vmsa-2012-0013.nasl - Type : ACT_GATHER_INFO
2013-05-21 Name : A web-based application running on the remote Windows host is affected by mul...
File : coldfusion_win_apsb13-03.nasl - Type : ACT_GATHER_INFO
2013-05-19 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_acroread-130516.nasl - Type : ACT_GATHER_INFO
2013-05-19 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_acroread-8571.nasl - Type : ACT_GATHER_INFO
2013-05-16 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2013-0826.nasl - Type : ACT_GATHER_INFO
2013-05-15 Name : The remote host is affected by a code execution vulnerability.
File : smb_nt_ms13-038.nasl - Type : ACT_GATHER_INFO
2013-05-14 Name : The version of Adobe Acrobat installed on the remote Windows host is affected...
File : adobe_acrobat_apsb13-15.nasl - Type : ACT_GATHER_INFO
2013-05-14 Name : The version of Adobe Reader on the remote Windows host is affected by multipl...
File : adobe_reader_apsb13-15.nasl - Type : ACT_GATHER_INFO
2013-05-14 Name : A web-based application running on the remote host is affected by multiple vu...
File : coldfusion_apsa13-03.nasl - Type : ACT_ATTACK
2013-05-14 Name : The version of Adobe Reader on the remote Mac OS X host is affected by multip...
File : macosx_adobe_reader_apsb13-15.nasl - Type : ACT_GATHER_INFO
2013-03-12 Name : A multimedia application framework installed on the remote Mac OS X host is a...
File : macosx_ms13-022.nasl - Type : ACT_GATHER_INFO
2013-03-12 Name : A browser enhancement on the remote Windows host could allow arbitrary code e...
File : smb_nt_ms13-022.nasl - Type : ACT_GATHER_INFO
2013-02-22 Name : The remote Unix host contains a programming platform that is affected by mult...
File : oracle_java_cpu_jun_2012_unix.nasl - Type : ACT_GATHER_INFO
2013-02-19 Name : A web management interface running on the remote host is affected by an authe...
File : coldfusion_apsb13-03_auth_bypass.nasl - Type : ACT_GATHER_INFO
2013-01-25 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_java-1_6_0-openjdk-120615.nasl - Type : ACT_GATHER_INFO
2013-01-24 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2010-0037.nasl - Type : ACT_GATHER_INFO
2013-01-24 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2010-0038.nasl - Type : ACT_GATHER_INFO
2013-01-24 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2010-0060.nasl - Type : ACT_GATHER_INFO
2013-01-14 Name : The remote host is affected by a code execution vulnerability.
File : smb_nt_ms13-008.nasl - Type : ACT_GATHER_INFO
2012-08-30 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-1505-2.nasl - Type : ACT_GATHER_INFO
2012-08-15 Name : The remote Windows host has a code execution vulnerability.
File : smb_nt_ms12-060.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20120613_java_1_6_0_openjdk_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20120613_java_1_6_0_openjdk_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20120613_java_1_6_0_sun_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2012-07-13 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1505-1.nasl - Type : ACT_GATHER_INFO
2012-07-11 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2012-1009.nasl - Type : ACT_GATHER_INFO
2012-07-05 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2507.nasl - Type : ACT_GATHER_INFO
2012-06-21 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2012-1009.nasl - Type : ACT_GATHER_INFO
2012-06-21 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2012-1019.nasl - Type : ACT_GATHER_INFO
2012-06-19 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2012-095.nasl - Type : ACT_GATHER_INFO
2012-06-18 Name : The remote Fedora host is missing a security update.
File : fedora_2012-9541.nasl - Type : ACT_GATHER_INFO
2012-06-18 Name : The remote Fedora host is missing a security update.
File : fedora_2012-9545.nasl - Type : ACT_GATHER_INFO
2012-06-18 Name : The remote Fedora host is missing a security update.
File : fedora_2012-9590.nasl - Type : ACT_GATHER_INFO
2012-06-18 Name : The remote Fedora host is missing a security update.
File : fedora_2012-9593.nasl - Type : ACT_GATHER_INFO
2012-06-15 Name : The remote Windows host contains software that is affected by multiple vulner...
File : hp_systems_insight_manager_700_multiple_vulns.nasl - Type : ACT_GATHER_INFO
2012-06-14 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2012-0729.nasl - Type : ACT_GATHER_INFO
2012-06-14 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2012-0730.nasl - Type : ACT_GATHER_INFO
2012-06-14 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2012-0729.nasl - Type : ACT_GATHER_INFO
2012-06-14 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2012-0730.nasl - Type : ACT_GATHER_INFO
2012-06-14 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2012-0734.nasl - Type : ACT_GATHER_INFO
2012-06-13 Name : The remote host has a version of Java that is affected by multiple vulnerabil...
File : macosx_java_10_6_update9.nasl - Type : ACT_GATHER_INFO
2012-06-13 Name : The remote host has a version of Java that is affected by multiple vulnerabil...
File : macosx_java_10_7_2012-004.nasl - Type : ACT_GATHER_INFO
2012-06-13 Name : The remote Windows host contains a programming platform that is affected by m...
File : oracle_java_cpu_jun_2012.nasl - Type : ACT_GATHER_INFO
2012-04-11 Name : The remote Windows host is affected by a remote code execution vulnerability.
File : smb_nt_ms12-027.nasl - Type : ACT_GATHER_INFO
2012-01-31 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201201-19.nasl - Type : ACT_GATHER_INFO
2012-01-27 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_fa2f386f481411e189b4001ec9578670.nasl - Type : ACT_GATHER_INFO
2012-01-18 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_acroread-120112.nasl - Type : ACT_GATHER_INFO
2012-01-18 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_acroread-7924.nasl - Type : ACT_GATHER_INFO
2012-01-11 Name : The version of Adobe Acrobat on the remote Windows host is affected by multip...
File : adobe_acrobat_apsb12-01.nasl - Type : ACT_GATHER_INFO
2012-01-11 Name : The version of Adobe Reader on the remote Windows host is affected by multipl...
File : adobe_reader_apsb12-01.nasl - Type : ACT_GATHER_INFO
2012-01-11 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2012-0011.nasl - Type : ACT_GATHER_INFO
2011-12-13 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_flash-player-7477.nasl - Type : ACT_GATHER_INFO
2011-12-07 Name : The version of Adobe Acrobat on the remote Windows host is affected by multip...
File : adobe_acrobat_apsa11-04.nasl - Type : ACT_GATHER_INFO
2011-12-07 Name : The version of Adobe Reader on the remote Windows host is affected by multipl...
File : adobe_reader_apsa11-04.nasl - Type : ACT_GATHER_INFO
2011-12-07 Name : The version of Adobe Reader on the remote Mac OS X host is affected by a memo...
File : macosx_adobe_reader_apsa11-04.nasl - Type : ACT_GATHER_INFO
2011-10-14 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201110-11.nasl - Type : ACT_GATHER_INFO
2011-05-05 Name : The remote openSUSE host is missing a security update.
File : suse_11_2_flash-player-110415.nasl - Type : ACT_GATHER_INFO
2011-04-19 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2011-0451.nasl - Type : ACT_GATHER_INFO
2011-04-19 Name : The remote SuSE 11 host is missing a security update.
File : suse_11_flash-player-110415.nasl - Type : ACT_GATHER_INFO
2011-04-18 Name : The remote Windows host contains a version of Adobe AIR that allows arbitrary...
File : adobe_air_apsb11-07.nasl - Type : ACT_GATHER_INFO
2011-04-18 Name : The remote Windows host contains a browser plug-in that allows arbitrary code...
File : flash_player_apsb11-07.nasl - Type : ACT_GATHER_INFO
2011-04-18 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_32b05547691311e0bdc4001b2134ef46.nasl - Type : ACT_GATHER_INFO
2011-04-15 Name : The version of Adobe Acrobat on the remote Windows host is affected by multip...
File : adobe_acrobat_apsa11-02.nasl - Type : ACT_GATHER_INFO
2011-04-15 Name : The version of Adobe Reader on the remote Windows host is affected by multipl...
File : adobe_reader_apsa11-02.nasl - Type : ACT_GATHER_INFO
2011-04-13 Name : An application installed on the remote Mac OS X host is affected by multiple ...
File : macosx_ms_office_apr2011.nasl - Type : ACT_GATHER_INFO
2011-04-13 Name : Arbitrary code can be executed on the remote host through Microsoft Excel.
File : smb_nt_ms11-021.nasl - Type : ACT_GATHER_INFO
2011-01-27 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_acroread-6802.nasl - Type : ACT_GATHER_INFO
2011-01-27 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_acroread-6803.nasl - Type : ACT_GATHER_INFO
2011-01-27 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_acroread-6879.nasl - Type : ACT_GATHER_INFO
2011-01-27 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_acroread-6881.nasl - Type : ACT_GATHER_INFO
2011-01-27 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_acroread-7181.nasl - Type : ACT_GATHER_INFO
2011-01-27 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_acroread_ja-6804.nasl - Type : ACT_GATHER_INFO
2011-01-27 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_acroread_ja-6805.nasl - Type : ACT_GATHER_INFO
2011-01-27 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_acroread_ja-7182.nasl - Type : ACT_GATHER_INFO
2011-01-24 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201101-08.nasl - Type : ACT_GATHER_INFO
2010-12-02 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_acroread-101007.nasl - Type : ACT_GATHER_INFO
2010-12-02 Name : The remote SuSE 11 host is missing a security update.
File : suse_11_acroread_ja-101007.nasl - Type : ACT_GATHER_INFO
2010-11-09 Name : An application installed on the remote Mac OS X host is affected by multiple ...
File : macosx_ms_office_nov2010.nasl - Type : ACT_GATHER_INFO
2010-11-09 Name : Arbitrary code can be executed on the remote host through Microsoft Office.
File : smb_nt_ms10-087.nasl - Type : ACT_GATHER_INFO
2010-10-20 Name : An application installed on the remote Mac OS X host is affected by multiple ...
File : macosx_ms_office_nov2009.nasl - Type : ACT_GATHER_INFO
2010-10-11 Name : The remote openSUSE host is missing a security update.
File : suse_11_1_acroread-101007.nasl - Type : ACT_GATHER_INFO
2010-10-11 Name : The remote openSUSE host is missing a security update.
File : suse_11_2_acroread-101007.nasl - Type : ACT_GATHER_INFO
2010-10-07 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2010-0743.nasl - Type : ACT_GATHER_INFO
2010-09-09 Name : The version of Adobe Acrobat on the remote Windows host is affected by multip...
File : adobe_acrobat_apsa10-02.nasl - Type : ACT_GATHER_INFO
2010-09-09 Name : The version of Adobe Reader on the remote Windows host is affected by multipl...
File : adobe_reader_apsa10-02.nasl - Type : ACT_GATHER_INFO
2010-09-08 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201009-05.nasl - Type : ACT_GATHER_INFO
2010-03-30 Name : Arbitrary code can be executed on the remote host through a web browser.
File : smb_nt_ms10-018.nasl - Type : ACT_GATHER_INFO
2010-03-04 Name : The remote openSUSE host is missing a security update.
File : suse_11_0_acroread-100225.nasl - Type : ACT_GATHER_INFO
2010-03-04 Name : The remote openSUSE host is missing a security update.
File : suse_11_1_acroread-100225.nasl - Type : ACT_GATHER_INFO
2010-03-04 Name : The remote openSUSE host is missing a security update.
File : suse_11_2_acroread-100225.nasl - Type : ACT_GATHER_INFO
2010-03-04 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_acroread-100225.nasl - Type : ACT_GATHER_INFO
2010-02-19 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2010-0114.nasl - Type : ACT_GATHER_INFO
2010-02-17 Name : The version of Adobe Acrobat on the remote Windows host is affected by multip...
File : adobe_acrobat_apsb10-07.nasl - Type : ACT_GATHER_INFO
2010-02-17 Name : The version of Adobe Reader on the remote Windows host is affected by multipl...
File : adobe_reader_apsb10-07.nasl - Type : ACT_GATHER_INFO
2010-02-02 Name : The remote SuSE 11 host is missing a security update.
File : suse_11_acroread_ja-100128.nasl - Type : ACT_GATHER_INFO
2010-01-25 Name : The remote openSUSE host is missing a security update.
File : suse_11_0_acroread-100122.nasl - Type : ACT_GATHER_INFO
2010-01-25 Name : The remote openSUSE host is missing a security update.
File : suse_11_1_acroread-100122.nasl - Type : ACT_GATHER_INFO
2010-01-25 Name : The remote openSUSE host is missing a security update.
File : suse_11_2_acroread-100122.nasl - Type : ACT_GATHER_INFO
2010-01-25 Name : The remote SuSE 11 host is missing a security update.
File : suse_11_acroread-100122.nasl - Type : ACT_GATHER_INFO
2010-01-13 Name : The version of Adobe Acrobat on the remote Windows host is affected by multip...
File : adobe_acrobat_apsb10-02.nasl - Type : ACT_GATHER_INFO
2010-01-13 Name : The PDF file viewer on the remote Windows host is affected by multiple vulner...
File : adobe_reader_apsb10-02.nasl - Type : ACT_GATHER_INFO
2009-12-08 Name : Arbitrary code can be executed on the remote host through a web browser.
File : smb_nt_ms09-072.nasl - Type : ACT_GATHER_INFO
2009-11-10 Name : Arbitrary code can be executed on the remote host through opening a Microsoft...
File : smb_nt_ms09-067.nasl - Type : ACT_GATHER_INFO
2008-08-13 Name : Arbitrary code can be executed on the remote host through Microsoft Word.
File : smb_nt_ms08-042.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2015-10-08 21:27:57
  • Multiple Updates
2015-04-29 17:24:34
  • First insertion