EXPLOIT-KIT -- Snort has alerted on traffic that is typical of known exploit kits. Exploit kits are pre-packaged sets of code and malware geared toward finding and taking advantage of common browser vulnerabilities. They are Javascript code that provides an entry point to a system to initiate the next state. Snort's rules look for known exploit kit nomenclature, information sent back exposing sensitive infrastructure, attempts to reach a certain file, etc. Rules try to identify the exact kit being used based on actor-group patterns, such as favored target website, malware types, and code similarities.
EXPLOIT-KIT Styx exploit kit eot outbound connection
Multiple buffer overflows in Adobe Reader and Acrobat 8.1.1 and earlier allow remote attackers to execute arbitrary code via a PDF file with long arguments to unspecified JavaScript methods. NOTE: this issue might be subsumed by CVE-2008-0655. Impact: CVSS base score 9.3 CVSS impact score 10.0 CVSS exploitability score 8.6 confidentialityImpact COMPLETE integrityImpact COMPLETE availabilityImpact COMPLETE Details: Ease of Attack:
No information provided
No public information
No known false positives
Talos research team. This document was generated from data supplied by the national vulnerability database, a product of the national institute of standards and technology. For more information see [nvd].
No rule groups
CVE-2007-5659 |
Loading description ![]() |
CVE-2008-0655 |
Loading description ![]() |
CVE-2011-3544 |
Loading description ![]() |
CVE-2012-0507 |
Loading description ![]() |
CVE-2012-1723 |
Loading description ![]() |
CVE-2012-4681 |
Loading description ![]() |
CVE-2012-4969 |
Loading description ![]() |
CVE-2013-0422 |
Loading description ![]() |
CVE-2013-2423 |
Loading description ![]() |