EXPLOIT-KIT -- Snort has alerted on traffic that is typical of known exploit kits. Exploit kits are pre-packaged sets of code and malware geared toward finding and taking advantage of common browser vulnerabilities. They are Javascript code that provides an entry point to a system to initiate the next state. Snort's rules look for known exploit kit nomenclature, information sent back exposing sensitive infrastructure, attempts to reach a certain file, etc. Rules try to identify the exact kit being used based on actor-group patterns, such as favored target website, malware types, and code similarities.
EXPLOIT-KIT Nuclear exploit kit obfuscated file download
Unspecified vulnerability in Adobe Reader and Acrobat 8.x before 8.2.1 and 9.x before 9.3.1 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors. Impact: CVSS base score 9.3 CVSS impact score 10.0 CVSS exploitability score 8.6 confidentialityImpact COMPLETE integrityImpact COMPLETE availabilityImpact COMPLETE Details: Ease of Attack:
No information provided
No public information
No known false positives
Talos research team. This document was generated from data supplied by the national vulnerability database, a product of the national institute of standards and technology. For more information see [nvd].
No rule groups
CVE-2010-0188 |
Loading description
|
CVE-2012-0507 |
Loading description
|
CVE-2012-1723 |
Loading description
|
CVE-2013-0074 |
Loading description
|
CVE-2013-2465 |
Loading description
|
CVE-2013-2471 |
Loading description
|
CVE-2013-2551 |
Loading description
|
CVE-2013-2883 |
Loading description
|
CVE-2013-7331 |
Loading description
|
CVE-2014-0515 |
Loading description
|
CVE-2014-0556 |
Loading description
|
CVE-2014-8439 |
Loading description
|
CVE-2015-0311 |
Loading description
|
CVE-2015-0336 |
Loading description
|