Adversaries shift to LNK files for initial access. Talos identifies threat actor activity and relationships using LNK metadata
Reporter | Title | Published | Views | Family All 83 |
---|---|---|---|---|
![]() | CVE-2015-0096 | 11 Mar 201510:59 | – | cve |
![]() | CVE-2022-41049 | 9 Nov 202222:15 | – | cve |
![]() | CVE-2022-41091 | 9 Nov 202222:15 | – | cve |
![]() | Microsoft Windows DLL Loading CVE-2015-0096 Remote Code Execution Vulnerability | 10 Mar 201500:00 | – | symantec |
![]() | [CVE-2 0 1 5-0 0 9 6]Microsoft Windows Shell SMB LNK Code Execution Exploit-vulnerability warning-the black bar safety net | 21 Mar 201500:00 | – | myhack58 |
![]() | “The seismic network of the third generation”(CVE-2017-8464 several species using the method and prevention-vulnerability and early warning-the black bar safety net | 7 Aug 201700:00 | – | myhack58 |
![]() | Remote code execution | 11 Mar 201510:59 | – | prion |
![]() | Security feature bypass | 9 Nov 202222:15 | – | prion |
![]() | Security feature bypass | 9 Nov 202222:15 | – | prion |
![]() | Microsoft Windows .LNK DLL Planting Remote Code Execution Vulnerability | 11 Mar 201500:00 | – | zdi |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo