Displaying 201 - 220 of 38146
Last import : Jun 17 17:00

This strike sends a trojan malware sample detected by Kaspersky as Trojan.Win32.Jorik.Nrgbot.dnd, Symantec as WS.Reputation.1, Bitdefender as Gen:Variant.Graftor.44604. The MD5 hash of this sample is abd519df241692ac99fb538d224613a6.

This strike sends a trojan malware sample detected by Mcafee as Generic VB.kj, Kaspersky as Trojan-Downloader.Win32.Andromeda.kd, Symantec as Backdoor.Trojan, Microsoft as Worm:Win32/Gamarue.F, Bitdefender as Trojan.Generic.KDV.745357. The MD5 hash of this sample is e78185ee792ec13e69830cd228c5a8c4.

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

This strike exploits an SQL Injection in IBM Tivoli Provisioning Manager where an attacker can update underlying data. In particular, a user may upgrade their account to an administrator.

This strike sends a trojan malware sample detected by Mcafee as Generic Downloader.oy, Kaspersky as Trojan-Dropper.Win32.NSIS.tz, Symantec as Trojan.ADH, Microsoft as Worm:Win32/Nuj.A, Bitdefender as Trojan.Nsis.Agent.Z. The MD5 hash of this sample is 530aca225ba2e2af41153d4a021640a2.

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits a stack buffer overflow vulnerability in HP OpenView Network Node Manager NNM. The vulnerability is caused by lack of input validation by OvWebHelp when handling HTTP requests. This vulnerability can be exploited by an unauthenticated attacker to inject and execute arbitrary code on target system.

This strike sends a trojan malware sample detected by Mcafee as Generic Downloader.oy, Kaspersky as Trojan-Dropper.Win32.NSIS.tz, Symantec as Trojan.ADH.2, Microsoft as Trojan:Win32/Comame, Bitdefender as Trojan.Nsis.Agent.Z. The MD5 hash of this sample is 254fe0300228bf75da41290d87d4865f.

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

This strike exploits a code execution vulnerability in Microsoft Sharepoint Document Coversion Launcher service. The vulnerability is due to insufficient validation of SOAP requests sent to the service interface. By specially crafting a malicious SOAP request, an unauthenticated attacker could execute arbitrary commands on the server.

This strike sends a malware sample that contains a trojan targeted at mobile devices running iOS named Fidall.A and has the md5 sum 4d99379ec9f2ca9a33bfe9841a931a80.

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

This strike exploits a buffer underflow vulnerability in the nginx HTTP server. The underflow can occur when parsing HTTP requests that contain directory traversals. When a ../ sequence occurs, the code does not validate all cases where the parent directory search starts from the root directory. If the request begins with the string /%23../ //../, or /%3F../, the code will search for the / character...

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a vulnerability within GE Proficy Historians ActiveX control KeyHelp.ocx. Specifically while using the LaunchTriPane method to run a chm file using hh.exe, the method fails to validate the parameters when passed the decompile option. This parameter can be passed a remote UNC path as the location of the stored chm file to be decompiled to a specified directory on the local Machine...

This strike sends a malware sample that contains a trojan targeted at mobile devices running Android OS named SMSZombie.A and has the md5 sum c71740ee94467ae70a71265116d54186.

This strike sends a malware sample that contains a trojan targeted at mobile devices running Android OS named Cawitt.A and has the md5 sum 9e986629f217699627f5658fc4931554.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a vulnerability in Photodex ProShow Producer. The vulnerability is due to a lack of input validation of user-supplied data. Exploiting this vulnerability could lead to remote code execution.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a Use-After-Free vulnerability in Microsoft Internet Explorer 6, 7, 8 and 9 allowing arbitrary code execution to a remote attacker via a specially-crafted website.

This strike sends a malware sample that contains a spyware targeted at mobile devices running Android OS named Retinax.C and has the md5 sum 6bae149bc65576831ac635a23938be36.

This strike sends a malware sample that contains a trojan targeted at mobile devices running Android OS named SMSZombie.A and has the md5 sum a31245022c60fc50b81f7ffc4f4967b2.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a vulnerability within the Opera Browser. The browswer does not properly validate the file scheme URI string parameter. If the string is greater than 8192 bytes the data will overwrite memory on buffer.

This strike sends a malware sample that contains a trojan targeted at mobile devices running Android OS named SMSZombie.A and has the md5 sum 4084939a0864b645f6c6a915586fb1ab.

This strike sends a malware sample that contains a trojan targeted at mobile devices running Android OS named Dougalek.A and has the md5 sum 00e74c118fa3902e5c85fd8e37f3d084.

CVSS: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

This strike exploits a stack buffer overflow in multiple vendors implementations of iSCSI. An overly long name will clobber a fixed sized stack buffer.

Pages