Displaying 61 - 80 of 37686
Last import : Mar 10 18:50

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits a flaw in Adobe's Flash Player where a malformed action script can write variables which are not allocated and leads to memory corruption.

This strike sends a malware sample detected by Mcafee as Artemis!E4950D3EE5B9, Kaspersky as UDS:DangerousObject.Multi.Generic, Symantec as WS.Reputation.1, Bitdefender as Trojan.Generic.KDV.765203. The MD5 hash of this sample is e4950d3ee5b91ac30f5ed449001c992a.

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits a vulnerability within Google's Chrome Browser. Google's URL component does not properly validate URLs that use escape characters, and these characters can allow for insertion of javascript code. In this attack the referenced page's cookie is returned via a javascript alert. With an additional alert from within a body onload event handler the application terminates...

This strike sends a malware sample detected by Mcafee as Artemis!9331B6794827, Microsoft as TrojanSpy:Win32/Bancos.AIS, Kaspersky as Trojan-Banker.Win32.Banbra.avrt, Bitdefender as Gen:Variant.Kazy.98907. The MD5 hash of this sample is 9331b67948273991c4e725539f290afd.

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits a stack buffer overflow in the libupnp library which is used in several embedded devices to handle Universal Plug and Play (UPnP) packets.

This strike sends a malware sample detected by Kaspersky as Trojan.Win32.Agent.ukrz, Bitdefender as Gen:Variant.Kazy.99271. The MD5 hash of this sample is 693be91f00e189c2d4bd4e9ebe9668dc.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits an integer truncation in Microsoft's Core Services where an overly large string is mishandled on the 32 bit boundary and an undersized memory buffer is clobbered.

This strike sends a malware sample detected by Mcafee as Artemis!06BD6480B683, Kaspersky as Hoax.Win32.ArchSMS.oykj, Bitdefender as Gen:Variant.Kazy.61200. The MD5 hash of this sample is 06bd6480b683471703c1e9783fb988b2.

This strike sends a malware sample detected by Mcafee as Artemis!BFD9FCF78544, Microsoft as Program:Win32/InstantBuzz, Kaspersky as not-a-virus:AdWare.Win32.InstantBuzz.a, Symantec as Adware.InstantBuzz, Bitdefender as Adware.Instantbuzz.A. The MD5 hash of this sample is bfd9fcf7854449f1ef52ece49d1fde51.

This strike sends a malware sample detected by Mcafee as Generic BackDoor.s, Kaspersky as Trojan-Spy.Win32.Mircspy.k, Bitdefender as Trojan.Generic.KDV.773027. The MD5 hash of this sample is cc1fc58ed14973831652020c14df9146.

CVSS: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

This strike exploits a defect in Digium's Asterisk Server where a malformed user request to a web page can clobber a stack buffer.

This strike sends a malware sample detected by Symantec as WS.Reputation.1. The MD5 hash of this sample is 1896d0b805bb00344a99e7b2b2445002.

This strike sends a malware sample detected by Kaspersky as Trojan-Dropper.Win32.Agent.hdvv, Bitdefender as Gen:Variant.Kazy.99271. The MD5 hash of this sample is efd904dd598b0a19b286940981a6b8f7.

This strike sends a malware sample detected by Mcafee as Artemis!43DC65F7C34C, Kaspersky as not-a-virus:RiskTool.Win32.Deleter.i, Symantec as WS.Reputation.1, Bitdefender as Trojan.Generic.KDV.768552. The MD5 hash of this sample is 43dc65f7c34c57bb34678b3cd61f5767.

This strike sends a malware sample detected by Mcafee as Artemis!D1F745BB3E91, Kaspersky as not-a-virus:AdWare.Win32.Shopper.aad, Bitdefender as Dropped:Adware.Generic.272001. The MD5 hash of this sample is d1f745bb3e918dd5704e0bf6bb6c3138.

This strike sends a malware sample detected by Mcafee as PWS-Banker!h2d, Microsoft as Trojan:Win32/Vasdek, Kaspersky as HEUR:Trojan.Win32.Generic, Symantec as Trojan.Gen, Bitdefender as Gen:Variant.Graftor.Elzob.8385. The MD5 hash of this sample is 911ad3bc86ec75ea3aba7841a3648821.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a flaw in EMC's AlphaStor Device Manager where an unauthenticated user can execute arbitrary commands.

This strike sends a malware sample detected by Mcafee as Artemis!75591A413D75, Microsoft as TrojanSpy:Win32/Banker.YX, Symantec as WS.Reputation.1, Bitdefender as Trojan.Generic.KDV.773886. The MD5 hash of this sample is 75591a413d754dd215a22d8c207fd3eb.

This strike sends a malware sample detected by Mcafee as Generic BackDoor.zl, Microsoft as VirTool:Win32/DelfInject.gen!CP, Kaspersky as Trojan.Win32.Inject.efqu, Symantec as WS.Reputation.1, Bitdefender as Trojan.Generic.KD.644606. The MD5 hash of this sample is 29a1dbe662289692dbd454174c72d1c8.

This strike sends a malware sample detected by Mcafee as Artemis!1C8428368000, Kaspersky as Trojan.Win32.Pakes.vym, Symantec as Suspicious.MH690.A, Bitdefender as Gen:Variant.Barys.1893. The MD5 hash of this sample is 1c84283680002c7ddadf0bc2c4e22263.

Pages