Displaying 61 - 80 of 38146
Last import : Jun 17 17:00

This strike sends a malware sample detected by Mcafee as Artemis!9331B6794827, Microsoft as TrojanSpy:Win32/Bancos.AIS, Kaspersky as Trojan-Banker.Win32.Banbra.avrt, Bitdefender as Gen:Variant.Kazy.98907. The MD5 hash of this sample is 9331b67948273991c4e725539f290afd.

This strike sends a malware sample detected by Kaspersky as Trojan.Win32.Agent.ukrz, Bitdefender as Gen:Variant.Kazy.99271. The MD5 hash of this sample is 693be91f00e189c2d4bd4e9ebe9668dc.

This strike sends a malware sample detected by Mcafee as Artemis!06BD6480B683, Kaspersky as Hoax.Win32.ArchSMS.oykj, Bitdefender as Gen:Variant.Kazy.61200. The MD5 hash of this sample is 06bd6480b683471703c1e9783fb988b2.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a flaw in EMCs AlphaStor Device Manager where an unauthenticated user can execute arbitrary commands.

This strike sends a malware sample detected by Mcafee as Artemis!BFD9FCF78544, Microsoft as Program:Win32/InstantBuzz, Kaspersky as not-a-virus:AdWare.Win32.InstantBuzz.a, Symantec as Adware.InstantBuzz, Bitdefender as Adware.Instantbuzz.A. The MD5 hash of this sample is bfd9fcf7854449f1ef52ece49d1fde51.

CVSS: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)

This strike exploits a flaw in EMCs AlphaStor Device Manager where an unauthenticated user can execute arbitrary commands. This is related to CVE-2013-0928 but uses a different mechanism.

This strike sends a malware sample detected by Mcafee as Generic BackDoor.s, Kaspersky as Trojan-Spy.Win32.Mircspy.k, Bitdefender as Trojan.Generic.KDV.773027. The MD5 hash of this sample is cc1fc58ed14973831652020c14df9146.

This strike sends a malware sample detected by Symantec as WS.Reputation.1. The MD5 hash of this sample is 1896d0b805bb00344a99e7b2b2445002.

This strike sends a malware sample detected by Kaspersky as Trojan-Dropper.Win32.Agent.hdvv, Bitdefender as Gen:Variant.Kazy.99271. The MD5 hash of this sample is efd904dd598b0a19b286940981a6b8f7.

CVSS: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

This strike exploits a defect in Digiums Asterisk Server where a malformed user request to a web page can clobber a stack buffer.

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits a vulnerability within Googles Chrome Browser. Googles URL component does not properly validate URLs that use escape characters, and these characters can allow for insertion of javascript code. In this attack the referenced pages cookie is returned via a javascript alert. With an additional alert from within a body onload event handler the application terminates abruptly.

This strike sends a malware sample detected by Mcafee as Artemis!43DC65F7C34C, Kaspersky as not-a-virus:RiskTool.Win32.Deleter.i, Symantec as WS.Reputation.1, Bitdefender as Trojan.Generic.KDV.768552. The MD5 hash of this sample is 43dc65f7c34c57bb34678b3cd61f5767.

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits a stack overflow in Schneider Electrics Interactive Graphical SCADA where a malformed user request can clobber a stack buffer.

This strike sends a malware sample detected by Mcafee as Artemis!D1F745BB3E91, Kaspersky as not-a-virus:AdWare.Win32.Shopper.aad, Bitdefender as Dropped:Adware.Generic.272001. The MD5 hash of this sample is d1f745bb3e918dd5704e0bf6bb6c3138.

This strike sends a malware sample detected by Mcafee as PWS-Banker!h2d, Microsoft as Trojan:Win32/Vasdek, Kaspersky as HEUR:Trojan.Win32.Generic, Symantec as Trojan.Gen, Bitdefender as Gen:Variant.Graftor.Elzob.8385. The MD5 hash of this sample is 911ad3bc86ec75ea3aba7841a3648821.

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits a stack buffer overflow in the libupnp library which is used in several embedded devices to handle Universal Plug and Play UPnP packets.

This strike sends a malware sample detected by Mcafee as Artemis!75591A413D75, Microsoft as TrojanSpy:Win32/Banker.YX, Symantec as WS.Reputation.1, Bitdefender as Trojan.Generic.KDV.773886. The MD5 hash of this sample is 75591a413d754dd215a22d8c207fd3eb.

This strike sends a malware sample detected by Mcafee as Generic BackDoor.zl, Microsoft as VirTool:Win32/DelfInject.gen!CP, Kaspersky as Trojan.Win32.Inject.efqu, Symantec as WS.Reputation.1, Bitdefender as Trojan.Generic.KD.644606. The MD5 hash of this sample is 29a1dbe662289692dbd454174c72d1c8.

This strike sends a malware sample detected by Mcafee as Generic FakeAlert.hh, Microsoft as Rogue:Win32/Onescan, Symantec as WS.Reputation.1, Bitdefender as Gen:Variant.Adware.Graftor.Elzob.9588. The MD5 hash of this sample is 416ec36c1cb3c9a70dbbe0141e6f8657.

This strike sends a malware sample detected by Mcafee as Artemis!1C8428368000, Kaspersky as Trojan.Win32.Pakes.vym, Symantec as Suspicious.MH690.A, Bitdefender as Gen:Variant.Barys.1893. The MD5 hash of this sample is 1c84283680002c7ddadf0bc2c4e22263.

Pages