Displaying 81 - 100 of 38146
Last import : Jun 17 17:00

This strike sends a malware sample detected by Kaspersky as Trojan-Banker.Win32.Banbra.avqu, Bitdefender as Gen:Variant.Kazy.81998. The MD5 hash of this sample is 273d0a74f706ab89270fd95b99d2c701.

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits a flaw in Adobes Flash Player where a malformed action script can write variables which are not allocated and leads to memory corruption.

This strike sends a malware sample detected by Symantec as WS.Reputation.1. The MD5 hash of this sample is a318ce25f25525b82a1f8bdc500d0a1d.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits an integer truncation in Microsofts Core Services where an overly large string is mishandled on the 32 bit boundary and an undersized memory buffer is clobbered.

This strike sends a malware sample detected by Mcafee as Artemis!9F89B2DB2DDA, Kaspersky as UDS:DangerousObject.Multi.Generic, Symantec as WS.Reputation.1, Bitdefender as Trojan.Generic.KDV.773889. The MD5 hash of this sample is 9f89b2db2dda214af06896c189eafec6.

This strike sends a trojan malware sample detected by Mcafee as Artemis!D56858A88201. The MD5 hash of this sample is d56858a8820158929fe461a85ea12d53.

This strike sends a bot malware sample detected by Mcafee as Artemis!D08F76A67782, Kaspersky as Trojan-Spy.Win32.Zbot.iipn, Symantec as WS.Reputation.1, Microsoft as PWS:Win32/Zbot, Bitdefender as Gen:Variant.Strictor.17141. The MD5 hash of this sample is d08f76a6778231427e994a40b037cd16.

This strike sends a trojan malware sample detected by Kaspersky as Trojan-Ransom.Win32.Blocker.akrc, Bitdefender as Gen:Trojan.Heur.VP.mn3@aqeDSxC. The MD5 hash of this sample is 69179d451d645bb7f24522795dd70295.

This strike sends a trojan malware sample detected by Mcafee as Trojan-FARW!3C96098B8113, Kaspersky as Backdoor.Win32.Simda.prm, Symantec as WS.Reputation.1, Microsoft as Backdoor:Win32/Simda, Bitdefender as Gen:Variant.Kazy.132750. The MD5 hash of this sample is 3c96098b8113e35487aaf158dec6ea0c.

CVSS: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

This strike exploits a flaw in Contawares FreeVimager where a malformed GIF file can clobber memory via invalid LZW references.

This strike sends a trojan malware sample detected by Mcafee as Artemis!63FE7DED187B, Kaspersky as HEUR:Trojan.Win32.Generic, Microsoft as TrojanSpy:Win32/Usteal.D, Bitdefender as Gen:Variant.Adware.SMSHoax.17. The MD5 hash of this sample is 63fe7ded187b913d0f7edfa9cf0db2bf.

This strike sends a trojan malware sample detected by Mcafee as Generic.gl, Kaspersky as Trojan-Dropper.Win32.Daws.bdef, Symantec as WS.Reputation.1, Microsoft as VirTool:Win32/Obfuscator.EH, Bitdefender as Gen:Variant.Graftor.Elzob.20514. The MD5 hash of this sample is 5589281d180113231bfbe1594d260322.

This strike sends a adware malware sample detected by Mcafee as Generic PUP.x!we, Kaspersky as not-a-virus:AdWare.Win32.Shopper.ns, Symantec as Trojan.ADH.2, Microsoft as Adware:Win32/Hotbar, Bitdefender as Dropped:Application.Generic.415794. The MD5 hash of this sample is 2c3a4c6882da5e1b5afb226e3891da05.

This strike sends a trojan malware sample detected by Mcafee as Artemis!4C52DC70ED67, Kaspersky as HEUR:Trojan.Win32.Generic, Symantec as WS.Reputation.1, Bitdefender as Gen:Variant.Kazy.104185. The MD5 hash of this sample is 4c52dc70ed675e288fa497a6dd4ba653.

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

This strike exploits a stack buffer overflow in Gimp where it doesnt properly handle a malformed XWD file.

This strike sends a trojan malware sample detected by Mcafee as Generic BackDoor.aax, Kaspersky as Backdoor.Win32.Bifrose.dfda, Symantec as W32.IRCBot, Microsoft as Worm:Win32/Busifom.A, Bitdefender as Trojan.Generic.5230925. The MD5 hash of this sample is 92342c9f11838e17fc7b271dadf36fab.

This strike sends a trojan malware sample detected by Mcafee as RDN/PWS-LDPinch!a, Kaspersky as Trojan.Win32.Agent.clrv, Symantec as Hacktool.Rootkit, Microsoft as Trojan:Win32/Orsam!rts, Bitdefender as Trojan.Agent.ANVF. The MD5 hash of this sample is 2a48c7806ece3d826685317d6f2174ed.

This strike sends a trojan malware sample detected by Bitdefender as Trojan.Generic.8566490. The MD5 hash of this sample is c1d685de5921a4dbd4a77b17df0832e8.

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

This strike exploits a stack buffer underflow in Adobes Camera Raw plug-in part of the CS6 suite. A malformed TIFF image can clobber data in memory located before a stack buffer.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a stack buffer overflow vulnerability inside KeyWorks KeyHelp Activex control which comes with EMCs ApplicationXtender. If the JumpURL method is passed an overly large string a buffer is overrun.

Pages