Displaying 81 - 100 of 37686
Last import : Mar 10 18:50

This strike sends a malware sample detected by Mcafee as Artemis!1C8428368000, Kaspersky as Trojan.Win32.Pakes.vym, Symantec as Suspicious.MH690.A, Bitdefender as Gen:Variant.Barys.1893. The MD5 hash of this sample is 1c84283680002c7ddadf0bc2c4e22263.

CVSS: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)

This strike exploits a flaw in EMC's AlphaStor Device Manager where an unauthenticated user can execute arbitrary commands. This is related to CVE-2013-0928 but uses a different mechanism.

This strike sends a malware sample detected by Kaspersky as Trojan-Banker.Win32.Banbra.avqu, Bitdefender as Gen:Variant.Kazy.81998. The MD5 hash of this sample is 273d0a74f706ab89270fd95b99d2c701.

This strike sends a malware sample detected by Symantec as WS.Reputation.1. The MD5 hash of this sample is a318ce25f25525b82a1f8bdc500d0a1d.

This strike sends a malware sample detected by Mcafee as Artemis!9F89B2DB2DDA, Kaspersky as UDS:DangerousObject.Multi.Generic, Symantec as WS.Reputation.1, Bitdefender as Trojan.Generic.KDV.773889. The MD5 hash of this sample is 9f89b2db2dda214af06896c189eafec6.

This strike sends a trojan malware sample detected by Mcafee as Artemis!D56858A88201. The MD5 hash of this sample is d56858a8820158929fe461a85ea12d53.

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits a daemon that is enabled by default which does not perform sufficient validation before executing commands as the superuser.

This strike sends a bot malware sample detected by Mcafee as Artemis!D08F76A67782, Kaspersky as Trojan-Spy.Win32.Zbot.iipn, Symantec as WS.Reputation.1, Microsoft as PWS:Win32/Zbot, Bitdefender as Gen:Variant.Strictor.17141. The MD5 hash of this sample is d08f76a6778231427e994a40b037cd16.

This strike sends a trojan malware sample detected by Kaspersky as Trojan-Ransom.Win32.Blocker.akrc, Bitdefender as Gen:Trojan.Heur.VP.mn3@aqeDSxC. The MD5 hash of this sample is 69179d451d645bb7f24522795dd70295.

This strike sends a trojan malware sample detected by Mcafee as Trojan-FARW!3C96098B8113, Kaspersky as Backdoor.Win32.Simda.prm, Symantec as WS.Reputation.1, Microsoft as Backdoor:Win32/Simda, Bitdefender as Gen:Variant.Kazy.132750. The MD5 hash of this sample is 3c96098b8113e35487aaf158dec6ea0c.

This strike sends a trojan malware sample detected by Mcafee as Artemis!63FE7DED187B, Kaspersky as HEUR:Trojan.Win32.Generic, Microsoft as TrojanSpy:Win32/Usteal.D, Bitdefender as Gen:Variant.Adware.SMSHoax.17. The MD5 hash of this sample is 63fe7ded187b913d0f7edfa9cf0db2bf.

This strike sends a trojan malware sample detected by Mcafee as Generic.gl, Kaspersky as Trojan-Dropper.Win32.Daws.bdef, Symantec as WS.Reputation.1, Microsoft as VirTool:Win32/Obfuscator.EH, Bitdefender as Gen:Variant.Graftor.Elzob.20514. The MD5 hash of this sample is 5589281d180113231bfbe1594d260322.

This strike sends a adware malware sample detected by Mcafee as Generic PUP.x!we, Kaspersky as not-a-virus:AdWare.Win32.Shopper.ns, Symantec as Trojan.ADH.2, Microsoft as Adware:Win32/Hotbar, Bitdefender as Dropped:Application.Generic.415794. The MD5 hash of this sample is 2c3a4c6882da5e1b5afb226e3891da05.

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

This strike exploits a stack buffer overflow in Gimp where it doesn't properly handle a malformed XWD file.

This strike sends a trojan malware sample detected by Mcafee as Artemis!4C52DC70ED67, Kaspersky as HEUR:Trojan.Win32.Generic, Symantec as WS.Reputation.1, Bitdefender as Gen:Variant.Kazy.104185. The MD5 hash of this sample is 4c52dc70ed675e288fa497a6dd4ba653.

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

This strike exploits a stack buffer underflow in Adobe's Camera Raw plug-in (part of the CS6 suite). A malformed TIFF image can clobber data in memory located before a stack buffer.

This strike sends a trojan malware sample detected by Mcafee as Generic BackDoor.aax, Kaspersky as Backdoor.Win32.Bifrose.dfda, Symantec as W32.IRCBot, Microsoft as Worm:Win32/Busifom.A, Bitdefender as Trojan.Generic.5230925. The MD5 hash of this sample is 92342c9f11838e17fc7b271dadf36fab.

This strike sends a trojan malware sample detected by Mcafee as RDN/PWS-LDPinch!a, Kaspersky as Trojan.Win32.Agent.clrv, Symantec as Hacktool.Rootkit, Microsoft as Trojan:Win32/Orsam!rts, Bitdefender as Trojan.Agent.ANVF. The MD5 hash of this sample is 2a48c7806ece3d826685317d6f2174ed.

This strike sends a trojan malware sample detected by Bitdefender as Trojan.Generic.8566490. The MD5 hash of this sample is c1d685de5921a4dbd4a77b17df0832e8.

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

This strike exploits a stack buffer overflow in FurboSoft's TurboFTP server where a malformed PORT command can clobber a buffer.

Pages