Displaying 101 - 120 of 37686
Last import : Jun 21 13:40

This strike sends a trojan malware sample detected by Mcafee as Artemis!B977C9750372, Kaspersky as Trojan-GameThief.Win32.OnLineGames.ajlfx, Symantec as Trojan.Gen, Microsoft as Trojan:Win32/Qhost.HB, Bitdefender as Trojan.Generic.KD.835084. The MD5 hash of this sample is b977c97503725a3d89121b1cac94b7ab.

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits a flaw in Novell's eDirectory where a malformed NCP packet can clobber a stack buffer.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a buffer overflow in EMC's NetWorker and its nsrindexd service where a malformed RPC request can clobber a buffer.

This strike sends a adware malware sample detected by Kaspersky as Trojan-Ransom.Win32.Blocker.akrc, Symantec as WS.Reputation.1, Bitdefender as Gen:Variant.Symmi.3678. The MD5 hash of this sample is 6a792aed705732cb561d8bf171049d8e.

CVSS: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

This strike exploits a flaw in Contaware's FreeVimager where a malformed GIF file can clobber memory via invalid LZW references.

This strike sends a bot malware sample detected by Mcafee as Downloader-CUU, Kaspersky as Trojan-Downloader.Win32.Karagany.asx, Symantec as Trojan.Smowbot, Microsoft as Backdoor:Win32/ProxyBot.D, Bitdefender as Gen:Variant.Symmi.1507. The MD5 hash of this sample is f7b4c5e55808f4ee23eb71877341b962.

This strike sends a bot malware sample detected by Mcafee as PWS-Zbot.gen.xd, Kaspersky as Trojan-Spy.Win32.Zbot.iegh, Symantec as WS.Reputation.1, Microsoft as PWS:Win32/Zbot.gen!AL, Bitdefender as Trojan.Generic.KDZ.4323. The MD5 hash of this sample is 52e82e33d5af4abdec26b97b99f5238e.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a stack buffer overflow vulnerability inside KeyWorks KeyHelp Activex control which comes with EMC's ApplicationXtender. If the JumpURL method is passed an overly large string a buffer is overrun.

This strike sends a adwre malware sample detected by Mcafee as Artemis!973627FB51DA, Kaspersky as not-a-virus:HEUR:AdWare.Win32.Shopper.heur, Symantec as Trojan.ADH.2, Microsoft as Adware:Win32/Hotbar, Bitdefender as Adware.Generic.257939. The MD5 hash of this sample is 973627fb51da0e3fb4be6cbf4df8c1d0.

This strike sends a trojan malware sample detected by Mcafee as Artemis!D351421F5860, Kaspersky as not-a-virus:RiskTool.Win32.Deleter.i, Symantec as WS.Reputation.1, Microsoft as TrojanDownloader:Win32/Banload.ACI, Bitdefender as Trojan.Generic.8630037. The MD5 hash of this sample is d351421f5860c43879f56141c966a652.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a buffer underflow (the memory contents before the start of the buffer get clobbered) in the Opera browser when it gets into an infinite loop while trying to view a malformed GIF image file.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits an overflow in the RealPlayer application where a malformed URL in a file can be used to clobber a buffer.

CVSS: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

This strike exploits a security bypass in Nginx when dealing with malformed file name requests.

CVSS: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

This strike exploits a denial of service bug in lighttpd where a remote user can pass in a malformed connection type which forces the server into an infinite loop.

This strike sends a malware sample detected by Mcafee as Artemis!63116D7AD2F2, Kaspersky as UDS:DangerousObject.Multi.Generic, Symantec as Trojan.Gen.2, Bitdefender as Gen:Variant.Symmi.2215. The MD5 hash of this sample is 63116d7ad2f2b32a92f0b78076a0ef0a.

This strike sends a malware sample detected by Microsoft as Trojan:MSIL/Bladabindi.B, Kaspersky as Trojan.MSIL.Zapchast.kmw, Bitdefender as Gen:Variant.Kazy.86639. The MD5 hash of this sample is 2f2299a310e20b2ebe33d1df7d60c583.

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits a flaw in Avaya's IP Office Customer Call Reporter where an unauthenticated user can upload an arbitrary file.

This strike sends a malware sample detected by Mcafee as PWS-Zbot.gen.ahc, Kaspersky as UDS:DangerousObject.Multi.Generic. The MD5 hash of this sample is d1bdde0c95df473e8d016f9278b7cb44.

This strike sends a malware sample detected by Mcafee as Adware-HotBar.f, Microsoft as Adware:Win32/Hotbar, Kaspersky as not-a-virus:AdWare.Win32.ScreenSaver.i, Symantec as Adware.Clkpotato!gen3, Bitdefender as Adware.HotBar.GR. The MD5 hash of this sample is ff465f97bd3827ddbfcdf6bd08514963.

This strike sends a malware sample detected by Mcafee as Artemis!C45576CE4FBA, Kaspersky as Trojan-Downloader.Win32.VB.axof, Symantec as WS.Reputation.1, Bitdefender as Trojan.Generic.KDV.772291. The MD5 hash of this sample is c45576ce4fba00586aceb404d72e1ee0.

Pages