Displaying 121 - 140 of 38146
Last import : Jun 17 17:00

This strike sends a malware sample detected by Mcafee as Adware-HotBar.f, Microsoft as Adware:Win32/Hotbar, Kaspersky as not-a-virus:AdWare.Win32.ScreenSaver.i, Symantec as Adware.Clkpotato!gen3, Bitdefender as Trojan.Generic.7444697. The MD5 hash of this sample is 4d826678ab84f3b867ed561db4bd3daa.

This strike sends a malware sample detected by Mcafee as Adware-HotBar.f, Microsoft as Adware:Win32/Hotbar, Kaspersky as not-a-virus:AdWare.Win32.ScreenSaver.i, Symantec as Adware.Clkpotato!gen3, Bitdefender as Trojan.Generic.7444697. The MD5 hash of this sample is 8bf3c467ecdde52b33b78ef263ef1310.

This strike sends a malware sample detected by Mcafee as Adware-HotBar.f, Kaspersky as not-a-virus:AdWare.Win32.ScreenSaver.i, Symantec as Adware.Clkpotato!gen3, Bitdefender as Trojan.Generic.7444697. The MD5 hash of this sample is d73d5ae83fa4f49a6978eac1d6095f3e.

This strike sends a malware sample detected by Mcafee as Adware-HotBar.f, Microsoft as Adware:Win32/Hotbar, Kaspersky as not-a-virus:AdWare.Win32.ScreenSaver.i, Symantec as Adware.Clkpotato!gen3, Bitdefender as Adware.HotBar.GR. The MD5 hash of this sample is fe3721667b5d151a0679aae7d5bb2b7b.

This strike sends a malware sample detected by Mcafee as Generic.tfr!z, Symantec as Trojan.ADH. The MD5 hash of this sample is 3d0b071aba1f30b346d8f935aa3a71d7.

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits a flaw in Avayas IP Office Customer Call Reporter where an unauthenticated user can upload an arbitrary file.

This strike sends a malware sample detected by Mcafee as Adware-HotBar.f, Microsoft as Adware:Win32/Hotbar, Kaspersky as not-a-virus:AdWare.Win32.ScreenSaver.i, Symantec as Adware.Clkpotato!gen3, Bitdefender as Trojan.Generic.7444697. The MD5 hash of this sample is 890ae0d6e1b9382d83e8a4b3a1229864.

This strike sends a malware sample detected by Mcafee as Adware-HotBar.f, Microsoft as Adware:Win32/Hotbar, Kaspersky as not-a-virus:AdWare.Win32.ScreenSaver.i, Symantec as Adware.Clkpotato!gen3, Bitdefender as Trojan.Generic.7444697. The MD5 hash of this sample is d7d2366326530915e9b9435ce3a00886.

CVSS: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

This strike exploits a denial of service bug in lighttpd where a remote user can pass in a malformed connection type which forces the server into an infinite loop.

This strike sends a malware sample detected by Mcafee as Adware-HotBar.d, Kaspersky as not-a-virus:AdWare.Win32.ScreenSaver.e, Symantec as Adware.Clkpotato!gen3, Bitdefender as Gen:Variant.Adware.Graftor.30458. The MD5 hash of this sample is ad0a304cdcba169889c461a97d803bc8.

This strike sends a malware sample detected by Mcafee as Adware-HotBar.f, Microsoft as Adware:Win32/Hotbar, Kaspersky as not-a-virus:AdWare.Win32.ScreenSaver.i, Symantec as Adware.Clkpotato!gen3, Bitdefender as Trojan.Generic.7444697. The MD5 hash of this sample is 12c9dbaf0b6d420daefc76a54911c4a2.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a buffer overflow in Apples Quicktime where a malformed Targa file can clobber a buffer.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a vulnerability that exists in the way Microsoft Windows ShellExecute handles malformed URIs when dealing with Internet Explorer7. If the URI handlers mailto, news, nntp, snews, telnet, and http contain a % character in the URI the code is unable to connect those handlers to any registered application in the system. In this strike importing a vcf contact file in Microsoft Outlook...

CVSS: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

This strike exploits a denial of service error where a malformed RPC request can force the server to dereference a NULL pointer.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a heap corruption vulnerability in Adobe Photoshop. The vulnerability is due to failure to sanitize PNG field values. By enticing a user to open a specially crafted PNG file, an attacker could execute arbitrary code.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a buffer overflow in Apples Quicktime where a malformed TeXML file can possibly lead to arbitrary code execution.

CVSS: 2.1 (AV:L/AC:L/Au:N/C:N/I:N/A:P)

This strike exploits a buffer overflow in Oracles Outside In handling of JPEG 2000 files where a malformed QCD segment can clobber a buffer.

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

This strike exploits a vulnerability in the Oracle WebCenter Forms Recognition ActiveX control. A lack of path validation in SaveLayout method allows the remote attacker to potentially execute arbitrary code.

CVSS: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits the insecure way that libraries are searched for by Mozilla Firefox and Mozilla Thunderbird that could result in the loading of a malicious file.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a vulnerability in the IBM Lotus Quickr QuickPlace ActiveX control. Lack of boundary checking causes a string copy in either Attachment Times or Import Times properties to write past the end of a buffer.

Pages