Displaying 121 - 140 of 38146
Last import : Feb 18 09:20

This strike sends a malware sample detected by Mcafee as Artemis!C45576CE4FBA, Kaspersky as Trojan-Downloader.Win32.VB.axof, Symantec as WS.Reputation.1, Bitdefender as Trojan.Generic.KDV.772291. The MD5 hash of this sample is c45576ce4fba00586aceb404d72e1ee0.

This strike sends a malware sample detected by Mcafee as Adware-HotBar.f, Microsoft as Adware:Win32/Hotbar, Kaspersky as not-a-virus:AdWare.Win32.ScreenSaver.i, Symantec as Adware.Clkpotato!gen3, Bitdefender as Trojan.Generic.7444697. The MD5 hash of this sample is 8bf3c467ecdde52b33b78ef263ef1310.

This strike sends a malware sample detected by Mcafee as Adware-HotBar.f, Kaspersky as not-a-virus:AdWare.Win32.ScreenSaver.i, Symantec as Adware.Clkpotato!gen3, Bitdefender as Trojan.Generic.7444697. The MD5 hash of this sample is d73d5ae83fa4f49a6978eac1d6095f3e.

This strike sends a malware sample detected by Mcafee as Adware-HotBar.f, Microsoft as Adware:Win32/Hotbar, Kaspersky as not-a-virus:AdWare.Win32.ScreenSaver.i, Symantec as Adware.Clkpotato!gen3, Bitdefender as Adware.HotBar.GR. The MD5 hash of this sample is fe3721667b5d151a0679aae7d5bb2b7b.

This strike sends a malware sample detected by Mcafee as Generic.tfr!z, Symantec as Trojan.ADH. The MD5 hash of this sample is 3d0b071aba1f30b346d8f935aa3a71d7.

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike demonstrates an exploit in Java where an attacker can run arbitrary Java code without sandbox protection by leveraging an exploit in the glassfish package.

This strike sends a malware sample detected by Mcafee as Adware-HotBar.f, Microsoft as Adware:Win32/Hotbar, Kaspersky as not-a-virus:AdWare.Win32.ScreenSaver.i, Symantec as Adware.Clkpotato!gen3, Bitdefender as Trojan.Generic.7444697. The MD5 hash of this sample is 4d826678ab84f3b867ed561db4bd3daa.

This strike sends a malware sample detected by Mcafee as Adware-HotBar.f, Microsoft as Adware:Win32/Hotbar, Kaspersky as not-a-virus:AdWare.Win32.ScreenSaver.i, Symantec as Adware.Clkpotato!gen3, Bitdefender as Trojan.Generic.7444697. The MD5 hash of this sample is 890ae0d6e1b9382d83e8a4b3a1229864.

This strike sends a malware sample detected by Mcafee as Adware-HotBar.f, Microsoft as Adware:Win32/Hotbar, Kaspersky as not-a-virus:AdWare.Win32.ScreenSaver.i, Symantec as Adware.Clkpotato!gen3, Bitdefender as Trojan.Generic.7444697. The MD5 hash of this sample is d7d2366326530915e9b9435ce3a00886.

This strike sends a malware sample detected by Mcafee as Adware-HotBar.d, Kaspersky as not-a-virus:AdWare.Win32.ScreenSaver.e, Symantec as Adware.Clkpotato!gen3, Bitdefender as Gen:Variant.Adware.Graftor.30458. The MD5 hash of this sample is ad0a304cdcba169889c461a97d803bc8.

This strike sends a malware sample detected by Mcafee as Adware-HotBar.f, Microsoft as Adware:Win32/Hotbar, Kaspersky as not-a-virus:AdWare.Win32.ScreenSaver.i, Symantec as Adware.Clkpotato!gen3, Bitdefender as Trojan.Generic.7444697. The MD5 hash of this sample is 12c9dbaf0b6d420daefc76a54911c4a2.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a buffer overflow in Apples Quicktime where a malformed Targa file can clobber a buffer.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a buffer overflow in Apples Quicktime where a malformed TeXML file can possibly lead to arbitrary code execution.

CVSS: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

This strike exploits a denial of service error where a malformed RPC request can force the server to dereference a NULL pointer.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a heap corruption vulnerability in Adobe Photoshop. The vulnerability is due to failure to sanitize PNG field values. By enticing a user to open a specially crafted PNG file, an attacker could execute arbitrary code.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a vulnerability that exists in the way Microsoft Windows ShellExecute handles malformed URIs when dealing with Internet Explorer7. If the URI handlers mailto, news, nntp, snews, telnet, and http contain a % character in the URI the code is unable to connect those handlers to any registered application in the system. In this strike importing a vcf contact file in Microsoft Outlook...

CVSS: 2.1 (AV:L/AC:L/Au:N/C:N/I:N/A:P)

This strike exploits a buffer overflow in Oracles Outside In handling of JPEG 2000 files where a malformed QCD segment can clobber a buffer.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a vulnerability in Microsoft Office Wordpad and Text Converter which can be viewed in Microsoft Office 2003. This overflow happens because the dictionary property of this document is not properly validate the NumEntries field which is used to calculate a heap buffer size by multiplying it with 12. A crafted NumEntries value of larger than 0x155555 would overflow the 4-byte...

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits a flaw in Adobe Reader where a malformed Portable Document Format with geo-spatial data can clobber a stack buffer.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a stack memory corruption vulnerability in Microsoft Office Powerpoint. The vulnerability is due to improper validation of user-supplied data when examining certain attributes in OEPlaceHolder atoms in PowerPoint files. This vulnerability can lead to arbitrary code execution in the context of the current user.

Pages