Displaying 121 - 140 of 37686
Last import : Jun 21 13:40

This strike sends a malware sample detected by Symantec as WS.Reputation.1. The MD5 hash of this sample is 70e30e6ac20c966d8b5b9bdf48b5423c.

This strike sends a malware sample detected by Mcafee as Adware-HotBar.f, Microsoft as Adware:Win32/Hotbar, Kaspersky as not-a-virus:AdWare.Win32.ScreenSaver.i, Symantec as Adware.Clkpotato!gen3, Bitdefender as Trojan.Generic.7444697. The MD5 hash of this sample is 4d826678ab84f3b867ed561db4bd3daa.

This strike sends a malware sample detected by Mcafee as Adware-HotBar.f, Microsoft as Adware:Win32/Hotbar, Kaspersky as not-a-virus:AdWare.Win32.ScreenSaver.i, Symantec as Adware.Clkpotato!gen3, Bitdefender as Trojan.Generic.7444697. The MD5 hash of this sample is 8bf3c467ecdde52b33b78ef263ef1310.

This strike sends a malware sample detected by Mcafee as Adware-HotBar.f, Kaspersky as not-a-virus:AdWare.Win32.ScreenSaver.i, Symantec as Adware.Clkpotato!gen3, Bitdefender as Trojan.Generic.7444697. The MD5 hash of this sample is d73d5ae83fa4f49a6978eac1d6095f3e.

This strike sends a malware sample detected by Mcafee as Adware-HotBar.f, Microsoft as Adware:Win32/Hotbar, Kaspersky as not-a-virus:AdWare.Win32.ScreenSaver.i, Symantec as Adware.Clkpotato!gen3, Bitdefender as Adware.HotBar.GR. The MD5 hash of this sample is fe3721667b5d151a0679aae7d5bb2b7b.

This strike sends a malware sample detected by Mcafee as Generic.tfr!z, Symantec as Trojan.ADH. The MD5 hash of this sample is 3d0b071aba1f30b346d8f935aa3a71d7.

This strike sends a malware sample detected by Mcafee as Adware-HotBar.f, Microsoft as Adware:Win32/Hotbar, Kaspersky as not-a-virus:AdWare.Win32.ScreenSaver.i, Symantec as Adware.Clkpotato!gen3, Bitdefender as Trojan.Generic.7444697. The MD5 hash of this sample is 890ae0d6e1b9382d83e8a4b3a1229864.

This strike sends a malware sample detected by Mcafee as Adware-HotBar.f, Microsoft as Adware:Win32/Hotbar, Kaspersky as not-a-virus:AdWare.Win32.ScreenSaver.i, Symantec as Adware.Clkpotato!gen3, Bitdefender as Trojan.Generic.7444697. The MD5 hash of this sample is d7d2366326530915e9b9435ce3a00886.

CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

This strike demonstrates an exploit in Java where an attacker can run arbitrary Java code without sandbox protection by leveraging an exploit in the glassfish package.

This strike sends a malware sample detected by Mcafee as Adware-HotBar.d, Kaspersky as not-a-virus:AdWare.Win32.ScreenSaver.e, Symantec as Adware.Clkpotato!gen3, Bitdefender as Gen:Variant.Adware.Graftor.30458. The MD5 hash of this sample is ad0a304cdcba169889c461a97d803bc8.

This strike sends a malware sample detected by Mcafee as Adware-HotBar.f, Microsoft as Adware:Win32/Hotbar, Kaspersky as not-a-virus:AdWare.Win32.ScreenSaver.i, Symantec as Adware.Clkpotato!gen3, Bitdefender as Trojan.Generic.7444697. The MD5 hash of this sample is 12c9dbaf0b6d420daefc76a54911c4a2.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a buffer overflow in Apple's Quicktime where a malformed Targa file can clobber a buffer.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a buffer overflow in Apple's Quicktime where a malformed TeXML file can possibly lead to arbitrary code execution.

CVSS: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)

This strike exploits a denial of service error where a malformed RPC request can force the server to dereference a NULL pointer.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a vulnerability that exists in the way Microsoft Windows ShellExecute handles malformed URIs when dealing with Internet Explorer7. If the URI handlers mailto, news, nntp, snews, telnet, and http contain a % character in the URI the code is unable to connect those handlers to any registered application in the system. In this strike importing a vcf contact file in Microsoft Outlook...

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a heap corruption vulnerability in Adobe Photoshop. The vulnerability is due to failure to sanitize PNG field values. By enticing a user to open a specially crafted PNG file, an attacker could execute arbitrary code.

CVSS: 2.1 (AV:L/AC:L/Au:N/C:N/I:N/A:P)

This strike exploits a buffer overflow in Oracle's Outside In handling of JPEG 2000 files where a malformed QCD segment can clobber a buffer.

CVSS: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)

This strike exploits a flaw in Cisco's AnyConnect software where a previous version of the software may be loaded which contains known vulnerabilities. Then an attacker may use vulnerabilities in that software for an attack. Since the attacker can control the file that is downloaded, any arbitrary file can be delivered.

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

This strike exploits a vulnerability in the Oracle WebCenter Forms Recognition ActiveX control. A lack of path validation in Save() method allows the remote attacker to potentially execute arbitrary code.

CVSS: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)

This strike exploits the insecure way that libraries are searched for by Mozilla Firefox and Mozilla Thunderbird that could result in the loading of a malicious file.

Pages