Backdoor.Win32.GateHell.21 malware suffers from an authentication bypass vulnerability.
3190bfb5d5a0c4124a88bc50873589e7242c550aaf54cc63e175b599737268ef
Backdoor.Win32.Ketch.i malware suffers from a remote stack buffer overflow vulnerability.
1f67f5397df9109f39d7d916cc57ce839e7b4287d17e91fa1a81302324177903
Backdoor.Win32.Zombam.a malware suffers from a remote stack buffer overflow vulnerability.
933ad0c7eaa00a4038e30992a463e6a35b6fb00aaf7b35c2dc9d821ed74449e0
Backdoor.Win32.Levelone.b malware suffers from a stack buffer overflow vulnerability.
90583a534f7d93ac2f8af0f02ec8ac44ebf3c090acb82b4d2fd68a8f9ea96b6e
Backdoor.Win32.Levelone.a malware suffers from a remote stack buffer overflow vulnerability.
e1d2cc0b45ddab3f25a55ff4572d118f9c05e4c659e1cb2d656a3c307192802c
Backdoor.Win32.Ketch.b malware suffers from a remote stack buffer overflow vulnerability.
7f01955e8c27b4b2918b903eb827c82d90119013ca1fac02fdfbe569ac1393b1
Backdoor.Win32.NinjaSpy.c suffers from a remote stack buffer overflow vulnerability. The specimen drops a DLL named "cmd.dll" under C:\WINDOWS\ which listens on both TCP ports 2003 and 2004. By sending consecutive HTTP PUT requests with large payloads of characters, we can cause buffer overflow.
400bc171e968496bf6805e3f0060696d5ec13c5f875efa99884bbebe00d20df4
Backdoor.Win32.Xtreme.yvp malware suffers from an insecure permissions vulnerability that can allow for privilege escalation.
d669ec11f5f4683946716bc09419f2d27c2862ffea1aea535846c71ffaa01d1f
Backdoor.Win32.Agent.dcbh malware suffers from an insecure permissions vulnerability that can allow for privilege escalation.
65b717d008ad928996743eba63917d1ee7bd2a3706dde18975d4feeabd4b5f35
Backdoor.Win32.Zombam.k malware suffers from a remote string dereference stack buffer overflow vulnerability.
ef174802095519a2a4b95156fe271616bd8eda0c62df1e04c47b034dce259f5c
BACKDOOR.WIN32.BNLITE malware suffers from a remote heap corruption vulnerability.
5846f42f4254264a3ccef8ab905e2bcfbc985351e4c829a10d519d7df39cf7c0
Phorplex malware suffers from an insecure permissions vulnerability that can allow for privilege escalation.
31c1931d20b346f643d993effac9bd45f03bb40eb954f7c9cc26215912a5b9ad
TROJAN.WIN32.JORIK.DMSPAMMER.SZ malware suffers from a remote memory corruption vulnerability.
96cc7d2ac0ad4a8f2073087d4f045ebc3f750b00d1a66c74e9a2704a61b6a679
HEUR.RISKTOOL.WIN32.BITMINER.GEN malware suffers from a null pointer vulnerability.
897cacb25224a142af9dd2a04c2827c26d2d7d9052eff1394cb54ae4f4b863c6
Backdoor.Win32.Zombam.j malware suffers from a remote stack buffer overflow vulnerability.
2ba1a6cf0269346fab9ee340a31b39db04858c26a52c70977145925c356eb40f
BACKDOOR.WIN32.REMOTEMANIPULATOR malware suffers from an insecure permissions vulnerability.
a64b81396e4e9bbeab9ae17cbf17a261b1a43a25dc5da0de2a55b256c9d07e8c
BACKDOOR.WIN32.ADVERBOT malware suffers from a remote stack corruption vulnerability.
e19f1cae1b270a3c26e471536c7e316b5ff21b3b1fd8f868d916eb9e10f0cf41
Trojan:Win32/Alyak.B malware suffers from a remote stack corruption vulnerability.
c730fca9492df00a1b3b3087832398a28816274d38d49172ee9e623c0323a4b3
Email-Worm.Win32.Zhelatin.ago malware suffers from a remote stack buffer overflow vulnerability.
cc85555b920fa27d6e6139214e1b57bc209184761c8e3ed44fa30d299077dac5
Trojan.Win32.Bayrob.cgau malware suffers from an insecure permissions vulnerability that can allow for privilege escalation.
13f2ef80f55d7bb39d8d08d9eafc77f1b6ae0f882c519b9f6ec9f1fa5aa1da54
Trojan.Win32.Barjac malware suffers from a remote stack buffer overflow vulnerability.
830d07090b48765c91480342ae79955c3e97436c901eb2c6598ae9da90d6dff7
Backdoor.Win32.Infexor.b malware suffers from a remote SEH stack buffer overflow vulnerability.
1638c6aafa2d5a2302a3dd2a366faeb99eb45a45a0ca28be2dbe2dd17ded3670
Win32 backdoor 2019-02-ARTRADOWNLOADER suffers from a remote SEH buffer overflow vulnerability.
b2138e14bfbb545a936e0f93a531841d3fd21f044775541685d107c8d0063eaa
Trojan.Win32.Antavka.bz malware suffers from an insecure permissions vulnerability that can allow for privilege escalation.
3a0c0a8c95934523df7b95cb211fb6da3e0d594dd977b28abd59f70b6efad7e7
AppSamvid suffers from a dll hijacking vulnerability.
3206874bf9be117c086c5018935c2dd5a760287f3aa9af5e6029349319ee83fd
Mandriva Linux Security Advisory 2014-227 - The decode_init function in libavcodec/huffyuv.c in FFmpeg before 1.1 allows remote attackers to have an unspecified impact via a crafted width in huffyuv data with the predictor set to median and the colorspace set to YUV422P, which triggers an out-of-bounds array access. The parse_picture_segment function in libavcodec/pgssubdec.c in FFmpeg before 1.1 allows remote attackers to have an unspecified impact via crafted RLE data, which triggers an out-of-bounds array access. The ff_er_frame_end function in libavcodec/error_resilience.c in FFmpeg before 1.0.4 and 1.1.x before 1.1.1 does not properly verify that a frame is fully initialized, which allows remote attackers to trigger a NULL pointer dereference via crafted picture data. The mm_decode_inter function in mmvideo.c in libavcodec in FFmpeg before 1.2.1 does not validate the relationship between a horizontal coordinate and a width value, which allows remote attackers to cause a denial of service via crafted American Laser Games MM Video data. The cdg_decode_frame function in cdgraphics.c in libavcodec in FFmpeg before 1.2.1 does not validate the presence of non-header data in a buffer, which allows remote attackers to cause a denial of service via crafted CD Graphics Video data. The read_header function in libavcodec/ffv1dec.c in FFmpeg before 2.1 does not properly enforce certain bit-count and colorspace constraints, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted FFV1 data. The updated packages have been upgraded to the 0.10.15 version which is not vulnerable to these issues.
cf41dc584dc8f69da805e217d05ba3652ca3aa212448252fb3fd5fc8f26c4777