what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 668 RSS Feed

Virus Files

Secunia Security Advisory 51156
Posted Nov 8, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Tavis Ormandy has reported multiple vulnerabilities in Sophos Anti-Virus, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct cross-site scripting attacks and compromise a user's system.

tags | advisory, local, vulnerability, virus, xss
SHA-256 | b08a7c2470ab6518631923185870143cd4ca98e17ae244daa22662ea9f1a6633
Sophail: Applied Attacks Against Sophos Antivirus
Posted Nov 6, 2012
Authored by Tavis Ormandy

By design, antivirus products introduce a vast attack surface to a hostile environment. The vendors of these products have a responsibility to uphold the highest secure development standards possible to minimize the potential for harm caused by their software. This second paper in a series on Sophos internals applies the results previously presented to assess the increased threat Sophos customers face. This paper is intended for a technical audience, and describes the process a sophisticated attacker would take when targeting Sophos users.

tags | paper, virus
SHA-256 | 6e947610a5f61d4dfef968f6267c1b7f69d040adf4a3f5f08d7edf9ebe6f3000
Kindsight Malware Report Q3 2012
Posted Nov 2, 2012
Site kindsight.net

The Kindsight Security Labs Q3 2012 Malware Report examines general trends for malware infections in home networks or infections in mobile devices and computers connected through mobile adapters. The data in this report is aggregated across the networks where Kindsight solutions are deployed.

tags | paper, virus
SHA-256 | 4358fac16115036cd5347643c7df24ea0a1c9963e8d996174c8561f908070ef5
Clam AntiVirus Toolkit 0.97.6
Posted Sep 19, 2012
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

Changes: A bug were CL_EFORMAT: Bad format or broken data ERROR was reported as the scan result was fixed.
tags | virus
systems | unix
SHA-256 | a15a2bb9200ac9f2c6f1c5e1072ac265a2c4fe5a9be4663b47d076afdfa123f8
Secunia Security Advisory 49990
Posted Jul 18, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Artem Chaykin has reported a vulnerability in Dr.Web Anti-virus for Android, which can be exploited by malicious people to disclose sensitive information.

tags | advisory, web, virus
SHA-256 | ccac48f9b1e4e5e39edf8c44ef436c8187f7bce3c4538e66ff4b1d8dd6e50587
Dr.Web Anti-Virus 7.00.0 SQL Injection
Posted Jul 17, 2012
Authored by Artem Chaykin | Site ptsecurity.com

Dr.Web Anti-Virus versions 7.00.0 and below suffer from a remote SQL injection vulnerability.

tags | advisory, remote, web, virus, sql injection
SHA-256 | 1f26f1d9a0c53d31cf524b8a8317a2acbba4e04bbcfa37d8609fe95557379ad4
Having Fun With VirusScan Enterprise
Posted Jul 12, 2012
Authored by Mert SARICA | Site mertsarica.com

VirusScan Enterprise Antivirus product may have a bug (or a vulnerability) in its parser that can lead to wrong action status messages and reports, malicious file scan bypass, and name spoofing by adding the magic line to the beginning of the file header.

tags | paper, spoof, virus
SHA-256 | 2245ea07c6a13e3cfa317e75e1bd13e79210f3bafacb32336208b8c41a1e3a8f
Clam AntiVirus Toolkit 0.97.5
Posted Jun 16, 2012
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

Changes: This release addresses possible evasion cases in some archive formats. It also addresses stability issues in portions of the bytecode engine. This release is recommended for all users.
tags | tool, virus
systems | unix
advisories | CVE-2012-1457, CVE-2012-1458, CVE-2012-1459
SHA-256 | db6c5e1a5ec8ca0b8006cf82661d3158d3365ba1b4bc14c03c5d0bca89a93c0d
ClamSAP Libraries 0.9.7.4
Posted Apr 27, 2012
Authored by Markus Strehle | Site clamsap.sourceforge.net

ClamSAP consists of two C shared libraries that link between ClamAV and the Virus Scan Interface (VSI) of SAP (official name: NW-VSI). A SAP application can use the ClamAV engine to scan for malicious uploads in HTTP uploads, for example.

Changes: This release includes an adaption for ClamAV 0.97.4 and support for remote clamd scans.
tags | web, virus
systems | unix
SHA-256 | 4cc0cb65a43b084856fe6c79649ded144d8b596d567a16eaa32c9ede9bc42ab4
HP Security Bulletin HPSBPV02754 SSRT100803
Posted Apr 12, 2012
Authored by HP | Site hp.com

HP Security Bulletin HPSBPV02754 SSRT100803 - A potential security vulnerability has been identified with certain HP ProCurve 5400 zl switches containing compact flash cards which may be infected with a virus. Reuse of an infected compact flash card in a personal computer could result in a compromise of that system's integrity. Revision 1 of this advisory.

tags | advisory, virus
advisories | CVE-2012-0133
SHA-256 | aa894cef3a0c2ea1f2d4d52dda2a5961a24ed2dc9729d8ce131a84f0c7de1ae2
Clam Antivirus Toolkit 0.97.4
Posted Mar 16, 2012
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

Changes: This release includes minor bugfixes, detection improvements, and initial support for on-access scanning under Mac OS X. This update is recommended for all users.
tags | tool, virus
systems | unix
SHA-256 | 958dd09c9da9ceb50c9e556b3ced9cbdf40e836d2bdc98286ce96e84fd4a5a53
Barracuda Spam/Virus WAF 600 Cross Site Scripting
Posted Jan 21, 2012
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Barracuda Spam/Virus WAF 600 suffers from a cross site scripting vulnerability.

tags | exploit, virus, xss
SHA-256 | 7be3777e4289e96e5e7b2bf2cec69b4513fe8bef931de3ae26a8d16cf5177ebf
Malware Reverse Engineering Part 1 - Static Analysis
Posted Jan 18, 2012
Authored by Rick Flores

This malware report is part 1 of 2. This report is an effort to track, categorize, contain, understand root cause and infection vector of said user account/s, networked equipment or computer/s. This report pertains to all incidents reported by TIER II help desk, TIER III engineers, customer complaints or random IT Security audit/finding/pen test.

tags | paper, root, virus
SHA-256 | 8ace29513474b3ae5ebf23335d1c8782b885f19d4f5db31bcf348fcb6e7db1b8
Kaspersky Internet Security / Anti-Virus 2011 / 2012 Memory Corruption
Posted Dec 20, 2011
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Kaspersky Internet Security 2011/2012 and Kaspersky Anti-Virus 2011/2012 suffer from a local memory corruption vulnerability.

tags | exploit, local, virus
SHA-256 | 18c23b61b3a5130f1676e81339edfa843b2843bccb7b7083fd3c502bd069ce8e
Anti-Virus Evasion Techniques
Posted Dec 11, 2011
Authored by Abhinav Singh

Whitepaper called Anti-Virus Evasion Techniques. Some of the techniques discussed are binding and splitting, converting exe to executable client side scripts, and performing code obfuscation/morphing.

tags | paper, virus
SHA-256 | a67e9dfc2edc6ef44c9c82a4132902d3b4329e23e0b4c682cc1ef2191fb41ee3
SAP NetWeaver Virus Scan Cross Site Scripting
Posted Nov 17, 2011
Authored by Dmitriy Evdokimov

The SAP NetWeaver Virus Scan interface suffers from multiple cross site scripting vulnerabilities.

tags | advisory, vulnerability, virus, xss
SHA-256 | bb8285b3a50293e1b7955490ff1a6f95c2a536a27d3d98b985e8678a317a3799
Clam AntiVirus Toolkit 0.97.3
Posted Oct 17, 2011
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

Changes: This is a minor bugfix release and is recommended for all users.
tags | tool, virus
systems | unix
SHA-256 | 3a8cece5b7e6b15410f6b8f96ff5591b2c5a72f290ee8a28fefda44cb5ae7aba
Anti-Virus Cloudfare Cross Site Scripting
Posted Oct 17, 2011
Authored by Sandeep Kamble

The service at anti-virus.cloudflare.com suffers from a cross site scripting vulnerability.

tags | exploit, virus, xss
SHA-256 | b6ee5497426ebce31868121289c9ae738ae0ad5026abab52cd9dbc4650ad8848
Qmail Scanner 2.10
Posted Oct 6, 2011
Site qmail-scanner.sourceforge.net

Qmail-Scanner, (previously known as scan4virus) is an addon that enables a Qmail Email server to scan all gatewayed Email for certain characteristics. It is typically used for its anti-virus protection functions, in which case it is used in conjunction with commercial virus scanners, but also enables a site to react to Email (at a server/site level) that contains specific strings in particular headers, or particular attachment filenames or types.

Changes: Some minor bugs were fixed. New features include DLP support and Team Cymru Malware Hash Registry support.
tags | virus
systems | linux, unix
SHA-256 | b6c430c81efd41bd28e56fb60e6e1ecbd98e44346c2faad69ff164960f042247
Embedding The Payload
Posted Sep 29, 2011
Authored by 0dem

Whitepaper called "Embedding the Payload" or "How to avoid AV-Detection". The main goal of this paper focuses on how to undermine system integrity by circumventing anti-virus detection.

tags | paper, virus
SHA-256 | 14edf4f453f8794728b0ac49c1d1ae57bab9b38e68a39ab9849188b3c9dd702d
F-Secure Multiple Products SEH Overwrite
Posted Aug 24, 2011
Authored by 41.w4r10r

F-Secure Anti-Virus 2010 / 2011 and Internet Security 2010 / 2011 active-x SEH overwrite exploit.

tags | exploit, overflow, virus, activex
SHA-256 | b38eddf800c45049b97bae2be28253121ba1933544a054983303e953ef2b916f
Sophail: A Critical Analysis Of Sophos Antivirus
Posted Aug 4, 2011
Authored by Tavis Ormandy

This paper describes the results of a thorough examination of Sophos Antivirus internals. The author presents a technical analysis of claims made by the vendor, and publishes the tools and reference material required to reproduce their results. Furthermore, they examine the product from the perspective of a vulnerability researcher, exploring the rich attack surface exposed, and demonstrating weaknesses and vulnerabilities.

tags | paper, vulnerability, virus
SHA-256 | 57ecb0848e5b99ef5678dc00d7aabb2718195a8bb23f387f2d5ff429df854455
Clam Antivirus Toolkit 0.97.2
Posted Jul 26, 2011
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

Changes: This release fixes problems with the bytecode engine, Safebrowsing detection, hash matcher, and other minor issues.
tags | virus
systems | unix
SHA-256 | 91503f8cff482cac1f2c951c5d62a7da8a17ba3b32eb8fa2800e29c03c7cd58a
Fake Malware And Virus Scanners
Posted Jul 5, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

Whitepaper called Fake Malware and Virus Scanners. Rogue security software reports a virus infection, even if your computer is clean. This kind of "software" could also fail to report viruses when your computer is infected. This document show what are the mechanisms to obfuscate this process.

tags | paper, virus
SHA-256 | 0305582fef0a334d0098bff6db770a8a71c665735a44588fdd53e7b219351d8c
Client-Side Threats - Anatomy Of Reverse Trojan Attacks
Posted Jul 5, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

Whitepaper called Client-Side Threats - Anatomy of Reverse Trojan Attacks. Client-side vulnerabilities are among the biggest threats facing users. Attackers are going after weaknesses in desktop applications such as browsers, media players, common office applications and e-mail clients to install malicious software, often Trojan horses and rootkits. This document explains in detail these threats while how to prevent them.

tags | paper, trojan, vulnerability, virus
SHA-256 | 2c1afb10f1f364d84902aa704ae75b54b7d538279adb0348248fba3c6e22acf9
Page 5 of 27
Back34567Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close