Search
Keyword: usoj_cve20146352.e
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does...
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This proof of concept attempts to exploit a vulnerability known as Spectre. If successful, it allows exploitation of said vulnerability in Windows systems. Exploitation of the vulnerability is difficult to mitigate as of this writing because it requi...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
* indicates a new version of an existing ruleDeep Packet Inspection Rules:CentOS Web Panel1011441* - CentOS Web Panel 'ajax_dashboard' SQL Injection Vulnerability (CVE-2020-15626)1011448 - CentOS Web Panel Multiple Command Injec...
* indicates a new version of an existing ruleDeep Packet Inspection Rules:Microsoft Office1010879 - Microsoft Excel XLS File Parsing Use-After-Free Remote Code Execution Vulnerability (CVE-2021-27053)1010878 - Microsoft Excel ...
* indicates a new version of an existing ruleDeep Packet Inspection Rules:Jenkins Remoting1010233* - Jenkins JRMP Java Library Deserialization Remote Code Execution Vulnerability (CVE-2016-0788)Oracle E-Business Suite Web Interfa...
* indicates a new version of an existing ruleDeep Packet Inspection Rules:Advanced Message Queuing Protocol (AMQP)1011704 - SolarWinds Network Performance Monitor Insecure Deserialization Vulnerability (CVE-2022-47503)HP Intel...
This malware family can be downloaded via visiting malicious websites. Its main function is to download other malware onto infected systems thus compromising its security.
This Trojan executes when a user accesses certain websites where it is hosted.It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system.It redirects browsers to certain sites. It i...
This Trojan executes when a user accesses certain websites where it is hosted.It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system.
This malware family can be downloaded via visiting malicious websites. Its main function is to download other malware onto infected systems thus compromising its security.
This malware family can be downloaded via visiting malicious websites. Its main function is to download other malware onto infected systems thus compromising its security.
This Trojan executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system.
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This worm arrives via removable drives.It modifies registry entries to hide files with System and Read-only attributes.It drops copies of itself into all the removable drives connected to an affected system. It drops copies of itself in removable dr...
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It takes advantage of certain vulnerabilities.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.