Search
Keyword: linux
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully perform its intended routine.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware packages. It requires its main component to succes...
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to succ...
A remote code execution vulnerability exists in Adobe Flash Player. The vulnerability is due to an unspecified error. A remote attacker can exploit this vulnerability by enticing a...
* indicates a new version of an existing rule Deep Packet Inspection Rules: Redis Server 1011555* - Redis Integer Overflow Vulnerability (CVE-2022-35951) Web Application PHP Based 1011689* - LibreNMS Cross-Site Scripting Vulne...
This is the third zero-day vulnerability disclosed from the Hacking Team leak. It affects all versions of Flash Player for Windows, Mac, and Linux. Once successfully exploited, it could cause a crash a...
This backdoor connects to a website to send and receive information.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires being executed with a specific argument/parameter, an additional component, or in a specific e...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully perform its intended routine.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Android OS
NOTES: The rooting tool TowelRoot is made by GeoHot that targets CVE-2014-3153 local privilege escalation vulnerability. It affects Linux Kernel 3.14.5 and consequently, most of Android versions. It breaks the mobile ...
Linux, Unix
Arrival Details This Trojan may be downloaded from the following remote site(s): http://{BLOCKED}5.{BLOCKED}4.184.150/404.cgi NOTES: It contains embedded malware ELF_ROOPRE.A, which will be executed and installed into the s...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It performs denial of service (DoS) attacks on affected systems using specific flooding method(s).
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Windows, Linux
Arrival Details This malware arrives via the following means: It may be uploaded and installed on a web server by a remote malicious user after gaining access to the server. Other Details This Backdoor does the follo...
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to succ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
* indicates a new version of an existing rule Deep Packet Inspection Rules: Unix Samba 1011294 - Samba AppleDouble Remote Code Execution Vulnerability (CVE-2021-44142) Web Application PHP Based 1011286 - WordPress 'True Rank...
* indicates a new version of an existing rule Deep Packet Inspection Rules: Apache Kylin 1011623* - Apache Kylin Command Injection Vulnerability (CVE-2022-24697) 1011685 - Apache Kylin Command Injection Vulnerability (CVE-2022-...