Search
Keyword: usojan.linux.cve20165195.c
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It requires its main component to
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It executes the dropped file(s). As a
This Trojan executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. It requires its main component to successfully perform its
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It takes advantage of software vulnerabilities in certain software to drop malicious
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It takes advantage of certain vulnerabilities. Arrival Details This Trojan arrives as an
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival
This Trojan executes when a user accesses certain websites where it is hosted. It may be hosted on a website and run when a user accesses the said website. However, as of this writing, the said sites
Once a malware successfully exploits the vulnerability, it causes certain actions to be done on the system. This Trojan may arrive bundled with malware packages as a malware component. It executes
This Trojan takes advantage of a known vulnerability in Adobe Reader and Acrobat version 9.x before 9.4 and 8.x before 8.2.5. It executes the files it drops, prompting the affected system to exhibit
CVE-2006-2758,CVE-2009-1523 Directory traversal vulnerability in the HTTP server in Mort Bay Jetty 5.1.14, 6.x before 6.1.17, and 7.x through 7.0.0.M2 allows remote attackers to access arbitrary
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
builds return-oriented programming (ROP) chain of Visual C runtime gadgets (MSVCRT) with hard-coded base addresses for English and Chinese language pack operating systems. On Windows 7, it uses hard-coded
CVE-2015-0285 This vulnerability is found in the ssl3_client_hello function in s3_clnt.c (OpenSSL 1.0.2 before 1.0.2a). When exploited successfully, it may be possible for remote attackers to bypass
CVE-2015-0209 Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might
CVE-2015-0288 The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow attackers to cause a
CVE-2015-0240 The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an
CVE-2016-2213 The vulnerability found in jpeg2000_decode_tile function in libavcodec/jpeg2000dec.c in FFmpeg before 2.8.6 may allow remote attackers to cause a denial of service. It does this using a
This Trojan executes the files it drops, prompting the affected system to exhibit the malicious routines they contain. Dropping Routine This Trojan drops the following files: %User Profile%