Search
Keyword: usojan.linux.cve20165195.c
* indicates a new version of an existing rule Deep Packet Inspection Rules: DCERPC Services 1009511 - Microsoft Windows SMB Remote Code Execution Vulnerability (CVE-2019-0630) DHCPv6 Client -
* indicates a new version of an existing rule Deep Packet Inspection Rules: Arcserve Unified Data Protection 1012019 - Arcserve Unified Data Protection Denial of Service Vulnerability (CVE-2024-0801)
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It exploits software vulnerabilities to propagate to other
Microsoft addresses the following vulnerabilities in its March batch of patches: (MS13-021) Cumulative Security Update for Internet Explorer (2809289) Risk Rating: Critical This patch addresses
Microsoft addresses the following vulnerabilities in its October batch of patches: (MS13-088) Cumulative Security Update for Internet Explorer (2888505) Risk Rating: Critical This security update
Microsoft addresses the following vulnerabilities in its October batch of patches: (MS14-056)Cumulative Security Update for Internet Explorer (2987107) Risk Rating: Critical This security update
(MS11-034) Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2506223)
CVE-2011-0675,CVE-2011-1234,CVE-2011-1235,CVE-2011-1236,CVE-2011-1237,CVE-2011-1238,CVE-2011-1239,CVE-2011-1240,CVE-2011-1241,CVE
* indicates a new version of an existing rule Deep Packet Inspection Rules: DCERPC Services 1007021* - Remote Registry Access Through SMBv2 Protocol Detected (ATT&CK T1012) MySQL Cluster 1011222
CVE-2009-4055 rtp.c in Asterisk Open Source 1.2.x before 1.2.37, 1.4.x before 1.4.27.1, 1.6.0.x before 1.6.0.19, and 1.6.1.x before 1.6.1.11; Business Edition B.x.x before B.2.5.13, C.2.x.x before
CVE-2013-7108 Multiple off-by-one errors in Nagios Core 3.5.1, 4.0.2, and earlier allow remote authenticated users to obtain sensitive information from process memory or cause a denial of service
Exploit kits such as Angler Exploit Kit and Nuclear Exploit Pack have been updated to include one of the recent Hacking Team Flash zero-day vulnerabilities. Magnitude Exploit kit, in particular,
CVE-2014-1763,CVE-2014-1765,CVE-2014-2783,CVE-2014-2785,CVE-2014-2786,CVE-2014-2787,CVE-2014-2788,CVE-2014-2789,CVE-2014-2790,CVE
Microsoft addresses the following vulnerabilities in its July batch of patches: (MS13-052) Vulnerabilities in .NET Framework and Silverlight Could Allow Remote Code Execution (2861561) Risk Rating:
* indicates a new version of an existing rule Deep Packet Inspection Rules: HP Intelligent Management Center (IMC) 1008709 - HPE Intelligent Management Center 'getSelInsBean' Expression Language
This Ransomware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
Microsoft addresses the following vulnerabilities in its September batch of patches: (MS13-067) Vulnerabilities in Microsoft SharePoint Server Could Allow Remote Code Execution (2834052) Risk Rating:
CVE-2014-2774,CVE-2014-2810,CVE-2014-2811,CVE-2014-2818,CVE-2014-2821,CVE-2014-2822,CVE-2014-2823,CVE-2014-4050,CVE-2014-4051,CVE
* indicates a new version of an existing rule Deep Packet Inspection Rules: DHCP Client 1009116* - DHCP Client Script Code Execution Vulnerability (CVE-2018-1111) - 1 DHCP Client - Incoming 1009114
* indicates a new version of an existing rule Deep Packet Inspection Rules: Apache Kylin 1011623 - Apache Kylin Command Injection Vulnerability (CVE-2022-24697) OpenSSL 1011597* - OpenSSL