Search
Keyword: usojan.linux.cve20165195.c
* indicates a new version of an existing rule Deep Packet Inspection Rules: Advanced Message Queuing Protocol (AMQP) 1011704* - SolarWinds Network Performance Monitor Insecure Deserialization
* indicates a new version of an existing rule Deep Packet Inspection Rules: DNS Client 1010766* - Identified Non Existing DNS Resource Record (RR) Types In DNS Traffic SSL Client Applications 1001113
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
CVE-2010-0742 The Cryptographic Message Syntax (CMS) implementation in crypto/cms/cms_asn1.c in OpenSSL before 0.9.8o and 1.x before 1.0.0a does not properly handle structures that contain
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
Microsoft addresses the following vulnerabilities in its August batch of patches: (MS12-052) Cumulative Security Update for Internet Explorer (2722913) Risk Rating: Critical This bulletin patches
CVE-2015-1658,CVE-2015-1686,CVE-2015-1688,CVE-2015-1694,CVE-2015-1703,CVE-2015-1704,CVE-2015-1705,CVE-2015-1708,CVE-2015-1709,CVE
Microsoft addresses the following vulnerabilities in its May batch of patches: (MS13-037) Cumulative Security Update for Internet Explorer (2829530) Risk Rating: Critical This patch addresses eleven
* indicates a new version of an existing rule Deep Packet Inspection Rules: DCERPC Services 1010317 - Microsoft Windows SMB Remote Code Execution Vulnerability (CVE-2020-1301) DCERPC Services -
* indicates a new version of an existing rule Deep Packet Inspection Rules: H2 Database 1011316* - H2 Database Remote Code Execution Vulnerability (CVE-2022-23221) Web Application PHP Based 1011319 -
Microsoft addresses the following vulnerabilities in its October batch of patches: (MS11-075) Vulnerability in Microsoft Active Accessibility Could Allow Remote Code Execution (2623699) Risk Rating:
Microsoft addresses the following vulnerabilities in its October batch of patches: (MS13-080) Cumulative Security Update for Internet Explorer (2879017) Risk Rating: Critical This security update
* indicates a new version of an existing rule Deep Packet Inspection Rules: DCERPC Services - Client 1009586 - Microsoft Internet Explorer DLL Loading Arbitrary Code Execution Vulnerability Over
Microsoft addresses vulnerabilities in its August security bulletin. Trend Micro Deep Security covers the following: CVE-2019-1196 - Chakra Scripting Engine Memory Corruption Vulnerability Risk
* indicates a new version of an existing rule Deep Packet Inspection Rules: DNS Server 1010293 - ISC BIND TSIG Denial-of-Service Vulnerability (CVE-2020-8617) FTP Server Common 1010229 - uftpd FTP
* indicates a new version of an existing rule Deep Packet Inspection Rules: DCERPC Services 1008445* - Microsoft Windows Search Remote Code Execution Vulnerability (CVE-2017-8543) MySQL Cluster
* indicates a new version of an existing rule Deep Packet Inspection Rules: CentOS Web Panel 1012095 - CentOS Web Panel Arbitrary File Write Vulnerability (CVE-2021-45466) 1012071 - CentOS Web Panel
This backdoor may be dropped by other malware. It may arrive using one or multiple arrival methods. It connects to a website to send and receive information. However, as of this writing, the said
CVE-2009-2726 The SIP channel driver in Asterisk Open Source 1.2.x before 1.2.34, 1.4.x before 1.4.26.1, 1.6.0.x before 1.6.0.12, and 1.6.1.x before 1.6.1.4; Asterisk Business Edition A.x.x, B.x.x
CVE-2009-3555 The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier,