Search
Keyword: gold_bug
This malware is a remote access tool (RAT) known as PlugX. It is one of the most common malware used in carrying out targeted attacks. The targeted attacks it has been involved in are mostly directed
This backdoor may be dropped by other malware. It creates folders where it drops its files. Arrival Details This backdoor may be dropped by other malware. Installation This backdoor drops the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor connects to Internet Relay Chat (IRC) servers. It joins an Internet Relay Chat (IRC) channel. It executes commands from a remote malicious user, effectively compromising the affected
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
REGIST FREE BUG MATH LAB IEEE KDE TRACK INFORMA FUJI @MAC SLACK REDHA SUSE BUNTU XANDROS @ABC @123 LOOKSMART SYNDICAT ELEKTRO ELECTRO NASA LUCENT TELECOM STUDIO SIERRA USERNAME IPTEK CLICK SALES PROMO
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
This malware is an IRC (Internet Relay Chat) bot that leverages the Bash bug vulnerability, also known as Shellshock. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to
(Shellshock) Exploit Emerges in the Wild, Leads to FLOODER Shell Attack On Your Server: Bash Bug ‘CVE-2014-7169′ and ‘CVE-2014-6271′ Downloaded from the Internet Compromises system security, Connects to
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It deletes itself after execution. Arrival Details This
This backdoor is downloaded before through a previous zero-day Java exploit, now tagged as CVE-2013-1493. This malware is also used as a payload for a zero-day Internet Explorer bug. To get a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
multiple unspecified RPC functions, aka Novell bug 287919, a different vulnerability than CVE-2007-2954 Novell Novell client 4.91 Trend Micro Deep Security shields networks through Deep Packet Inspection
JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a crafted argument, aka Bug Id 6872357. sun jdk
CVE-2008-4065 Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allow remote attackers to bypass cross-site scripting (XSS) protection
attackers to force the download and execution of arbitrary files via a crafted web page, aka Bug ID CSCta25876. cisco secure_desktop 3.1,cisco secure_desktop 3.1.1,cisco secure_desktop 3.1.1.27,cisco
CVE-2008-1447 The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and
CVE-2008-3704 Heap-based buffer overflow in the MaskedEdit ActiveX control in Msmask32.ocx 6.0.81.69, and possibly other versions before 6.0.84.18, in Microsoft Visual Studio 6.0, Visual Basic 6.0,