Keyword: gold_bug
322 Total Search   |   Showing Results : 161 - 180
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
\ VIDEOEDIT.VideoEditCtrl.1 (Default) = "VideoEdit Gold Control" HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ VIDEOEDIT.VideoEditCtrl.1\CLSID (Default) = "{57D9AF4C-23BA-47EC-A40B-2DA79641B285}" HKEY_LOCAL_MACHINE\SOFTWARE\Classes
Injection Vulnerability (CVE-2024-29823) 1012094 - Progress WhatsUp Gold Server-Side Request Forgery Vulnerability (CVE-2024-5015) 1012092 - Progress WhatsUp Gold Path Traversal Vulnerability (CVE-2024-5018)
Description Name: CVE-2024-4885 - WHATSUP GOLD TRAVERSAL EXPLOIT - HTTP (REQUEST) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting t...
CVE-2024-36104) PaperCut 1012082* - PaperCut NG and MF Remote Code Execution Vulnerability (CVE-2024-1882) Progress WhatsUp Gold WCF service 1012117 - Progress WhatsUp Gold Directory Traversal Vulnerability
Vulnerability (CVE-2024-2878) 1012087* - Ivanti Endpoint Manager SQL Injection Vulnerability (CVE-2024-29822 and CVE-2024-29824) 1012099 - Progress WhatsUp Gold Directory Traversal Vulnerability (CVE-2024-5019)
Description Name: CVE-2024-5008 - WHATSUP GOLD RCE EXPLOIT - HTTP (REQUEST) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this ty...
(CVE-2024-28075) Ivanti Endpoint Manager 1012156* - Ivanti Endpoint Manager XML External Entity Information Disclosure Vulnerability (CVE-2024-37397) Progress WhatsUp Gold WCF service 1012129* - Progress WhatsUp
Data Vulnerability (CVE-2024-41874) Web Server HTTPS 1012119* - Progress WhatsUp Gold Denial Of Service Vulnerability (CVE-2024-5011) 1012118* - Progress WhatsUp Gold Unrestricted File Upload
of the following malware: TROJ_AGENT.BCPC TROJ_PONMCOP.SM1 TROJ_PONMCOP.SM TROJ_PONMOCOP.SM We speculate that there might be a bug that causes the malware to print the code instead of executing a file.
executable file that claims to be the update patch and bug fixes for Windows XP Service Pack 2 and 3. The executable file has a detection name of WORM_VB.GAW
Vista and 7.) Other System Modifications This Trojan deletes the following files: %User Temp%\1.tmp %System Root%\bug %System Root%\0.ico %System Root%\temp.reg %Temp%\scs2.tmp %Temp%\scs3.tmp %Temp%
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This backdoor arrives as an attachment to email messages spammed by
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
copies are being sent from your computer. Nowadays it happens from many computers, because this is a new virus type (Network Worms). Using the new bug in the Windows, these viruses infect the computer
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses the default Windows folder icon to trick users