Keyword: unix_lion.a
99864 Total Search   |   Showing Results : 81 - 100
This malware is involved in the Bash Vulnerability Exploit attack of September 2014. It is capable of compromising an affected system's security by carrying out commands made by a malicious remote
This malware is involved in the Bash Vulnerability Exploit attack of September 2014. It is capable of compromising an affected system's security by carrying out commands made by a malicious remote
This malware is involved in the Bash Vulnerability Exploit attack of September 2014. It is capable of compromising an affected system's security by carrying out commands made by a malicious remote
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This malware is involved in the Bash Vulnerability Exploit attack of September 2014. It is capable of compromising an affected system's security by carrying out commands made by a malicious remote
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This worm arrives via removable drives. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. It connects to Internet Relay
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Backdoor arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be hosted on a website and run when a user accesses the said website. It does not have any propagation routine. It does not have any backdoor routine. It does not drop any other file.
CVE-2009-2979 Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 do not properly perform XMP-XML entity expansion, which allows remote attackers to cause a
Description Name: CVE-2020-10808 - IFS UNIX EXPLOIT - FTP (Request) . This is Trend Micro detection for FTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of ne...
Description Name: UNIX IFS SHELL RCE - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of network behavior...
* indicates a new version of an existing rule Deep Packet Inspection Rules: Mail Server Common 1011847 - Identified Img Over SMTP With Base64 Encoding (ATT&CK T1071.003) Unix Samba 1011797* - Samba
* indicates a new version of an existing rule Deep Packet Inspection Rules: H2 Database 1011316 - H2 Database Remote Code Execution Vulnerability (CVE-2022-23221) Trend Micro ServerProtect EarthAgent
* indicates a new version of an existing rule Deep Packet Inspection Rules: H2 Database 1011281* - H2 Database Console JNDI Injection Vulnerability (CVE-2021-42392) Unix Samba 1011294* - Samba
* indicates a new version of an existing rule Deep Packet Inspection Rules: Mail Server Common 1011847 - Identified Img Over SMTP With Base64 Encoding (ATT&CK T1071.003) Unix Samba 1011797* - Samba
* indicates a new version of an existing rule Deep Packet Inspection Rules: Network Scanner 1008800* - Bypass Network Scanner Traffic Nextgen Mirth Connect 1012008* - Nextgen Mirth Connect Insecure
Macintosh can find the appropriate update here: http://www.adobe.com/support/downloads/product.jsp?product=10&platform=Macintosh. Adobe Reader users on UNIX can find the appropriate update here:
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a