Email address | private |
---|---|
Website | malvuln.com |
First Active | 2021-01-04 |
Last Active | 2021-02-26 |
Backdoor.Win32.Onalf malware has a backdoor running on TCP/2020 that does not require any authentication.
8413023933171cccf3cf8f346fc00dc6
Backdoor.Win32.Zxman malware has a backdoor running on TCP/2048 that does not require any authentication.
e59d2f563516bdcc00be9a6bd0fe9c3e
Backdoor.Win32.Whisper.b malware suffers from a remote stack corruption vulnerability.
4bd5113d73f55e63e170f6485cf89911
Backdoor.Win32.Whirlpool.10 malware suffers from a remote stack buffer overflow vulnerability.
c3d3b273680f8c02a4ca076c42f19836
Backdoor.Win32.Zombam.geq malware suffers from a remote buffer overflow vulnerability.
0e05a63a804977c46a87862508e94e15
Backdoor.Win32.NetBull.11.a malware suffers from a remote buffer overflow vulnerability.
c7e98adc9680b9ba74fa492156661473
Email-Worm.Win32.Agent.gi malware suffers from a remote stack buffer overflow vulnerability.
4cd0dcc841eb9464b95eea555c050501
Constructor.Win32.SMWG.c malware suffers from an insecure permissions vulnerability.
e122f5165b2281d0ce329bb9e0e184e9
Constructor.Win32.SMWG.a suffers from an insecure permissions vulnerability.
5fad881b745d1314ea203b37f2d103fc
Newfuture Trojan V.1.0 BETA 1 malware suffers from an insecure permissions vulnerability.
e267f7d69761b3693f04b9c14690bfa6
Backdoor.Win32.Mnets malware suffers from a remote stack buffer overflow vulnerability.
5d8aad9a560a7ece945d0fe95285e29d
Backdoor.Win32.Whgrx malware suffers from a remote host header stack buffer overflow vulnerability.
029e2786ef07f0a4088dd28099d0c0ba
Backdoor.Win32.Latinus.b malware suffers from a remote buffer overflow vulnerability.
b661fe827bf583c7569949c8d8a2da77
MaskPE by yzkzero is a tool for implanting backdoors in existing PE files. The backdoor tool does not properly check the files it loads and falls victim to a file based local buffer overflow.
72efcb72d724bc0daa49e648ba265a77
MaskPE by yzkzero is a tool for implanting backdoors in existing PE files. The backdoor tool does not properly check the files it loads and falls victim to a file based local buffer overflow.
0c9d7516bb5236825540d15407ea5e4c
Backdoor.Win32.Ncx.bt malware suffers from a remote stack buffer overflow vulnerability.
f5bce01787682bf3fb97234b39073682
Backdoor.Win32.Ketch.a suffers from a remote stack buffer overflow vulnerability.
2b2dc699e19a395de36fa5e2527ce2c4
Backdoor.Win32.Ketch.i malware suffers from a remote stack buffer overflow vulnerability.
db079ee4491b3f466c3e96c16dc1b444
Backdoor.Win32.Kurbadur.a malware suffers from a remote stack buffer overflow vulnerability.
d7e25699281dd539a431c9cfb0f980e8
Backdoor.Win32.Zombam.a malware suffers from a remote stack buffer overflow vulnerability.
1d4c04985317d4a19cc3d4abc3ead48f
Backdoor.Win32.Levelone.b malware suffers from a stack buffer overflow vulnerability.
483f356a3fa7919f6cd02a9cbf70cec3
Backdoor.Win32.Levelone.a malware suffers from a remote stack buffer overflow vulnerability.
42c19cf7188e3ac194716a5bf3da43a2
Backdoor.Win32.Ketch.b malware suffers from a remote stack buffer overflow vulnerability.
38df86e71109ce6870225d853970d548
Backdoor.Win32.NinjaSpy.c suffers from a remote stack buffer overflow vulnerability. The specimen drops a DLL named "cmd.dll" under C:\WINDOWS\ which listens on both TCP ports 2003 and 2004. By sending consecutive HTTP PUT requests with large payloads of characters, we can cause buffer overflow.
8f5ab251df42addd482e25bdea7aa8d8
Backdoor.Win32.Xtreme.yvp malware suffers from an insecure permissions vulnerability that can allow for privilege escalation.
741ddec159e373a1d7451f1e291cafb5