Trojan-Spy.Win32.SpyEyes.auwl malware suffers from an insecure permissions vulnerability.
ff481f4af41b6f43df7c8e3017cb4e81
Trojan-Spy.Win32.SpyEyes.auqj malware suffers from an insecure permissions vulnerability.
b27bcb078acadef5d9673ba6f9baee0f
Trojan.Win32.Gentee.h malware suffers from an insecure permissions vulnerability.
03d48addfc66aea7b577988827baf563
Trojan.Win32.Gentee.b malware suffers from an insecure permissions vulnerability.
98a3a625db4ee07d86d10013047158cf
Backdoor.Win32.RemoteManipulator.brr malware suffers from an insecure permissions vulnerability.
03c76122ff5a3473d5647fb3442e64c7
Backdoor.Win32.NetBull.11.b malware suffers from a remote buffer overflow vulnerability.
5d83f56bb4aab89af9950a4cd903fc28
Backdoor.Win32.Xyligan.blp malware suffers from an insecure permissions vulnerability.
251cd2e86c93a5a18bb4cdcd0fb053d2
Backdoor.Win32.Celine malware suffers from a missing authentication vulnerability.
366ed9d9d52b826d2853d75866588948
Backdoor.Win32.Buterat.cxq malware suffers from an insecure permissions vulnerability.
8bd125c777e04e3f2d54ae1f5473cfa3
Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.
7988932a5e3930fa6035b8f8b584f0d8
Backdoor.Win32.Anaptix.bd malware suffers from an insecure permissions vulnerability.
a29ccbb8898e5925597a8efa77f5bf4a
Packed.Win32.Katusha.o suffers from an insecure permissions vulnerability.
9790aabb0b7e4fca980f0e90fbe84713
Backdoor.Win32.MiniBlackLash malware suffers from a denial of service vulnerability.
c1db00d324b6ac51dca2d3d86731ecb6
Backdoor.Win32.Mhtserv.b malware suffers from a missing authentication vulnerability.
85e523d3eb22be0386798576ad173264
Backdoor.Win32.Zhangpo malware suffers from a denial of service vulnerability.
b8337573f3d58f7b3a81f97267576f7d
Backdoor.Win32.Zetronic malware suffers from a denial of service vulnerability.
45dea762870995e89b0da07f0f04cfd9
Constructor.Win32.SpyNet.a malware suffers from a remote password leak vulnerability.
bc2fa63c88e9e471738e8d2dbf873a26
Backdoor.Win32.Wollf.14 malware has a backdoor on TCP/7614 that does not require any authentication.
67751ad6a5636ad444a23dacf27f3961
Backdoor.Win32.DarkKomet.apbb malware suffers from an insecure permissions vulnerability.
3c1100753a17af79e9be0e2d053ca50e
Backdoor.Win32.Wollf.c malware has a backdoor with a hardcoded password.
a71e856823aa52f52d525f719f3a9af2
Backdoor.Win32.DarkKomet.bhfh malware suffers from an insecure permissions vulnerability.
19db0f71751a30f61bad2714f3347026
Backdoor.Win32.Wollf.16 malware creates and runs a service named contime.exe with SYSTEM integrity and listens on port 5240. The malware uses a weak hardcoded password of 12345678 which can easily be viewed in the binary using strings utility.
6641101a924d25a5237609e14628fd2f
Trojan.Win32.Xocry.ff malware suffers from an insecure permissions vulnerability.
932a00f5f7015f7fbe93a8d4673539e6
Backdoor.Win32.Jokerdoor malware suffers from an insecure permissions vulnerability.
97d09d3f08ee1102c8538c08bc78ea63
Backdoor.Win32.Noknok.50 malware suffers from an insecure permissions vulnerability.
9233b2cdf687f9dc14f44beebe52c0d0