Search Results

Showing results for fg-vd-09-013-cisco

Virus
W32/SPNR.09H013!tr is classified as a Trojan. Trojan has the capabilities to remote access connection handling, perform Denial of Service (DoS) or Distributed DoS (DDoS), capture keyboard inputs, delete...
  • Added: Aug 24, 2013
Virus
Perl/Cisco.514!exploit is classified as malware using a known exploit. Exploit employs by malware to gain access to a system through a known vulnerabilities. Most commonly a computer security hole. The...
  • Added: Jul 27, 2007
Virus
W32/SMSFraud.09FG11!tr is classified as a Trojan. Trojan has the capabilities to remote access connection handling, perform Denial of Service (DoS) or Distributed DoS (DDoS), capture keyboard inputs,...
  • Added: Jul 30, 2011
Virus
W32/SPNR.09FG11!tr is classified as a Trojan. Trojan has the capabilities to remote access connection handling, perform Denial of Service (DoS) or Distributed DoS (DDoS), capture keyboard inputs, delete...
  • Added: Jun 18, 2011
Virus
Perl/Cisco.514FLOOD!exploit is classified as malware using a known exploit. Exploit employs by malware to gain access to a system through a known vulnerabilities. Most commonly a computer security hole....
  • Added: Aug 09, 2007
Virus
W32/CiscoKill!exploit is classified as malware using a known exploit. Exploit employs by malware to gain access to a system through a known vulnerabilities. Most commonly a computer security hole. The...
  • Added: Dec 01, 2009
Virus
  • Added: Apr 25, 2006
Virus
Perl/CiscoFlood.BN!exploit is classified as malware using a known exploit. Exploit employs by malware to gain access to a system through a known vulnerabilities. Most commonly a computer security hole....
  • Added: Jun 01, 2008
Virus
Perl/Cisco_BlackAngels.A!exploit is classified as malware using a known exploit. Exploit employs by malware to gain access to a system through a known vulnerabilities. Most commonly a computer security...
  • Added: Mar 25, 2013
Virus
W32/CiscoIOS.A!exploit is classified as an exploit.An exploit is a malicious program that takes advantage of a software vulnerability that may enable a remote attacker to gain access to the targeted system.The...
  • Added: Oct 17, 2017