Difference between revisions of "Microsoft Windows"
Jump to navigation
Jump to search
m (Text replacement - "{{Target" to "{{Asset") |
m (Text replacement - "TypeOfTarget" to "TypeOfAsset") |
||
Line 1: | Line 1: | ||
{{Asset | {{Asset | ||
| | |TypeOfAsset=Operating system | ||
}} | }} |
Latest revision as of 12:37, 8 August 2015
Type of asset: Operating system
- As target: Admin.HLP, Adrenalin, AlertLock, Alina, Andromeda, AnnLoader, Arcom, Athena, Atrax, Bagle, Bozok, Bredolab, CTB-Locker, Carberp, Casier, Cbeplay.P, Chameleon, Chidol, Citadel, Clampi, Conficker, Coreflood, Crisis, Cythosia, Devdar, Disker, DistTrack, Dorkbot, Duqu, Encriyoko, Expiro, FakeM, Finfisher, Gauss, Gendarmerie, Hamweq, HerpesNet, Hesperbot, Infinity, Kelihos, Koobface, Kuluoz, LogPOS, Lyposit, Madi, Makadocs, Mariposa, NetWeird, Petya, PickPocket... further results
- As origin: None
- As target: None
- As origin: None
- As target: None
- As origin: None
- As target: None
- As origin: None
Exploits kits targetting or originating from Microsoft Windows
- None
- None
Vulnerabilities whose target is Microsoft Windows
- CVE-2003-0533, CVE-2006-0003, CVE-2011-3402, CVE-2013-3918, CVE-2013-7331, CVE-2014-6332, CVE-2015-1671, CVE-2015-1701
- As a victim: None
- As a partner: None