Skip to content
SecPod  – Documentation
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO
  • Toggle website search
Search this website
Menu Close
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO
  • Toggle website search
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO

Saner Platform

  • Saner Platform Release Notes
    • Saner Platform Integration Release: ServiceNow Integration Introduced, Freshservice Enhanced
    • Release Notes Saner 6.4.1
    • Release Notes SanerNow 6.4
    • Release Notes SanerNow 6.3.1
    • Release Notes SanerNow 6.3
    • Release Notes SanerNow 6.2.1
    • Release Notes SanerNow 6.2.0.3
    • Release Notes SanerNow 6.2.0.1
    • Release Notes SanerNow 6.2
    • Release Notes SanerNow 6.1.1
    • Release Notes SanerNow 6.1
    • Release Notes SanerNow 6.0
    • Release Notes SanerNow 5.3.1
    • Release Notes SanerNow 5.3
    • Release Notes SanerNow 5.2
    • Release Notes SanerNow 5.1
    • Release Notes SanerNow 5.0
    • Release Notes SanerNow 4.8.0.0
    • Release Notes SanerNow 4.7.0.0
    • Release Notes SanerNow 4.6.0.0
    • Release Notes SanerNow 4.5.0.0
    • Release Notes SanerNow 4.4.0.0
    • Release Notes SanerNow 4.3.0.0
    • Release Notes SanerNow 4.2.2.1
    • Release Notes SanerNow 4.2.2.0
    • Release Notes SanerNow 4.2.1.0
    • Release Notes SanerNow 4.2.0.0
    • Release Notes SanerNow 4.1.1.0
    • Release Notes SanerNow 4.0.0.5
  • Saner Platform Guide
    • Saner Platform and ServiceNow Integration Guide
    • Saner Platform and Freshservice Integration Guide
    • Saner Platform Function Guides
    • Saner Device Management User Guide
  • FAQs
    • Saner CVEM Technical FAQs
  • How Tos
    • General
      • How to increase the subscription count for an Account in Saner CVEM
      • How to increment license count for an Organization in Saner CVEM
      • How to provision Saner tools for an Organization
      • How to change subscription type in Saner CVEM
      • How to sign-up with Saner CVEM?
      • How to create a new account in Saner CVEM?
      • How to create a new user in Saner CVEM?
      • How to enable SSO authentication policy in Saner CVEM?
      • How to set alerts in SanerNow?
      • How to view, download and filter the audit logs?
      • How to designate Saner Agent to perform network scan?
      • How to Co-Brand with your logo?
      • How to fetch the details of the mandatory fields from the Okta account?
      • How to create MFA policy for Okta?
      • How to fetch the details of the mandatory fields from the PingID account?
      • How to create MFA policy for PingID?
      • How to fetch the details of the mandatory fields from the PingOne account?
      • How to create MFA policy for PingOne?
      • How to download and install Saner Agent in Mac?
      • How to download and install Saner agent in Linux?
      • How to download and install the Saner agent in Windows?
      • How to update the expiry date of an existing subscription?
      • How to manage users and their preferences using role-based access?
      • How to uninstall SanerNow Agent using SanerNow Offline deployer tool.
      • How to onboard a new organization?
      • How to deploy SanerNow Agent using SanerNow Offline deployer tool.
      • How to install a Saner agent through the command line?
      • How to uninstall the Saner agent through command line?
    • Saner Reports
      • How to configure mail settings to email Report PDF?
      • How to create a custom report in SanerNow?
      • How to schedule for the report back up?
    • Saner Device Management
      • How to create custom groups in Saner CVEM
    • Saner Mail Settings
      • How to create new mail settings in Saner?
      • How to use OAuth-enabled authentication in Saner mail settings
      • How to create OAuth Client ID and Client Secret for Gmail
      • How to create OAuth Client ID and Client Secret for Microsoft 365.
  • Supported OSs and Platforms
    • Operating Systems and Platforms Supported
    • Supported Third-party Applications for Patching

Saner Cloud

  • Before You Begin
    • Glossary of Terms
    • Read me First
  • Get Started
    • Saner Cloud Deployment Guides
      • Azure Onboarding
      • Troubleshooting
      • Get Started with Saner CNAPP AWS Cloud Deployment V1.0
      • Onboarding with AWS Credentials(Least Recommended Method)
      • Onboarding with AWS Role(Manual)
      • Onboarding with AWS Role CloudFormation (Automatic): Recommended
    • Roles and Permissions
      • Roles and Permissions for AWS Remediation Access
      • Roles and Permissions for Azure Onboarding, Detection, and Remediation
  • Learn About
    • Cost and Usage
    • Excessive Permission Categories Evaluated Across Different Cloud Services
    • Publicly Accessible Resources
    • Patch Aging and Patch Impact
    • SecPod Default Benchmarks
    • Watchlists
    • Cloud Workload Protection Platform(CWPP)
    • Overview of Report Views in Saner Cloud
    • Whitelisting Resources
    • Saner Plasma AI Assistant for Seamless User Interaction
    • Critical Events to Monitor in AWS
    • High-Privilege Actions in Critical Activity Logs for AWS
    • Audit Logs in Saner Cloud
    • Excessive Permissions
    • Alerts in SanerCloud
  • User Guides
    • Cloud Security Remediation Management(CSRM) User Guide
    • Cloud Infrastructure Entitlement Management(CIEM) User Guide
    • Cloud Security Posture Anomaly(CSPA) User Guide
    • Cloud Security Asset Exposure(CSAE) User Guide
    • Cloud Security Posture Management(CSPM) User Guide
  • Tell Me How
    • How to Configure Automation Rule to Remediate Misconfigurations?
    • How to Manage Report Views at Organization-level in Saner Cloud?
    • How to Get a Cohesive View from Saner Cloud Unified Dashboard?
    • How to Use Tags to Quickly Filter Resources?
    • How to Troubleshoot Issues with Audit Logs?
    • How to Manage Groups and Tags in Saner Cloud?
    • How to Manage Report Views for a User Account in Saner Cloud?
    • How to Troubleshoot or Analyze with Critical Activity Logs?
    • How to Setup Alerts Across SanerCloud Tools?
    • How to Take Action on Alert Notifications from SanerCloud?
    • CSPM
      • How to Setup Benchmarks in Saner CSPM?
      • How to Use Quick Evaluation Benchmarks?
      • How to Detect Patterns over a Period with Resource Trends?
      • How to Assess System Compliance and Security Posture?
    • CSPA
      • How to Initiate Patch Remediation from CSPA Dashboard?
      • How to Quickly Identify the Detected and Remediated Anomalies for an Account?
      • How to Prioritize Remediation or Fixes based on Confidence Levels?
      • How to Examine the Overall Anomaly Information for Specific Rules or Checks?
      • How to Search and Retrieve Anomaly Data?
      • How to Whitelist Rules or Resources in Cloud Security Scans?
    • CIEM
      • How to See the Active Version for an IAM Policy?
      • How to Troubleshoot or Analyze with Critical Activity Logs?
      • How to View by Type and Usage for any Identity in CIEM?
      • How to Get Visibility into Cloud Entitlements?
      • How to Use Evidence to Address Policies with Excessive Permission?
      • How to Know the Excessive Permissions on a Specific Service?
      • How to Visually See the Relationship between Identity, Entitlement, Policy, or Permission?
      • How to Determine if a Policy has Excessive Permission?
      • How to Initiate Patch Remediation from CIEM Dashboard?
    • CSRM
      • How to Configure Automation Rule to Remediate Misconfigurations?
      • How to Create a Patching Task for Items Currently in “Approval Pending” State?
      • How to Evaluate Remediation Effort with Patching Impact Chart?
      • How to Prioritize and Address Older or High-Risk Anomalies with Patch Aging?
      • How to Monitor the Overall Status of the Remediation Job?
      • How do I Get to Know the Regions Impacted by a Specific Rule?
      • How to View the Severity of a Missing Patch Affected by a Rule?
      • How to Address Missing Patches Via Remediation Tasks?
      • How to Quickly Access the Necessary Tool for Remediation and Begin Patching Tasks?
    • CSAE
      • How to Setup Watchlist Configuration for a Resource?
      • How to Identify Outdated Resources for Cleanup?
      • How does Resource Categorization Work in Saner CSAE?
      • How to Identify Resources Exposed to External Network?
      • How to Understand the Resource Footprint Globally Across Various Regions?
      • How to Make Informed Decisions on Your Expenditure based on Resource Usage Graph?
  • Frequently Asked Questions
    • Saner Cloud Technical FAQs
  • Saner Cloud Release Notes
    • Saner Cloud – V.1.1 Release Notes
    • Saner Cloud – V.1.0 Release Notes
  • Security Intelligence for Saner Cloud
    • Benchmark Compliance Rules in AWS and Azure
      • Azure
        • NIST 800-53 Revision Rules in Azure
          • NIST 800-53 Revision 5 Rules in Azure: An Overview
          • Understand NIST 800-53 Revision 5 Rules in Azure
          • Understand NIST 800-53 Revision 5 Global Rules in Azure
          • Understand NIST 800-53 Revision 5 Regional Rules in Azure
        • SecPod Rules in Azure
          • SecPod Default Rules in Azure: An Overview
          • Understand SecPod Global Rules in Azure
          • Understand SecPod Regional Rules in Azure
          • Understand SecPod Default Rules in Azure
        • HIPAA HITRUST Rules in Azure
          • HIPAA HITRUST Rules in Azure: An Overview
          • Understand HIPAA HITRUST 14.7.0 Rules in Azure
          • Understand HIPAA HITRUST 14.7.0 Global Rules in Azure
          • Understand HIPAA HITRUST 14.7.0 Regional Rules in Azure
        • PCI DSS Rules in Azure
          • PCI DSS 3.2.1 Rules in Azure: An Overview
          • Understand PCI DSS 4.0 Rules in Azure
          • Understand PCI DSS 4.0 Global Rules in Azure
          • Understand PCI DSS 4.0 Regional Rules in Azure
        • SOC 2 Rules in Azure
          • SOC 2 Rules in Azure: An Overview
          • Understand SOC2 Rules in Azure
          • Understand SOC2 Global Rules in Azure
          • Understand SOC2 Regional Rules in Azure
        • CIS Rules in Azure
          • CIS Rules in Azure: An Overview
          • Understand CIS 1.2.0 Rules in Azure
          • Understand CIS 2.1.0 Rules in Azure
          • Understand CIS 1.1.0 Benchmark Compliance Rules in Azure
          • Understand CIS 3.0.0 Benchmark Compliance Rules in Azure
          • Understand CIS 1.2.0 Global Benchmark Compliance Rules in Azure
          • Understand CIS 2.1.0 Global Benchmark Compliance Rules in Azure
          • Understand CIS 3.0.0 Global Benchmark Compliance Rules in Azure
          • Understand CIS 2.1.0 Regional Benchmark Compliance Rules in Azure
          • Understand CIS 3.0.0 Regional Benchmark Compliance Rules in Azure
      • AWS
        • SecPod Rules in AWS
          • SecPod Default Rules in AWS: An Overview
          • Understand SecPod Default Rules in AWS
          • Understand SecPod Global Rules in AWS
          • Understand SecPod Regional Rules in AWS
        • PCI DSS 3.2.1 Rules in AWS
          • PCI DSS 3.2.1 Rules in AWS: An Overview
          • Understand PCI DSS 3.2.1 Rules in AWS
          • Understand PCI DSS 3.2.1 Global Rules in AWS
          • Understand PCI DSS 3.2. 1 Regional in AWS
        • CIS Rules in AWS
          • CIS Rules in AWS: An Overview
          • Understand CIS Rules in AWS
          • Understand CIS 3.0.0 Rules in AWS
          • Understand CIS 4.0.1 Rules in AWS
          • Understand CIS 4.0.0 Rules in AWS
          • Understand CIS 3.0.0 Global Rules in AWS
          • Understand CIS 4.0.0 Global Rules in AWS
          • Understand CIS 3.0.0 Regional Rules in AWS
          • Understand CIS 4.0.0 Regional Rules in AWS
        • HIPAA HITRUST Rules in AWS
          • HIPAA HITRUST Rules in AWS: An Overview
          • Understand HIPAA HITRUST Rules in AWS
          • Understand HIPAA HITRUST Global Rules in AWS
          • Understand HIPAA HITRRUST Regional Rules in AWS
        • NIST 800-53 Revision 5 Rules in AWS
          • NIST 800-53 Revision 5 Rules in AWS: An Overview
          • Understand NIST 800-53 Revision 5 Rules in AWS
          • Understand NIST 800-53 Revision 5 Global Rules in AWS
          • Understand NIST 800-53 Revision 5 Regional Rules in AWS
        • SOC 2 Rules in AWS
          • SOC 2 Rules in AWS: An Overview
          • Understand SOC 2 Rules in AWS
          • Understand SOC 2 Global Rules in AWS
          • Understand SOC 2 Regional Rules in AWS
    • Posture Anomaly Checks in AWS and Azure
      • Implementing Posture Anomaly Checks in AWS
      • Implementing Posture Anomaly Checks in Azure
    • Infrastructure Entitlement Checks in AWS and Azure
      • Implementing Infrastructure Entitlement Checks in Azure
      • Implementing Infrastructure Entitlement Checks in AWS

Saner CVEM

  • Saner CVEM Release Notes
    • Saner Platform Integration Release: ServiceNow Integration Introduced, Freshservice Enhanced
    • Release Notes Saner 6.4.1
    • Release Notes SanerNow 6.4
    • Release Notes SanerNow 6.3.1
    • Release Notes SanerNow 6.3
    • Release Notes SanerNow 6.2.1
    • Release Notes SanerNow 6.2.0.3
    • Release Notes SanerNow 6.2.0.1
    • Release Notes SanerNow 6.2
    • Release Notes SanerNow 6.1.1
    • Release Notes SanerNow 6.1
    • SanerNow Risk Prioritization Launch
    • Release Notes SanerNow 6.0
    • Release Notes SanerNow 5.3.1
    • Release Notes SanerNow 5.3
    • Release Notes SanerNow 5.2
    • Release Notes SanerNow 5.1
    • Release Notes SanerNow 5.0
    • Release Notes SanerNow 4.8.0.0
    • Release Notes SanerNow 4.7.0.0
    • Release Notes SanerNow 4.6.0.0
    • Release Notes SanerNow 4.5.0.0
    • Release Notes SanerNow 4.4.0.0
    • Release Notes SanerNow 4.3.0.0
    • Release Notes SanerNow 4.2.2.1
    • Release Notes SanerNow 4.2.2.0
    • Release Notes SanerNow 4.2.1.0
    • Release Notes SanerNow 4.2.0.0
    • Release Notes SanerNow 4.1.1.0
    • Release Notes SanerNow 4.0.0.5
  • Saner CVEM Guide
    • What’s New in Saner CVEM?
    • Getting Started with Saner CVEM
    • Pre-requisites for Saner CVEM Deployment
    • How does Saner CVEM’s deployment architecture work?
  • Saner CVEM Products
    • Overview of Saner Continuous Vulnerability and Exposure Management
    • Saner CVEM Unified Dashboard User Guide
    • Saner CVEM Asset Exposure User Guide
    • Saner CVEM Continuous Posture Anomaly Management User Guide
    • Data Points IT teams can Fetch from Saner CPAM
    • Posture Anomaly Computation Rules
    • Saner CVEM Vulnerability Management User Guide
    • Saner CVEM Compliance Management User Guide
    • Saner CVEM Risk Prioritization User Guide
    • Saner CVEM Patch Management User Guide
    • Saner CVEM Endpoint Management User Guide
    • Saner CVEM Remote Access User Guide
    • Saner CVEM Network Scanner User Guide
    • Saner CVEM Cyber Hygiene Score User Guide
  • How Tos
    • Saner AE
      • How to blacklist and whitelist applications in Saner AE?
      • How to manage asset licenses using Saner AE?
      • How to run an asset scan using Saner AE?
    • Saner CPAM
      • How to create new response in PA tool?
      • How to build your own detection and response in PA tool?
      • How to whitelist an entire PA ID?
      • How to configure Posture Anomaly tool for custom detection?
      • How to fix Anomalies from PA dashboard?
      • How to fix anomalies detected in your account from All Anomalies Page?
      • How to fix anomalies from PA Summary page?
      • How to delete PA scan preferences?
      • How to schedule PA Scans on Daily, Weekly, and Monthly basis?
      • How to launch Posture Anomaly scans?
    • Saner CM
      • How to run a compliance scan?
      • How to custom create a security policy?
      • How to align with PCI security compliance management?
      • How to align with NIST 800-171 security compliance management?
      • How to align with NIST 800-53 security compliance management?
      • How to align with HIPAA security compliance management using Saner CM?
    • Saner VM
      • How to automate and schedule vulnerability scans?
      • How to exclude vulnerabilities in Saner VM tool
      • How to manage excluded vulnerabilities in Saner VM?
      • How to remediate vulnerabilities from vulnerability management dashboard?
    • Saner PM
      • How to fix firmware in Saner?
      • How to exclude patches in Saner PM?
      • How to manage excluded patches in Saner PM?
      • How to automate patch management in Saner PM?
      • How to roll back patches in Saner PM?
      • How to specify Service Level Agreement (SLA) using Remediation SLA in Saner PM?
      • How to apply missing patches in Saner PM?
      • How to apply the most critical patches in Saner PM?
      • How to perform custom remediation for applications that require paid patches using Saner PM
      • How to check the status of patching activity?
    • Saner EM
      • How to collect all security events from Windows Events Log?
      • How to check password policy set in Windows systems?
      • How to check status of DEP in Windows systems?
      • How to check faulty Anti-Virus (AV) status in Windows systems?
      • How to check for Anti-Virus (AV) status in Windows systems?
      • How to check account lockout policy on Windows systems?
      • How to check if Bit-locker protection is OFF in Windows systems?
      • How to list all inactive users on Windows systems?
      • How to list all guest accounts in Windows systems?
      • How to list all Administrator accounts on Windows systems?
      • How to list last-logon details of users on Windows systems?
      • How to identify all users in Windows systems?
      • How to collect all services that are currently running in Windows systems?
      • How to list all Groups in Windows systems?
      • How to collect all keyboard and pointing devices connected to Windows systems?
      • How to collect all storage devices connected to Windows systems?
      • How to investigate total RAM or CPU threshold (greater than or equal to 80%) in Windows systems?
      • How to collect operating systems information in Windows?
      • How to investigate disks running out of space (<100 MB) in Windows systems?
      • How to collect and investigate disk information on Windows systems?
      • How to collect all installed patches in Windows systems?
      • How to collect all software patches that are hidden in the Windows Update server?
      • How to check the status of Windows Update Server (WSUS/SCCM)?
      • How to collect BIOS information such as serial number, version, manufacturer in Windows systems?
      • How to collect all the important missing patches in Windows systems?
      • How to check wireless security in Linux systems?
      • How to collect mounted disk information on Linux systems?
      • How to check wireless signal quality in Linux systems?
      • How to check all firewall policies on Linux systems?
      • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Linux systems?
      • How to collect DNS information on Linux systems?
      • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing in Linux?
      • How to check wireless signal quality in Windows systems?
      • How to check wireless security in Windows systems?
      • How to collect all open ports in Windows systems?
      • How to collect all network interfaces in Windows systems?
      • How to investigate DNS cache on Windows systems?
      • How to check all firewall policies on Windows systems?
      • How to collect DNS information on Windows systems?
      • How to collect all the applications with an unknown publisher in Linux systems?
      • How to perform system tuning?
      • How to collect all software licenses in Windows systems?
      • How to identify potentially unwanted programs such as torrent downloaders or unnecessary toolbars running on Windows systems?
      • How to collect a list of applications that are started when you boot your computer?
      • How to collect all the applications with an unknown publisher in Windows systems?
      • How to collect all software licenses in Mac systems?
      • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing Windows?
      • How to collect all families of operating systems such as Windows, Unix, and macOS?
      • How to collect environment variables set in all operating systems?
      • How to collect all the applications with an unknown publisher in Mac systems?
      • How to delete and quarantine a file?
      • How to start and stop the processes in Saner?
      • How to block blacklisted applications in Saner?
      • How to enable/disable devices in Saner
      • How to manually import devices into Saner?
      • How to deploy software in Saner EM?
      • How to enable and disable firewall settings in Saner AE?
      • How to collect all shared resources on Windows systems?
      • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Windows systems?
      • How to connect to a client machine graphically using Saner Remote Access
  • FAQs
    • Saner CVEM Technical FAQs

Security Intelligence

  • Network Scanner Product Support Matrix
  • Privilege levels for authenticated scans using Saner Network Scanner
  • Overview of Security Content and Intelligence
  • Security Content Statistics
  • Application and OS Remediation Coverage
  • Compliance Benchmark Coverage
  • List of Vulnerability to Exploit/Malware Mapping covered in Saner
  • OVAL Definitions Family-wise Distribution
  • OVAL Definitions Class-wise Distribution
  • OVAL Definitions Platform Coverage
View Categories
  • Home
  • Docs
  • Security Intelligence
  • List of Vulnerability to Exploit/Malware Mapping covered in Saner

List of Vulnerability to Exploit/Malware Mapping covered in Saner

Print Friendly, PDF & Email

Last Updated: June 17, 2025

Sl.NOMalware Vulnerability Enumeration
11byte Products Active Exploits
221Nails
35ss5c Ransomware
48220 Group
5APT-C-09
6APT-C-27
7APT-C-60
8APT12
9APT16
10APT30
11AZORult Trojan
12Abcbot Botnet
13Achilles
14Adobe Acrobat Reader Active Exploits
15Adobe ColdFusion Active Exploits
16AdvisorsBot Malware
17Adwind RAT
18Agent Tesla Trojan
19Akira Ransomware Group
20Amnesia33
21Andariel Group
22AndoryuBot Botnet
23AndroxGh0st Malware
24Angler Exploit Kit
25Antlion APT
26Aoqin Dragon
27Apache Flink Active Exploits
28Apache HTTP Server Active Exploits
29Apache HugeGraph Server Active Exploits
30Apache Log4j Active Exploits
31Apache OfBiz Active Exploits
32Apache Solr Active Exploits
33Apache Spark Active Exploits
34Apache Struts Active Exploits
35Apache Superset Active Exploits
36Apache Tomcat Active Exploits
37Apple MacOS Active Exploits
38Aquatic Panda APT
39Archie Exploit Kit
40Asnarok Trojan
41Asruex Trojan
42AssocAID Exploit Kit
43Astrum Exploit Kit
44Atlassian Products Active Exploits
45Atom Silo Group
46Aurora Panda APT17
47AveMaria RAT
48AvosLocker Ransomware
49Axiom Group
50B1txor20 Backdoor
51BIG IP Active Exploits
52BITTER APT
53BPFDoor
54BRONZE BUTLER APT
55BUSHWALK Malware
56BabyShark Malware
57BackConfig Trojan
58BackdoorDiplomacy APT
59BadAlloc
60Baldr Trojan
61BalkanDoor Backdoor
62Baron Samedit
63BazaLoader
64Beapy Cryptominer
65Bespoke Malware
66BestPack Exploit Kit
67BianLian Ransomware Group
68BigDebIT
69BillGates Botnet
70Bl00dy Ransomware Group
71Black Basta Group
72Black Kingdom Ransomware
73BlackByte Ransomware
74BlackCat Ransomware
75BlackHole Exploit Kit
76BlackLotus Malware
77BlackOasis APT
78BlackSquid Malware
79BlackTech APT
80Bleeding-Life Exploit Kit
81BleedingTooth
82Blue Mockingbird Group
83BlueKeep
84BlueNoroff APT
85BlueSky Ransomware
86BoldMove Backdoor
87BootHole
88BotenaGo Botnet
89Bottle Exploit Kit
90BrickerBot Botnet
91Buhtrap Group
92ByeBear
93CDPwn
94CK Exploit Kit
95COVID-19 Campaign
96CableHaunt
97CacheOut
98Cacti Active Exploits
99Calypso APT
100Capesand Exploit Kit
101Capsaicin Botnet
102Carbanak APT
103Cerber Ransomware
104Chainshot Malware
105Check Point Security Gateways Active Exploits
106Chthonic Banking Trojan
107Cisco ASA Active Exploit CVE-2018-0296
108Cisco ASA Active Exploit CVE-2020-3580
109Cisco ASA Active Exploits
110Cisco AnyConnect Active Exploits
111Cisco ESA Active Exploits
112Cisco IOS XR XE Active Exploits
113Cisco IP Phones Active Exploits
114Cisco SD WAN vManage Active Exploit
115Cisco SMA Active Exploits
116Cisco SPA112 2 Port Phone Adapter Active Exploit
117Cisco Secure Web Appliance Active Exploits
118Cisco Small Business RV Routers Active Exploits
119Citrix ADC Active Exploits
120Citrix ADC Gateway SDWAN WAN-OP Active Exploits
121Citrix Content Collaboration Active Exploits
122Citrix Gateway Active Exploits
123ClOp Ransomware
124Cleaver APT
125Cloud Atlas APT
126Cloud9 Botnet
127CloudMensis Spyware
128Cobalt APT
129Codoso APT19
130CommentPanda APT1
131Condi Malware
132Confucius APT
133Contec SolarView Series Active Exploits
134Cool Exploit Kit
135CopyKittens
136CrimeBoss Exploit Kit
137CrimePack Exploit Kit
138CritXPack Exploit Kit
139CrushFTP Active Exploits
140Cuba Ransomware
141Curveball
142Cyber Partisans Group
143D-Link Devices Active Exploits
144DEV-0322 APT
145Dacls RAT
146Dark.IoT Botnet
147DarkGate Malware
148DarkHydrus APT
149DarkIRC Botnet
150DarkMe Malware
151DarkRadiation Ransomware
152Darkhotel APT
153DazzleSpy Spyware
154DearCry Ransomware
155Deep Panda APT
156DevilsTongue Malware
157Dirty Pipe
158Disdain Exploit Kit
159Django Active Exploits
160Dofloo Trojan
161Donot Team APT-C-35
162DoppelPaymer Ransomware
163DotkaChef Exploit Kit
164Double Dragon APT41
165DoublePulsar BackDoor
166DragonOK APT
167Dragonfly APT
168DreamBus Malware
169Dridex Malware
170Drown
171Drupal Active Exploits
172Dukes-APT29
173Dust Storm APT
174ESXiArgs Ransomware
175Ebury Botnet
176Echobot Botnet
177Effluence Backdoor
178Elderwood Group
179Eleonore Exploit Kit
180Elephant Beetle
181Elfin APT33
182Elise Malware
183Ember-Bear Group
184Emissary Panda APT
185Emotet Trojan
186Empire Pack Exploit Kit
187Equation APT
188EternalBlue
189EternalRed
190EvilPost APT
191EwDoor Botnet
192ExileRat Malware
193Exim Active Exploits
194Exotic Lily Group
195F5 BIG-IP Active Exploits
196FIN11 APT
197FIN6 APT
198FIN7 APT
199FIN8 APT
200FabriXss
201Fallout
202Fallout Exploit Kit
203FatPipe Inc Active Exploits
204Fbot Botnet
205Ficora Botnet
206Fiesta Exploit Kit
207FileZen Active Exploits
208FinSpy
209Firefox Active Exploits
210FiveHands Ransomware
211FlashPack Exploit Kit
212Flimkit Exploit Kit
213Fodcha Botnet
214Follina
215Formbook Malware
216Fortinet Products Active Exploits
217Fox Kitten Campaign
218Fragus Exploit Kit
219Frankenstein Campaign
220FreakOut Malware
221FruityArmor APT
222FudModule Rootkit
223GOLD SOUTHFIELD Group
224Gafgtyt tor Botnet
225Gafgyt Botnet
226Gamaredon Group
227GambleForce Group
228GandCrab Ransomware
229GeoServer Active Exploits
230Gh0stRAT Trojan
231GhostMiner Malware
232Ghostcat
233GitLab Active Exploits
234Gitpaste-12 Malware
235Glazunov Exploit Kit
236Glueball
237Glupteba Malware Dropper
238GoBrut Botnet
239GoMet Backdoor
240Godlua Backdoor
241Godzilla Backdoor
242Godzilla Loader
243Goldoon Botnet
244Gongda Exploit Kit
245Google Chrome Active Exploits
246Gorgon APT
247Grafana Active Exploits
248Grandsoft Exploit Kit
249Graphite Malware
250GreenFlash-Sundown Exploit Kit
251Group5 APT
252GroupA21 APT
253H0lyGh0st Ransomware Group
254H2Miner Botnet
255HTTP2 Rapid Reset Attack
256HabitsRAT
257Hafnium Group
258Hail Cock Botnet
259Hangul Active Exploits
260Hanjuan Exploit Kit
261HawkEye Keylogger
262Hawkball Backdoor
263Headmare Group
264HeartBleed
265Helldown Ransomware Group
266HelloKitty Ransomware
267Hermes Ransomware
268Hezb Malware
269HiMan Exploit Kit
270Hierarchy Exploit Kit
271Higaisa APT
272HinataBot Botnet
273Hive Ransomware
274Hunter Exploit Kit
275IBM WebSphere Active Exploits
276INFRAHALT
277IZ1H9 Malware
278IcePack Exploit Kit
279Illumina UCS Active Exploits
280ImageMagick Active Exploits
281Imminent Monitor RAT
282Impact Exploit Kit
283ImpassionedFramework Exploit Kit
284Incognito Exploit Kit
285InfectedSlurs Botnet
286Infinity Exploit Kit
287Insekt RAT
288IntelBroker Group
289Internet Explorer Active Exploit CVE-2019-0752
290Internet Explorer Active Exploit CVE-2019-1367
291Internet Explorer Active Exploit CVE-2020-0674
292Internet Explorer Active Exploit CVE-2021-33742
293Internet Explorer Active Exploits
294JNEC.a Ransomware
295Jasmin Ransomware
296Jenkins Active Exploits
297JetBrains TeamCity Active Exploits
298JustExploit Exploit Kit
299KPOT Stealer Malware
300KaiXin Exploit Kit
301KashmirBlack Botnet
302Ke3chang APT
303Kerberods Trojan Dropper
304Khonsari Ransomware
305Kibana Active Exploits
306Kimsuky APT
307Knotweed APT
308Konni Group
309Kore Exploit Kit
310Kovter Malware
311Kr00k
312Kronos Banking Trojan
313KrustyLoader Malware
314KuaiGoMiner Trojan
315LOWZERO Backdoor
316Lamberts APT
317LatenBot
318LatentBot
319Lazarus Group
320Leafminer Group
321Lemon Duck Malware
322Leviathan APT
323LightSpy Spyware
324LightsOut Exploit Kit
325Line Runner Malware
326Linux Kernel Active Exploits
327Linux.Ngioweb Botnet
328LiquorBot Botnet
329LoJax Malware
330LockBit Ransomware
331Loda RAT
332LokiBot Malware
333Lone Wolf Group
334Lord Exploit Kit
335Lotus Blossom APT
336Lucifer Malware
337MATA Backdoor
338MBR Locker Ransomware
339Magecart Group
340Magento Active Exploits
341Magnet Goblin Group
342Magniber Ransomware
343Magnitude Exploit Kit
344MalSmoke Group
345Manganese APT
346Manuscrypt Malware
347Marvin Attack
348Maze Ransomware
349Meltdown
350MenuPass APT10
351Merry Christmas Exploit Kit
352MetaPack Exploit Kit
353Microsoft Excel Active Exploits
354Microsoft Exchange Server Active Exploits
355Microsoft Windows Active Exploits
356Migraine
357MikroTik RouterOS Active Exploits
358MinIO Active Exploits
359Mirai Botnet
360Mispadu Banking Trojan
361Mitel MiVoice Connect Active Exploits
362MobileIron Active Exploits
363ModifiedElephant APT
364Molerats APT
365Moobot Botnet
366Mozi Botnet
367Mozilla Thunderbird Active Exploits
368Mpack Exploit Kit
369Msupedge Backdoor
370MuddyWater APT
371Muhstik Botnet
372Mukashi Malware
373Mustang Panda APT
374MysterySnail RAT
375NAME:WRECK
376NEODYMIUM APT
377NOTROBIN Malware
378NRSMiner Cryptominer
379NXNSAttack
380Nagios Server Active Exploits
381Naikon APT
382Nansh0u Campaign
383Nebula Exploit Kit
384Necro Botnet
385Nemty Ransomware
386Neosploit Exploit Kit
387Neptune Exploit Kit
388NetCat Attack
389NetWalker Ransomware
390Neutrino Exploit Kit
391NextCry Ransomware
392NicePack Exploit Kit
393Night Sky Ransomware
394Nimbuspwn
395Niteris Exploit Kit
396Nostromo Active Exploits
397Novidade Exploit Kit
398Nuclear Exploit Kit
399Nucsoft Exploit Kit
400NullHole Exploit Kit
401OceanLotus APT32
402OilRig APT34
403OmniRAT Malware
404OpenSSL Active Exploits
405Operation Earth Kitsune
406Operation EmailThief
407Operation INJ3CTOR3 Campaign
408Operation LagTime IT Campaign
409Operation Muzabi
410Operation Poison Needles APT
411Operation PowerFall Campaign
412Operation SideCopy
413Operation TunnelSnake
414Operation WatchDog
415Operation WizardOpium Campaign
416Oracle Active Exploits
417Oracle Coherence Active Exploit CVE-2020-2555
418Oracle WebLogic Server Active Exploit CVE-2015-4852
419Oracle WebLogic Server Active Exploits
420Orcus Rat Malware
421P2Pinfect Malware
422PHP Active Exploits
423PKPLUG APT
424POLONIUM Group
425Palo Alto Active Exploits
426Persirai Botnet
427Petya Ransomware
428PgMiner Botnet
429Phoenix Exploit Kit
430Phosphorus Group
431Pinchy Spider APT
432Pirpi APT3
433Pitty Tiger APT
434Platinum APT
435Play Ransomware Group
436Plex Media Server Active Exploits
437PlugX Malware
438Plurox Malware
439Poison Ivy
440Poodle
441PopAds Exploit Kit
442Poseidon Group
443PostgreSQL Active Exploits
444PowerPool APT
445Powerdir
446Praying Mantis APT
447Predator the Thief Stealer Malware
448PrestaShop Active Exploits
449Primetek Primefaces Active Exploits
450PrincessLocker Ransomware
451PrintNightmare
452Private Exploit Kit
453Pro-Ocean Malware
454Progress Kemp LoadMaster Active Exploits
455Progress MOVEit Products Active Exploits
456ProjectM APT
457Promethium APT
458Prophet Spider APT
459ProxyShell
460ProxyToken
461Pulse Connect Secure Active Exploits
462Purple Fox Exploit Kit
463Purple Fox Malware
464Putter Panda APT2
465PuzzleMaker Group
466Python Active Exploits
467QNAP Active Exploits
468Qakbot
469Qlocker Ransomware
470Quasar
471RAMBleed
472RECON
473RIDL
474RIG Exploit Kit
475Raccoon Stealer
476Rancor APT
477RansomEXX Group
478Raspberry Robin Malware
479Rawin Exploit Kit
480Reaper APT37
481RedDot Exploit Kit
482RedGoBot
483RedJuliett Campaign
484RedLine Malware
485RedTail Malware
486Redigo Malware
487Redkit Exploit Kit
488RegreSSHion
489Remcos RAT
490Reptile Malware
491Resi Gemini Net Active Exploits
492Retbleed Active Exploits
493Return of the WiZard
494Revenge RAT
495RevengeHotels Campaign
496Ripple20
497RobbinHood Ransomware
498Roboto Botnet
499Rocke Group
500Rockwell Automation Active Exploits
501RokRAT Malware
502RomCom RAT
503Roundcube Webmail Active Exploits
504Rozena Backdoor
505Ryuk Ransomware
506SAP Applications Active Exploits
507SIGRed
508STAC4663 Group
509SUPERNOVA Malware
510SWEED Group
511Safari Active Exploits
512Sakura Exploit Kit
513SamSam Ransomware
514SandCat APT
515Sandbreak
516Sandworm Team APT
517Sandworm Trojan
518Satan Ransomware
519Satori Botnet
520Sava Exploit Kit
521ScamClub Group
522Scarlet Mimic APT
523Sea Turtle APT
524SeaSide Backdoor
525Sednit Exploit Kit
526ServiceNow Active Exploits
527ShadowPad Backdoor
528SharePoint Active Exploit-CVE-2019-0604
529SharePoint Active Exploits
530ShellBot Botnet
531ShellShock
532Shlayer Trojan
533Shrootless
534Siberia Exploit Kit
535Sidewinder APT
536Silence APT
537Sitecore XP Active Exploits
538Slingshot APT
539Slub Backdoor
540SmokeLoader Malware
541Smominru Botnet
542Sodinokibi Ransomware
543Sofacy APT28
544SolarWinds Serv-U Active Exploits
545SolarWinds Web Help Desk Active Exploits
546SonicWall GMS Active Exploit
547SonicWall SMA Active Exploits
548SonicWall SonicOS Active Exploits
549Sophos Active Exploits
550SparkRAT Malware
551Spartan Exploit Kit
552SpeakUp Backdoor Trojan
553Spectre
554Spectre-NG
555Spelevo Exploit Kit
556Spiral Group
557Spring Cloud Function Active Exploits
558Spring4Shell
559Stayin Alive Campaign
560Storm 0062 Group
561Storm-0978 Group
562StripedFly Malware
563Styx Exploit Kit
564SubZero Malware
565Suckfly APT
566SugarCRM Active Exploits
567Sundown Exploit Kit
568Sundown-Pirate Exploit Kit
569Sweet Orange Exploit Kit
570Symantec Messaging Gateway Active Exploit CVE-2017-6327
571Sysrv-hello Botnet
572TA413 APT
573TA459 APT
574TA505 APT
575TIBCO Jasper Reports Active Exploits
576TLStorm
577Taidoor Malware
578Tails Active Exploits
579TeamTNT APT
580Teclib GLPI Active Exploits
581TellYouThePass Ransomware
582Terrapin Attack
583Text4Shell
584The White Company Group
585ThreadKit Exploit Kit
586Tick APT
587ToddleShark Malware
588ToddyCat APT
589Tonto Team APT
590Tornado
591Trend Micro Products Active Exploits
592Trickbot
593Troldesh Ransomware
594Tropic Trooper APT
595TrueBot Malware
596Ttint Trojan
597Turla Malware
598UAC-0194 Group
599UAT4356 Group
600UNC1945 APT
601UNC2198 Group
602UNC2447 Group
603UNC2546 Group
604UNC2630 Group
605UNC2682 Group
606UNC2717 Group
607UNC3886 Group
608UNC4466 Group
609UNC4841 Group
610UNC4857 Group
611UNC5221 Group
612UNC5325 Group
613UNC5337 Group
614UTA0218 Group
615Underminer Exploit Kit
616VMWare Active Exploits
617VegaLocker Ransomware
618Velvet Ant Group
619Venom RAT
620Violin Panda APT20
621Void Banshee APT
622Volatile Cedar APT
623Volt Typhoon Group
624WPS Office Active Exploits
625WS FTP Server Active Exploits
626WSO2 Active Exploits
627WannaCry Ransomware
628Watchbog Malware
629Wavethrough
630Web Shell Malware
631Webtoos DDoS Trojan
632Wekby-APT18
633Western Digital NAS Devices Active Exploit CVE-2018-18472
634WhiteLotus Exploit Kit
635Whitefly APT
636Whitehole Exploit Kit
637Windigo APT
638Windows NTLM Active Exploit CVE-2019-1040
639Wingbird
640Winnti APT
641Winter Vivern APT
642Witchetty APT
643Wizard Spider Group
644WoodyRAT
645WordPress Active Exploits
646XBash Malware
647XCSSET Malware
648XDSpy APT
649XFiles Malware
650XMRig Cryptominer
651XWorm Malware
652ZHtrap Botnet
653Zabbix Active Exploits
654Zebrocy APT
655Zerobot Botnet
656Zerologon
657Zhi Zhu Exploit Kit
658Zimbra Collaboration Active Exploits
659Zirconium APT
660ZoPack
661Zoho ManageEngine ADSelfService Plus Active Exploits
662Zoho ManageEngine Access Manager Plus Active Exploits
663Zoho ManageEngine Desktop Central Active Exploit CVE-2020-10189
664Zoho ManageEngine PAM360 Active Exploits
665Zoho ManageEngine Password Manager Pro Active Exploits
666Zoho ManageEngine ServiceDesk Plus Active Exploits
667ZombieLoad
668Zoom Active Exploits
669Zyklon Backdoor
670Zyxel Devices Active Exploits
671admin338 APT
672amiak APT
673iPack Exploit Kit
674jQuery Active Exploits
675njRAT
676ownCloud Active Exploits
677vBulletin Active Exploit CVE-2020-17496
678vBulletin Active Exploit-CVE-2019-16759
679z0Miner Malware

Share This Article :
  • X
  • LinkedIn
Still stuck? How can we help?

Saner Documentation Feedback

Compliance Benchmark CoverageOVAL Definitions Family-wise Distribution
Copyright 2025 - SecPod. All Rights Reserved. Privacy Policy.
SanerNow Version 6.3.x