Skip to content
SecPod  – Documentation
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO
  • Toggle website search
Search this website
Menu Close
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO
  • Toggle website search
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO

Saner Platform

  • Saner Platform Release Notes
    • Saner Platform Integration Release: ServiceNow Integration Introduced, Freshservice Enhanced
    • Release Notes Saner 6.4.1
    • Release Notes SanerNow 6.4
    • Release Notes SanerNow 6.3.1
    • Release Notes SanerNow 6.3
    • Release Notes SanerNow 6.2.1
    • Release Notes SanerNow 6.2.0.3
    • Release Notes SanerNow 6.2.0.1
    • Release Notes SanerNow 6.2
    • Release Notes SanerNow 6.1.1
    • Release Notes SanerNow 6.1
    • Release Notes SanerNow 6.0
    • Release Notes SanerNow 5.3.1
    • Release Notes SanerNow 5.3
    • Release Notes SanerNow 5.2
    • Release Notes SanerNow 5.1
    • Release Notes SanerNow 5.0
    • Release Notes SanerNow 4.8.0.0
    • Release Notes SanerNow 4.7.0.0
    • Release Notes SanerNow 4.6.0.0
    • Release Notes SanerNow 4.5.0.0
    • Release Notes SanerNow 4.4.0.0
    • Release Notes SanerNow 4.3.0.0
    • Release Notes SanerNow 4.2.2.1
    • Release Notes SanerNow 4.2.2.0
    • Release Notes SanerNow 4.2.1.0
    • Release Notes SanerNow 4.2.0.0
    • Release Notes SanerNow 4.1.1.0
    • Release Notes SanerNow 4.0.0.5
  • Saner Platform Guide
    • Prerequisites For Saner SaaS Platform Deployment
    • Saner Administration Guide
    • Saner Device Management User Guide
    • Saner Platform and ServiceNow Integration Guide
    • Saner Platform and Freshservice Integration Guide
    • Saner Platform Function Guides
  • FAQs
    • Saner CVEM Technical FAQs
  • How Tos
    • General
      • How to increase the subscription count for an Account in Saner CVEM
      • How to increment license count for an Organization in Saner CVEM
      • How to provision Saner tools for an Organization
      • How to change subscription type in Saner CVEM
      • How to sign-up with Saner CVEM?
      • How to create a new account in Saner CVEM?
      • How to create a new user in Saner CVEM?
      • How to enable SSO authentication policy in Saner CVEM?
      • How to set alerts in Saner?
      • How to view, download and filter the audit logs?
      • How to designate Saner Agent to perform network scan?
      • How to Co-Brand with your logo?
      • How to fetch the details of the mandatory fields from the Okta account?
      • How to create MFA policy for Okta?
      • How to fetch the details of the mandatory fields from the PingID account?
      • How to create MFA policy for PingID?
      • How to fetch the details of the mandatory fields from the PingOne account?
      • How to create MFA policy for PingOne?
      • How to download and install Saner Agent in Mac?
      • How to download and install Saner agent in Linux?
      • How to download and install the Saner agent in Windows?
      • How to update the expiry date of an existing subscription?
      • How to manage users and their preferences using role-based access?
      • How to uninstall Saner Agent using Saner Offline deployer tool.
      • How to onboard a new organization?
      • How to deploy Saner Agent using Saner Offline deployer tool.
      • How to install a Saner agent through the command line?
      • How to uninstall the Saner agent through command line?
    • Saner Reports
      • How to configure mail settings to email Report PDF?
      • How to create a custom report in Saner?
      • How to schedule for the report back up?
    • Saner Device Management
      • How to create custom groups in Saner CVEM
    • Saner Mail Settings
      • How to create new mail settings in Saner?
      • How to use OAuth-enabled authentication in Saner mail settings
      • How to create OAuth Client ID and Client Secret for Gmail
      • How to create OAuth Client ID and Client Secret for Microsoft 365.
  • Supported OSs and Platforms
    • Operating Systems and Platforms Supported
    • Supported Third-party Applications for Patching

Saner Cloud

  • Before You Begin
    • Glossary of Terms
    • Read me First
  • Get Started
    • Prerequisites For Saner SaaS Platform Deployment
    • Saner Cloud Deployment Guides
      • Azure Onboarding
      • Troubleshooting
      • Get Started with Saner CNAPP AWS Cloud Deployment V1.0
      • Onboarding with AWS Credentials(Least Recommended Method)
      • Onboarding with AWS Role(Manual)
      • Onboarding with AWS Role CloudFormation (Automatic): Recommended
    • Roles and Permissions
      • Roles and Permissions for AWS Remediation Access
      • Roles and Permissions for Azure Onboarding, Detection, and Remediation
  • Learn About
    • Remediation Rollback
    • Automation and Job-driven Remediation
    • Cost and Usage
    • Excessive Permission Categories Evaluated Across Different Cloud Services
    • Publicly Accessible Resources
    • Patch Aging and Patch Impact
    • SecPod Default Benchmarks
    • Watchlists
    • Cloud Workload Protection Platform(CWPP)
    • Overview of Report Views in Saner Cloud
    • Whitelisting Resources
    • Saner Plasma AI Assistant for Seamless User Interaction
    • Critical Events to Monitor in AWS
    • High-Privilege Actions in Critical Activity Logs for AWS
    • Audit Logs in Saner Cloud
    • Excessive Permissions
    • Alerts in SanerCloud
  • User Guides
    • Cloud Cyber Hygiene Score(CCHS) User Guide
    • Cloud Security Remediation Management(CSRM) User Guide
    • Cloud Infrastructure Entitlement Management(CIEM) User Guide
    • Cloud Security Posture Anomaly(CSPA) User Guide
    • Cloud Security Asset Exposure(CSAE) User Guide
    • Cloud Security Posture Management(CSPM) User Guide
  • Tell Me How
    • How to Remediate in Saner Cloud?
    • How to Configure Automation Rule to Remediate Misconfigurations?
    • How to Manage Report Views at Organization-level in Saner Cloud?
    • How to Get a Cohesive View from Saner Cloud Unified Dashboard?
    • How to Use Tags to Quickly Filter Resources?
    • How to Troubleshoot Issues with Audit Logs?
    • How to Manage Groups and Tags in Saner Cloud?
    • How to Manage Report Views for a User Account in Saner Cloud?
    • How to Troubleshoot or Analyze with Critical Activity Logs?
    • How to Setup Alerts Across SanerCloud Tools?
    • How to Take Action on Alert Notifications from SanerCloud?
    • CSAE
      • How to Setup Watchlist Configuration for a Resource?
      • How to Identify Outdated Resources for Cleanup?
      • How does Resource Categorization Work in Saner CSAE?
      • How to Identify Resources Exposed to External Network?
      • How to Understand the Resource Footprint Globally Across Various Regions?
      • How to Make Informed Decisions on Your Expenditure based on Resource Usage Graph?
    • CSPM
      • How to Setup Benchmarks in Saner CSPM?
      • How to Use Quick Evaluation Benchmarks?
      • How to Detect Patterns over a Period with Resource Trends?
      • How to Assess System Compliance and Security Posture?
    • CSPA
      • How to Initiate Patch Remediation from CSPA Dashboard?
      • How to Quickly Identify the Detected and Remediated Anomalies for an Account?
      • How to Prioritize Remediation or Fixes based on Confidence Levels?
      • How to Examine the Overall Anomaly Information for Specific Rules or Checks?
      • How to Search and Retrieve Anomaly Data?
      • How to Whitelist Rules or Resources in Cloud Security Scans?
    • CIEM
      • How to See the Active Version for an IAM Policy?
      • How to Address Critical Activities Using Evidence?
      • How to View by Type and Usage for any Identity in CIEM?
      • How to Get Visibility into Cloud Entitlements?
      • How to Use Evidence to Address Policies with Excessive Permission?
      • How to Know the Excessive Permissions on a Specific Service?
      • How to Visually See the Relationship between Identity, Entitlement, Policy, or Permission?
      • How to Determine if a Policy has Excessive Permission?
      • How to Initiate Remediation for Different Identities from CIEM?
    • CSRM
      • Rollback an Applied Remediation
      • How to Configure Automation Rule to Remediate Misconfigurations?
      • How to Create a Patching Task for Items Currently in “Approval Pending” State?
      • How to Evaluate Remediation Effort with Patching Impact Chart?
      • How to Prioritize and Address Older or High-Risk Anomalies with Patch Aging?
      • How to Monitor the Overall Status of the Remediation Job?
      • How do I Get to Know the Regions Impacted by a Specific Rule?
      • How to View the Severity of a Missing Patch Affected by a Rule?
      • How to Address Missing Patches Via Remediation Tasks?
      • How to Quickly Access the Necessary Tool for Remediation and Begin Patching Tasks?
  • Frequently Asked Questions
    • Saner Cloud Technical FAQs
  • Saner Cloud Release Notes
    • Saner Cloud – V.1.2.0.0 Release Notes
    • Saner Cloud – V.1.1.0.0 Release Notes
    • Saner Cloud – V.1.1 Release Notes
    • Saner Cloud – V.1.0 Release Notes
  • Security Intelligence for Saner Cloud
    • Benchmark Compliance Rules in AWS and Azure
      • AWS
        • SecPod Rules in AWS
          • SecPod Default Rules in AWS: An Overview
          • Understand SecPod Default Rules in AWS
          • Understand SecPod Global Rules in AWS
          • Understand SecPod Regional Rules in AWS
        • PCI DSS 3.2.1 Rules in AWS
          • PCI DSS 3.2.1 Rules in AWS: An Overview
          • Understand PCI DSS 3.2.1 Rules in AWS
          • Understand PCI DSS 3.2.1 Global Rules in AWS
          • Understand PCI DSS 3.2. 1 Regional in AWS
        • CIS Rules in AWS
          • CIS Rules in AWS: An Overview
          • Understand CIS Rules in AWS
          • Understand CIS 3.0.0 Rules in AWS
          • Understand CIS 4.0.1 Rules in AWS
          • Understand CIS 4.0.0 Rules in AWS
          • Understand CIS 3.0.0 Global Rules in AWS
          • Understand CIS 4.0.0 Global Rules in AWS
          • Understand CIS 3.0.0 Regional Rules in AWS
          • Understand CIS 4.0.0 Regional Rules in AWS
        • SOC 2 Rules in AWS
          • SOC 2 Rules in AWS: An Overview
          • Understand SOC 2 Rules in AWS
          • Understand SOC 2 Global Rules in AWS
          • Understand SOC 2 Regional Rules in AWS
        • HIPAA HITRUST Rules in AWS
          • HIPAA HITRUST Rules in AWS: An Overview
          • Understand HIPAA HITRUST Rules in AWS
          • Understand HIPAA HITRUST Global Rules in AWS
          • Understand HIPAA HITRRUST Regional Rules in AWS
        • NIST 800-53 Revision 5 Rules in AWS
          • NIST 800-53 Revision 5 Rules in AWS: An Overview
          • Understand NIST 800-53 Revision 5 Rules in AWS
          • Understand NIST 800-53 Revision 5 Global Rules in AWS
          • Understand NIST 800-53 Revision 5 Regional Rules in AWS
      • Azure
        • CIS Rules in Azure
          • CIS Rules in Azure: An Overview
          • Understand CIS 1.2.0 Rules in Azure
          • Understand CIS 2.1.0 Rules in Azure
          • Understand CIS 1.1.0 Benchmark Compliance Rules in Azure
          • Understand CIS 3.0.0 Benchmark Compliance Rules in Azure
          • Understand CIS 1.2.0 Global Benchmark Compliance Rules in Azure
          • Understand CIS 2.1.0 Global Benchmark Compliance Rules in Azure
          • Understand CIS 3.0.0 Global Benchmark Compliance Rules in Azure
          • Understand CIS 2.1.0 Regional Benchmark Compliance Rules in Azure
          • Understand CIS 3.0.0 Regional Benchmark Compliance Rules in Azure
        • NIST 800-53 Revision Rules in Azure
          • NIST 800-53 Revision 5 Rules in Azure: An Overview
          • Understand NIST 800-53 Revision 5 Rules in Azure
          • Understand NIST 800-53 Revision 5 Global Rules in Azure
          • Understand NIST 800-53 Revision 5 Regional Rules in Azure
        • SecPod Rules in Azure
          • SecPod Default Rules in Azure: An Overview
          • Understand SecPod Global Rules in Azure
          • Understand SecPod Regional Rules in Azure
          • Understand SecPod Default Rules in Azure
        • HIPAA HITRUST Rules in Azure
          • HIPAA HITRUST Rules in Azure: An Overview
          • Understand HIPAA HITRUST 14.7.0 Rules in Azure
          • Understand HIPAA HITRUST 14.7.0 Global Rules in Azure
          • Understand HIPAA HITRUST 14.7.0 Regional Rules in Azure
        • PCI DSS Rules in Azure
          • PCI DSS 3.2.1 Rules in Azure: An Overview
          • Understand PCI DSS 4.0 Rules in Azure
          • Understand PCI DSS 4.0 Global Rules in Azure
          • Understand PCI DSS 4.0 Regional Rules in Azure
        • SOC 2 Rules in Azure
          • SOC 2 Rules in Azure: An Overview
          • Understand SOC2 Rules in Azure
          • Understand SOC2 Global Rules in Azure
          • Understand SOC2 Regional Rules in Azure
    • Posture Anomaly Checks in AWS and Azure
      • Implementing Posture Anomaly Checks in AWS
      • Implementing Posture Anomaly Checks in Azure
    • Infrastructure Entitlement Checks in AWS and Azure
      • Implementing Infrastructure Entitlement Checks in Azure
      • Implementing Infrastructure Entitlement Checks in AWS

Saner CVEM

  • Saner CVEM Release Notes
    • Release Notes Saner 6.5
    • Saner Platform Integration Release: ServiceNow Integration Introduced, Freshservice Enhanced
    • Release Notes Saner 6.4.1
    • Release Notes SanerNow 6.4
    • Release Notes SanerNow 6.3.1
    • Release Notes SanerNow 6.3
    • Release Notes SanerNow 6.2.1
    • Release Notes SanerNow 6.2.0.3
    • Release Notes SanerNow 6.2.0.1
    • Release Notes SanerNow 6.2
    • Release Notes SanerNow 6.1.1
    • Release Notes SanerNow 6.1
    • SanerNow Risk Prioritization Launch
    • Release Notes SanerNow 6.0
    • Release Notes SanerNow 5.3.1
    • Release Notes SanerNow 5.3
    • Release Notes SanerNow 5.2
    • Release Notes SanerNow 5.1
    • Release Notes SanerNow 5.0
    • Release Notes SanerNow 4.8.0.0
    • Release Notes SanerNow 4.7.0.0
    • Release Notes SanerNow 4.6.0.0
    • Release Notes SanerNow 4.5.0.0
    • Release Notes SanerNow 4.4.0.0
    • Release Notes SanerNow 4.3.0.0
    • Release Notes SanerNow 4.2.2.1
    • Release Notes SanerNow 4.2.2.0
    • Release Notes SanerNow 4.2.1.0
    • Release Notes SanerNow 4.2.0.0
    • Release Notes SanerNow 4.1.1.0
    • Release Notes SanerNow 4.0.0.5
  • Saner CVEM Guide
    • What’s New in Saner CVEM?
    • Getting Started with Saner CVEM
    • Pre-requisites for Saner CVEM Deployment
    • How does Saner CVEM’s deployment architecture work?
  • Saner CVEM Products
    • Overview of Saner Continuous Vulnerability and Exposure Management
    • Saner CVEM Unified Dashboard User Guide
    • Saner CVEM Asset Exposure User Guide
    • Saner CVEM Continuous Posture Anomaly Management User Guide
    • Data Points IT teams can Fetch from Saner CPAM
    • Posture Anomaly Computation Rules
    • Saner CVEM Vulnerability Management User Guide
    • Saner CVEM Compliance Management User Guide
    • Saner CVEM Risk Prioritization User Guide
    • Saner CVEM Patch Management User Guide
    • Saner CVEM Endpoint Management User Guide
    • Saner CVEM Remote Scripting User Guide
    • Saner CVEM Remote Access User Guide
    • Saner CVEM Network Scanner User Guide
    • Saner CVEM Cyber Hygiene Score User Guide
  • How Tos
    • Saner AE
      • How to blacklist and whitelist applications in Saner AE?
      • How to manage asset licenses using Saner AE?
      • How to run an asset scan using Saner AE?
    • Saner CPAM
      • How to create new response in PA tool?
      • How to build your own detection and response in PA tool?
      • How to whitelist an entire PA ID?
      • How to configure Posture Anomaly tool for custom detection?
      • How to fix Anomalies from PA dashboard?
      • How to fix anomalies detected in your account from All Anomalies Page?
      • How to fix anomalies from PA Summary page?
      • How to delete PA scan preferences?
      • How to schedule PA Scans on Daily, Weekly, and Monthly basis?
      • How to launch Posture Anomaly scans?
    • Saner VM
      • How to automate and schedule vulnerability scans?
      • How to exclude vulnerabilities in Saner VM tool
      • How to manage excluded vulnerabilities in Saner VM?
      • How to remediate vulnerabilities from vulnerability management dashboard?
    • Saner CM
      • How to run a compliance scan?
      • How to custom create a security policy?
      • How to align with PCI security compliance management?
      • How to align with NIST 800-171 security compliance management?
      • How to align with NIST 800-53 security compliance management?
      • How to align with HIPAA security compliance management using Saner CM?
    • Saner PM
      • How to fix firmware in Saner?
      • How to exclude patches in Saner PM?
      • How to manage excluded patches in Saner PM?
      • How to automate patch management in Saner PM?
      • How to roll back patches in Saner PM?
      • How to specify Service Level Agreement (SLA) using Remediation SLA in Saner PM?
      • How to apply missing patches in Saner PM?
      • How to apply the most critical patches in Saner PM?
      • How to perform custom remediation for applications that require paid patches using Saner PM
      • How to check the status of patching activity?
    • Saner EM
      • How to collect all security events from Windows Events Log?
      • How to check password policy set in Windows systems?
      • How to check status of DEP in Windows systems?
      • How to check faulty Anti-Virus (AV) status in Windows systems?
      • How to check for Anti-Virus (AV) status in Windows systems?
      • How to check account lockout policy on Windows systems?
      • How to check if Bit-locker protection is OFF in Windows systems?
      • How to list all inactive users on Windows systems?
      • How to list all guest accounts in Windows systems?
      • How to list all Administrator accounts on Windows systems?
      • How to list last-logon details of users on Windows systems?
      • How to identify all users in Windows systems?
      • How to collect all services that are currently running in Windows systems?
      • How to list all Groups in Windows systems?
      • How to collect all keyboard and pointing devices connected to Windows systems?
      • How to collect all storage devices connected to Windows systems?
      • How to investigate total RAM or CPU threshold (greater than or equal to 80%) in Windows systems?
      • How to collect operating systems information in Windows?
      • How to investigate disks running out of space (<100 MB) in Windows systems?
      • How to collect and investigate disk information on Windows systems?
      • How to collect all installed patches in Windows systems?
      • How to collect all software patches that are hidden in the Windows Update server?
      • How to check the status of Windows Update Server (WSUS/SCCM)?
      • How to collect BIOS information such as serial number, version, manufacturer in Windows systems?
      • How to collect all the important missing patches in Windows systems?
      • How to check wireless security in Linux systems?
      • How to collect mounted disk information on Linux systems?
      • How to check wireless signal quality in Linux systems?
      • How to check all firewall policies on Linux systems?
      • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Linux systems?
      • How to collect DNS information on Linux systems?
      • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing in Linux?
      • How to check wireless signal quality in Windows systems?
      • How to check wireless security in Windows systems?
      • How to collect all open ports in Windows systems?
      • How to collect all network interfaces in Windows systems?
      • How to investigate DNS cache on Windows systems?
      • How to check all firewall policies on Windows systems?
      • How to collect DNS information on Windows systems?
      • How to collect all the applications with an unknown publisher in Linux systems?
      • How to perform system tuning?
      • How to collect all software licenses in Windows systems?
      • How to identify potentially unwanted programs such as torrent downloaders or unnecessary toolbars running on Windows systems?
      • How to collect a list of applications that are started when you boot your computer?
      • How to collect all the applications with an unknown publisher in Windows systems?
      • How to collect all software licenses in Mac systems?
      • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing Windows?
      • How to collect all families of operating systems such as Windows, Unix, and macOS?
      • How to collect environment variables set in all operating systems?
      • How to collect all the applications with an unknown publisher in Mac systems?
      • How to delete and quarantine a file?
      • How to start and stop the processes in Saner?
      • How to block blacklisted applications in Saner?
      • How to enable/disable devices in Saner
      • How to manually import devices into Saner?
      • How to deploy software in Saner EM?
      • How to enable and disable firewall settings in Saner AE?
      • How to collect all shared resources on Windows systems?
      • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Windows systems?
      • How to connect to a client machine graphically using Saner Remote Access
  • FAQs
    • Saner CVEM Technical FAQs

Security Intelligence

  • Overview of Security Content and Intelligence
  • Security Content Statistics
  • OVAL Definitions Platform Coverage
  • OVAL Definitions Class-wise Distribution
  • OVAL Definitions Family-wise Distribution
  • Application and OS Remediation Coverage
  • Compliance Benchmark Coverage
  • List of Vulnerability to Exploit/Malware Mapping covered in Saner
  • Network Scanner Product Support Matrix
  • Privilege levels for authenticated scans using Saner Network Scanner
View Categories
  • Home
  • Docs
  • Security Intelligence
  • List of Vulnerability to Exploit/Malware Mapping covered in Saner

List of Vulnerability to Exploit/Malware Mapping covered in Saner

Print Friendly, PDF & Email

Last Updated: Sept 02, 2025

SI.NoMalware Vulnerability Enumeration
11byte Products Active Exploits
221Nails
35ss5c Ransomware
48220 Group
5APT-C-09
6APT-C-27
7APT-C-60
8APT12
9APT16
10APT30
11AZORult Trojan
12Abcbot Botnet
13Achilles
14Adobe Acrobat Reader Active Exploits
15Adobe ColdFusion Active Exploits
16AdvisorsBot Malware
17Adwind RAT
18Agent Tesla Trojan
19Akira Ransomware Group
20Amnesia33
21Andariel Group
22AndoryuBot Botnet
23AndroxGh0st Malware
24Angler Exploit Kit
25Antlion APT
26Aoqin Dragon
27Apache Flink Active Exploits
28Apache HTTP Server Active Exploits
29Apache HugeGraph Server Active Exploits
30Apache Log4j Active Exploits
31Apache OfBiz Active Exploits
32Apache Solr Active Exploits
33Apache Spark Active Exploits
34Apache Struts Active Exploits
35Apache Superset Active Exploits
36Apache Tomcat Active Exploits
37Apple MacOS Active Exploits
38Aquatic Panda APT
39Archie Exploit Kit
40Asnarok Trojan
42Asruex Trojan
43AssocAID Exploit Kit
44Astrum Exploit Kit
45Atlassian Products Active Exploits
46Atom Silo Group
47Aurora Panda APT17
48AveMaria RAT
49AvosLocker Ransomware
50Axiom Group
51B1txor20 Backdoor
52BIG IP Active Exploits
53BITTER APT
54BPFDoor
55BRONZE BUTLER APT
56BUSHWALK Malware
57BabyShark Malware
58BackConfig Trojan
59BackdoorDiplomacy APT
60BadAlloc
61Baldr Trojan
62BalkanDoor Backdoor
63Baron Samedit
64BazaLoader
65Beapy Cryptominer
66Bespoke Malware
67BestPack Exploit Kit
68BianLian Ransomware Group
69BigDebIT
70BillGates Botnet
71Bl00dy Ransomware Group
72Black Basta Group
73Black Kingdom Ransomware
74BlackByte Ransomware
75BlackCat Ransomware
76BlackHole Exploit Kit
77BlackLotus Malware
78BlackOasis APT
79BlackSquid Malware
80BlackTech APT
81Bleeding-Life Exploit Kit
82BleedingTooth
83Blue Mockingbird Group
84BlueKeep
85BlueNoroff APT
86BlueSky Ransomware
87BoldMove Backdoor
88BootHole
89BotenaGo Botnet
90Bottle Exploit Kit
91BrickerBot Botnet
92Buhtrap Group
93ByeBear
94CDPwn
95CK Exploit Kit
96COVID-19 Campaign
97CableHaunt
98CacheOut
99Cacti Active Exploits
100Calypso APT
101Capesand Exploit Kit
102Capsaicin Botnet
103Carbanak APT
104Cerber Ransomware
105Chainshot Malware
106Check Point Security Gateways Active Exploits
107Chthonic Banking Trojan
108Cisco ASA Active Exploit CVE-2018-0296
109Cisco ASA Active Exploit CVE-2020-3580
110Cisco ASA Active Exploits
111Cisco AnyConnect Active Exploits
112Cisco ESA Active Exploits
113Cisco IOS XR XE Active Exploits
114Cisco IP Phones Active Exploits
115Cisco SD WAN vManage Active Exploit
116Cisco SMA Active Exploits
117Cisco SPA112 2 Port Phone Adapter Active Exploit
118Cisco Secure Web Appliance Active Exploits
119Cisco Small Business RV Routers Active Exploits
120Citrix ADC Active Exploits
121Citrix ADC Gateway SDWAN WAN-OP Active Exploits
122Citrix Content Collaboration Active Exploits
123Citrix Gateway Active Exploits
124ClOp Ransomware
125Cleaver APT
126Cloud Atlas APT
127Cloud9 Botnet
128CloudMensis Spyware
129Cobalt APT
130Codoso APT19
131CommentPanda APT1
132Condi Malware
133Confucius APT
134Contec SolarView Series Active Exploits
135Cool Exploit Kit
136CopyKittens
137CrimeBoss Exploit Kit
138CrimePack Exploit Kit
139CritXPack Exploit Kit
140CrushFTP Active Exploits
142Cuba Ransomware
143Curveball
144Cyber Partisans Group
145D-Link Devices Active Exploits
146DEV-0322 APT
147Dacls RAT
148Dark.IoT Botnet
149DarkGate Malware
150DarkHydrus APT
151DarkIRC Botnet
152DarkMe Malware
153DarkRadiation Ransomware
154Darkhotel APT
155DazzleSpy Spyware
156DearCry Ransomware
157Deep Panda APT
158DevilsTongue Malware
159Dirty Pipe
160Disdain Exploit Kit
161Django Active Exploits
162Dofloo Trojan
163Donot Team APT-C-35
164DoppelPaymer Ransomware
165DotkaChef Exploit Kit
166Double Dragon APT41
167DoublePulsar BackDoor
168DragonOK APT
169Dragonfly APT
170DreamBus Malware
171Dridex Malware
172Drown
173Drupal Active Exploits
174Dukes-APT29
175Dust Storm APT
176ESXiArgs Ransomware
177Ebury Botnet
178Echobot Botnet
179Effluence Backdoor
180Elderwood Group
181Eleonore Exploit Kit
182Elephant Beetle
183Elfin APT33
184Elise Malware
185Ember-Bear Group
186Emissary Panda APT
187Emotet Trojan
188Empire Pack Exploit Kit
189Equation APT
190EternalBlue
191EternalRed
192EvilPost APT
193EwDoor Botnet
194ExileRat Malware
195Exim Active Exploits
196Exotic Lily Group
197F5 BIG-IP Active Exploits
198FIN11 APT
199FIN6 APT
200FIN7 APT
201FIN8 APT
202FabriXss
203Fallout
204Fallout Exploit Kit
205FatPipe Inc Active Exploits
206Fbot Botnet
207Ficora Botnet
208Fiesta Exploit Kit
209FileZen Active Exploits
210FinSpy
211Firefox Active Exploits
212FiveHands Ransomware
213FlashPack Exploit Kit
214Flimkit Exploit Kit
215Fodcha Botnet
216Follina
217Formbook Malware
218Fortinet Products Active Exploits
219Fox Kitten Campaign
220Fragus Exploit Kit
221Frankenstein Campaign
222FreakOut Malware
223FruityArmor APT
224FudModule Rootkit
225GOLD SOUTHFIELD Group
226Gafgtyt tor Botnet
227Gafgyt Botnet
228Gamaredon Group
229GambleForce Group
230GandCrab Ransomware
231GeoServer Active Exploits
232Gh0stRAT Trojan
233GhostMiner Malware
234Ghostcat
235GitLab Active Exploits
236Gitpaste-12 Malware
237Glazunov Exploit Kit
238Glueball
239Glupteba Malware Dropper
240GoBrut Botnet
241GoMet Backdoor
242Godlua Backdoor
243Godzilla Backdoor
244Godzilla Loader
245Goldoon Botnet
246Gongda Exploit Kit
247Google Chrome Active Exploits
248Gorgon APT
249Grafana Active Exploits
250Grandsoft Exploit Kit
251Graphite Malware
252GreenFlash-Sundown Exploit Kit
253Group5 APT
254GroupA21 APT
255H0lyGh0st Ransomware Group
256H2Miner Botnet
257HTTP2 Rapid Reset Attack
258HabitsRAT
259Hafnium Group
260Hail Cock Botnet
261Hangul Active Exploits
262Hanjuan Exploit Kit
263HawkEye Keylogger
264Hawkball Backdoor
265Headmare Group
266HeartBleed
267Helldown Ransomware Group
268HelloKitty Ransomware
269Hermes Ransomware
270Hezb Malware
271HiMan Exploit Kit
272Hierarchy Exploit Kit
273Higaisa APT
274HinataBot Botnet
275Hive Ransomware
276Hunter Exploit Kit
277IBM WebSphere Active Exploits
278INFRAHALT
279IZ1H9 Malware
280IcePack Exploit Kit
281Illumina UCS Active Exploits
282ImageMagick Active Exploits
283Imminent Monitor RAT
284Impact Exploit Kit
285ImpassionedFramework Exploit Kit
286Incognito Exploit Kit
287InfectedSlurs Botnet
288Infinity Exploit Kit
289Insekt RAT
290IntelBroker Group
291Internet Explorer Active Exploit CVE-2019-0752
292Internet Explorer Active Exploit CVE-2019-1367
293Internet Explorer Active Exploit CVE-2020-0674
294Internet Explorer Active Exploit CVE-2021-33742
295Internet Explorer Active Exploits
296JNEC.a Ransomware
297Jasmin Ransomware
298Jenkins Active Exploits
299JetBrains TeamCity Active Exploits
300JustExploit Exploit Kit
301KPOT Stealer Malware
302KaiXin Exploit Kit
303KashmirBlack Botnet
304Ke3chang APT
305Kerberods Trojan Dropper
306Khonsari Ransomware
307Kibana Active Exploits
308Kimsuky APT
309Knotweed APT
310Konni Group
311Kore Exploit Kit
312Kovter Malware
313Kr00k
314Kronos Banking Trojan
315KrustyLoader Malware
316KuaiGoMiner Trojan
317LOWZERO Backdoor
318Lamberts APT
319LatenBot
320LatentBot
321Lazarus Group
322Leafminer Group
323Lemon Duck Malware
324Leviathan APT
325LightSpy Spyware
326LightsOut Exploit Kit
327Line Runner Malware
328Linux Kernel Active Exploits
329Linux.Ngioweb Botnet
330LiquorBot Botnet
331LoJax Malware
332LockBit Ransomware
333Loda RAT
334LokiBot Malware
335Lone Wolf Group
336Lord Exploit Kit
337Lotus Blossom APT
338Lucifer Malware
339MATA Backdoor
340MBR Locker Ransomware
341Magecart Group
342Magento Active Exploits
343Magnet Goblin Group
344Magniber Ransomware
345Magnitude Exploit Kit
346MalSmoke Group
347Manganese APT
348Manuscrypt Malware
349Marvin Attack
350Maze Ransomware
351Meltdown
352MenuPass APT10
353Merry Christmas Exploit Kit
354MetaPack Exploit Kit
355Microsoft Excel Active Exploits
356Microsoft Exchange Server Active Exploits
357Microsoft Windows Active Exploits
358Migraine
359MikroTik RouterOS Active Exploits
360MinIO Active Exploits
361Mirai Botnet
362Mispadu Banking Trojan
363Mitel MiVoice Connect Active Exploits
364MobileIron Active Exploits
365ModifiedElephant APT
366Molerats APT
367Moobot Botnet
369Mozi Botnet
370Mozilla Thunderbird Active Exploits
371Mpack Exploit Kit
372Msupedge Backdoor
373MuddyWater APT
374Muhstik Botnet
375Mukashi Malware
376Mustang Panda APT
377MysterySnail RAT
378NAME:WRECK
379NEODYMIUM APT
380NOTROBIN Malware
381NRSMiner Cryptominer
382NXNSAttack
383Nagios Server Active Exploits
384Naikon APT
385Nansh0u Campaign
386Nebula Exploit Kit
387Necro Botnet
388Nemty Ransomware
389Neosploit Exploit Kit
390Neptune Exploit Kit
391NetCat Attack
392NetWalker Ransomware
393Neutrino Exploit Kit
394NextCry Ransomware
395NicePack Exploit Kit
396Night Sky Ransomware
397Nimbuspwn
398Niteris Exploit Kit
399Nostromo Active Exploits
400Novidade Exploit Kit
401Nuclear Exploit Kit
402Nucsoft Exploit Kit
403NullHole Exploit Kit
404OceanLotus APT32
405OilRig APT34
406OmniRAT Malware
407OpenSSL Active Exploits
408Operation Earth Kitsune
409Operation EmailThief
410Operation INJ3CTOR3 Campaign
411Operation LagTime IT Campaign
412Operation Muzabi
413Operation Poison Needles APT
414Operation PowerFall Campaign
415Operation SideCopy
416Operation TunnelSnake
417Operation WatchDog
418Operation WizardOpium Campaign
419Oracle Active Exploits
420Oracle Coherence Active Exploit CVE-2020-2555
421Oracle WebLogic Server Active Exploit CVE-2015-4852
422Oracle WebLogic Server Active Exploits
423Orcus Rat Malware
424P2Pinfect Malware
425PHP Active Exploits
426PKPLUG APT
427POLONIUM Group
428Palo Alto Active Exploits
429Persirai Botnet
430Petya Ransomware
431PgMiner Botnet
432Phoenix Exploit Kit
433Phosphorus Group
434Pinchy Spider APT
435Pirpi APT3
436Pitty Tiger APT
437Platinum APT
438Play Ransomware Group
439Plex Media Server Active Exploits
440PlugX Malware
441Plurox Malware
442Poison Ivy
443Poodle
444PopAds Exploit Kit
445Poseidon Group
446PostgreSQL Active Exploits
447PowerPool APT
448Powerdir
449Praying Mantis APT
450Predator the Thief Stealer Malware
451PrestaShop Active Exploits
452Primetek Primefaces Active Exploits
453PrincessLocker Ransomware
454PrintNightmare
455Private Exploit Kit
456Pro-Ocean Malware
457Progress Kemp LoadMaster Active Exploits
458Progress MOVEit Products Active Exploits
459ProjectM APT
460Promethium APT
461Prophet Spider APT
462ProxyShell
463ProxyToken
464Pulse Connect Secure Active Exploits
465Purple Fox Exploit Kit
466Purple Fox Malware
467Putter Panda APT2
468PuzzleMaker Group
469Python Active Exploits
470QNAP Active Exploits
471Qakbot
472Qlocker Ransomware
473Quasar
474RAMBleed
475RECON
476RIDL
477RIG Exploit Kit
478Raccoon Stealer
479Rancor APT
480RansomEXX Group
481Raspberry Robin Malware
482Rawin Exploit Kit
483Reaper APT37
484RedDot Exploit Kit
485RedGoBot
486RedJuliett Campaign
487RedLine Malware
488RedTail Malware
489Redigo Malware
490Redkit Exploit Kit
491RegreSSHion
492Remcos RAT
493Reptile Malware
494Resi Gemini Net Active Exploits
495Retbleed Active Exploits
496Return of the WiZard
497Revenge RAT
498RevengeHotels Campaign
499Ripple20
500RobbinHood Ransomware
501Roboto Botnet
502Rocke Group
503Rockwell Automation Active Exploits
504RokRAT Malware
505RomCom RAT
506Roundcube Webmail Active Exploits
507Rozena Backdoor
508Ryuk Ransomware
509SAP Applications Active Exploits
510SIGRed
511STAC4663 Group
512SUPERNOVA Malware
513SWEED Group
514Safari Active Exploits
515Sakura Exploit Kit
516SamSam Ransomware
517SandCat APT
518Sandbreak
519Sandworm Team APT
520Sandworm Trojan
521Satan Ransomware
522Satori Botnet
523Sava Exploit Kit
524ScamClub Group
525Scarlet Mimic APT
526Sea Turtle APT
527SeaSide Backdoor
528Sednit Exploit Kit
529ServiceNow Active Exploits
530ShadowPad Backdoor
531SharePoint Active Exploit-CVE-2019-0604
532SharePoint Active Exploits
533ShellBot Botnet
534ShellShock
535Shlayer Trojan
536Shrootless
537Siberia Exploit Kit
538Sidewinder APT
539Silence APT
540Sitecore XP Active Exploits
541Slingshot APT
542Slub Backdoor
543SmokeLoader Malware
544Smominru Botnet
545Sodinokibi Ransomware
546Sofacy APT28
547SolarWinds Serv-U Active Exploits
548SolarWinds Web Help Desk Active Exploits
549SonicWall GMS Active Exploit
550SonicWall SMA Active Exploits
551SonicWall SonicOS Active Exploits
552Sophos Active Exploits
553SparkRAT Malware
554Spartan Exploit Kit
555SpeakUp Backdoor Trojan
556Spectre
557Spectre-NG
558Spelevo Exploit Kit
559Spiral Group
560Spring Cloud Function Active Exploits
561Spring4Shell
562Stayin Alive Campaign
563Storm 0062 Group
564Storm-0978 Group
565StripedFly Malware
566Styx Exploit Kit
567SubZero Malware
568Suckfly APT
569SugarCRM Active Exploits
570Sundown Exploit Kit
571Sundown-Pirate Exploit Kit
572Sweet Orange Exploit Kit
573Symantec Messaging Gateway Active Exploit CVE-2017-6327
574Sysrv-hello Botnet
575TA413 APT
576TA459 APT
577TA505 APT
578TIBCO Jasper Reports Active Exploits
579TLStorm
580Taidoor Malware
581Tails Active Exploits
582TeamTNT APT
583Teclib GLPI Active Exploits
584TellYouThePass Ransomware
585Terrapin Attack
586Text4Shell
587The White Company Group
588ThreadKit Exploit Kit
589Tick APT
590ToddleShark Malware
591ToddyCat APT
592Tonto Team APT
593Tornado
594Trend Micro Products Active Exploits
595Trickbot
596Troldesh Ransomware
597Tropic Trooper APT
598TrueBot Malware
599Ttint Trojan
600Turla Malware
601UAC-0194 Group
602UAT4356 Group
603UNC1945 APT
604UNC2198 Group
605UNC2447 Group
606UNC2546 Group
607UNC2630 Group
608UNC2682 Group
609UNC2717 Group
610UNC3886 Group
611UNC4466 Group
612UNC4841 Group
613UNC4857 Group
614UNC5221 Group
615UNC5325 Group
616UNC5337 Group
617UTA0218 Group
618Underminer Exploit Kit
619VMWare Active Exploits
620VegaLocker Ransomware
621Velvet Ant Group
622Venom RAT
623Violin Panda APT20
624Void Banshee APT
625Volatile Cedar APT
626Volt Typhoon Group
627WPS Office Active Exploits
628WS FTP Server Active Exploits
629WSO2 Active Exploits
630WannaCry Ransomware
631Watchbog Malware
632Wavethrough
633Web Shell Malware
634Webtoos DDoS Trojan
635Wekby-APT18
636Western Digital NAS Devices Active Exploit CVE-2018-18472
637WhiteLotus Exploit Kit
638Whitefly APT
639Whitehole Exploit Kit
640Windigo APT
641Windows NTLM Active Exploit CVE-2019-1040
642Wingbird
643Winnti APT
644Winter Vivern APT
645Witchetty APT
646Wizard Spider Group
647WoodyRAT
648WordPress Active Exploits
649XBash Malware
650XCSSET Malware
652XDSpy APT
653XFiles Malware
654XMRig Cryptominer
655XWorm Malware
656ZHtrap Botnet
657Zabbix Active Exploits
658Zebrocy APT
659Zerobot Botnet
660Zerologon
661Zhi Zhu Exploit Kit
662Zimbra Collaboration Active Exploits
663Zirconium APT
664ZoPack
665Zoho ManageEngine ADSelfService Plus Active Exploits
666Zoho ManageEngine Access Manager Plus Active Exploits
667Zoho ManageEngine Desktop Central Active Exploit CVE-2020-10189
668Zoho ManageEngine PAM360 Active Exploits
669Zoho ManageEngine Password Manager Pro Active Exploits
670Zoho ManageEngine ServiceDesk Plus Active Exploits
671ZombieLoad
672Zoom Active Exploits
673Zyklon Backdoor
674Zyxel Devices Active Exploits
675admin338 APT
676amiak APT
677iPack Exploit Kit
678jQuery Active Exploits
679njRAT
680ownCloud Active Exploits
681vBulletin Active Exploit CVE-2020-17496
682vBulletin Active Exploit-CVE-2019-16759
683z0Miner Malware

Sl.NOMalware Vulnerability Enumeration
11byte Products Active Exploits
221Nails
35ss5c Ransomware
48220 Group
5APT-C-09
6APT-C-27
7APT-C-60
8APT12
9APT16
10APT30
11AZORult Trojan
12Abcbot Botnet
13Achilles
14Adobe Acrobat Reader Active Exploits
15Adobe ColdFusion Active Exploits
16AdvisorsBot Malware
17Adwind RAT
18Agent Tesla Trojan
19Akira Ransomware Group
20Amnesia33
21Andariel Group
22AndoryuBot Botnet
23AndroxGh0st Malware
24Angler Exploit Kit
25Antlion APT
26Aoqin Dragon
27Apache Flink Active Exploits
28Apache HTTP Server Active Exploits
29Apache HugeGraph Server Active Exploits
30Apache Log4j Active Exploits
31Apache OfBiz Active Exploits
32Apache Solr Active Exploits
33Apache Spark Active Exploits
34Apache Struts Active Exploits
35Apache Superset Active Exploits
36Apache Tomcat Active Exploits
37Apple MacOS Active Exploits
38Aquatic Panda APT
39Archie Exploit Kit
40Asnarok Trojan
41Asruex Trojan
42AssocAID Exploit Kit
43Astrum Exploit Kit
44Atlassian Products Active Exploits
45Atom Silo Group
46Aurora Panda APT17
47AveMaria RAT
48AvosLocker Ransomware
49Axiom Group
50B1txor20 Backdoor
51BIG IP Active Exploits
52BITTER APT
53BPFDoor
54BRONZE BUTLER APT
55BUSHWALK Malware
56BabyShark Malware
57BackConfig Trojan
58BackdoorDiplomacy APT
59BadAlloc
60Baldr Trojan
61BalkanDoor Backdoor
62Baron Samedit
63BazaLoader
64Beapy Cryptominer
65Bespoke Malware
66BestPack Exploit Kit
67BianLian Ransomware Group
68BigDebIT
69BillGates Botnet
70Bl00dy Ransomware Group
71Black Basta Group
72Black Kingdom Ransomware
73BlackByte Ransomware
74BlackCat Ransomware
75BlackHole Exploit Kit
76BlackLotus Malware
77BlackOasis APT
78BlackSquid Malware
79BlackTech APT
80Bleeding-Life Exploit Kit
81BleedingTooth
82Blue Mockingbird Group
83BlueKeep
84BlueNoroff APT
85BlueSky Ransomware
86BoldMove Backdoor
87BootHole
88BotenaGo Botnet
89Bottle Exploit Kit
90BrickerBot Botnet
91Buhtrap Group
92ByeBear
93CDPwn
94CK Exploit Kit
95COVID-19 Campaign
96CableHaunt
97CacheOut
98Cacti Active Exploits
99Calypso APT
100Capesand Exploit Kit
101Capsaicin Botnet
102Carbanak APT
103Cerber Ransomware
104Chainshot Malware
105Check Point Security Gateways Active Exploits
106Chthonic Banking Trojan
107Cisco ASA Active Exploit CVE-2018-0296
108Cisco ASA Active Exploit CVE-2020-3580
109Cisco ASA Active Exploits
110Cisco AnyConnect Active Exploits
111Cisco ESA Active Exploits
112Cisco IOS XR XE Active Exploits
113Cisco IP Phones Active Exploits
114Cisco SD WAN vManage Active Exploit
115Cisco SMA Active Exploits
116Cisco SPA112 2 Port Phone Adapter Active Exploit
117Cisco Secure Web Appliance Active Exploits
118Cisco Small Business RV Routers Active Exploits
119Citrix ADC Active Exploits
120Citrix ADC Gateway SDWAN WAN-OP Active Exploits
121Citrix Content Collaboration Active Exploits
122Citrix Gateway Active Exploits
123ClOp Ransomware
124Cleaver APT
125Cloud Atlas APT
126Cloud9 Botnet
127CloudMensis Spyware
128Cobalt APT
129Codoso APT19
130CommentPanda APT1
131Condi Malware
132Confucius APT
133Contec SolarView Series Active Exploits
134Cool Exploit Kit
135CopyKittens
136CrimeBoss Exploit Kit
137CrimePack Exploit Kit
138CritXPack Exploit Kit
139CrushFTP Active Exploits
140Cuba Ransomware
141Curveball
142Cyber Partisans Group
143D-Link Devices Active Exploits
144DEV-0322 APT
145Dacls RAT
146Dark.IoT Botnet
147DarkGate Malware
148DarkHydrus APT
149DarkIRC Botnet
150DarkMe Malware
151DarkRadiation Ransomware
152Darkhotel APT
153DazzleSpy Spyware
154DearCry Ransomware
155Deep Panda APT
156DevilsTongue Malware
157Dirty Pipe
158Disdain Exploit Kit
159Django Active Exploits
160Dofloo Trojan
161Donot Team APT-C-35
162DoppelPaymer Ransomware
163DotkaChef Exploit Kit
164Double Dragon APT41
165DoublePulsar BackDoor
166DragonOK APT
167Dragonfly APT
168DreamBus Malware
169Dridex Malware
170Drown
171Drupal Active Exploits
172Dukes-APT29
173Dust Storm APT
174ESXiArgs Ransomware
175Ebury Botnet
176Echobot Botnet
177Effluence Backdoor
178Elderwood Group
179Eleonore Exploit Kit
180Elephant Beetle
181Elfin APT33
182Elise Malware
183Ember-Bear Group
184Emissary Panda APT
185Emotet Trojan
186Empire Pack Exploit Kit
187Equation APT
188EternalBlue
189EternalRed
190EvilPost APT
191EwDoor Botnet
192ExileRat Malware
193Exim Active Exploits
194Exotic Lily Group
195F5 BIG-IP Active Exploits
196FIN11 APT
197FIN6 APT
198FIN7 APT
199FIN8 APT
200FabriXss
201Fallout
202Fallout Exploit Kit
203FatPipe Inc Active Exploits
204Fbot Botnet
205Ficora Botnet
206Fiesta Exploit Kit
207FileZen Active Exploits
208FinSpy
209Firefox Active Exploits
210FiveHands Ransomware
211FlashPack Exploit Kit
212Flimkit Exploit Kit
213Fodcha Botnet
214Follina
215Formbook Malware
216Fortinet Products Active Exploits
217Fox Kitten Campaign
218Fragus Exploit Kit
219Frankenstein Campaign
220FreakOut Malware
221FruityArmor APT
222FudModule Rootkit
223GOLD SOUTHFIELD Group
224Gafgtyt tor Botnet
225Gafgyt Botnet
226Gamaredon Group
227GambleForce Group
228GandCrab Ransomware
229GeoServer Active Exploits
230Gh0stRAT Trojan
231GhostMiner Malware
232Ghostcat
233GitLab Active Exploits
234Gitpaste-12 Malware
235Glazunov Exploit Kit
236Glueball
237Glupteba Malware Dropper
238GoBrut Botnet
239GoMet Backdoor
240Godlua Backdoor
241Godzilla Backdoor
242Godzilla Loader
243Goldoon Botnet
244Gongda Exploit Kit
245Google Chrome Active Exploits
246Gorgon APT
247Grafana Active Exploits
248Grandsoft Exploit Kit
249Graphite Malware
250GreenFlash-Sundown Exploit Kit
251Group5 APT
252GroupA21 APT
253H0lyGh0st Ransomware Group
254H2Miner Botnet
255HTTP2 Rapid Reset Attack
256HabitsRAT
257Hafnium Group
258Hail Cock Botnet
259Hangul Active Exploits
260Hanjuan Exploit Kit
261HawkEye Keylogger
262Hawkball Backdoor
263Headmare Group
264HeartBleed
265Helldown Ransomware Group
266HelloKitty Ransomware
267Hermes Ransomware
268Hezb Malware
269HiMan Exploit Kit
270Hierarchy Exploit Kit
271Higaisa APT
272HinataBot Botnet
273Hive Ransomware
274Hunter Exploit Kit
275IBM WebSphere Active Exploits
276INFRAHALT
277IZ1H9 Malware
278IcePack Exploit Kit
279Illumina UCS Active Exploits
280ImageMagick Active Exploits
281Imminent Monitor RAT
282Impact Exploit Kit
283ImpassionedFramework Exploit Kit
284Incognito Exploit Kit
285InfectedSlurs Botnet
286Infinity Exploit Kit
287Insekt RAT
288IntelBroker Group
289Internet Explorer Active Exploit CVE-2019-0752
290Internet Explorer Active Exploit CVE-2019-1367
291Internet Explorer Active Exploit CVE-2020-0674
292Internet Explorer Active Exploit CVE-2021-33742
293Internet Explorer Active Exploits
294JNEC.a Ransomware
295Jasmin Ransomware
296Jenkins Active Exploits
297JetBrains TeamCity Active Exploits
298JustExploit Exploit Kit
299KPOT Stealer Malware
300KaiXin Exploit Kit
301KashmirBlack Botnet
302Ke3chang APT
303Kerberods Trojan Dropper
304Khonsari Ransomware
305Kibana Active Exploits
306Kimsuky APT
307Knotweed APT
308Konni Group
309Kore Exploit Kit
310Kovter Malware
311Kr00k
312Kronos Banking Trojan
313KrustyLoader Malware
314KuaiGoMiner Trojan
315LOWZERO Backdoor
316Lamberts APT
317LatenBot
318LatentBot
319Lazarus Group
320Leafminer Group
321Lemon Duck Malware
322Leviathan APT
323LightSpy Spyware
324LightsOut Exploit Kit
325Line Runner Malware
326Linux Kernel Active Exploits
327Linux.Ngioweb Botnet
328LiquorBot Botnet
329LoJax Malware
330LockBit Ransomware
331Loda RAT
332LokiBot Malware
333Lone Wolf Group
334Lord Exploit Kit
335Lotus Blossom APT
336Lucifer Malware
337MATA Backdoor
338MBR Locker Ransomware
339Magecart Group
340Magento Active Exploits
341Magnet Goblin Group
342Magniber Ransomware
343Magnitude Exploit Kit
344MalSmoke Group
345Manganese APT
346Manuscrypt Malware
347Marvin Attack
348Maze Ransomware
349Meltdown
350MenuPass APT10
351Merry Christmas Exploit Kit
352MetaPack Exploit Kit
353Microsoft Excel Active Exploits
354Microsoft Exchange Server Active Exploits
355Microsoft Windows Active Exploits
356Migraine
357MikroTik RouterOS Active Exploits
358MinIO Active Exploits
359Mirai Botnet
360Mispadu Banking Trojan
361Mitel MiVoice Connect Active Exploits
362MobileIron Active Exploits
363ModifiedElephant APT
364Molerats APT
365Moobot Botnet
366Mozi Botnet
367Mozilla Thunderbird Active Exploits
368Mpack Exploit Kit
369Msupedge Backdoor
370MuddyWater APT
371Muhstik Botnet
372Mukashi Malware
373Mustang Panda APT
374MysterySnail RAT
375NAME:WRECK
376NEODYMIUM APT
377NOTROBIN Malware
378NRSMiner Cryptominer
379NXNSAttack
380Nagios Server Active Exploits
381Naikon APT
382Nansh0u Campaign
383Nebula Exploit Kit
384Necro Botnet
385Nemty Ransomware
386Neosploit Exploit Kit
387Neptune Exploit Kit
388NetCat Attack
389NetWalker Ransomware
390Neutrino Exploit Kit
391NextCry Ransomware
392NicePack Exploit Kit
393Night Sky Ransomware
394Nimbuspwn
395Niteris Exploit Kit
396Nostromo Active Exploits
397Novidade Exploit Kit
398Nuclear Exploit Kit
399Nucsoft Exploit Kit
400NullHole Exploit Kit
401OceanLotus APT32
402OilRig APT34
403OmniRAT Malware
404OpenSSL Active Exploits
405Operation Earth Kitsune
406Operation EmailThief
407Operation INJ3CTOR3 Campaign
408Operation LagTime IT Campaign
409Operation Muzabi
410Operation Poison Needles APT
411Operation PowerFall Campaign
412Operation SideCopy
413Operation TunnelSnake
414Operation WatchDog
415Operation WizardOpium Campaign
416Oracle Active Exploits
417Oracle Coherence Active Exploit CVE-2020-2555
418Oracle WebLogic Server Active Exploit CVE-2015-4852
419Oracle WebLogic Server Active Exploits
420Orcus Rat Malware
421P2Pinfect Malware
422PHP Active Exploits
423PKPLUG APT
424POLONIUM Group
425Palo Alto Active Exploits
426Persirai Botnet
427Petya Ransomware
428PgMiner Botnet
429Phoenix Exploit Kit
430Phosphorus Group
431Pinchy Spider APT
432Pirpi APT3
433Pitty Tiger APT
434Platinum APT
435Play Ransomware Group
436Plex Media Server Active Exploits
437PlugX Malware
438Plurox Malware
439Poison Ivy
440Poodle
441PopAds Exploit Kit
442Poseidon Group
443PostgreSQL Active Exploits
444PowerPool APT
445Powerdir
446Praying Mantis APT
447Predator the Thief Stealer Malware
448PrestaShop Active Exploits
449Primetek Primefaces Active Exploits
450PrincessLocker Ransomware
451PrintNightmare
452Private Exploit Kit
453Pro-Ocean Malware
454Progress Kemp LoadMaster Active Exploits
455Progress MOVEit Products Active Exploits
456ProjectM APT
457Promethium APT
458Prophet Spider APT
459ProxyShell
460ProxyToken
461Pulse Connect Secure Active Exploits
462Purple Fox Exploit Kit
463Purple Fox Malware
464Putter Panda APT2
465PuzzleMaker Group
466Python Active Exploits
467QNAP Active Exploits
468Qakbot
469Qlocker Ransomware
470Quasar
471RAMBleed
472RECON
473RIDL
474RIG Exploit Kit
475Raccoon Stealer
476Rancor APT
477RansomEXX Group
478Raspberry Robin Malware
479Rawin Exploit Kit
480Reaper APT37
481RedDot Exploit Kit
482RedGoBot
483RedJuliett Campaign
484RedLine Malware
485RedTail Malware
486Redigo Malware
487Redkit Exploit Kit
488RegreSSHion
489Remcos RAT
490Reptile Malware
491Resi Gemini Net Active Exploits
492Retbleed Active Exploits
493Return of the WiZard
494Revenge RAT
495RevengeHotels Campaign
496Ripple20
497RobbinHood Ransomware
498Roboto Botnet
499Rocke Group
500Rockwell Automation Active Exploits
501RokRAT Malware
502RomCom RAT
503Roundcube Webmail Active Exploits
504Rozena Backdoor
505Ryuk Ransomware
506SAP Applications Active Exploits
507SIGRed
508STAC4663 Group
509SUPERNOVA Malware
510SWEED Group
511Safari Active Exploits
512Sakura Exploit Kit
513SamSam Ransomware
514SandCat APT
515Sandbreak
516Sandworm Team APT
517Sandworm Trojan
518Satan Ransomware
519Satori Botnet
520Sava Exploit Kit
521ScamClub Group
522Scarlet Mimic APT
523Sea Turtle APT
524SeaSide Backdoor
525Sednit Exploit Kit
526ServiceNow Active Exploits
527ShadowPad Backdoor
528SharePoint Active Exploit-CVE-2019-0604
529SharePoint Active Exploits
530ShellBot Botnet
531ShellShock
532Shlayer Trojan
533Shrootless
534Siberia Exploit Kit
535Sidewinder APT
536Silence APT
537Sitecore XP Active Exploits
538Slingshot APT
539Slub Backdoor
540SmokeLoader Malware
541Smominru Botnet
542Sodinokibi Ransomware
543Sofacy APT28
544SolarWinds Serv-U Active Exploits
545SolarWinds Web Help Desk Active Exploits
546SonicWall GMS Active Exploit
547SonicWall SMA Active Exploits
548SonicWall SonicOS Active Exploits
549Sophos Active Exploits
550SparkRAT Malware
551Spartan Exploit Kit
552SpeakUp Backdoor Trojan
553Spectre
554Spectre-NG
555Spelevo Exploit Kit
556Spiral Group
557Spring Cloud Function Active Exploits
558Spring4Shell
559Stayin Alive Campaign
560Storm 0062 Group
561Storm-0978 Group
562StripedFly Malware
563Styx Exploit Kit
564SubZero Malware
565Suckfly APT
566SugarCRM Active Exploits
567Sundown Exploit Kit
568Sundown-Pirate Exploit Kit
569Sweet Orange Exploit Kit
570Symantec Messaging Gateway Active Exploit CVE-2017-6327
571Sysrv-hello Botnet
572TA413 APT
573TA459 APT
574TA505 APT
575TIBCO Jasper Reports Active Exploits
576TLStorm
577Taidoor Malware
578Tails Active Exploits
579TeamTNT APT
580Teclib GLPI Active Exploits
581TellYouThePass Ransomware
582Terrapin Attack
583Text4Shell
584The White Company Group
585ThreadKit Exploit Kit
586Tick APT
587ToddleShark Malware
588ToddyCat APT
589Tonto Team APT
590Tornado
591Trend Micro Products Active Exploits
592Trickbot
593Troldesh Ransomware
594Tropic Trooper APT
595TrueBot Malware
596Ttint Trojan
597Turla Malware
598UAC-0194 Group
599UAT4356 Group
600UNC1945 APT
601UNC2198 Group
602UNC2447 Group
603UNC2546 Group
604UNC2630 Group
605UNC2682 Group
606UNC2717 Group
607UNC3886 Group
608UNC4466 Group
609UNC4841 Group
610UNC4857 Group
611UNC5221 Group
612UNC5325 Group
613UNC5337 Group
614UTA0218 Group
615Underminer Exploit Kit
616VMWare Active Exploits
617VegaLocker Ransomware
618Velvet Ant Group
619Venom RAT
620Violin Panda APT20
621Void Banshee APT
622Volatile Cedar APT
623Volt Typhoon Group
624WPS Office Active Exploits
625WS FTP Server Active Exploits
626WSO2 Active Exploits
627WannaCry Ransomware
628Watchbog Malware
629Wavethrough
630Web Shell Malware
631Webtoos DDoS Trojan
632Wekby-APT18
633Western Digital NAS Devices Active Exploit CVE-2018-18472
634WhiteLotus Exploit Kit
635Whitefly APT
636Whitehole Exploit Kit
637Windigo APT
638Windows NTLM Active Exploit CVE-2019-1040
639Wingbird
640Winnti APT
641Winter Vivern APT
642Witchetty APT
643Wizard Spider Group
644WoodyRAT
645WordPress Active Exploits
646XBash Malware
647XCSSET Malware
648XDSpy APT
649XFiles Malware
650XMRig Cryptominer
651XWorm Malware
652ZHtrap Botnet
653Zabbix Active Exploits
654Zebrocy APT
655Zerobot Botnet
656Zerologon
657Zhi Zhu Exploit Kit
658Zimbra Collaboration Active Exploits
659Zirconium APT
660ZoPack
661Zoho ManageEngine ADSelfService Plus Active Exploits
662Zoho ManageEngine Access Manager Plus Active Exploits
663Zoho ManageEngine Desktop Central Active Exploit CVE-2020-10189
664Zoho ManageEngine PAM360 Active Exploits
665Zoho ManageEngine Password Manager Pro Active Exploits
666Zoho ManageEngine ServiceDesk Plus Active Exploits
667ZombieLoad
668Zoom Active Exploits
669Zyklon Backdoor
670Zyxel Devices Active Exploits
671admin338 APT
672amiak APT
673iPack Exploit Kit
674jQuery Active Exploits
675njRAT
676ownCloud Active Exploits
677vBulletin Active Exploit CVE-2020-17496
678vBulletin Active Exploit-CVE-2019-16759
679z0Miner Malware

Share This Article :

  • X
  • LinkedIn
Still stuck? How can we help?

Saner Documentation Feedback

Compliance Benchmark CoverageNetwork Scanner Product Support Matrix
Copyright 2025 - SecPod. All Rights Reserved. Privacy Policy.
SanerNow Version 6.5.x