Lucene search
Basic search
Lucene search
Search by product
Subscribe
K
Start 30-day trial
Database
Vendors
Products
Years
CVSS
Scanner
Agent Scanning
API Scanning
Manual Audit
Perimeter Scanner
Scanning
Projects
Email
Webhook
Plugins
Resources
Documents
Blog
Glossary
FAQ
Pricing
Contacts
About Us
Partners
Branding Guideline
SIGN IN
Mohit Kumar
THN:DC21EBE0272DEA3B043A3EB0A5B5B1DA
History
Oct 27, 2013 - 5:37 a.m.
Terminator RAT became more sophisticated in recent APT attacks
2013-10-27
05:37:00
Mohit Kumar
thehackernews.com
95
0.973 High
EPSS
Percentile
99.9%
JSON
None
Related
info 67
exploit 7
NVD 2
scanner 3
microsoft 1
blog 9
software 1
threatpost
info
30
NetTraveler Attackers Using PRISM Program as Bait
2013-06-18 10:00:42
Safe Targeted Espionage Campaign Borrows from Cybercriminals
2013-05-20 14:47:14
Tool Scans for RTF Files Spreading Malware in Targeted Attacks
2012-09-14 17:25:21
checkpoint_advisories
info
6
MSCOMCTL.OCX Killbit: bdd1f04b-858b-11d1-b16a-00c0f0283628 (MS12-027; CVE-2012-0158)
2012-04-10 00:00:00
Microsoft Windows MSCOMCTL.OCX ActiveX Control Remote Code Execution - Ver2 (CVE-2012-0158)
2014-04-16 00:00:00
MSCOMCTL.OCX Killbit: 996BF5E0-8044-4650-ADEB-0B013914E99C (MS12-027; CVE-2012-0158)
2012-04-10 00:00:00
thn
info
14
Beware! Cyber Criminals may spoil your Valentine's Day
2014-02-10 22:26:00
Surveillance malware targets 350 high profile victims in 40 countries
2013-06-04 16:39:00
Surveillance malware targets 350 high profile victims in 40 countries
2013-06-04 05:39:00
canvas
exploit
Immunity Canvas: MS12_027
2012-04-10 21:55:00
attackerkb
info
CVE-2012-0158
2012-04-10 00:00:00
Microsoft Windows TabStrip MSCOMCTL.OCX RCE Vulnerability
2012-08-15 00:00:00
fireeye
info
10
China-based Cyber Threat Group Uses Dropbox for Malware Communications and Targets Hong Kong Media Outlets
2015-12-01 08:00:00
China-based Cyber Threat Group Uses Dropbox for Malware Communications and Targets Hong Kong Media Outlets
2015-12-01 08:00:00
APT Group Sends Spear Phishing Emails to Indian Government Officials
2016-06-03 01:30:00
saint
exploit
4
Microsoft Windows Common Controls MSCOMCTL.OCX Vulnerability
2012-04-12 00:00:00
Microsoft Windows Common Controls MSCOMCTL.OCX Vulnerability
2012-04-12 00:00:00
Microsoft Windows Common Controls MSCOMCTL.OCX Vulnerability
2012-04-12 00:00:00
cve
NVD
CVE-2012-0158
2012-04-10 21:55:00
openvas
scanner
Microsoft Windows Common Controls Remote Code Execution Vulnerability (2664258)
2012-04-11 00:00:00
Microsoft Windows Common Controls Remote Code Execution Vulnerability (2664258)
2012-04-11 00:00:00
packetstorm
exploit
MS12-027 MSCOMCTL ActiveX Buffer Overflow
2012-04-25 00:00:00
nessus
scanner
MS12-027: Vulnerability in Windows Common Controls Could Allow Remote Code Execution (2664258)
2012-04-11 00:00:00
cisa_kev
info
Microsoft MSCOMCTL.OCX Remote Code Execution Vulnerability
2021-11-03 00:00:00
prion
NVD
Design/Logic Flaw
2012-04-10 21:55:00
mskb
microsoft
MS12-027: Vulnerability in MSCOMCTL.OCX could allow Remote Code Execution: April 10, 2012
2012-04-10 00:00:00
talosblog
blog
When combining exploits for added effect goes wrong
2017-08-14 09:55:00
myhack58
info
Hand to hand teach you how to construct the office exploits EXP(fourth period)-bug warning-the black bar safety net
2016-12-03 00:00:00
The macro perspective of the office vulnerability, 2010-2018-a vulnerability warning-the black bar safety net
2019-06-13 00:00:00
malwarebytes
blog
Chinese APT group targets India and Hong Kong using new variant of MgBot malware
2020-07-21 15:00:00
seebug
exploit
Microsoft Office 内存损坏漏洞(CVE-2015-1641)
2015-12-31 00:00:00
carbonblack
blog
Technical Analysis: Hackers Leveraging COVID-19 Pandemic to Launch Phishing Attacks, Fake Apps/Maps, Trojans, Backdoors, Cryptominers, Botnets & Ransomware
2020-03-19 20:48:06
securityvulns
software
Microsoft Windows multiple security vulnerabilities
2012-04-23 00:00:00
securelist
blog
Cycldek: Bridging the (air) gap
2020-06-03 10:00:32
ics
info
Top 10 Routinely Exploited Vulnerabilities
2020-05-12 12:00:00
Potential for China Cyber Response to Heightened U.S.–China Tensions
2020-10-20 12:00:00
qualysblog
blog
4
Top 19+ Vulnerability CVEs in Santa’s Dashboard Tracking
2019-12-27 18:01:22
Part 2: An In-Depth Look at the Latest Vulnerability Threat Landscape (Attackers’ Edition)
2023-07-18 13:38:53
Qualys Top 20 Most Exploited Vulnerabilities
2023-09-04 14:00:00
avleonov
blog
September 2023: VM courses, Bahasa Indonesia, Russian Podcasts, Goodbye Tinkoff, MS Patch Tuesday, Qualys TOP 20, Linux, Forrester, GigaOm, R-Vision VM
2023-09-30 19:31:42
0.973 High
EPSS
Percentile
99.9%
JSON
Related for THN:DC21EBE0272DEA3B043A3EB0A5B5B1DA
info
67
exploit
7
NVD
2
scanner
3
microsoft
1
blog
9
software
1