Category
|
Description
|
Access Control
|
Vulnerabilities caused by insecure access control
|
Backdoor/Trojan Horse
|
Network activities related to backdoor activity or Trojan horse
|
BotNet
|
BotNet activity
|
Buffer Overflow
|
Vulnerabilities caused by buffer (heap/stack) overflow/underflow
|
DoS (Denial of Service)
|
Denial of Services activities
|
Exploits
|
Exploits found in the public domain, such as Exploit-DB
|
File Vulnerabilities
|
Vulnerabilities regarding file formats, such as Office documents and
image files
|
Instant Messenger
|
Instant Messenger activity
|
Malware Traffic
|
Activities incurred by malware, such as phone home to C&C servers
|
P2P
|
P2P activity
|
Reconnaissance
|
Scanning activities in the pre-compromise stage of an attack
|
Scan
|
Probe or scan activity
|
Virus/Worm
|
Network activities related to worms
|
Web Attack
|
Vulnerabilities regarding Web servers and clients
|
Miscellaneous
|
Anything that does not fit into any other category
|
The page you're looking for can't be found or is under maintenance
Try again later or go to the home page
Go to home page