|Detected||Sep 30 2010 13:34 GMT|
|Released||Oct 01 2010 07:50 GMT|
If you’d like to find out more about how programs of this type function, please read about the general behavior of programs in the same class or sub-class (see right).
Because many programs of this type are slight modifications of older versions, the descriptions for these older versions may be of interest. Links to any available descriptions are displayed under the general description on the right of the screen.
If you can’t find a suitable description on our site, you can get more help from the Contact Us section.
Exploits are programs that contain data or executable code which take advantage of one or more vulnerabilities in software running on a local or remote computer for clearly malicious purposes.
Often, malicious users employ an exploit to penetrate a victim computer in order to subsequently install malicious code (for example, to infect all visitors to a compromised website with a malicious program). Additionally, exploits are commonly used by Net-Worms in order to hack a victim computer without any action being required from the user.
Nuker programs are notable among exploits; such programs send specially crafted requests to local or remote computers, causing the system to crash.