Search
Keyword: linux
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It performs denial of service (DoS) attacks on affected systems using specific flooding method(s).
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It performs denial of service (DoS) attacks on affected systems using specific flooding method(s).
Apache Backdoor - Linux/Cdorked.A
Linux/Cdorked.A is one of the most sophisticated Apache backdoors that targets the Linux platforms. This malware redirects traffic to malicious websites.
Apply associated Trend Micro DPI Rules.
Heap-based buffer overflow in rsync before 2.5.7, when running in server mode, allows remote attackers to execute arbitrary code and possibly escape the chroot jail.
Andrew Tridgell rsy...
The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect t...
The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel before 2.6.22 does not properly validate the hop-by-hop IPv6 extended header, which allows remote attacke...
The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and f...
Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows ...
* indicates a new version of an existing ruleDeep Packet Inspection Rules:DCERPC Services - Client1007120* - SMB DLL Injection Exploit Detected (ATT&CK T1055.001)Microsoft Office1011095 - Microsoft Excel Remote Code Execu...
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This is the a zero-day vulnerability disclosed from the Hacking Team leak. It affects all versions of Flash Player for Windows, Mac, and Linux. The bug is a Use-After-Free vulnerability involving the ...
Adobe Flash Player before 10.2.154.27 on Windows, Linux, and Solaris and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader 9.x before 9.4.4 and 10.x through 10.0...
Debian Linux 'httpd' Vulnerability
A default configuration of Apache on Debian GNU/Linux sets the ServerRoot to /usr/doc, which allows remote users to read documentation files for the entire server.
Apply associated Trend Micro DPI Rules.
This malware is involved in the February 2016 compromise of an open-source Linux OS distribution website. It may find its way into users' systems by being embedded in a downloaded Linux Mint ISO file. Users affected by this malware may find the secur...
Off-by-one error in the ldap scheme handling in the Rewrite module (mod_rewrite) in Apache 1.3 from 1.3.28, 2.0.46 and other versions before 2.0.59, and 2.2, when RewriteEngin...
A flaw was found in the way the Linux kernel's futex subsystem handles certain Priority Inheritance (PI) futexes. Attackers who successfully exploit this vulnerability may raise their privileges on the vulne...
The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges v...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This malware was downloaded from a fake Trend Micro page.This Trojan may arrive bundled with malware packages as a malware component. It may be unknowingly downloaded by a user while visiting malicious websites. It may be hosted on a website and run...