Keyword: linux
971 Total Search   |   Showing Results : 21 - 40
Mac_PowerPC) Mozilla/4.0 (compatible; MSIE 5.23; Mac_PowerPC) Mozilla/4.0 (compatible; MSIE 5.5; Windows NT 5.0) Mozilla/4.0 (compatible; MSIE 6.0; ; Linux armv5tejl; U) Opera 8.02 [en_US] Maemo browser 0.4.31
Mac_PowerPC) Mozilla/4.0 (compatible; MSIE 5.23; Mac_PowerPC) Mozilla/4.0 (compatible; MSIE 5.5; Windows NT 5.0) Mozilla/4.0 (compatible; MSIE 6.0; ; Linux armv5tejl; U) Opera 8.02 [en_US] Maemo browser 0.4.31
file with a long XSLT "transformation match" condition that triggers a large number of steps. redhat Enterprise Linux Desktop 5,redhat Enterprise Linux Desktop Workstation 5,redhat desktop 3,redhat
CVE-2007-5962 Memory leak in a certain Red Hat patch, applied to vsftpd 2.0.5 on Red Hat Enterprise Linux (RHEL) 5 and Fedora 6 through 8, and on Foresight Linux and rPath appliances, allows remote
code execution on servers that run these Linux distributions. Bash is used by most Unix and Linux systems, as well as OS X. This vulnerability was reportedly being exploited in the wild already. Trend
system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Other Details This Hacking Tool does the following: This Hacking Tool is used for Linux
SE: • JDK and JRE 6 Update 18 and earlier for Windows, Solaris, and Linux • JDK 5.0 Update 23 and earlier for Solaris • SDK 1.4.2_25 and earlier for Solaris • Java for Business: • JDK and JRE 6 Update
2.0.56,Apache Software Foundation Apache HTTP Server 2.0.57,Apache Software Foundation Apache HTTP Server 2.0.58,Ubuntu Ubuntu Linux 5.04,Ubuntu Ubuntu Linux 5.10,Ubuntu Ubuntu Linux 6.06 LTS Apply associated
Linux 7.0,Conectiva Conectiva Linux 8.0,Wietse Venema Postfix 1.0.21,Wietse Venema Postfix 1.1.11,Wietse Venema Postfix 19990906,Wietse Venema Postfix 19991231,Wietse Venema Postfix 20010228,Wietse Venema
NOTES: The Possible_PROCHID.SMLBAT1 detection is for Linux malware, which may have the capability to hide processes.
code execution on servers that run these Linux distributions. Bash is used by most Unix and Linux systems, as well as OS X. This vulnerability was reportedly being exploited in the wild already. Trend
NOTES: Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest the characteristics of an exploited Linux vmsplice() function.
Macintosh,Adobe Flash Player 18.0.0.204 and earlier versions for Linux installed with Google Chrome,Adobe Flash Player Extended Support Release version 13.0.0.302 and earlier 13.x versions for Windows and
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and before 11.2.202.508 on Linux allows attackers to execute arbitrary code via unspecified vectors. Apply associated
This vulnerability, dubbed as "Ghost," is found in the GNU C Library (also known as glibc). It can be employed by attackers to execute arbitrary code on various Linux operating systems.
13.0.0.260 and earlier 13.x versions Adobe Flash Player 11.2.202.429 and earlier versions for Linux CVE-2015-0311 Adobe Flash Player 16.0.0.287 and earlier versions for Windows and Macintosh Adobe Flash Player
CVE-2014-3153 A flaw was found in the way the Linux kernel's futex subsystem handles certain Priority Inheritance (PI) futexes. Attackers who successfully exploit this vulnerability may raise their
Buffer overflow in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and before 11.2.202.521 on Linux allows attackers to execute arbitrary code via unspecified vectors.
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and before 11.2.202.521 on Linux allows attackers to execute arbitrary code via unspecified
Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and before 11.2.202.521 on Linux allow attackers to execute arbitrary code by leveraging an unspecified "type confusion.