Search
Keyword: linux
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and before 11.2.202.508 on Linux allows attackers to execute arbitrary code via unspecified vectors, a dif...
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and before 11.2.202.508 on Linux allows attackers to execute arbitrary code via unspecified vectors, a dif...
This backdoor may be hosted on a website and run when a user accesses the said website.
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and before 11.2.202.481 on Linux allows attackers to execute arbit...
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and before 11.2.202.481 on Linux, allows attackers to execute arbi...
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and before 11.2.202.508 on Linux allows attackers to execute arbitrary code via unspecified vectors, a dif...
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and before 11.2.202.481 on Linux allows attackers to execute arbit...
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and before 11.2.202.481 on Linux, allows attackers to execute arbi...
This Hacking Tool may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Adobe Flash Player is prone to an unspecified remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running th...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully perform its intended routine.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware packages. It requires its main component to succes...
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to succ...
Microsoft addresses several vulnerabilities in its August batch of patches: CVE-2017-8591 | Windows IME Remote Code Execution Vulnerability Risk Rating: Critical This security update resolves a rem...
A remote code execution vulnerability exists in Adobe Flash Player. The vulnerability is due to an unspecified error. A remote attacker can exploit this vulnerability by enticing a...
* indicates a new version of an existing rule Deep Packet Inspection Rules: Redis Server 1011555* - Redis Integer Overflow Vulnerability (CVE-2022-35951) Web Application PHP Based 1011689* - LibreNMS Cross-Site Scripting Vulne...
This backdoor connects to a website to send and receive information.
