Keyword: linux
987 Total Search   |   Showing Results : 61 - 80
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and before 11.2.202.508 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and before 11.2.202.481 on Linux allow attackers to cause a denial of service (NULL pointer dereference) or
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and before 11.2.202.481 on Linux allow attackers to cause a denial of service (NULL pointer dereference) or
CVE-2013-5331,CVE-2013-5332,apsb13-28 Adobe Flash Player on Windows and Linux allow remote attackers to execute arbitrary code via crafted content that leverages an unspecified "type confusion", as
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and before 11.2.202.481 on Linux allows attackers to execute arbitrary code via
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and before 11.2.202.481 on Linux allows attackers to execute arbitrary code via
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and before 11.2.202.481 on Linux allow attackers to execute arbitrary code or cause a denial of service (memory
Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and before 11.2.202.418 on Linux allow attackers to execute arbitrary code by leveraging an unspecified "type
Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and before 11.2.202.418 on Linux allow attackers to execute arbitrary code by leveraging an unspecified "type
Adobe Flash Player before 13.0.0.262 and 14.x through 16.x before 16.0.0.287 on Windows and OS X and before 11.2.202.438 on Linux does not properly restrict discovery of memory addresses, which
HP-UX Linux SunOS If the system type is one of the aforementioned, it will try to overwrite the disk partitions or delete the following folders: /etc/ /home/ /kernel/ /usr/ Dropped by other malware
CVE-2003-1138 The default configuration of Apache 2.0.40, as shipped with Red Hat Linux 9.0, allows remote attackers to list directory contents, even if auto indexing is turned off and there is a
CVE-2015-3636 This vulnerability involves the ping_unhash function in net/ipv4/ping.c in the Linux kernel before 4.0.3, where it does not initialize a certain list data structure during an unhash
InterScan VirusWall 5.1 for Windows NT,Trend Micro InterScan VirusWall Linux for SMB,Trend Micro InterScan VirusWall Scan Engine 7.510.0-1002,Trend Micro InterScan VirusWall Windows NT for SMB,Trend Micro
CVE-2013-6282 The get_user and put_user API functions of the Linux kernel fail to validate the target address when being used on ARM v6k/v7 platforms. This functionality was originally implemented
2015-0324,apsb15-04 Buffer overflow in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and before 11.2.202.442 on Linux allows attackers to execute arbitrary
This malware is involved in the February 2016 compromise of an open-source Linux OS distribution website. It may find its way into users' systems by being embedded in a downloaded Linux Mint ISO
CVE-2010-2221 Multiple buffer overflows in the iSNS implementation in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) before 1.0.6, (2) iSCSI Enterprise Target (aka
Details This backdoor does the following: It is capable of opening a shell and may execute any command from a remote user: cmd.exe is executed in Windows /bin/sh is executed in Linux It accepts the
CVE-2008-2025 Cross-site scripting (XSS) vulnerability in Apache Struts before 1.2.9-162.31.1 on SUSE Linux Enterprise (SLE) 11, before 1.2.9-108.2 on SUSE openSUSE 10.3, before 1.2.9-198.2 on SUSE