Search
Keyword: javabytevera1
CVE-2011-0419 Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in
CVE-2006-2758,CVE-2009-1523 Directory traversal vulnerability in the HTTP server in Mort Bay Jetty 5.1.14, 6.x before 6.1.17, and 7.x through 7.0.0.M2 allows remote attackers to access arbitrary
CVE-2009-3985 �Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, allows remote attackers to associate spoofed content with an invalid URL by setting document.location to this URL, and then
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the affected system's HOSTS files. This
This malware abuses certificates and has security software evasion that affects machines using Apple's OS X operating system. The fake certificates installed by the malware allows for man in the
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
CVE-2009-3987 The GeckoActiveXObject function in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, generates different exception messages depending on whether the
\SOFTWARE\Microsoft\ Cryptography\OID\EncodingType 1\ CryptDllEncodeObject\1.3.6.1.4.1.311.2.1.15 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Cryptography\OID\EncodingType 1\ CryptDllEncodeObject\#2004
\SOFTWARE\Microsoft\ Cryptography\OID\EncodingType 1\ CryptDllEncodeObject\1.3.6.1.4.1.311.2.1.15 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Cryptography\OID\EncodingType 1\ CryptDllEncodeObject\#2004
" HKEY_CURRENT_USER\Software\Microsoft\ MediaPlayer\Preferences SendUserGUID = "{random values}" HKEY_CURRENT_USER\Software\Microsoft\ MediaPlayer\Preferences SilentAcquisition = "1" HKEY_CURRENT_USER\Software
" HKEY_LOCAL_MACHINE\SOFTWARE\Policies\ Microsoft\Windows\WindowsUpdate DisableOSUpgrade = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Policies\ Microsoft\Windows\WindowsUpdate\ OSUpgrade ReservationsAllowed = "0
\SOFTWARE\Classes\ CLSID\{52F6F7BD-DF73-44B3-AE13-89E1E1FB8F6A}\MiscStatus HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ CLSID\{52F6F7BD-DF73-44B3-AE13-89E1E1FB8F6A}\MiscStatus\ 1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
CVE-2008-3640 Integer overflow in the WriteProlog function in texttops in CUPS before 1.3.9 allows remote attackers to execute arbitrary code via a crafted PostScript file that triggers a heap-based
CVE-2008-3641 The Hewlett-Packard Graphics Language (HPGL) filter in CUPS before 1.3.9 allows remote attackers to execute arbitrary code via crafted pen width and pen color opcodes that overwrite