Keyword: unixliona1
54359 Total Search   |   Showing Results : 461 - 480
{4889CB45-FFEB-486E-8785-D034DAC2ACE6} {361E80BE-388B-4270-BF54-A10C2B756504} = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Tarma Installer\ Products\{361E80BE-388B-4270-BF54-A10C2B756504} TizPath = "{malware path and file name}" HKEY_LOCAL_MACHINE
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ Interface\{C28145AB-9286-4EDE-BAE7-DE0A04F1936C}\TypeLib It adds the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\MediaPlayerV1alpha4017\ Components Ie = "1
CVE-2010-2884 Adobe Flash Player 10.1.82.76 and earlier on Windows, Mac OS X, Linux, and Solaris and 10.1.92.10 on Android; authplay.dll in Adobe Reader and Acrobat 9.x before 9.4; and authplay.dll
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\Microsoft\ Internet Explorer\Main NoProtectedModeBanner = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Internet Explorer GlobalUserOffline = "0" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
CVE-2010-0160 The Web Worker functionality in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, does not properly handle array data types for posted messages,
CVE-2009-3548 The Windows installer for Apache Tomcat 6.0.0 through 6.0.20, 5.5.0 through 5.5.28, and possibly earlier versions uses a blank default password for the administrative user, which allows
CVE-2004-1363 Buffer overflow in extproc in Oracle 10g allows remote attackers to execute arbitrary code via environment variables in the library name, which are expanded after the length check is
CVE-2004-1364 Directory traversal vulnerability in extproc in Oracle 9i and 10g allows remote attackers to access arbitrary libraries outside of the $ORACLE_HOME\bin directory. Oracle Oracle8i
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
HKEY_LOCAL_MACHINE\SOFTWARE\Tarma Installer\ Components\{4889CB45-FFEB-486E-8785-D034DAC2ACE6} {361E80BE-388B-4270-BF54-A10C2B756504} = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Tarma Installer\ Products\
\Microsoft\ Internet Explorer\Main NoProtectedModeBanner = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Internet Explorer GlobalUserOffline = "0" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion
CVE-2009-3027 VRTSweb.exe in VRTSweb in Symantec Backup Exec Continuous Protection Server (CPS) 11d, 12.0, and 12.5; Veritas NetBackup Operations Manager (NOM) 6.0 GA through 6.5.5; Veritas Backup
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
CVE-2012-5271 Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x
CVE-2008-3257 Stack-based buffer overflow in the Apache Connector (mod_wl) in Oracle WebLogic Server (formerly BEA WebLogic Server) 10.3 and earlier allows remote attackers to execute arbitrary code
%Application Data%\Google\Chrome\User Data\Default\Extensions\djkiheoffgjccjmbjcflfdnlfglgclpn\1\519b2ffd205576.64236490.js %Application Data%\Google\Chrome\User Data\Default\Extensions
URLInfoAbout = "https://www.{BLOCKED}ncleaner.com" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Uninstall\ Telamon Cleaner NoModify = "1" HKEY_CURRENT_USER\Software\Microsoft\ Windows