Search
Keyword: unixliona1
\ RestartManager\Session0000 Sequence = "1" HKEY_CURRENT_USER\Software\Microsoft\ RestartManager\Session0000 RegFiles0000 = "\x00" HKEY_CURRENT_USER\Software\Microsoft\ RestartManager\Session0000 RegFilesHash = "
CVE-2006-0377 CRLF injection vulnerability in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to inject arbitrary IMAP commands via newline characters in the mailbox parameter of the
CVE-2003-0222 Stack-based buffer overflow in Oracle Net Services for Oracle Database Server 9i release 2 and earlier allows attackers to execute arbitrary code via a "CREATE DATABASE LINK" query
\" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ services\iis\Parameters SrvanyUI = {GUID Value} HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ services\iis ErrorControl = "1" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet
\Microsoft\ Internet Account Manager\Accounts\Active Directory GC LDAP Server ID = "0" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\Bigfoot LDAP Server ID = "1" HKEY_CURRENT_USER
adds the following registry entries: HKEY_CURRENT_USER\Software\Policies\ Microsoft\Windows\System DisableCMD = "1" HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\Main Window Title =
{22222222-2222-2222-2222-220322802294}" HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ CrossriderApp0038094.Sandbox\CurVer Default = "CrossriderApp0038094.Sandbox" HKEY_LOCAL_MACHINE\SOFTWARE\Ultra Downloads Notifier\ IE TotalProfiles = "1
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
\ Windows\CurrentVersion\Uninstall\ Nezavisimo 1.5 VersionMajor = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Uninstall\ Nezavisimo 1.5 VersionMinor = "5" HKEY_LOCAL_MACHINE\SOFTWARE
LDAP Server ID = "1" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\VeriSign LDAP Server ID = "2" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\WhoWhere
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\SOFTWARE\Microsoft\ Windows\CurrentVersion\Uninstall\ Sense UninstallString = "%Program Files%\Sense\Uninstall.exe /fcp=1" HKEY_LOCAL_MACHINE\SOFTWARE\Sense\ Installer BundledChrome = "1" HKEY_LOCAL_MACHINE
\Microsoft\ Windows\CurrentVersion\Uninstall\ Torrent Search NoModify = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Uninstall\ Torrent Search NoRepair = "1" HKEY_CURRENT_USER\Software
This potentially unwanted application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed
\WindowsUpdate DisableOSUpgrade = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Policies\ Microsoft\Windows\WindowsUpdate\ OSUpgrade ReservationsAllowed = "0" HKEY_LOCAL_MACHINE\SOFTWARE\51e5db588f 86bd5df9 = "864
Identity Ordinal = "1" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts AssociatedID = "{random values}" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\Active
Identity Ordinal = "1" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts AssociatedID = "{random values}" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\Active
Identity Ordinal = "1" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts AssociatedID = "{random values}" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\Active
CVE-2012-0256 Apache Traffic Server 2.0.x and 3.0.x before 3.0.4 and 3.1.x before 3.1.3 does not properly allocate heap memory, which allows remote attackers to cause a denial of service (daemon
\Software\Microsoft\ RestartManager\Session0000 SessionHash = "{random characters}" HKEY_CURRENT_USER\Software\Microsoft\ RestartManager\Session0000 Sequence = "1" HKEY_CURRENT_USER\Software\Microsoft