Search
Keyword: ms
3244 Total Search |
Showing Results : 1 - 20
system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run MS Windows Update = "service.exe" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\RunServices MS Windows
here . (MS13-068) Vulnerability in Microsoft Outlook Could Allow Remote Code Execution (2756473) Risk Rating: Critical This security update addresses a vulnerability in MS Outlook that may lead to
\CrucialSoft Ltd %User Profile%\CrucialSoft Ltd\MS AntiSpyware 2009 (Note: %User Profile% is the current user's profile folder, which is usually C:\Documents and Settings\{user name} on Windows 2000, XP, and
spyware may be used to display the installed product ID and product key of the following: MS Office Windows operating system Internet Explorer MS Exchange Server MS SQL Server Visual Studio
\CrucialSoft Ltd %User Profile%\CrucialSoft Ltd\MS AntiSpyware 2009 (Note: %User Profile% is the current user's profile folder, which is usually C:\Windows\Profiles\{user name} on Windows 98 and ME, C:\WINNT
\CrucialSoft Ltd %User Profile%\CrucialSoft Ltd\MS AntiSpyware 2009 (Note: %User Profile% is the current user's profile folder, which is usually C:\Windows\Profiles\{user name} on Windows 98 and ME, C:\WINNT
\CrucialSoft Ltd %User Profile%\CrucialSoft Ltd\MS AntiSpyware 2009 (Note: %User Profile% is the current user's profile folder, which is usually C:\Windows\Profiles\{user name} on Windows 98 and ME, C:\WINNT
\CrucialSoft Ltd %User Profile%\CrucialSoft Ltd\MS AntiSpyware 2009 (Note: %User Profile% is the current user's profile folder, which is usually C:\Documents and Settings\{user name} on Windows 2000, XP, and
\CrucialSoft Ltd %User Profile%\CrucialSoft Ltd\MS AntiSpyware 2009 (Note: %User Profile% is the current user's profile folder, which is usually C:\Documents and Settings\{user name} on Windows 2000, XP, and
. (MS13-084) Vulnerabilities in Microsoft SharePoint Server Could Allow Remote Code Execution (2885089) Risk Rating: Important This security update addresses two vulnerabilities in MS Office that may
\CrucialSoft Ltd %User Profile%\CrucialSoft Ltd\MS AntiSpyware 2009 (Note: %User Profile% is the current user's profile folder, which is usually C:\Documents and Settings\{user name} on Windows 2000, XP, and
\CrucialSoft Ltd %User Profile%\CrucialSoft Ltd\MS AntiSpyware 2009 (Note: %User Profile% is the current user's profile folder, which is usually C:\Documents and Settings\{user name} on Windows 2000, XP, and
the affected system and executes them: %ProgramData%\MS Word 2015\{random filename}.exe (for Windows Vista and above) %Program Files%\Common Files\MS Word 2015\{random filename}.exe (for Windows XP and
CVE-2012-1894 This update resolves a vulnerability identified in MS Office for Mac that could allow remote code execution when successfully exploited. The vulnerability exists in folder permissions
system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. NOTES: This malware is the detection for an infected MS Excel file. It checks for open
This spyware searches the local drive of an infected system for MS Word and MS Excel documents. The collected documents are then archived and saved. It then uploads the created archive to the
entry is "{User Defined}" .) NOTES: It modifies the following files: {MS Word Application path}\Normal.dot {MS Powerpoint Application path}\Blank Presentation.pot It disables the virus protection of MS
execute any code on the vulnerable system. Some of the affected MS products are: MS Visual FoxPro MS Commerce Server MS SQL Server MS Office Microsoft Office 2003 Service Pack 3,Microsoft Office 2003 Web
Office document. The targeted platforms are MS Office 2007, 2010, 2013, 2016, and Office 365. CVE-2017-11882 is a remote code execution vulnerability that can enable an attacker to execute arbitrary code
Description Name: CVE-2018-8581 MS Exchange Server NTLM Authentication Bypass HTTP - (Response) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of netwo...