Keyword: os2first
41783 Total Search   |   Showing Results : 1221 - 1240
CVE-2010-2884 Adobe Flash Player 10.1.82.76 and earlier on Windows, Mac OS X, Linux, and Solaris and 10.1.92.10 on Android; authplay.dll in Adobe Reader and Acrobat 9.x before 9.4; and authplay.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ pdfforge Images2PDF\DefaultIcon HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ pdfforge Images2PDF\shell\open\ command HKEY_LOCAL_MACHINE\SOFTWARE\PDF Architect 2\ Links HKEY_LOCAL_MACHINE
" (Note: The default value data of the said registry entry is 0 .) HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Explorer\ Advanced Hidden = "2" (Note: The default value data of the said
CVE-2010-1748 The cgi_initialize_string function in cgi-bin/var.c in the web interface in CUPS before 1.4.4, as used on Apple Mac OS X 10.5.8, Mac OS X 10.6 before 10.6.4, and other platforms, does
This malicious application GingerBreak targets the Android platform and exploits a vulnerability presented on Android OS version 2.3 (code name: Gingerbread). After the exploit, the device is "rooted
%AppDataLocal%\Temp\{file name 2}.exe - where as the file name 2 can be similar name in any exe file located in system directory - detected as TROJ_ROPEST.B (Note: %AppDataLocal% is the Local Application Data
entries as part of its installation routine: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Explorer Path = "{encrypted CnCs, computer name and OS version}" HKEY_LOCAL_MACHINE\Software
banking/bitcoin Proxy address for the Man-in-the-middle attack List of new C&C server It gathers the following data: Host Name Public IP Address Computer Name OS Version OS Platform User Accounts System Info(CPU,
This Adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. It connects to
This potentially unwanted application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any
CVE-2011-0609 Unspecified vulnerability in Adobe Flash Player 10.2.154.13 and earlier on Windows, Mac OS X, Linux, and Solaris; 10.1.106.16 and earlier on Android; Adobe AIR 2.5.1 and earlier; and
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
data: OS Version MAC Address List of AV products from the victim's machine OS Architecture Username Domain Name Other Details This Trojan does the following: Uses PingCastle Scanner to determine
data: OS Version MAC Address List of AV products from the victim's machine OS Architecture Username Domain Name Other Details This Trojan does the following: Uses PingCastle Scanner to determine
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It creates folders where it drops its files. It may be injected into
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
below) HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\googleupdate Start = "2" (For Windows XP and below) HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\googleupdate ErrorControl = "1" (For
{Malware path}/idus.log {Malware Path}/vga.conf Information Theft This Backdoor gathers the following data: OS name OS version CPU clock rate CPU usage Number of CPU cores Network usage RAM size IP address
This worm sends copies of itself to target recipients using the instant-messaging (IM) application, MSN Messenger . It executes commands from a remote user to connect to malicious sites to download
Address OS Version User Name Other Details This spyware connects to the following URL(s) to check for an Internet connection: google.com It connects to the following URL(s) to get the affected system's IP