Keyword: microsoft internet explorer
73965 Total Search   |   Showing Results : 32561 - 32580
CVE-2011-3396 This security update resolves two privately reported vulnerabilities in Microsoft Office . The vulnerabilities could allow remote code execution if a user opens a specially crafted
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Other Details This Trojan adds the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\MIcrosoft
Tracker 'verify.php' Remote Password Reset Vulnerability (CVE-2017-7615) Web Server HTTPS 1011673 - Cacti Command Injection Vulnerability (CVE-2022-46169) Web Server SharePoint 1011541* - Microsoft
\AppData\Roaming\Microsoft\Windows\Start Menu on Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), Windows 8 (32- and 64-bit), Windows 8.1 (32- and 64-bit), Windows Server 2008, and Windows Server
Menu on Windows 2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\Users\{user name}\AppData\Roaming\Microsoft\Windows\Start Menu on Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit
\Documents and Settings\{user name}\Start Menu on Windows 2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\Users\{user name}\AppData\Roaming\Microsoft\Windows\Start Menu on Windows Vista (32- and
2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\Users\{user name}\AppData\Roaming\Microsoft\Windows\Start Menu on Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), Windows 8 (32-
2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\Users\{user name}\AppData\Roaming\Microsoft\Windows\Start Menu on Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), Windows 8 (32-
Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run 68AD0FD0 = "%User Profile%
Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run 68AD0FD0 = "%User Profile%
Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run 68AD0FD0 = "
2003.) Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run
This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run F0BDFF95 = "%User Profile%
Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run 68AD0FD0 = "%User Profile%\Axftzrrgv
HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run F0BDFF95 = "%User Temp%\Wnxulxqp\sfmgpruumc.exe" Other System Modifications This Trojan deletes the following files: %User Temp%\hcpslnlayc.pre (Note:
created svchost.exe Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows NT
entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows NT\CurrentVersion\Winlogon shell = "explorer.exe,%Application Data%\skype.dat" NOTES: This
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run {random CLSID} = %Application Data%\{random1}\{random}.exe Other System Modifications This spyware adds the
Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run E-Set 2011 = %Program Files%\E-Set
Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Local\Temp on Windows Vista and 7.) It adds the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion