Keyword: microsoft internet explorer
74031 Total Search   |   Showing Results : 34301 - 34320
CVE-2009-3132 Microsoft Office Excel 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Excel Viewer 2003 SP3; Office Excel Viewer
CVE-2010-0486,MS10-019 The WinVerifyTrust function in Authenticode Signature Verification 5.1, 6.0, and 6.1 in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows
CVE-2011-0030 This security update addresses a vulnerability in the Microsoft Windows Client/Server Run-time Subsystem (CSRSS), which could allow elevation of privilege. The exploit works if an
startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run Microsoft Domain Controller = "%System%\mstc.exe" Other System Modifications This worm adds the following registry keys:
to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run Microsoft Anti Virus Controller = msavc32.exe Other Details This backdoor
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Winlogon = "%User Profile%\Application Data\Winlogon.exe" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows
automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run Find = "%Windows%\antivirus.exe" Other System Modifications This worm adds the following registry
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Betriebssystem Microsoft® Windows® = "%User Temp%\crcss.exe" Dropping Routine This Trojan drops the
\Microsoft\ DirectWin32 It adds the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ DirectWin32 Policy = "{random characters}" Dropping Routine This worm drops the following files: %System%
\SOFTWARE\Microsoft\ DirectWin32 It adds the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ DirectWin32 Policy = "{random characters}" Dropping Routine This Trojan drops the following
Modifications This Trojan adds the following registry keys: HKEY_CURRENT_USER\Software\Microsoft\ Windows Script\Settings It adds the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Windows
automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Microsoft Windows = "%Windows%\Photos.exe" Dropping Routine This Trojan drops the following files:
automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Microsoft Windows = "%Windows%\Photos.exe" Dropping Routine This Trojan drops the following files:
This security update addresses a vulnerability found existing in Microsoft Windows. Once successfully exploited, it could allow elevation of privilege when an attacker logs to a system and runs a
CVE-2010-0821 Unspecified vulnerability in Microsoft Office Excel 2002 SP3, 2003 SP3, 2007 SP1 and SP2; Office 2004 for mac; Office 2008 for Mac; Open XML File Format Converter for Mac; Office Excel
HKEY_CURRENT_USER\Software\Microsoft\ Speech\PhoneConverters DefaultTokenId = "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech\PhoneConverters\Tokens\English" Dropping Routine This Joke Program drops the following
\SOFTWARE\Wow6432Node\ Microsoft\Windows\CurrentVersion\ RUN Microsoft WinUpdate = "%System%\msupdte.exe" Dropping Routine This Trojan drops the following files: %System%\msupdte.exe (Note: %System% is the
(CVE-2020-5844) Web Server IIS 1006434* - Microsoft IIS Directory Traversal Vulnerability 1000101* - Microsoft IIS Malformed HTTP Request DoS Vulnerability Web Server Miscellaneous 1011521 - Atlassian Jira Server
Serv-U Directory Traversal Vulnerability (CVE-2024-28995) 1012051* - WordPress Core Cross-Site Scripting Vulnerability (CVE-2024-4439) Web Server SharePoint BDC 1012113* - Microsoft SharePoint Server
(es): svchost.exe Autostart Technique This Ransomware adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows