Search
Keyword: microsoft internet explorer
\Software\Microsoft\ Internet Explorer\Main\FeatureControl HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\Main\FeatureControl\ FEATURE_BROWSER_EMULATION HKEY_CURRENT_USER\Software\Microsoft\ Internet
2000, XP, and Server 2003.) It adds the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\ Microsoft\Internet Explorer\Control Panel HKEY_CURRENT_USER\SOFTWARE\Policies\ Microsoft\Internet
\Software\Microsoft\ Internet Explorer\SearchScopes It adds the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\SearchScopes DownloadUpdates = "23c" HKEY_CURRENT_USER
fewer rights on the system. Microsoft Internet Explorer 6 (Windows Server 2003 Service Pack 2),Microsoft Internet Explorer 6 (Windows Server 2003 with SP2 for Itanium-based Systems),Microsoft Internet
registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Internet Explorer\Extensions\{1A92F9C0-BC59-44B8-B429-CF2E4A67D423} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ WAS.Event.Help\CLSID It adds the following
keys: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\ Microsoft\Internet Explorer\Control Panel HKEY_CURRENT_USER\SOFTWARE\Policies\ Microsoft\Internet Explorer\Control Panel It adds the following registry entries:
\Software\Microsoft\ Internet Explorer\Main\FeatureControl HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\Main\FeatureControl\ FEATURE_AJAX_CONNECTIONEVENTS HKEY_CURRENT_USER\Software\Microsoft
\Software\Microsoft\ Internet Explorer\Main\FeatureControl HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\Main\FeatureControl\ FEATURE_AJAX_CONNECTIONEVENTS HKEY_CURRENT_USER\Software\Microsoft
CVE-2005-0553 Race condition in the memory management routines in the DHTML object processor in Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via a
\IECompatCache %Application Data%\Microsoft\Windows\PrivacIE %Windows%\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host %AppDataLocal%\Microsoft\Internet Explorer\Recovery\High\Active
HKEY_CLASSES_ROOT\CLSID\{460B4F43-12E1-474C-9103-54855F10C1E2} It adds the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\New Windows Allow HTTPS = 1 HKEY_CURRENT_USER\Software
\Software\Microsoft\ Windows Script\Settings HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\ WINDOWS\CUR RENTVERSION\RUN HKEY_CURRENT_USER\SOFTWARE\Policies\ Microsoft\Internet Explorer\Control Panel It adds the
spyware adds the following registry keys: HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\PhishingFilter HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\Recovery It adds the following
\S-1-5-21-1645522239-1292428093-682003330-1003\Software\ Microsoft\Internet Explorer\Privacy HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ SystemCertificates\ROOT\Certificates\ AB00E3B6DA03470E4BE5418FDF86E3E1706ED813 It adds the following registry
\S-1-5-21-1645522239-1292428093-682003330-1003\Software\ Microsoft\Internet Explorer\Privacy HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ SystemCertificates\ROOT\Certificates\ 4E44E7573B9B10C6F1EEE95CFE11BD7F83D4C7AC It adds the following registry
\S-1-5-21-1645522239-1292428093-682003330-1003\Software\ Microsoft\Internet Explorer\Privacy HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ SystemCertificates\ROOT\Certificates\ AB00E3B6DA03470E4BE5418FDF86E3E1706ED813 It adds the following registry
\S-1-5-21-1645522239-1292428093-682003330-1003\Software\ Microsoft\Internet Explorer\Privacy HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ SystemCertificates\ROOT\Certificates\ F5A8FACD7747F01DED1FD8E2F7366B926DBCA5E0 It adds the following registry
CVE-2006-3450 Microsoft Internet Explorer 6 allows remote attackers to execute arbitrary code by using the document.getElementByID Javascript function to access crafted Cascading Style Sheet (CSS)
%\Microsoft\Internet Explorer\DomainSuggestions %AppDataLocal%\Microsoft\Internet Explorer\Recovery\High\Active %Application Data%\Microsoft\Windows\PrivacIE (Note: %Application Data% is the current
/prefetch:2 It creates the following folders: %AppDataLocal%\Microsoft\Internet Explorer\Recovery\High\Active %Application Data%\Microsoft\Windows\IECompatUACache %AppDataLocal%\Microsoft\Internet Explorer