Keyword: agent
10706 Total Search   |   Showing Results : 1 - 20
   Next  
CVE-2005-1272 cve: Stack-based buffer overflow in the Backup Agent for Microsoft SQL Server in BrightStor ARCserve Backup Agent for SQL Server 11.0 allows remote attackers to execute arbitrary code
\Classes\ irc\Shell\open\ ddeexec\ifexec HKEY_LOCAL_MACHINE\Software\Classes\ irc\Shell\open\ ddeexec\Topic HKEY_CURRENT_USER\Software\Microsoft\ Microsoft Agent It adds the following registry entries:
\Classes\ irc\Shell\open\ ddeexec\ifexec HKEY_LOCAL_MACHINE\Software\Classes\ irc\Shell\open\ ddeexec\Topic HKEY_CURRENT_USER\Software\Microsoft\ Microsoft Agent It adds the following registry entries:
HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\Uninstall\ mIRC HKEY_CURRENT_USER\Software\Microsoft\ Microsoft Agent It adds the following registry entries: HKEY_CURRENT_USER\Software\mIRC DateUsed =
\svchost.exe -uninstall" HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ irc EditFlags = "{random values}" HKEY_CURRENT_USER\Software\Microsoft\ Microsoft Agent VoiceEnabled = "1" HKEY_CURRENT_USER\Software\Microsoft
Agent It adds the following registry entries: HKEY_CURRENT_USER\Software\m1RC DateUsed = "1354739051" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Uninstall\ m1RC DisplayName = "m1RC
\ irc\Shell\open\ ddeexec\Topic HKEY_CURRENT_USER\Software\Microsoft\ Microsoft Agent It adds the following registry entries: HKEY_CURRENT_USER\Software\mIRC DateUsed = "1326477047" HKEY_LOCAL_MACHINE
\Software\Classes\ irc\Shell\open\ ddeexec\Topic HKEY_CURRENT_USER\Software\Microsoft\ Microsoft Agent It adds the following registry entries: HKEY_CURRENT_USER\Software\mIRC DateUsed = "1324714786
\Software\Microsoft\ Microsoft Agent It adds the following registry entries: HKEY_CURRENT_USER\Software\mIRC DateUsed = "1367482722" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Uninstall
CVE-2007-3040 Stack-based buffer overflow in agentdpv.dll 2.0.0.3425 in Microsoft Agent on Windows 2000 SP4 allows remote attackers to execute arbitrary code via a crafted URL to the Agent
\Software\Classes\ irc\Shell\open\ ddeexec\ifexec HKEY_CURRENT_USER\Software\Classes\ irc\Shell\open\ ddeexec\Topic HKEY_CURRENT_USER\Software\Microsoft\ Microsoft Agent It adds the following registry
malware/grayware packages. Installation This potentially unwanted application drops the following files: %System%\dat\Dexon\Agent\Agent.exe %System%\dat\Dexon\Agent\Agent_Distrib.exe %System%\dat\Dexon\Agent
the following registry keys: HKEY_CLASSES_ROOT\MJ HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ MJ HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Settings\ User Agent HKEY_CURRENT_USER
Trojan deletes the following files: %Program Files%\Trend Micro\Deep Security Agent\Notifier.exe %Program Files%\Trend Micro\Deep Security Agent\ds_monitor.exe %Program Files%\Trend Micro\Deep Security
x_CHAR(0x01)_9 It adds the following registry keys: HKEY_CURRENT_USER\Software\Mirabilis\ ICQ\Agent\Apps\ Run It adds the following registry entries: HKEY_CURRENT_USER\Software\Mirabilis\ ICQ\Agent\Apps
HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Settings\ 5.0\User Agent @ = {user agent information} HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Internet Settings\ 5.0\User
CVE-2005-4734 Stack-based buffer overflow in IISWebAgentIF.dll in RSA Authentication Agent for Web (aka SecurID Web Agent) 5.2 and 5.3 for IIS allows remote attackers to execute arbitrary code via a
Application adds the following processes: NET START SLEEPYN1 It creates the following folders: %Program Files%\LEVTEMP %Program Files%\LeverIT %Program Files%\LeverIT\Agent %Program Files%\LeverIT\Agent\Instok
keys: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Setttings\ 5.0\User Agent HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Setttings\ 5.0\User Agent\Post
\Software\Mirabilis\ ICQ\Agent\Apps\ Run HKEY_CURRENT_USER\Software\Mirabilis\ ICQ\Owners It adds the following registry entries: HKEY_CURRENT_USER\Software\Mirabilis\ ICQ\Agent\Apps\ Run Path = "%System%