Search
Keyword: 2
1,Windows 8.1 for 32-bit Systems,Windows Server 2012 R2,Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation),Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core
(MS15-005) Vulnerability in Network Location Awareness Service Could Allow Security Feature Bypass (3022777)
R2,Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation),Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation),Windows Server 2008 R2 for x64-based
(MS15-010) Vulnerabilities in Windows Kernel-Mode Driver Could Allow Remote Code Execution (3036220)
Systems Service Pack 1,Windows Server 2012 R2,Windows RT[1],Windows RT 8.1[1],Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation),Windows Server 2008 for x64-based Systems
(MS12-055) Vulnerability in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2731847)
for Itanium-based Systems,Windows Server 2008 R2 for Itanium-based Systems Service Pack 1,Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation),Windows Server 2008 for
Systems Service Pack 2 (Server Core installation),Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation),Windows Server 2008 R2 for x64-based Systems (Server Core installation
(MS12-054) Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution (2733594)
Pack 2 (Server Core installation),Windows Server 2008 R2 for x64-based Systems (Server Core installation),Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation),Windows XP
Edition Service Pack 2,Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2*,Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based
(MS11-024) Vulnerability in Windows Fax Cover Page Editor Could Allow Remote Code Execution (2527308)
2,Windows Vista x64 Edition Service Pack 2,Windows Vista x64 Edition Service Pack 1,Windows Server 2008 for 32-bit Systems Service Pack 2**,Windows Server 2008 for 32-bit Systems,Windows Server 2008 for
(Microsoft Office 2003 Service Pack 3),Microsoft Excel 2007 Service Pack 2 (Microsoft Office 2007 Service Pack 2),Microsoft Excel 2010 (32-bit editions) (Microsoft Office 2010 (32-bit editions),Microsoft Excel
(MS11-054) Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2555917)
2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2*,Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2*,Windows Server
\webcam talk.exe %System%\dtveazkj\webcam software.exe %System%\dtveazkj\SOF FULL.exe %System%\dtveazkj\Soldier Of Fortune 2 FULL.exe %System%\dtveazkj\UT2K3 FULL.exe %System%\dtveazkj\Unreal Tournament
argument. Oracle Oracle10g Database Server Release 2 Apply associated Trend Micro DPI Rules. 1001167| 1001167 - Oracle Database Server XDB PITRIG_DROPMETADATA Procedure Buffer Overflow
using Outlook Web App (OWA). Microsoft Exchange Server 2007 Service Pack 3,Microsoft Exchange Server 2010 Service Pack 1,Microsoft Exchange Server 2010 Service Pack 2
\ControlSet001\ Services\Tcpip\Parameters LargeBufferSize = "1" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\Tcpip\Parameters SynAckProtect = "2" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\Tcpip
\CurrentVersion\Explorer\ Advanced Hidden = "0" (Note: The default value data of the said registry entry is 2 .) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Advanced\Folder\Hidden
(Note: The default value data of the said registry entry is 2 .) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Advanced\Folder\Hidden\ SHOWALL CheckedValue = "0" (Note: The
%AppDataLocal%\Google\Chrome\User Data\Profile 2\LoginDataCopy %AppDataLocal%\Chromium\User Data\Default\CookiesCopy %AppDataLocal%\CocCoc\Browser\User Data\Default\CookiesCopy %All Users Profile%
%AppDataLocal%\Google\Chrome\User Data\Profile 2\LoginDataCopy %AppDataLocal%\Chromium\User Data\Default\CookiesCopy %AppDataLocal%\CocCoc\Browser\User Data\Default\CookiesCopy %All Users Profile%
Software\Opera Stable\LoginDataCopy %AppDataLocal%\Chromium\User Data\Profile 3\WebDataCopy %AppDataLocal%\Google\Chrome\User Data\Profile 2\CookiesCopy %All Users Profile%\57g64oamgX\Files\_Screen.jpg
drops the following files: %AppDataLocal%\Chromium\User Data\Profile 2\WebDataCopy %AppDataLocal%\Chromium\User Data\Profile 3\WebDataCopy %All Users Profile%\D747UGavof6t3\Files\Browsers\Cookies