Keyword: agent
10702 Total Search   |   Showing Results : 41 - 60
CVE-2006-3445 Integer overflow in the ReadWideString function in agentdpv.dll in Microsoft Agent on Microsoft Windows 2000 SP4, XP SP2, and Server 2003 up to SP1 allows remote attackers to execute
File List HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications\ PJM\Settings HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Settings\ User Agent HKEY_CURRENT_USER
File List HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications\ PJM\Settings HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Settings\ User Agent HKEY_CURRENT_USER
\Software\CLASSES\ FAST HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Windows\CurrentVersion\Internet Settings\ 5.0\User Agent\Post Platform HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Windows\CurrentVersion\Internet
keys: HKEY_CURRENT_USER\Software\Unisoft\ Agent It adds the following registry entries: HKEY_CURRENT_USER\Software\Unisoft\ Agent TCPPORT = "8123" This report is generated via an automated analysis
{BLOCKED}t.com/360safe.html Other Details This Trojan does the following: Checks the User Agent of the affected system. If the user agent is msie 7 , it loads the possibly malicious page 361.html (detected
\ Agent HKEY_LOCAL_MACHINE\SOFTWARE\Clients\ NetworkAgentDriver\tlb It adds the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Clients\ NetworkAgentDriver t0_macid = "DC55E17B988987F362F345B5A9
CVE-2008-4828 Multiple stack-based buffer overflows in dsmagent.exe in the Remote Agent Service in the IBM Tivoli Storage Manager (TSM) client 5.1.0.0 through 5.1.8.2, 5.2.0.0 through 5.2.5.3,
CVE-2008-1357 Format string vulnerability in the logDetail function of applib.dll in McAfee Common Management Agent (CMA) 3.6.0.574 (Patch 3) and earlier, as used in ePolicy Orchestrator 4.0.0 build
" Other System Modifications This backdoor adds the following registry keys: HKEY_CLASSES_ROOT\FAST HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Settings\ User Agent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\RunServices HKEY_CURRENT_USER\Software\Mirabilis\ ICQ\Agent\Apps\ Administrator It adds the following registry entries: HKEY_CURRENT_USER\Software
Agent HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Settings\ User Agent\Post Platform HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Settings\ 5.0\User
routine: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Setttings\ 5.0\User Agent HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Setttings\ User Agent
CVE-2009-1429 The Intel LANDesk Common Base Agent (CBA) in Symantec Alert Management System 2 (AMS2), as used in Symantec System Center (SSS); Symantec AntiVirus Server; Symantec AntiVirus Central
\CurrentVersion\Internet Settings\ 5.0\User Agent\Post Platform HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Windows\CurrentVersion\Internet Settings\ User Agent\Post Platform HKEY_CURRENT_USER\Software\Microsoft\ Windows
\AVG10\avgtray.exe %Program Files%\AVG\AVG10\avgrsx.exe %Program Files%\AVG\AVG10\avgcsrvx.exe %Program Files%\AVG\AVG10\Identity Protection\Agent\Bin\AVGIDSAgent.exe %Program Files%\AVG\AVG10\Identity
\Software\CLASSES\ FAST HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Windows\CurrentVersion\Internet Settings\ 5.0\User Agent\Post Platform HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Windows\CurrentVersion\Internet
7.) Other System Modifications This backdoor adds the following registry keys: HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Windows\CurrentVersion\Internet Settings\ 5.0\User Agent\Post Platform
Stack-based buffer overflow in the Agent Browser in Veritas Backup allows remote attackers to execute arbitrary code via a registration request with a long hostname. Symantec Veritas Backup Exec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Windows\CurrentVersion\Internet Settings\ 5.0\User Agent\Post Platform HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Windows\CurrentVersion\Internet Settings\ User Agent\Post Platform It