Keyword: agent
10705 Total Search   |   Showing Results : 61 - 80
registry keys: HKEY_LOCAL_MACHINE\Software\CLASSES\ MJ HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Windows\CurrentVersion\Internet Settings\ 5.0\User Agent\Post Platform HKEY_CURRENT_USER\SOFTWARE\Microsoft
and 7.) Other System Modifications This spyware adds the following registry keys: HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Windows\CurrentVersion\Internet Settings\ 5.0\User Agent\Post Platform
Stack-based buffer overflow in the Agent Browser in Veritas Backup allows remote attackers to execute arbitrary code via a registration request with a long hostname. Symantec Veritas Backup Exec
Stack-based buffer overflow in the Agent Browser in Veritas Backup allows remote attackers to execute arbitrary code via a registration request with a long hostname. Symantec Veritas Backup Exec
above only) Other System Modifications This backdoor adds the following registry keys: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Setttings\ User Agent HKEY_CURRENT_USER
registry keys: HKEY_LOCAL_MACHINE\Software\CLASSES\ MJ HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Windows\CurrentVersion\Internet Settings\ 5.0\User Agent\Post Platform HKEY_CURRENT_USER\SOFTWARE\Microsoft
keys: HKEY_LOCAL_MACHINE\Software\CLASSES\ FAST HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Windows\CurrentVersion\Internet Settings\ 5.0\User Agent\Post Platform HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Windows
HKEY_CURRENT_USER\Software\Context2pro\ context2prod\VersionNames HKEY_CURRENT_USER\Software\Context2pro\ context2prod\Agent It adds the following registry entries: HKEY_CURRENT_USER\Software\Context2pro
CVE-2011-3827 The iCalendar component in gwwww1.dll in GroupWise Internet Agent (GWIA) in Novell GroupWise 8.0 before Support Pack 3 allows remote attackers to cause a denial of service
Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules. 1003525| 1003525 - Novell GroupWise Internet Agent SMTP Command Remote Buffer Overflow
Setttings\ 5.0\User Agent HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Setttings\ 5.0\User Agent\Post Platform HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet
\Microsoft\ Windows\CurrentVersion\Internet Setttings\ 5.0\User Agent HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Setttings\ 5.0\User Agent\Post Platform HKEY_CURRENT_USER\Software
\Software\Microsoft\ Windows\CurrentVersion\Internet Settings\ User Agent\Post Platform This report is generated via an automated analysis system.
Description Name: AGENT - HTTP (Request) - Variant 3 . This is the Trend Micro detection for malicious HTTP network packet that manifest any of the following actions:CallbackThis attack is used for Command and Control Communication
\Software\Microsoft\ Windows\CurrentVersion\Internet Settings\ User Agent\Post Platform This report is generated via an automated analysis system.
Autostart Technique This worm adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run Agent = "%System%
This Trojan adds the following registry keys: HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Windows\CurrentVersion\Internet Settings\ 5.0\User Agent\Post Platform HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Windows
This Trojan adds the following registry keys: HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Windows\CurrentVersion\Internet Settings\ 5.0\User Agent\Post Platform HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Windows
It uses the default User Agent in URLs it accesses. It does this by querying the following registry value: HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings User Agent It does not have
\Microsoft\ Windows\CurrentVersion\Internet Settings\ 5.0\User Agent\Post Platform HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Windows\CurrentVersion\Internet Settings\ User Agent\Post Platform Dropping Routine This