![]() Informed manage engine about the vulnerability: March 4, 2015Ĭase moved to development team: March 4, 2015 "UninstallString"="C:\\Program Files\\fake\\uninst.exe" "DisplayName"="A fake software 2 installed" Product: Asset Explorer - Web Application 6.1.0 (Build 6112)Īdd the following registry entry in the machine, for targeted attack. ![]() If the 'publisher' name contains vulnerable script, it gets executed in the browser. You can manage software
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |