The Active Network
ActiveMac Anonymous | Create a User | Reviews | News | Forums | Advertise  
 

  *  

  ActiveX Kill Bit Can Be Bypassed - Another Reason to Apply MS05-054?
Time: 19:41 EST/00:41 GMT | News Source: SecurityTracker | Posted By: John Quigley

ISC reader Juha-Matti Laurio pointed out a new vulnerability note VU#998297, published by US-CERT on January 26, 2006, which states that a malicious website can bypass an ActiveX kill bit by taking advantage of a bug in Internet Explorer. A kill bit is a registry setting that prevents Internet Explorer from running the corresponding ActiveX control even if the control is installed on the system. It is not uncommon to proactively set kill bits for known malicious ActiveX controls as part of a spyware-prevention effort. For example, the SpywareGuide website provides a freely downloadable .REG file for setting kill bits of many "dubious" ActiveX controls.

Write Comment
Return to News

  Displaying 776 through 781 of 781
Prev | First
  The time now is 6:59:43 PM ET.
Any comment problems? E-mail us
#776 By 4240821 (82.115.4.100) at 1/7/2026 1:41:50 AM
https://www.pillowfort.social/posts/6893270
https://www.pillowfort.social/posts/6893101
https://www.pillowfort.social/posts/6893015
https://www.pillowfort.social/posts/6892955
https://www.pillowfort.social/posts/6892895
https://www.pillowfort.social/posts/6892823
https://www.pillowfort.social/posts/6892689
https://www.pillowfort.social/posts/6892638
https://www.pillowfort.social/posts/6892558
https://www.pillowfort.social/posts/6892505

#777 By 4240821 (82.115.4.100) at 1/9/2026 9:35:33 AM
https://www.pillowfort.social/posts/6614627
https://www.pillowfort.social/posts/6614407
https://www.pillowfort.social/posts/6614303
https://www.pillowfort.social/posts/6614109
https://www.pillowfort.social/posts/6613987
https://www.pillowfort.social/posts/6613852
https://www.pillowfort.social/posts/6613657
https://www.pillowfort.social/posts/6613368
https://www.pillowfort.social/posts/6613230
https://www.pillowfort.social/posts/6613135

#778 By 4240821 (82.115.4.100) at 1/9/2026 9:43:25 AM
https://www.pillowfort.social/posts/6628598
https://www.pillowfort.social/posts/6628535
https://www.pillowfort.social/posts/6628405
https://www.pillowfort.social/posts/6628326
https://www.pillowfort.social/posts/6628183
https://www.pillowfort.social/posts/6628053
https://www.pillowfort.social/posts/6627314
https://www.pillowfort.social/posts/6627133
https://www.pillowfort.social/posts/6626608
https://www.pillowfort.social/posts/6626404

#779 By 4240821 (82.115.4.100) at 1/9/2026 11:04:07 PM
https://www.pillowfort.social/posts/6956873
https://www.pillowfort.social/posts/6956812
https://www.pillowfort.social/posts/6956710
https://www.pillowfort.social/posts/6956642
https://www.pillowfort.social/posts/6956515
https://www.pillowfort.social/posts/6956392
https://www.pillowfort.social/posts/6956289
https://www.pillowfort.social/posts/6956197
https://www.pillowfort.social/posts/6956120
https://www.pillowfort.social/posts/6955984

#780 By 4240821 (82.115.4.100) at 1/10/2026 10:49:29 AM
https://www.pillowfort.social/posts/6460042
https://www.pillowfort.social/posts/6459902
https://www.pillowfort.social/posts/6459079
https://www.pillowfort.social/posts/6459001
https://www.pillowfort.social/posts/6458840
https://www.pillowfort.social/posts/6458702
https://www.pillowfort.social/posts/6458147
https://www.pillowfort.social/posts/6457814
https://www.pillowfort.social/posts/6457679
https://www.pillowfort.social/posts/6456913

#781 By 4240821 (82.115.4.230) at 1/12/2026 4:10:39 PM
https://myvidplay.com/d/6ranp4mdkjfw
https://myvidplay.com/d/4bfsaq7n2nzv
https://myvidplay.com/d/9ov8whs00p0z
https://myvidplay.com/d/g77wcnzo8l5y
https://myvidplay.com/d/9jls0aigfcg9
https://myvidplay.com/d/phlbstfewp7s
https://myvidplay.com/d/0ilxzkfqthgh
https://myvidplay.com/d/ea5tglxs6cb3
https://myvidplay.com/d/ntm7ubba0ssj
https://myvidplay.com/d/d05o2chk1dfk

Write Comment
Return to News
  Displaying 776 through 781 of 781
Prev | First
  The time now is 6:59:43 PM ET.
Any comment problems? E-mail us
User name and password:

 

  *  
  *   *