Keyword: microsoft security bulletin ms03-007
78647 Total Search   |   Showing Results : 2641 - 2660
CVE-2015-2374 This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker with access to a primary domain controller (PDC)
CVE-2013-2556 This security update resolves one publicly disclosed vulnerability and three privately reported vulnerabilities in Microsoft Windows. The most severe vulnerabilities could allow
CVE-2013-3175 This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker sends a specially crafted RPC
CVE-2012-0150 This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted media file
CVE-2012-0157 This security update resolves a privately reported vulnerability in Microsoft Windows . The vulnerability could allow elevation of privilege if an attacker logs on to a system and runs
following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\Run Time Resource Alerts Storage Filtering Tiles = "%System
\SOFTWARE\Microsoft\ Security Center UACDisableNotify = "0" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\policies\ system EnableLUA = "0" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services
\CurrentVersion\Run Windows Player = "%System%\csrcs.exe" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run Microsofts = "%Windows%\csrcs.exe" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center
This malware exploits a vulnerability found in Microsoft Office known as CVE-2017-0199. There are reports that exploits using the said vulnerability are in the wild. A security patch for the
which is usually C:\Windows.) It adds the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center UACDisableNotify = "0" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows
\S-5-3-42-2819952290-8240758988-879315005-3665\jwgkvsq.vmx,ahaezedrn ;{garbage characters} useAuTopLAY=1 It exploits the following software vulnerabilities to propagate to other computers across a network: Microsoft Security Bulletin MS08-067
\S-5-3-42-2819952290-8240758988-879315005-3665\jwgkvsq.vmx,ahaezedrn ;{garbage characters} useAuTopLAY=1 It exploits the following software vulnerabilities to propagate to other computers across a network: Microsoft Security Bulletin MS08-067
\ Security Center AntiVirusDisableNotify = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center UpdatesDisableNotify = "1" It creates the following registry entry(ies) to disable Task Manager, Registry
systems? Once downloaded and installed on the affected system, NECURS variants disable security services and elements as their main routine. This is combined with information theft as well as performing
following registry keys: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\RunOnce It adds the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ DirectDraw\MostRecentApplication
(CVE-2020-7066) Web Client Common 1010182* - Google Chrome Type Confusion Vulnerability (CVE-2020-6418) 1010244 - Microsoft Remote Desktop Connection Manager Information Disclosure Vulnerability (CVE-2020-0765)
{E0E223U1-A8T2-_CHAR(0x1A)_5N7-M7B4-Ø1Y3J7Q6J4S0} HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\ WINDOWS\CURRENTVERSION\RUNSERVICES It adds the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center
= "1" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ services\VHWAEINP\Security Security = "{random characters}" HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\ Microsoft\Windows NT\CurrentVersion\ Winlogon
registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center UACDisableNotify = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\policies\ system EnableLUA = "0" Dropping Routine
or updated Integrity Monitoring Rules in this Security Update. Log Inspection Rules: 1010002* - Microsoft PowerShell Command Execution (ATT&CK T1059.001)