Keyword: microsoft security bulletin ms03-007
78646 Total Search   |   Showing Results : 981 - 1000
modifies the following registry entries to disable Security Center functions: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center AntiVirusDisableNotify = 1 (Note: The default value data of the said
\StandardProfile EnableFirewall = "0" It modifies the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center AntiVirusDisableNotify = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security
\Microsoft\Windows\NetCC437.dll %System Root%\ProgramData\Microsoft\Windows\QQlive.exe (Note: %System Root% is the Windows root folder, where it usually is C:\ on all Windows operating system versions.) It
\ services\Micorsoft Windows Service It adds the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center AntiVirusOverride = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security
\Software\Microsoft\ Office\11.0\Word\ Security AccessVBOM = "0" HKEY_CURRENT_USER\Software\Microsoft\ Office\11.0\Word\ Security Level = "4" It modifies the following registry entries: HKEY_LOCAL_MACHINE
Modifications This Trojan adds the following registry entries as part of its installation routine: HKEY_CURRENT_USER\Software\Microsoft\ Office\{version}\Word\ Security AccessVBOM = 0 HKEY_CURRENT_USER\Software
* indicates a new version of an existing rule Deep Packet Inspection Rules: Apache Kylin 1011685* - Apache Kylin Command Injection Vulnerability (CVE-2022-43396) IPSec-IKE 1011669* - Microsoft
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Internet Security = "%Application Data%\midefender.exe" Dropping Routine This Trojan drops the following
* indicates a new version of an existing rule Deep Packet Inspection Rules: NFS Server 1011740* - Microsoft Windows Network File System Remote Code Execution Vulnerability (CVE-2023-24941) Unix Samba
* indicates a new version of an existing rule Deep Packet Inspection Rules: NFS Server 1011740* - Microsoft Windows Network File System Remote Code Execution Vulnerability (CVE-2023-24941) Unix Samba
CVE-2011-1986,CVE-2011-1987,CVE-2011-1988,CVE-2011-1989,CVE-2011-1990 This security update addresses a vulnerability in Microsoft Windows that may lead to remote code execution once a user opens a
Settings ProxyHttp1.1 = "0" (Note: The default value data of the said registry entry is 1 .) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center AntivirusDisableNotify = "1" (Note: The default value data
Kaspersky Anti-Virus avast! Antivirus AntiVir Desktop AVG Monitor AVG Service AVG Security ESET Security ESET Antivirus Microsoft Inspection Microsoft Malware Microsoft Security Trojan-Spy.Win32.Zbot.uzup
addresses vulnerabilities existing in Microsoft FAST Search Server 2010 for SharePoint. When exploited, it could allow remote code execution in the security context (user accounts) with a token. Note that
(DoS) via a crafted web site, thus compromising the security of the system. Trend Micro disclosed details about this vulnerability to Microsoft and the said company credited our research contribution.
This security update addresses a vulnerability found in Microsoft Service Bus for Windows Server, which when exploited successfully can lead to denial of service. Microsoft Service Bus 1.1 when
\CurrentControlSet\ Enum\Root\LEGACY_MICORSOFT_WINDOWS_SERVICE It adds the following registry entries as part of its installation routine: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center UacDisableNotify = "1
.jar .dll .vbe .bat .inf It modifies the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center FirewallOverride = 1 (Note: The default value data of the said registry entry
VBS_WIMMIE.SMC then deletes itself and its dropper once its execution is completed. It saves the malicious __EventConsumer as the following: Microsoft WMI Comsumer Security Event_consumer It creates the following
\SharedAccess\Parameters\ FirewallPolicy\StandardProfile DoNotAllowExceptions = "0" It modifies the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center AntiVirusDisableNotify = "1