Keyword: microsoft security bulletin ms03-007
78646 Total Search   |   Showing Results : 1061 - 1080
HKEY_CLASSES_ROOT\VideoAXObject.Chl\CLSID HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\Uninstall\ Video ActiveX Solution It adds the following registry entries: HKEY_CURRENT_USER\Software\Security
\Parameters ServiceDll = "%Program Files%\Internet Explorer\icwnet.dll" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion\SvcHost netsvcss = "Net Security Service" Dropping Routine This backdoor
entries: HKEY_CURRENT_USER\Software\Microsoft\ Windows NT\CurrentVersion\Windows Load = "%User Profile%\Security\Security.exe" Other Details This spyware connects to the following possibly malicious URL:
" HKEY_LOCAL_MACHINE\System\CurrentControlSet\ Services\msamger ErrorControl = "0" HKEY_LOCAL_MACHINE\System\CurrentControlSet\ Services\msamger DisplayName = "Microsoft Security Accounts Manager" HKEY_LOCAL_MACHINE
CVE-2014-0261 This security update resolves one privately reported vulnerability in Microsoft Dynamics AX. The vulnerability could allow denial of service if an authenticated attacker submits
1006143 - Microsoft .NET Framework ASP.NET Forms Security Bypass Vulnerability (CVE-2011-3416)
CVE-2014-2815 This security update resolves a privately reported vulnerability in Microsoft OneNote. The vulnerability could allow remote code execution if a specially crafted file is opened in an
CVE-2013-1290 This security update resolves a publicly disclosed vulnerability in Microsoft SharePoint Server. The vulnerability, if left unpatched, may allow information disclosure if an attacker
CVE-2014-6364 This security update resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a specially crafted file is opened in an
CVE-2015-1757 This security update addresses a vulnerability in Microsoft Active Directory Federation Services (AD FS) that could allow elevation of privilege when an attacker submits a specially
following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center AntiVirusDisableNotify = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center FirewallDisableNotify = "1
Security Config\v2.0.50727.312\security.config.cch (Windows Vista and higher versions) %AppDataLocalLow%\Microsoft\CryptnetUrlCache\Content\62B5AF9BE9ADC1085C3C56EC07A82BF6 (Windows Vista and higher versions
registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center FirewallDisableNotify = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center UpdatesDisableNotify = "1" HKEY_LOCAL_MACHINE
following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center AntiVirusDisableNotify = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center FirewallDisableNotify = "1
CVE-2014-1817,CVE-2014-1818 This security update addresses vulnerabilities found in Microsoft Windows, Microsoft Office, and Microsoft Lyn. Once successfully exploited via a specially crafted
Report Viewer 2005 SP1, Report Viewer 2008 Gold and SP1, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a crafted PNG image file. microsoft .net_framework
CVE-2009-2502 Buffer overflow in GDI in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Office Project 2002 SP1,
\SharedAccess\Parameters\ FirewallPolicy\StandardProfile EnableFirewall = "0" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center UacDisableNotify = "1" It modifies the following registry entries:
" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center UacDisableNotify = "1" It modifies the following registry entries: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\wscsvc Start = "4" (Note: The default value
\SharedAccess\Parameters\ FirewallPolicy\StandardProfile EnableFirewall = "0" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center UacDisableNotify = "1" It modifies the following registry entries: