Keyword: microsoft security bulletin ms03-007
78644 Total Search   |   Showing Results : 1221 - 1240
CVE-2013-1336,CVE-2013-1337 This security update patches two vulnerabilities in the Microsoft .NET Framework. The more severe of the vulnerabilities could allow spoofing if a .NET application
Overflow." Microsoft Office 2004,Microsoft Office XP Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense
String Variable Vulnerability." Microsoft Excel 2002,Microsoft Office 2004 Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with
complete control of an affected system. Microsoft Windows Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center FirewallOverride = 1 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center FirewallDisableNotify = 1 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows
\SYSTEM\CurrentControlSet\ Services\AFinding ObjectName = "Local System" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\AFinding\Security Security = "{random values}" Other System Modifications This
characters} Enum = HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\{eight random characters Security = It adds the following registry entries: KEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\{eight
Modifications This worm adds the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\Security Center\Svc HKEY_CURRENT_USER\Software\FirstRRRun It adds the following registry entries:
malicious user via a specific IP address. Some DANMEC variants prevent users from accessing specific URLs related to security and antivirus solutions. They may also terminate processes related to security and
malicious user via a specific IP address. Some DANMEC variants prevent users from accessing specific URLs related to security and antivirus solutions. They may also terminate processes related to security and
malicious user via a specific IP address. Some DANMEC variants prevent users from accessing specific URLs related to security and antivirus solutions. They may also terminate processes related to security and
Modifications This worm adds the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\Security Center\Svc HKEY_CURRENT_USER\Software\FirstRRRun It adds the following registry entries:
%Program Files%\Internet Explorer\iexplore.exe .) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center AntiVirusDisableNotify = "1" (Note: The default value data of the said registry entry is 0 .)
%Program Files%\Internet Explorer\iexplore.exe .) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center AntiVirusDisableNotify = "1" (Note: The default value data of the said registry entry is 0 .)
%Program Files%\Internet Explorer\iexplore.exe .) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center AntiVirusDisableNotify = "1" (Note: The default value data of the said registry entry is 0 .)
\Microsoft\ Security Center\Svc HKEY_CURRENT_USER\Software\Afqteuv\ 1926745233 It adds the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Wireless ID = "emabvlomsterdowxvdl
\CurrentVersion\policies\ system HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center\Svc HKEY_CURRENT_USER\Software\Afqteuv\ 1926745233 HKEY_LOCAL_MACHINE\Software\Policies\ Microsoft\Internet Explorer\Control
CVE-2011-0043,CVE-2011-0091 This security update addresses vulnerabilities in Microsoft Windows with the more severe ones capable of allowing elevation of privilege if a local, authenticated attacker
* indicates a new version of an existing rule Deep Packet Inspection Rules: Microsoft Office 1011303 - Microsoft Excel Information Disclosure Vulnerability (CVE-2022-22716) Unix Samba 1011294* -
1012070 - Microsoft Windows MSHTML Platform Remote Code Execution Vulnerability (CVE-2023-35628) Web Server Common 1008621* - Disallow Upload Of A JSP File (ATT&CK T1190) Web Server HTTPS 1012065 -