Keyword: microsoft security bulletin ms03-007
78644 Total Search   |   Showing Results : 1261 - 1280
attackers to execute arbitrary code via a .hhp file with a long Contents file field. Microsoft HTML Help 1.4 SDK,Microsoft HTML Help Workshop 4.74.8702.0 Trend Micro Deep Security shields networks through
CVE-2008-0235 Microsoft VFP_OLE_Server ActiveX control is prone to a remote command-execution vulnerability. An attacker can exploit this issue to execute arbitrary commands with the privileges of
arbitrary code via a malformed object pointer, as originally reported by ISC on 20060519 for a zero-day attack. Microsoft Word 2003 Trend Micro Deep Security shields networks through Deep Packet Inspection
CVE-2008-0108 Stack-based buffer overflow in wkcvqd01.dll in Microsoft Works 6 File Converter, as used in Office 2003 SP2 and SP3, Works 8.0, and Works Suite 2005, allows remote attackers to execute
CVE-2013-3859 This security update resolves a privately reported vulnerability in Microsoft Office IME (Chinese). The vulnerability could allow elevation of privilege if a logged on attacker launches
of the said registry entry is \Device\ .) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center AntiVirusDisableNotify = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center AntiVirusOverride =
\ControlSet001\ Services\NetBT\Parameters TransportBindName = "\Device" (Note: The default value data of the said registry entry is \Device\ .) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center
Modifications This worm adds the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center\Svc FirewallOverride = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center\Svc
\ Security Center\Svc FirewallOverride = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center\Svc AntiVirusDisableNotify = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center\Svc
Microsoft addresses several vulnerabilities in its October security bulletin. Trend Micro Deep Security covers the following: CVE-2019-1335 - Chakra Scripting Engine Memory Corruption Vulnerability
This backdoor has received attention from independent media sources and/or other security firms. Specifically, it is the dropped file of TROJ_MSPOSER.ASM, a Trojan that takes advantage of the Epsilon
Confusion Vulnerability (CVE-2020-6418) Web Client Internet Explorer/Edge 1011323 - Microsoft Internet Explorer Security Feature Bypass Vulnerability (CVE-2022-24502) Web Server Common 1010099* - Elastic
originally reported for Internet Explorer 6 and 7, aka "URL Redirect Cross Domain Information Disclosure Vulnerability." Microsoft Outlook Express 6.0 Trend Micro Deep Security shields
arbitrary code, aka the "CMS Memory Corruption Vulnerability." Microsoft Content Management Server 2001 SP1,Microsoft Content Management Server 2001 SP2 Trend Micro Deep Security shields
Media 6.0 SDK, allows remote attackers to execute arbitrary code via a long SourceUrl property value. Microsoft DirectX Media 6.0 Trend Micro Deep Security shields networks through Deep Packet Inspection
CVE-2008-0117,ms08-014 Unspecified vulnerability in Microsoft Excel 2000 SP3 and 2002 SP2, and Office 2004 and 2008 for Mac, allows user-assisted remote attackers to execute arbitrary code via
CVE-2008-0081,ms08-014 Unspecified vulnerability in Microsoft Excel 2000 SP3 through 2003 SP2, Viewer 2003, and Office 2004 for Mac allows user-assisted remote attackers to execute arbitrary code via
that is not properly handled when importing the file, aka "Excel File Import Vulnerability." Microsoft Excel 2000,Microsoft Excel 2004,Microsoft Excel 2008 Trend Micro Deep Security
command, aka the IMAP Literal Processing Vulnerability . Microsoft Exchange Server 2000 SP3 Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using
crafted base64-encoded MIME e-mail message. Microsoft Exchange Server 2000 SP3,Microsoft Exchange Server 2003 SP1,Microsoft Exchange Server 2003 SP2,Microsoft Exchange Server 2007 Trend Micro Deep Security