Keyword: microsoft security bulletin ms03-007
78644 Total Search   |   Showing Results : 1521 - 1540
Modifications This backdoor adds the following registry entries: HKEY_CURRENT_USER\Software\AppDataLow\ Software\Microsoft\Internet Explorer\ Security\AntiPhishing\{GUID} ID = {random value} HKEY_CRRENT_USER
* indicates a new version of an existing rule Deep Packet Inspection Rules: Database Microsoft SQL 1000917* - Restrict Microsoft SQL Server XP_CMDSHELL Procedure MySQL Cluster NDBD 1011389 - Oracle
Vulnerabilities (CVE-2022-36957 and CVE-2022-38108) DCERPC Services 1011587* - Microsoft Windows Server Service Tampering Vulnerability (CVE-2022-30216) OpenSSL 1011597 - OpenSSL 'ossl_punycode_decode' Buffer
* indicates a new version of an existing rule Deep Packet Inspection Rules: DCERPC Services - Client 1012075* - Microsoft Windows MSHTML Platform Remote Code Execution Vulnerability Over SMB
attackers to cause a denial of service (memory consumption) via a large number of SIP INVITE requests, which trigger the creation of many sessions. Microsoft Office Communicator Trend Micro Deep Security
CVE-2014-6356 This security update resolves two privately reported vulnerabilities in Microsoft Word and Microsoft Office Web Apps. The vulnerabilities could allow remote code execution if an
Integrity Monitoring Rules in this Security Update. Log Inspection Rules: 1003802* - Directory Server - Microsoft Windows Active Directory 1011453* - Microsoft Windows WMI Events - 1
\public %System Root%\users\public\Public Document %User Profile%\10.0\Forms %User Profile%\10.0\Collab %User Profile%\10.0\Security %User Profile%\Security\CRLCache %User Profile%\Application Data
" HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\TypeLib Version = "1.0" It modifies the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center
\Temp on Windows Vista and 7.) It adds the following registry keys: HKEY_CURRENT_USER\Software\Microsoft\ Windows\Windows Error Reporting HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\syshost32
following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run Local Security Authority Process = "{malware path and
to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run Adobe Updater = "{malware path and file name} eusoudejesus" Other System
Intelligent User Profile Service"): Application Background Control Desktop Extension Function Group Host Intelligent Key Layer Multimedia Network Operation Portable Quality Remote Security TCP/IP User Profile
Security Bulletin MS17-010 Ransomware Routine This Ransomware encrypts files found in the following folders: Fixed Drives Network Drives Removable Drives It avoids encrypting files with the following strings
user's Start Menu folder, which is usually C:\Windows\Start Menu or C:\Documents and Settings\{User name}\Start Menu on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Roaming\Microsoft
\SOFTWARE\Microsoft\ Security Center AntiVirusDisableNotify = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center UpdatesDisableNotify = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center
= "41" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Reliability LastAliveStamp = "\xd0\xba\xad\x0b" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center cval = "0
9.2.0,Autonomy KeyView Filter SDK 9.2.0,Autonomy KeyView Viewer SDK 9.2.0,IBM Lotus Notes 7.0.2,Symantec Mail Security 5.0,Symantec Mail Security 5.0.0,Symantec Mail Security 5.0.0.24,Symantec Mail Security
CVE-1999-0233 IIS 1.0 allows users to execute arbitrary commands using .bat or .cmd files. Microsoft IIS 1.0 Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules.
CVE-2011-2007,CVE-2011-2008 This security update resolves two publicly disclosed vulnerabilities in Host Integration Server. The vulnerabilities could allow denial of service if a remote attacker