Search
Keyword: microsoft security bulletin ms03-007
CVE-2015-1793 A certificate forgery security bypass has been reported in OpenSSL. This is due to incorrectly implemented certificate verification in OpenSSL. An attacker could use a crafted
\Kaspersky Lab %SystemRoot%Arquivos de programas\McAfee %SystemRoot%Arquivos de programas\Microsoft Security Client %SystemRoot%Arquivos de programas\Norton AntiVirus %SystemRoot%Arquivos de programas
\ Internet Explorer\Main Search Bar = http://www.google.com/ie HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center AntiVirusDisableNotify = 1 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center
CVE-2008-4110 Microsoft SQL Server 'sqlvdir.dll' ActiveX Control is prone to a buffer-overflow vulnerability because it fails to bounds-check user-supplied data before copying it into an
CVE-2006-0028 �Unspecified vulnerability in Microsoft Excel 2000, 2002, and 2003, in Microsoft Office 2000 SP3 and other packages, allows user-assisted attackers to execute arbitrary code via a BIFF
CVE-2006-1043 cve: Stack-based buffer overflow in Microsoft Visual Studio 6.0 and Microsoft Visual InterDev 6.0 allows user-assisted attackers to execute arbitrary code via a long DataProject field
CVE-2010-0261 Heap-based buffer overflow in Microsoft Office Excel 2007 SP1 and SP2 and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allows remote attackers
\SOFTWARE\Microsoft\ Security Center AntiVirusDisableNotify = "1" (Note: The default value data of the said registry entry is 0 .) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center FirewallDisableNotify
1009209* - ElasticSearch Dynamic Script Arbitrary Java Code Execution Vulnerability (CVE-2014-3120) Web Client Common 1004315* - Identified Malicious PDF Document - 3 1009359 - Microsoft Windows GDI
the following registry keys: HKEY_CURRENT_USER\Software\Internet Security HKEY_CLASSES_ROOT\videoaccessactivex.Chl\CLSID HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\Uninstall\ Video
i6g8xs.exei6g8xs Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run
This worm adds the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center\Svc FirewallOverride = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center\Svc
' Anti-Malware {file path}\McAfee {file path}\McAfee.com {file path}\Microsoft Security Essentials {file path}\Microsoft\Microsoft Antimalware {file path}\Norton AntiVirus {file path}\Microsoft Security Client
name}\settings HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\Security Center\Svc HKEY_CURRENT_USER\Software\bisoft It adds the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows
Applications\ TestProg\Settings HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\Security Center\Svc HKEY_CURRENT_USER\Software\FirstRRRun It adds the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE
name}\settings HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\Security Center\Svc HKEY_CURRENT_USER\Software\bisoft It adds the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows
appwizard-generated applications\ {malware file name}\settings HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\Security Center\Svc HKEY_CURRENT_USER\Software\FirstRRRun It adds the following registry entries:
\ Services\NetUdpActivator Description = "{random characters}" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\NetUdpActivator Running = "1" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion UName
\Microsoft\ Security Center UACDisableNotify = "0" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\policies\ system EnableLUA = "0" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion
CVE-2010-0815,MS10-031 VBE6.DLL in Microsoft Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Visual Basic for Applications (VBA), and VBA SDK 6.3 through 6.5 does not