Keyword: ms04-032_microsoft_windows
99225 Total Search   |   Showing Results : 21 - 40
Microsoft addresses the following vulnerabilities in its November batch of patches: (MS11-083) Vulnerability in TCP/IP Could Allow Remote Code Execution (2588516) Risk Rating: Critical This security
}\AppData\Local\Temp on Windows Vista, 7, 8, 8.1, 2008(64-bit), 2012(64-bit) and 10(64-bit).) It adds the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ RestartManager\Session0000
update addresses thirteen vulnerabilities in Microsoft Office. More specifically, it resolves issues that could allow remote code execution if a user opens a specially crafted Excel file or a specially
CVE-2010-3243,CVE-2010-3324 This security update addresses vulnerabilities in Microsoft SharePoint and Windows SharePoint Services. If successfully exploited via a specially crafted script to a
Explorer, which could allow remote code execution once users view a specially crafted webpage via Internet Explorer. As such, this could potentially compromise the security of the systems. Windows 7 for
Security Update for Windows Library Loading to Address Remote Code Execution (3140709) Risk Rating: Important This security update resolves a vulnerability in Microsoft Windows. When exploited successfully,
Microsoft Windows and may allow remote code execution. It may lead to remote code execution once attackers send a maliciously crafted SMB response to a client-initiated SMB request. Read more here . (MS11-020
(MS12-030) Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2663830) Risk Rating: Important This security update resolves a vulnerability found in the Windows Authenticode Signature
msvidctl.dll in DirectShow, in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted
msvidctl.dll in DirectShow, in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted
Microsoft Windows SMB Server (MS17-010) Vulnerability Process Termination This Worm terminates the following services if found on the affected system: xWinWpdSrv SVSHost Microsoft Telemetry lsass Microsoft
vulnerabilities to propagate across networks: Microsoft Windows SMB Server (MS17-010) Vulnerability Process Termination This Worm terminates the following services if found on the affected system: .Net CLR 360rTys
CVE-2010-3225 This security update addresses the vulnerability in the Microsoft Windows Media Player Network Sharing Service that could allow remote code execution once an attacker sends a specially
website with specially crafted CFF font. An attacker may persuade users to visit such sites via a link in an email or in an Instant Messenger message. Windows XP Service Pack 3,Windows XP Professional x64
CVE-2010-3229 This security update addresses a vulnerability in the Secure Channel (SChannel) security package in Windows that could allow denial of service if an affected Internet Information
CVE-2014-1823 This security update addresses a vulnerability found in Microsoft Lync Server that could allow information disclosure, which remote attackers may possibly use to launch other attacks.
startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run MyPlayusers = "%Program Files%\Internet Explorer\binding.exe" Other System Modifications This spyware deletes the following files:
\ Microsoft\Windows\Safer\ CodeIdentifiers\0\Paths\ {035e7641-6df1-464d-8912-953d36917d4e} HKEY_LOCAL_MACHINE\SOFTWARE\Policies\ Microsoft\Windows\Safer\ CodeIdentifiers\0\Paths\
following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion adv429 = "adv429" Other Details This Trojan connects to the following possibly malicious URL: http://{BLOCKED
CVE-2012-0174,CVE-2012-0179 This update resolves the following vulnerabilities in affected Windows versions: Windows Firewall Bypass Vulnerability TCP/IP Double Free Vulnerability When exploited, the