Keyword: microsoft security bulletin ms03-007
78892 Total Search   |   Showing Results : 1081 - 1100
Report Viewer 2005 SP1, Report Viewer 2008 Gold and SP1, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a crafted PNG image file. microsoft .net_framework
CVE-2009-2502 Buffer overflow in GDI in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Office Project 2002 SP1,
\SharedAccess\Parameters\ FirewallPolicy\StandardProfile EnableFirewall = "0" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center UacDisableNotify = "1" It modifies the following registry entries:
" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center UacDisableNotify = "1" It modifies the following registry entries: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\wscsvc Start = "4" (Note: The default value
\SharedAccess\Parameters\ FirewallPolicy\StandardProfile EnableFirewall = "0" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center UacDisableNotify = "1" It modifies the following registry entries:
This security update addresses vulnerabilities found existing in Microsoft Office server and productivity software, which could allow elevation of privilege. An attacker can successfully exploit
CVE-2013-1292,CVE-2013-1283,CVE-2013-1291,CVE-2013-1293 This security update resolves a reported vulnerability in Microsoft Office. The vulnerability, if left unpatched, may allow elevation of
CVE-2013-1289 This security update resolves a reported vulnerability in Microsoft Office. The vulnerability, if left unpatched, may allow elevation of privilege if an attacker sends specially crafted
CVE-2002-0684. Astaro Security Linux 2.0 16,Astaro Security Linux 2.0 23,Astaro Security Linux 2.0 24,Astaro Security Linux 2.0 25,Astaro Security Linux 2.0 26,Astaro Security Linux 2.0 27,Astaro Security Linux
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Uninstall\ eSafeSecControl DisplayName = "eSafe Security Control 1.0.0.2405" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Uninstall
name}\AppData\Local\Temp on Windows Vista and 7.) It adds the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center\Svc HKEY_CURRENT_USER\Software\Aasppapmmxkvs\ -993627007 It
Server 2003, or C:\Users\{user name}\AppData\Local\Temp on Windows Vista and 7.) It adds the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center\Svc HKEY_CURRENT_USER\Software
Software Security Task Manager Zillyya Antivirus Spyware Terminator Lavasoft BlockPost DefenseWall HIPS DefenseWall Microsoft Antimalware Microsoft Security Essentials Sandboxie Positive Technologies UAenter
Lavasoft Malwarebytes Malwarebytes' Anti-Malware McAfee McAfee.com Microsoft Security Client Microsoft Security Essentials Microsoft\Microsoft Antimalware Norton AntiVirus Online Solutions P Tools Internet
\SOFTWARE\Microsoft\ Windows\CurrentVersion\Policies\ System EnableLUA = 0 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center AntiVirusOverride = 1 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center
CVE-2013-5042 This security update resolves a privately reported vulnerability in ASP.NET SignalR. The vulnerability could allow elevation of privilege if an attacker reflects specially crafted
) Other System Modifications This worm adds the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center\Svc FirewallOverride = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This Trojan creates the following folders: %User Profile%\Window Security (Note:
security updates or have insecure applications installed: http://secunia.com/software_inspector/ Feature Overview - The Secunia Software Inspector: * Detects insecure versions of applications installed
CVE-2015-0062 This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow an attacker to leverage the lack of impersonation-level security