Keyword: ms04-011_microsoft_windows
99236 Total Search   |   Showing Results : 41 - 60
Settings\{user name}\Desktop in Windows 2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\Users\{user name}\Desktop in Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), Windows 8 (32-
Microsoft Windows Could Allow Elevation of Privilege (3031432) Risk Rating: Important This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow an
where it usually is C:\Documents and Settings\{user name}\Desktop in Windows 2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\Users\{user name}\Desktop in Windows Vista (32- and 64-bit),
Microsoft addresses the following vulnerabilities in its February batch of patches: (MS14-005) Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure (2916036) Risk Rating:
Vulnerability in Windows Client/Server Run-time Subsystem (CSRSS) Could Allow Elevation of Privilege (2790113) Risk Rating: Important Read more here . This patch addresses a vulnerability found in Microsoft
vulnerability in the Microsoft Windows Client/Server Run-time Subsystem (CSRSS), which could allow elevation of privilege. Read more here . (MS11-011) Vulnerabilities in Windows Kernel Could Allow Elevation of
CVE-2010-4398,CVE-2011-0045 This security update addresses vulnerabilities in Microsoft Windows, which could allow elevation of privilege if an attacker logged on locally and ran a specially crafted
Server 2008, and Windows Server 2012.) Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft
CVE-2013-0077 This patch addresses a vulnerability found in Microsoft Windows. Once an affected user opens a specially crated media file and a Microsoft Office document with a specially crafted
to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run jswpanpe.exe = "%User Profile%\Identities\jswpanpe.exe " Other System
shares. It modifies the following registry entries: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Hardware Profiles\0001\Software\ Microsoft\windows\CurrentVersion\ Internet Settings ProxyEnable = “1” (Note: The
usually C:\Documents and Settings\{user name} on Windows 2000, XP, and Server 2003, or C:\Users\{user name} on Windows Vista and 7.) Other System Modifications This Trojan modifies the following file(s): It
Modifications This Ransomware modifies the following registry entries: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Hardware Profiles\0001\Software\ Microsoft\windows\CurrentVersion\ Internet Settings ProxyEnable = 1
Other System Modifications This Ransomware modifies the following registry entries: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Hardware Profiles\0001\Software\ Microsoft\windows\CurrentVersion\ Internet
CVE-2014-0271 This security update resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user
This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker convinces a user with a domain-configured
Windows 2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\Users\{user name}\AppData\Local\Temp on Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), Windows 8 (32- and 64-bit), Windows
Settings\Temp on Windows 2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\Users\{user name}\AppData\Local\Temp on Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), Windows 8 (32- and
Windows 2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\Users\{user name}\AppData\Local\Temp on Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), Windows 8 (32- and 64-bit), Windows
Windows 2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\Users\{user name}\AppData\Local\Temp on Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), Windows 8 (32- and 64-bit), Windows