![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.807081 |
Categoría: | Mac OS X Local Security Checks |
Título: | Microsoft Office Remote Code Execution Vulnerabilities (3134226) - Mac OS X |
Resumen: | This host is missing an important security; update according to Microsoft Bulletin MS16-015 |
Descripción: | Summary: This host is missing an important security update according to Microsoft Bulletin MS16-015 Vulnerability Insight: Multiple flaws are due to multiple memory corruption vulnerabilities. Vulnerability Impact: Successful exploitation will allow remote attackers to execute arbitrary code in the context of the currently logged-in user. Failed exploit attempts will likely result in denial of service conditions. Affected Software/OS: Microsoft Office 2011 on Mac OS X. Solution: Apply the patch from the referenced advisory. CVSS Score: 9.3 CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-0022 Microsoft Security Bulletin: MS16-015 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-015 http://www.securitytracker.com/id/1034975 http://www.securitytracker.com/id/1034976 Common Vulnerability Exposure (CVE) ID: CVE-2016-0052 Common Vulnerability Exposure (CVE) ID: CVE-2016-0054 |
Copyright | Copyright (C) 2016 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |