![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.815772 |
Categoría: | Windows : Microsoft Bulletins |
Título: | Adobe Flash Player Microsoft Edge and Internet Explorer Security Update (APSB20-06) - Windows |
Resumen: | Adobe Flash Player is prone to an arbitrary code execution vulnerability. |
Descripción: | Summary: Adobe Flash Player is prone to an arbitrary code execution vulnerability. Vulnerability Insight: The flaw exists due to a type confusion issue. Vulnerability Impact: Successful exploitation allows attackers to execute arbitrary code. Affected Software/OS: Adobe Flash Player prior to 32.0.0.330 within Microsoft Edge or Internet Explorer on, Windows 10 Version 1607 for x32/x64 Edition, Windows 10 Version 1709 for x32/x64 Edition, Windows 10 Version 1803 for x32/x64 Edition, Windows 10 Version 1809 for x32/x64 Edition, Windows 10 Version 1903 for x32/x64 Edition, Windows 10 Version 1909 for x32/x64 Edition, Windows 10 x32/x64 Edition, Windows 8.1 for x32/x64 Edition, Windows Server 2012/2012 R2, Windows Server 2016, Windows Server 2019 Solution: Update to Adobe Flash Player 32.0.0.330 or later. CVSS Score: 9.3 CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2020-3757 https://security.gentoo.org/glsa/202003-61 RedHat Security Advisories: RHSA-2020:0513 https://access.redhat.com/errata/RHSA-2020:0513 |
Copyright | Copyright (C) 2020 Greenbone Networks GmbH |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |