![]() ![]() ![]() This version of Flash Player has a criticalvulnerability. Exploit Frameworks Securit圜enter 4 TENABLE NETWORK SECURITY INC., COPYRIGHT © 2012CPE: cpe:/o:microsoft:windowsCVE: CVE-2010-2549, CVE-2010-2743, CVE-2010-2744BID: 41280, 43773, 43774Crossref: OSVDB #66003, OSVDB #68551, OSVDB #68552, EDB-ID #15985, IAVA #2010-A-0138, MSFT #MS10-073Vulnerability Publication Date: 0Patch Publication Date: 2Plugin Publication Date: 3Plugin Modification Date: 3Exploit Available: trueExploitability Ease: Exploits are availablePlugin Type: localSource File: smb_nt_ms10-073.naslExploit Frameworks: Canvas (CANVAS), Core Impact Plugin Plugin Name Severity Port Protocol Family Exploit? Yes55140 Flash Player < High 445 TCP Windows 10.3.181.26 Multiple Vulnerabilities (APSB11-18)Synopsis: A browser plugin is affected by a memory corruption vulnerability.Description: According to its version, the instance of Flash Player installed on the remote Windows host is earlier than 10.3.181.26. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |