![]() Mitigation: Update Adobe Flash Player installation to the latest version Vulnerable products: Adobe Flash Player before 28.0.0.161 Vulnerable products: Microsoft Windows Vista SP2 Windows Server 2008 SP2 and R2 SP1 Windows 7 SP1 Windows 8.1 Windows Server 2012 Gold and R2 Windows RT 8.1 and Windows 10 Gold, 1511, and 1607 and Windows Server 2016Īssociated malware: Multiple using the EternalSynergy and EternalBlue Exploit Kit Mitigation: Upgrade to Struts 2.3.32 or Struts 2.5.10.1 ![]() Vulnerable products: Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 ![]() Vulnerable products: Microsoft Office 2007 SP3/2010 SP2/2013 SP1/2016, Vista SP2, Server 2008 SP2, Windows 7 SP1, Windows 8.1Īssociated malware: FINSPY, LATENTBOT, Dridex Vulnerable products: Microsoft Office 2007 SP3/2010 SP2/2013 SP1/2016 ProductsĪssociated malware: Loki, FormBook, Pony/FAREIT Vulnerable products: Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP SP1, and Office Web Apps Server 2010 SP SP1 Mitigation: Update affected Microsoft products with the latest security patches Vulnerable products: Microsoft Office 2003 SP3, 2007 SP2, and SP3, and 2010 Gold and SP1 Office 2003 Web Components SP3 SQL Server 2000 SP4, 2005 SP4, and 2008 SP2, SP3, and R2 BizTalk Server 2002 SP1 Commerce Server 2002 SP4, 2007 SP2, and 2009 Gold and R2 Visual FoxPro 8.0 SP1 and 9.0 SP2 and Visual Basic 6.0 Included are the vulnerable products, CVE numbers, and mitigation strategies. The list below will help you identify malware associated with exploiting the CVE (Common Vulnerabilities and Exposures). List of the most exploited software vulnerabilities The agency urges businesses in the private and public sectors to apply to their networks the available updates and implement centralized patch management systems to prevent cyberattacks. cyber security agency, and the Federal Bureau of Investigation (FBI) published a list of the top 20 most exploited software vulnerabilities across the last 6 years, between 20. Recently, CISA (Cybersecurity and Infrastructure Security Agency), a U.S.
0 Comments
Leave a Reply. |