![]() Refer to Microsoft Security Guide for more details pertaining to this vulnerability. ![]() Successful exploitation allows an attacker to execute code remotely. There is no direct download for the patch. Note: Office click-2-run and Office 365 installations need to be updated manually or need to be set to automatic update. This authenticated QID checks the file versions from the Microsoft advisory with the versions on the affected office system. This security update contains the following KBs: Microsoft has released January 2021 security updates to fix multiple security vulnerabilities. Microsoft Office and Microsoft Office Services and Web Apps Security Update January 2021 Qualys has released the following checks for these new vulnerabilities: To fix newly discovered flaws in their software. Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition. Visit Qualys Security Blog to prioritize remediation. Their networks for these and other new vulnerabilities by accessing Vulnerability checks in the Qualys Cloud Platform to protectĪnnounced today by Microsoft. Qualys Vulnerability R&D Lab has released new
0 Comments
Leave a Reply. |