Wednesday, July 16, 2008

check your PC for vulnerabilities

From remote - describes other vulnerabilities where the attack vector doesn't require access to the system or a local network. This category covers services that are acceptable to expose to the Internet (e.g. HTTP, HTTPS, SMTP). It also covers client applications used on the Internet and certain vulnerabilities where it is reasonable to assume that a security conscious user can be tricked into performing certain actions.

System access - This covers vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.

Vulnerability is a type of active threat found in your computer system. Most of these objects can be found in Program Files where .exe, .dll and more are critically very and highly dangerous when infected. The vulnerability is caused due to an error in the object handler when parsing object header data. This can be exploited to corrupt memory
via a specially crafted Publisher file. Successful exploitation may allow execution of arbitrary code.


GiggleYohoo designed by CHRiS CaGanG - ALL RIGHTS RESERVED series of 2022

Click to TOP