[BESAdmin-Announcements] Content Modification: Patches for Windows
Announcements for BES Administrators
besadmin-announcements at bigmail.bigfix.com
Tue Feb 25 11:46:45 PST 2020
Content in the Patches for Windows site has been modified.
Modified:
[Major] MS13-023: Vulnerability in Microsoft Visio Viewer 2010 Could Allow Remote Code Execution - Visio Viewer 2010 SP1 (ID: 1302301)
[Major] Security advisory: Scripting Engine Memory Corruption Vulnerability - Disable Workaround (ID: 450033109)
[Major] Security advisory: Scripting Engine Memory Corruption Vulnerability - Disable Workaround (x64) (ID: 286872526)
[Major] Security advisory: Scripting Engine Memory Corruption Vulnerability - Enable Workaround (ID: 450033110)
[Major] Security advisory: Scripting Engine Memory Corruption Vulnerability - Enable Workaround (x64) (ID: 286872527)
Reason for Update:
Update relevane in workaround fixlets to account for wow redirection
Fixed hash mismatch issue in fixlet ID: 1302301
Actions to Take:
None
Published site version:
Patches for Windows, version 3483
Additional links:
None
Application Engineering Team
BigFix
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://bigmail.bigfix.com/pipermail/besadmin-announcements/attachments/20200225/8463e6a5/attachment.html>
More information about the Besadmin-announcements
mailing list