Known Vulnerabilities for Malware Protection Engine by Microsoft

Listed below are 10 of the newest known vulnerabilities associated with the software "Malware Protection Engine" by "Microsoft".

These CVEs are retrieved based on exact matches on listed software and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2021-42298 Microsoft Defender Remote Code Execution Vulnerability 7.8 - HIGH 2021-11-10 2021-11-17
CVE-2021-34522 Microsoft Defender Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34464. 7.8 - HIGH 2021-07-14 2021-07-22
CVE-2021-34471 Microsoft Windows Defender Elevation of Privilege Vulnerability 7.8 - HIGH 2021-08-12 2021-08-23
CVE-2021-34464 Microsoft Defender Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34522. 7.8 - HIGH 2021-07-16 2021-07-22
CVE-2021-31985 Microsoft Defender Remote Code Execution Vulnerability 8.8 - HIGH 2021-06-08 2021-07-08
CVE-2021-31978 Microsoft Defender Denial of Service Vulnerability 5.5 - MEDIUM 2021-06-08 2021-06-11
CVE-2017-8540 The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 200... 7.8 - HIGH 2017-05-26 2017-08-13
CVE-2017-8539 The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 200... 5.5 - MEDIUM 2017-05-26 2019-10-03
CVE-2017-8538 The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 200... 7.8 - HIGH 2017-05-26 2017-08-13
CVE-2017-0290 The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 200... 7.8 - HIGH 2017-05-09 2019-05-08

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationMicrosoftMalware Protection Engine1.1.14306.0AllAllAll
ApplicationMicrosoftMalware Protection Engine1.1.10701.0AllAllAll
ApplicationMicrosoftMalware Protection Engine1.1.10600.0AllAllAll
ApplicationMicrosoftMalware Protection Engine-AllAllAll

Popular searches for Malware Protection Engine

Microsoft Malware Protection Engine deployment information

support.microsoft.com/en-us/help/2510781/microsoft-malware-protection-engine-deployment-information

Microsoft Malware Protection Engine deployment information Discusses how to update the Microsoft Malware Protection Engine q o m, including prerequisites, restart, and removal, and how to verify that the updates were installed correctly.

Microsoft Patch (computing) Malware Endpoint security Installation (computer programs) Microsoft Windows Microsoft Servers Software deployment Software versioning Information Windows Defender Microsoft Azure Malicious Software Removal Tool Microsoft Intune Reboot Software Computer program Apple Inc. Computer virus Computer file

Microsoft Security Advisory 4022344

technet.microsoft.com/en-us/library/security/4022344

Microsoft Security Advisory 4022344 Microsoft S Q O is releasing this security advisory to inform customers that an update to the Microsoft Malware Protection Engine = ; 9 addresses a security vulnerability that was reported to Microsoft Y W U. The update addresses a vulnerability that could allow remote code execution if the Microsoft Malware Protection Engine An attacker who successfully exploited this vulnerability could execute arbitrary code in the security context of the LocalSystem account and take control of the system. See the Affected Software section for a list of affected products.

technet.microsoft.com/library/security/4022344.aspx docs.microsoft.com/en-us/security-updates/SecurityAdvisories/2017/4022344 technet.microsoft.com/library/security/4022344 docs.microsoft.com/en-us/security-updates/securityadvisories/2017/4022344 Microsoft Malware Vulnerability (computing) Patch (computing) Software Arbitrary code execution Computer security Computer file Exploit (computer security) Antivirus software Security hacker Image scanner Same-origin policy Installation (computer programs) Security Software versioning User (computing) Common Vulnerabilities and Exposures Memory address Software deployment

© CVE.report 2022 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report