{"id":72854,"date":"2010-06-15T07:21:19","date_gmt":"2010-06-15T07:21:19","guid":{"rendered":"https:\/\/localhost\/wordpress\/?p=72854"},"modified":"2010-06-15T07:21:19","modified_gmt":"2010-06-15T07:21:19","slug":"microsoft-windows-help-and-support-center-vulnerability","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/microsoft-windows-help-and-support-center-vulnerability\/","title":{"rendered":"Microsoft Windows Help and Support Center vulnerability"},"content":{"rendered":"<p>The vulnerability for Microsoft Windows Help and Support Center is being exploited in the wild. More information for this vulnerability at <a title=\"https:\/\/www.microsoft.com\/technet\/security\/advisory\/2219475.mspx\" href=\"https:\/\/www.microsoft.com\/technet\/security\/advisory\/2219475.mspx\">https:\/\/www.microsoft.com\/technet\/security\/advisory\/2219475.mspx<\/a> . The vulnerability allows for infecting a Windows system by visiting manipulated web sites, for example (drive-by-download).<\/p>\n<p>Microsoft now has released a \u201c<a title=\"https:\/\/support.microsoft.com\/kb\/2219475\" href=\"https:\/\/support.microsoft.com\/kb\/2219475\">Fix It<\/a>\u201d tool which unregisters the HCP protocol as a workaround, because there is currently no patch available. We recommend users to use this tool to block the vulnerability from being exploited.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The vulnerability for Microsoft Windows Help and Support Center is being exploited in the wild. More information for this vulnerability at https:\/\/www.microsoft.com\/technet\/security\/advisory\/2219475.mspx . The vulnerability allows for infecting a Windows system by visiting manipulated web sites, for example (drive-by-download). Microsoft now has released a \u201cFix It\u201d tool which unregisters the HCP protocol as a workaround, [&hellip;]<\/p>\n","protected":false},"author":22,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-72854","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/72854"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=72854"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/72854\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=72854"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=72854"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=72854"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}