Secunia CSI7
Advisories
Research
Forums
Create Profile
Our Commitment
PSI
PSI API
CSI
OSI
xSI
Vulnerabilities
Programs
Open Discussions
My Threads
Create Thread
Statistics
About

Forum Thread: Macrovision Update Service ActiveX Control version 5.6

You are currently viewing a forum thread in the Secunia Community Forum. Please note that opinions expressed here are not of Secunia but solely reflect those of the user who wrote it.

This thread was submitted in the following forum:
PSI

This thread has been marked as locked.
TonyB. Macrovision Update Service ActiveX Control version 5.6
Member 4th Apr, 2014 15:28
Ranking: -34
Posts: 38
User Since: 1st Nov, 2013
System Score: N/A
Location: US
Has this been resolved as i still have not found a way to remove Macrovision Update Service ActiveX Control version 5,6 only thing i have done is disable the PSI to ignore it but how do we fix it. reading threw all the thread and the official one there seams to be no resolve for it. so how come they were all locked?. as clearly this is a issue that needs attention?.

kurtcobainus

RE: Macrovision Update Service ActiveX Control version 5.6
[+]
This reply has been deleted
Maurice Joyce RE: Macrovision Update Service ActiveX Control version 5.6
Handling Contributor 8th Apr, 2014 17:02
Score: 11720
Posts: 8,956
User Since: 4th Jan 2009
System Score: N/A
Location: UK
Threads auto lock after 7 days of no activity. The main reason is to prevent spammers (which this thread has already attracted) but also tag on posts that are misleading or factually incorrect which rightly leads to members voting those submissions down.

You clearly misunderstand the role of Secunia PSI. It is a vulnerability checker full stop. Secunia Support do not supply an individual fix it service.

Despite what you say the general advice already given by Secunia has worked for some & the comments on that & other threads prove it.

PSI has found something amiss with your set up. They have given you the path to the problem & their website where you can search for more information on the impact of their discovery. In some instances they supply an optional auto update service to correct vulnerabilities. What you do with the information & tools provided is up to you. If you are expecting Secunia Support to comment further you could be in for a long wait - your problem has nothing to do with them unless you can prove it is a False Positive in which case you should use these guidelines to report it:

http://secunia.com/vulnerability_scanning/personal...

The Forum can be helpful in solving individual problems. To achieve the best results from helpers the Secunia guidelines in creating a thread should be followed.

Before creating your thread:

Please make sure to include as many details as possible. The more details, the easier it will be for other users to assist you.

If your thread relates to a problem with patching a program, please be sure to include and verify:
* The path to where the program was detected on your PC
* Description of what you've done to patch the program
* That you have re scanned your PC after applying the patch


In addition, for your problem, please confirm which OS you are using & what files are in C:\Windows\downloaded program files using the CMD Prompt as an administrator? It would be helpful if you published a screen shot of the result - example below:

https://1ncuig.bn1303.livefilestore.com/y2pcXj1fx5...

--
Maurice

Windows 7 SP1 64 Bit OS
HP Intel Pentium i7
IE 11 for Windows 7 SP1
16GB RAM
Was this reply relevant?
+5
-0

This thread has been marked as locked.


 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability