Summary: This vulnerability affects: Adobe Reader and Acrobat 9.x and earlier, on Windows, Mac, and UNIX computers (The flaws technically affect Reader X as well, but are much less exploitable) How an attacker exploits it: By enticing your users into viewing maliciously crafted PDF documents Impact: An attacker can execute code on your computer, potentially gaining control … [Read more...]
Archives for December 2011
WatchGuard Releases WSM v11.5.1 Update 1: XSS Flaws Corrected
Severity:High 15 December, 2011 Summary: This vulnerability affects: WatchGuard System Manager (WSM) v11.5.1 How an attacker exploits it: Multiple vectors of attack, including enticing you to click a maliciously crafted link, or sending specially crafted network traffic through an XTM appliance and having you view the resulting logs in our Web UI Impact: In the worst case, … [Read more...]
IE Cumulative Patch Fixes Three New Security Flaws
Severity: Medium Summary: This vulnerability affects: All current versions of Internet Explorer, running on all current versions of Windows How an attacker exploits it: Typically, by enticing one of your users to visit a malicious web page Impact: Various, in the worst case an attacker can execute code on your user's computer, gaining complete control of it What to do: … [Read more...]
Five Office Updates Primarily Patch Document Handling Vulnerabilities
Summary: These vulnerabilities affect: Most current versions of Microsoft Office for Windows and Mac, and related products like Publisher How an attacker exploits them: Typically, by enticing you to open maliciously crafted Office documents Impact: An attacker can execute code, potentially gaining complete control of your computer What to do: Install the appropriate Office … [Read more...]
Seven Windows Updates Fix Three Critical Flaws, Including Duqu 0day
Bulletins Affect Kernel-Mode Drivers, Windows Media Player, Active Directory, and More Severity: High Summary: These vulnerabilities affect: All current versions of Windows and components that ship with it How an attacker exploits them: Multiple vectors of attack including enticing your users to malicious web sites, or into opening booby-trapped files Impact: Various … [Read more...]