Severity: High Summary: These vulnerabilities affect: All current versions of Windows and components that often ship with it (like XML Core Services and the .NET Framework). Some vulnerable components also affect Office and Server Software products. How an attacker exploits them: Multiple vectors of attack, including sending malicious print jobs to luring victims to … [Read more...]
Shockwave Update Corrects Five Buffer Overflows
Summary: This vulnerability affects: Adobe Shockwave Player 11.6.7.637 and earlier, running on Windows and Macintosh computers How an attacker exploits it: By enticing your users into visiting a website containing a malicious Shockwave content Impact: An attacker can execute code on your computer, potentially gaining control of it What to do: If you allow the use of … [Read more...]
Four Updates Repair Office and Server Software Vulnerabilities
Severity: High Summary: These vulnerabilities affect: Microsoft Office related products, including Word, Works, Sharepoint, InfoPack, Communicator, Lync, Groove, and more How an attacker exploits them: Multiple vectors of attack, including enticing users to click specially crafted links, or to open specially crafted documents Impact: In the worst case, an attacker can gain … [Read more...]
Grab Adobe's Shockwave Update to Avoid Web-based Attacks
Summary: This vulnerability affects: Adobe Shockwave Player 11.6.3.633 and earlier, running on Windows and Macintosh computers How an attacker exploits it: By enticing your users into visiting a website containing a malicious Shockwave content Impact: An attacker can execute code on your computer, potentially gaining control of it What to do: If you allow the use of … [Read more...]
Apple OSX: Take Your Leopards In For a Checkup
Summary: These vulnerabilities affect: All current versions of OS X 10.5.x (Leopard) and OS X 10.6.x (Snow Leopard) How an attacker exploits them: Multiple vectors of attack, including enticing your users to visit a malicious web site, or into downloading and viewing various documents or images Impact: Various results; in the worst case, an attacker executes code on your … [Read more...]