Severity: High 11 October, 2011 Summary: This vulnerability affects: All current versions of Internet Explorer (including IE9) How an attacker exploits it: By enticing one of your users to visit a malicious web page, or click a malicious link Impact: In the worst case an attacker can execute code on your user's computer, gaining control of it What to do: Deploy the … [Read more...]
Cumulative Patch Corrects Drive-by Download Flaws in IE9
Severity: High 9 August, 2011 Summary: This vulnerability affects: All current versions of Internet Explorer, including IE9 How an attacker exploits it: In most cases, by enticing one of your users to visit a malicious web page Impact: Various, in the worst case an attacker can execute code on your user's computer, gaining complete control of it What to do: Deploy the … [Read more...]
Two IE Bulletins Cure a Dozen Security Flaws
Severity: High 14 June, 2011 Summary: These vulnerabilities affects: All current versions of Internet Explorer, running on all current versions of Windows How an attacker exploits it: Typically, by enticing one of your users to visit a malicious web page Impact: In the worst case an attacker can execute code on your user's computer, gaining complete control of it What to … [Read more...]
IE Update Corrects Code Execution and Information Disclosure Flaws
Severity: High 12 April, 2011 Summary: This vulnerability affects: All current versions of Internet Explorer, running on all current versions of Windows How an attacker exploits it: Typically, by enticing one of your users to visit a malicious web page Impact: In the worst case an attacker can execute code on your user's computer, gaining complete control of it What to do: … [Read more...]
Critical Oracle (Sun) Java Update Closes 21 Holes
Severity: High 16 February, 2011 Summary: These vulnerabilities affect: All versions of Sun Java Runtime Environment (JRE) and Java Development Kit (JDK) released before 14 February, running on Windows, Solaris, and Linux platforms How an attacker exploits them: Multiple vectors of attack, including luring your users to a malicious web page containing specially crafted … [Read more...]