Summary: This vulnerability affects: All current versions of Internet Explorer, running on all current versions of Windows How an attacker exploits it: By enticing one of your users to visit a malicious web page Impact: In the worst case, an attacker can execute code on your user's computer, gaining complete control of it What to do: Deploy the appropriate Internet … [Read more...]
Five Vulnerabilities in Windows and its Components; Two Critical
Bulletins Affect Media Decompression Components, Kernel-mode Drivers, and More Summary: These vulnerabilities affect: All current versions of Windows and components that ship with it How an attacker exploits them: Multiple vectors of attack, including enticing your users to open malicious media or to visit specially crafted websites Impact: Various results; in the … [Read more...]
Remote IIS Code Execution Flaw Affects Only Select Web Servers
Summary: This vulnerability affects: IIS 6.0, 7.0 and 7.5 How an attacker exploits it: By sending a specially crafted HTTP request Impact: In the worst case, an attacker can gain complete control of your IIS server What to do: Install Microsoft's IIS updates, or let Windows Update do it for you Exposure: Microsoft's Internet Information Services (IIS) is one of the … [Read more...]
Microsoft Office Security Bulletins Affect Excel and SharePoint
Summary: These vulnerabilities affect: All current versions of Microsoft Office (for Windows and Mac) and Office SharePoint Server How an attacker exploits them: Multiple vectors of attack, including enticing your users into opening malicious Office documents Impact: Various results; in the worst case, an attacker can gain complete control of your Windows … [Read more...]
VBA Vulnerability Makes Office Documents Dangerous
Summary: This vulnerability affects: Microsoft Visual Basic for Applications (VBA), which ships with all current versions of Office How an attacker exploits it: By tricking one of your users into opening a malicious Office document Impact: An attacker can potentially gain complete control of your windows computers (depending on the privileges of the user) What to … [Read more...]