Summary: This vulnerability affects: Adobe Flash Player running on all platforms and Adobe Air How an attacker exploits it: By enticing users to visit a website containing malicious Flash content Impact: In the worst case, an attacker can execute code on the user's computer, potentially gaining control of it What to do: Download and install the latest version of Adobe … [Read more...]
Windows File Handling Remote Code Execution Flaw
Severity: Medium Summary: These vulnerabilities affect: All current versions of Windows How an attacker exploits them: By tricking your users into running a .bat or .cmd file from a network location Impact: In the worst case, an attacker can gain complete control of your Windows computer What to do: Install the appropriate Microsoft patches as soon as possible, or let … [Read more...]
Four Windows Updates: Hijack Windows with Malicious Images
Severity: High Summary: These vulnerabilities affect: All current versions of Windows (and related components like Silverlight) How an attacker exploits them: Multiple vectors of attack, including luring users into viewing malicious images Impact: In the worst case, an attacker can gain complete control of your Windows computer What to do: Install the appropriate Microsoft … [Read more...]
Windows Updates Fix Code Execution, DoS, and Privilege Elevation Flaws
Severity: High Summary: These vulnerabilities affect: All current versions of Windows (and related components like the .NET Framework and VBScript Engine) How an attacker exploits them: Multiple vectors of attack, including luring users to malicious web sites or into viewing malicious vector graphics Impact: In the worst case, an attacker can gain complete control of your … [Read more...]
Trio of Office Updates Fix SharePoint Flaw & ASLR Bypass
Severity: High Summary: These vulnerabilities affect: Microsoft Office and related products, including SharePoint How an attacker exploits them: Varies. Typically by enticing users to visit malicious web content or open Office documents Impact: Many. In the worst case, an attacker can gain complete control of your Windows computer What to do: Install the appropriate … [Read more...]