Severity: High Summary: These vulnerabilities affect: All current versions of Internet Explorer (IE) How an attacker exploits them: By enticing one of your users to visit a malicious web page Impact: An attacker can execute code on your user's computer, often gaining complete control of it What to do: Install Microsoft's IE updates immediately, or let Windows Automatic … [Read more...]
Three Critical Vulnerabilities Only Affect IE 9
Severity: High Summary: These vulnerabilities affect: Internet Explorer (IE) 9 only How an attacker exploits them: By enticing one of your users to visit a malicious web page Impact: An attacker can execute code on your user's computer, often gaining complete control of it What to do: Install Microsoft's Internet Explorer 9 updates immediately, or let Windows Automatic … [Read more...]
Adobe Flash Player Update and Reader X 0day
Summary: These vulnerabilities affect: Adobe Flash Player running on all platforms, Adobe Air, and all versions of Reader X How an attacker exploits it: By enticing users to visit a website containing malicious Flash content (or into downloading and opening a malicious PDF) Impact: In the worst case, an attacker can execute code on the user's computer, potentially gaining … [Read more...]
Four Updates Repair Office and Server Software Vulnerabilities
Severity: High Summary: These vulnerabilities affect: Microsoft Office related products, including Word, Works, Sharepoint, InfoPack, Communicator, Lync, Groove, and more How an attacker exploits them: Multiple vectors of attack, including enticing users to click specially crafted links, or to open specially crafted documents Impact: In the worst case, an attacker can gain … [Read more...]
Early Adobe Flash Patch Corrects 25 Vulnerabilities
Summary: This vulnerability affects: Adobe Flash Player running on all platforms (including Android devices) and Adobe Air How an attacker exploits it: By enticing users to visit a website containing malicious Flash content Impact: In the worst case, an attacker can execute code on the user's computer, potentially gaining control of it What to do: Download and install the … [Read more...]