![]() Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes the user to the attacker's website. An attacker would have no way to force users to visit such a website. ![]() The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. This security update resolves two privately reported vulnerabilities in Microsoft XML Core Services. Version: 1.2 General Information Executive Summary Published: Janu| Updated: December 16, 2013 Security Bulletin Microsoft Security Bulletin MS13-002 - Critical Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution (2756145)
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |