![]() ![]() Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. In all cases, however, an attacker would have no way to force users to visit such a website. The vulnerability could allow remote code execution if a user visits a website containing specially crafted content designed to exploit the vulnerability. This security update resolves a privately reported vulnerability in Windows common controls. Version: 2.1 General Information Executive Summary ![]() Published: Aug| Updated: January 30, 2013 Security Bulletin Microsoft Security Bulletin MS12-060 - Critical Vulnerability in Windows Common Controls Could Allow Remote Code Execution (2720573)
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |