![]() |
Internet Explorer Security Flaws
Patches available.
There are pretty serious security holes in Internet Explorer. You can dowload the patch and close them up (until they find the next security holes) |
More info:
Vulnerability identifiers: - Buffer Overrun in Gopher Protocol Handler: CAN-2002-0646 - Buffer Overrun in Legacy Text Formatting ActiveX Control: CAN-2002-0647 - XML File Reading via Redirect: CAN-2002-0648 - File Origin Spoofing: CAN-2002-0722 - Cross Domain Verification in Object Tag: CAN-2002-0723 - Variant of Cross-Site Scripting in Local HTML Resource: CAN-2002-0691 |
Crap like this happens all too often with IE. Glad I seldom use it.
|
Thanks for the info! ::Installing patch::: :thumbsup
|
Quote:
http://www.hotlinkpro.com/xp.jpg I'd love to see an update list from Windows 95. :) |
Microsoft has a serious problem when it comes to writing safe code. I'm starting to lose the faith.
|
All times are GMT -7. The time now is 02:50 PM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123