![]() ![]() Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The attacker would then have to convince the user to open the malicious document. An attacker could craft a malicious ActiveX control to be used by a Microsoft Office document that hosts the browser rendering engine. ![]() Microsoft is aware of targeted attacks that attempt to exploit this vulnerability by using specially-crafted Microsoft Office documents. Microsoft ActiveX Remote Code Execution VulnerabilityĪ vulnerability has been identified in SIMATIC NET PC Software V14 (All versions), SIMATIC NET PC Software V15 (All versions), SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions), SIMATIC WinCC (All versions Microsoft is investigating reports of a remote code execution vulnerability in MSHTML that affects Microsoft Windows. Microsoft ActiveX Data Objects Remote Code Execution Vulnerability
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |