Critical Microsoft IE and .NET Holes Patched

WEBINAR:
On-Demand

Application Security Testing: An Integral Part of DevOps


This week Microsoft announced eight security bulletins which will patch 23 security holes, including patches for Internet Explorer and .NET. Two bulletins were rated as critical, with the other six being considered important.

One critical patch resolved vulnerabilities which could potentially allow an attacker to take over a user's computer by simply visiting a malicious web page while using the IE web browser. Another fixes a vulnerability in the .NET Framework and Silverlight which is present if a user visits a web page using any browser which runs XAML or Silverlight apps.

This week Microsoft announced eight security bulletins which will patch 23 security holes, including patches for Internet Explorer, Silverlight and .NET. Two bulletins were rated as critical, with the other six being considered important.

View Article



Comments

  • There are no comments yet. Be the first to comment!

  • You must have javascript enabled in order to post comments.

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • CEOs, CIOs, boards and shareholders are demanding digital transformation. They want their organizations to be more customer-focused, competitive and strategic to increase revenue. Data drives all of those aspects. A great first step in optimizing data use is moving data to the cloud. It can quickly show benefits. Here are six aspects of a cloud data management strategy that will help your organization more fully move, manage and use valuable data to successfully support digital transformation.

  • Mobility is reaching an inflection point in enterprise. Smart enterprises are moving away from tactical point solutions for mobile device management, looking instead for a secure, comprehensive, unified, and future-proof mobile-app platform. Enterprise applications are now at the heart of mobile productivity, data is shared outside the enterprise walls, and the data itself may reside on multiple devices and clouds. Read this guide to learn how a unified endpoint management (UEM) solution is critical to …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date