![]() ![]() ![]() “These vulnerabilities can also be exploited through an embedded ActiveX control in a Microsoft Office document or any application that uses the Internet Explorer rendering engine.” “As is typically the case for Flash Player vulnerabilities, web-based exploitation is the primary vector of exploitation but not the only one,” according to Nick Colyer, senior product marketing manager with Automox, in an email.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |