Microsoft Security Advisory (979352): Vulnerability in Internet Explorer Could Allow Remote Code Exe


 
Thread Tools Search this Thread
Special Forums Windows & DOS: Issues & Discussions Security Advisories (RSS) - Microsoft Microsoft Security Advisory (979352): Vulnerability in Internet Explorer Could Allow Remote Code Exe
# 1  
Old 01-20-2010
Microsoft Security Advisory (979352): Vulnerability in Internet Explorer Could Allow Remote Code Exe

Revision Note: V1.2 (January 20, 2010): Revised Executive Summary to reflect the changing nature of attacks attempting to exploit the vulnerability. Clarified information in the Mitigating Factors section for Data Execution Prevention (DEP) and Microsoft Outlook, Outlook Express, and Windows Mail. Clarified several Frequently Asked Questions to provide further details about the vulnerability and ways to limit the possibility of exploitation. Added " Enable or disable ActiveX controls in Office 2007" and " Do not open unexpected files" to the Workarounds section. Advisory Summary:Microsoft continues to investigate reports of limited attacks against customers of Internet Explorer 6, using a vulnerability in Internet Explorer. This advisory contains information about which versions of Internet Explorer are vulnerable as well as workarounds and mitigations for this issue.

More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
HTTP::Cookies::Microsoft(3)				User Contributed Perl Documentation			       HTTP::Cookies::Microsoft(3)

NAME
HTTP::Cookies::Microsoft - access to Microsoft cookies files SYNOPSIS
use LWP; use HTTP::Cookies::Microsoft; use Win32::TieRegistry(Delimiter => "/"); my $cookies_dir = $Registry-> {"CUser/Software/Microsoft/Windows/CurrentVersion/Explorer/Shell Folders/Cookies"}; $cookie_jar = HTTP::Cookies::Microsoft->new( file => "$cookies_dir\index.dat", 'delayload' => 1, ); my $browser = LWP::UserAgent->new; $browser->cookie_jar( $cookie_jar ); DESCRIPTION
This is a subclass of "HTTP::Cookies" which loads Microsoft Internet Explorer 5.x and 6.x for Windows (MSIE) cookie files. See the documentation for HTTP::Cookies. METHODS
The following methods are provided: $cookie_jar = HTTP::Cookies::Microsoft->new; The constructor takes hash style parameters. In addition to the regular HTTP::Cookies parameters, HTTP::Cookies::Microsoft recognizes the following: delayload: delay loading of cookie data until a request is actually made. This results in faster runtime unless you use most of the cookies since only the domain's cookie data is loaded on demand. CAVEATS
Please note that the code DOESN'T support saving to the MSIE cookie file format. AUTHOR
Johnny Lee <typo_pl@hotmail.com> COPYRIGHT
Copyright 2002 Johnny Lee This library is free software; you can redistribute it and/or modify it under the same terms as Perl itself. perl v5.16.3 2012-02-15 HTTP::Cookies::Microsoft(3)