The vulnerability is not valid as a reference pointer in Internet Explorer. It is subject to certain conditions for the invalid pointer can be accessed after an object is deleted. In a special attack, try to access an object is released, Internet Explorer can be done to allow the execution of code from remote locations.
Microsoft is currently working on a patch for vulnerabilities in the probability that the patch cycle, the patch will be released generally resolve as a fix.
The confirmation page patch lists several mitigating factors, but the safest option is now moving to a different web browser, at least if no patch is needed to protect the computer system vulnerability.
0 Comment:
Post a Comment