Severity: High
8 July, 2008
Summary:
§ These vulnerabilities affect: Microsoft Access 2000, 2002, and 2003
§ How an attacker exploits them: By enticing one of your users to a malicious web site
§ Impact: An attacker can execute code, potentially gaining complete control of your user’s computer
§ What to do: Implement workarounds described in the “Solution Path” section below
0 Comments