Some vulnerabilities have been reported in Microsoft Internet Explorer, which can be exploited by malicious people to compromise a user's system.
1) An error when handling parameters passed to unspecified navigation methods can be exploited to corrupt memory via a specially crafted web page.
2) An error when fetching a file with an overly long path from a WebDAV share can be exploited to corrupt heap memory via a specially crafted web page.
3) An unspecified use-after-free error can be exploited to corrupt memory via a specially crafted web page.
4) A boundary error when processing an overly long filename extension specified inside an "EMBED" tag can be exploited to cause a stack-based buffer overflow.
Successful exploitation of the vulnerabilities may allow execution of arbitrary code.
Patches are available for these critical issues.
Things borrower must know about Pre Closing Home loan - Most people tend to take a home loan for 15 to 20 years as this usually offers the lowest home loan interest rates. Now to prepay the loan, you have to pa...