We're still waiting for Microsoft to release a patch for the actively exploited security vulnerability in Internet Explorer -- at least for those who will receive it. In the meantime, the company suggested a workaround which involved restricting access to JScript.dll, acknowledging that this might lead to certain problems. But it seems that the company underestimated the negative impact the workaround could have. In addition to problems with services that rely on JScript.dll or PAC scripts, users are also experiencing problems with printing. See also: Microsoft pledges to patch Internet Explorer bug that is being actively exploited 0patch releases micropatch…
[Continue Reading]
Aucun commentaire:
Enregistrer un commentaire