Credits
1997/2004, Active Network. All
Rights Reserved.
Layout & Design by
Designer Dream. Content
written by the Active Network team. Please click
here for full terms of
use and restrictions or read our
Privacy Statement.
Two new vulnerabilities, the most serious of which could enable an attacker to run arbitrary code on a users system if the user either browsed to a hostile Web site or opened a specially crafted HTML-based email message.