An attacker may be able to take control of your computer by taking advantage of two different vulnerabilities in Internet Explorer and Windows.
Description
There is a vulnerability in the way Internet Explorer processes
certain HTML code. There is also a vulnerability in the way Microsoft Windows handles certain images. By exploiting either vulnerability, an attacker may be
able to take control of your computer.
Reports indicate that one of these vulnerabilities is being exploited by
malicious code referred to as Phel.