A vulnerability in Visual Studio 2005 could let an attacker execute code on a targeted Windows machine, Microsoft said Wednesday.Danish security vendor Secunia rated the vulnerability as “extremely critical” since it hasn’t been patched and there are unconfirmed reports it’s being exploited, said Thomas Kristensen, chief technology officer for Secunia.Microsoft said proof-of-concept attack code has been published, and the company could eventually issue a patch after its investigation. The company typically issues patches on the second Tuesday of the month, although it has been known to push out a patch faster depending on the risk of the vulnerability.“We are aware of the possibility of limited attacks that are attempting to use the reported vulnerability,” wrote Christopher Budd, a security program manager, on Microsoft’s Security Center Response blog. The vulnerability lies in an Active X control called the WMI Object Broker control, contained in the WmiScriptUtils.dll, Microsoft said. For a successful attack, a user would have to be lured to a website designed to exploit the flaw. Microsoft cautioned against following links in e-mails from unknown senders, since those could lead to an attacker’s site.Microsoft posted several mitigating factors that would head off attacks. For example, the particular ActiveX control is not included in the default allow list for Internet Explorer 7 (IE7). Also, those who are running Visual Studio 2005 on Windows Server 2003 and Windows Server 2003 Service Pack 1 in their default configurations—with the Enhanced Security Configuration turned on—are not affected, Microsoft wrote.If an attack were successful, the hacker would have only the same rights as a local user, so Microsoft said those accounts configured with fewer rights than an administrator might cause less of an impact.Visual Studio is an application development tool from Microsoft.-Jeremy Kirk, IDG News Service (London Bureau)Related Links: Microsoft Windows Mobile Security Blasted by Analyst Microsoft IE7 Browser Still Contains Old Flaw 1st Microsoft IE7 Security Flaw ReportedThis article is posted on our Microsoft Informer page. For more news on the Redmond, Wash.-based powerhouse, keep checking in. Check out our CIO News Alerts and Tech Informer pages for more updated news coverage. Related content brandpost Zero-trust: Why You Shouldn’t Ignore Your Print Environment By Canon Business Solutions Jun 07, 2023 5 mins Zero Trust news Salesforce CEO Benioff shakes up executive team with new hires Six months after the company lost its co-CEO and announced it was laying off 10% of its global workforce, Salesforce’s top team is undergoing a major personnel change. By Charlotte Trueman Jun 07, 2023 3 mins Technology Industry Enterprise Applications opinion Cisco debuts bold portfolio of network, security, and observability solutions and previews generative AI capabilities for Webex and Security Cloud Cisco’s innovative technologies help connect the dots of its network- and cloud-based ecosystem. By Pete Bartolik Jun 07, 2023 4 mins Cloud Security brandpost Help wanted: IT tools and talent for building a multicloud estate Like all trade workers, IT leaders need the right tools and skills to succeed in a multicloud world characterized by application and data sprawl. By Chad Dunn, Vice President, Product Management, Dell APEX Jun 07, 2023 6 mins Multi Cloud Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe