Severity: High 10 August, 2010 Summary: These vulnerabilities affect: All current versions of Microsoft Office for Windows and Mac (specifically Word and Excel) How an attacker exploits them: By enticing you to open maliciously crafted Office documents Impact: An attacker can execute code, potentially gaining complete control of your computer What to do: Install the … [Read more...]
Cumulative IE Patch Corrects Multiple Memory Corruption Flaws
Severity: High 10 August, 2010 Summary: This vulnerability affects: All current versions of Internet Explorer, running on all current versions of Windows How an attacker exploits it: By enticing one of your users to visit a malicious web page Impact: Various, in the worst case an attacker can execute code on your user's computer, gaining complete control of it What to do: … [Read more...]
Out-of-Cycle Update Fixes Shortcut Icon Vulnerability
Summary: These vulnerabilities affect: All current versions of Windows How an attacker exploits them: Various ways, including enticing you into downloading a specially crafted shortcut and browsing the directory containing it Impact: In the worst case, an attacker can gain complete control of your Windows computer What to do: Install Microsoft's out-of-band Windows … [Read more...]
Microsoft Patches Critical Windows Help Center Vulnerability: Two Windows Bulletins Correct Flaws in Helpctr.exe and Cdd.dll
Summary: These vulnerabilities affect: All versions of Windows XP and Server 2003, as well as the 64-bit versions of Windows 7 and Server 2008 R2 How an attacker exploits them: Multiple vectors of attack, including enticing your users to visit a specially crafted website Impact: Various results; in the worst case, an attacker can gain complete control of your Windows … [Read more...]
Microsoft Office Updates Fix ActiveX Controls and Outlook
Summary: These vulnerabilities affect: Microsoft Office 2002, 2003, and 2007 (Windows only) or the components that ship with it How an attacker exploits them: Multiple vectors of attack, including enticing your users to a malicious website, or into opening a malicious attachment. Impact: Various results; in the worst case, an attacker can gain complete control of your … [Read more...]