Severity: High Summary: These vulnerabilities affect: Microsoft Office and related products like SharePoint Server How an attacker exploits them: Varies. Typically by enticing users to open or interact with maliciously crafted Office documents, or interacting with web resources Impact: Many. In the worst case, an attacker can gain complete control of your Windows … [Read more...]
Trio of Office Updates Fix SharePoint Flaw & ASLR Bypass
Severity: High Summary: These vulnerabilities affect: Microsoft Office and related products, including SharePoint How an attacker exploits them: Varies. Typically by enticing users to visit malicious web content or open Office documents Impact: Many. In the worst case, an attacker can gain complete control of your Windows computer What to do: Install the appropriate … [Read more...]
Sharepoint, Excel, and Word Security Updates
Severity: High Summary: These vulnerabilities affect: Microsoft Office related products, including SharePoint, Word, and Excel How an attacker exploits them: Varies. Typically by enticing users to open or interact with maliciously crafted Office documents Impact: Many. In the worst case, an attacker can gain complete control of your Windows computer What to do: Install the … [Read more...]
Microsoft Black Tuesday: Install the IE Update First
If you follow the blog, you're surely aware that today's Microsoft Patch Day; and it's an especially important one. Though it doesn't set any records, Microsoft has released an update to fix a fairly significant, zero day Internet Explorer (IE) vulnerability, which many attackers have exploited in the wild for the past few weeks. If you can only apply one patch today, I … [Read more...]
Office Updates Fix SharePoint, Outlook, Word, and More
Severity: High Summary: These vulnerabilities affect: Microsoft Office related products, including SharePoint, Outlook, Word, Excel, Access, FrontPage and other components How an attacker exploits them: Varies. Typically by enticing users to open or interact with maliciously crafted Office documents Impact: Many. In the worst case, an attacker can gain complete control of … [Read more...]