Severity: High Summary: These vulnerabilities affect: Microsoft Office and related products like SharePoint Server How an attacker exploits them: Varies. Typically by enticing users to open or interact with maliciously crafted Office documents, or interacting with web resources Impact: Many. In the worst case, an attacker can gain complete control of your Windows … [Read more...]
Windows File Handling Remote Code Execution Flaw
Severity: Medium Summary: These vulnerabilities affect: All current versions of Windows How an attacker exploits them: By tricking your users into running a .bat or .cmd file from a network location Impact: In the worst case, an attacker can gain complete control of your Windows computer What to do: Install the appropriate Microsoft patches as soon as possible, or let … [Read more...]
Four Windows Updates: Hijack Windows with Malicious Images
Severity: High Summary: These vulnerabilities affect: All current versions of Windows (and related components like Silverlight) How an attacker exploits them: Multiple vectors of attack, including luring users into viewing malicious images Impact: In the worst case, an attacker can gain complete control of your Windows computer What to do: Install the appropriate Microsoft … [Read more...]
Windows Updates Fix Code Execution, DoS, and Privilege Elevation Flaws
Severity: High Summary: These vulnerabilities affect: All current versions of Windows (and related components like the .NET Framework and VBScript Engine) How an attacker exploits them: Multiple vectors of attack, including luring users to malicious web sites or into viewing malicious vector graphics Impact: In the worst case, an attacker can gain complete control of your … [Read more...]
Trio of Office Updates Fix SharePoint Flaw & ASLR Bypass
Severity: High Summary: These vulnerabilities affect: Microsoft Office and related products, including SharePoint How an attacker exploits them: Varies. Typically by enticing users to visit malicious web content or open Office documents Impact: Many. In the worst case, an attacker can gain complete control of your Windows computer What to do: Install the appropriate … [Read more...]