Severity: High Summary: These vulnerabilities affect: Microsoft Office and related products, including SharePoint How an attacker exploits them: Varies. Typically by enticing users to visit malicious web content or open Office documents Impact: Many. In the worst case, an attacker can gain complete control of your Windows computer What to do: Install the appropriate … [Read more...]
Sharepoint, Excel, and Word Security Updates
Severity: High Summary: These vulnerabilities affect: Microsoft Office related products, including SharePoint, Word, and Excel How an attacker exploits them: Varies. Typically by enticing users to open or interact with maliciously crafted Office documents Impact: Many. In the worst case, an attacker can gain complete control of your Windows computer What to do: Install the … [Read more...]
Office Updates Fix SharePoint, Outlook, Word, and More
Severity: High Summary: These vulnerabilities affect: Microsoft Office related products, including SharePoint, Outlook, Word, Excel, Access, FrontPage and other components How an attacker exploits them: Varies. Typically by enticing users to open or interact with maliciously crafted Office documents Impact: Many. In the worst case, an attacker can gain complete control of … [Read more...]
Microsoft Black Tuesday: Big IE Update Trumps Windows & Office Patches
If you manage Windows networks, you know what time it is... time for Microsoft's monthly list of security updates. Microsoft Patch day has gone live, and you can find a listing of today's security bulletins in their June Patch Day summary page. As expected, they released five security bulletins, one for Internet Explorer (IE), three for Windows and its components, and one for … [Read more...]
SharePoint Suffers from XSS and Information Disclosure Flaws
Summary: These vulnerabilities affect: SharePoint Server, Groove Server, Office Web Apps, and InfoPath 2010, which are all part of Microsoft's Office family products How an attacker exploits them: Multiple vectors of attack, including luring your users to a malicious link, or by visiting a specific address on a vulnerable server Impact: In the worst case, an attacker can … [Read more...]