A security vulnerability exists in Microsoft Office 2010 32-Bit Edition that could allow arbitrary code to run when a maliciously modified file is opened. This update resolves that vulnerability.
Link Removed
Revision Note: V1.0 (May 14, 2013): Advisory published.
Summary: Microsoft is releasing this security advisory to help ensure customers are aware that an update to the Microsoft Malware Protection Engine also addresses a security vulnerability reported to Microsoft. The update...
advisory
arbitrary
attack
code
context
control
customers
engine
execution
exploit
information
localsystem
malware
microsoft
protection
remote
security
system
update
vulnerability
Original release date: March 05, 2013
Systems Affected
Any system using Oracle Java 7, 6, 5 (1.7, 1.6, 1.5) including
Java Platform Standard Edition 7 (Java SE 7)
Java Platform Standard Edition 6 (Java SE 6)
Java Platform Standard Edition 6 (Java SE 5)
Java SE Development Kit (JDK...
Revision Note: V1.0 (July 10, 2012): Advisory published.
Summary: Microsoft is announcing the availability of an automated Microsoft Fix it solution that disables the Windows Sidebar and Gadgets on supported editions of Windows Vista and Windows 7. Disabling the Windows Sidebar and...
advisory
arbitrary
code execution
fix it
gadgets
microsoft
protection
remote
security
sidebar
untrusted
updates
vulnerabilities
windows 7
windows vista
Severity Rating: Important
Revision Note: V1.0 (December 13, 2011): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Microsoft Office IME (Chinese). The vulnerability could allow elevation of privilege if a logged-on user...
Revision Note: V1.0 (November 3, 2011): Advisory published.
Summary: Microsoft is investigating a vulnerability in a Microsoft Windows component, the Win32k TrueType font parsing engine. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode...
advisory
arbitrary
attack
code
customer
data
elevation
exploitation
font
impact
kernel
malware
microsoft
revision
security
targeted
truetype
vulnerability
win32k
windows
Revision Note: V2.0 (February 8, 2011): Summary and update FAQ revised to notify users that the 971029 update to Autorun that restricts AutoPlay functionality to CD and DVD media will be offered via automatic updating. Advisory Summary:Microsoft is announcing the availability of updates to the...
Revision Note: V1.1 (January 5, 2011): Added a link to the automated Microsoft Fix it solution for the Modify the Access Control List (ACL) on shimgvw.dll workaround.Summary: Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker...
access
accounts
advisory
arbitrary
control
data
engine
exploit
fix
graphics
microsoft
programs
remote
rendering
rights
security
user
vulnerability
workaround
Revision Note: V1.1 (January 5, 2011): Added a link to the automated Microsoft Fix it solution for the Modify the Access Control List (ACL) on shimgvw.dll workaround. Advisory Summary:Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An...
access
advisory
arbitrary
attack
code
control
data
engine
exploit
fix it
graphics
microsoft
programs
remote
rendering
security
user rights
vulnerability
windows
workaround
Bulletin Severity Rating:Important - This security update resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of these vulnerabilities could allow elevation of privilege due to an error in the processing of a specific input buffer. An attacker who is able to log...