A security vulnerability exists in Microsoft Office 2010 32-Bit Edition that could allow arbitrary code to run when a maliciously modified file is opened. This update resolves that vulnerability.
Link Removed
Revision Note: V1.0 (May 14, 2013): Advisory published.
Summary: Microsoft is releasing this security advisory to help ensure customers are aware that an update to the Microsoft Malware Protection Engine also addresses a security vulnerability reported to Microsoft. The update...
advisory
arbitrary
attack
code
context
control
customers
engine
execution
exploit
information
local system
malware
microsoft
protection
remote
security
system
update
vulnerability
Original release date: March 05, 2013
Systems Affected
Any system using Oracle Java 7, 6, 5 (1.7, 1.6, 1.5) including
Java Platform Standard Edition 7 (Java SE 7)
Java Platform Standard Edition 6 (Java SE 6)
Java Platform Standard Edition 6 (Java SE 5)
Java SE Development Kit (JDK...
Revision Note: V1.0 (July 10, 2012): Advisory published.
Summary: Microsoft is announcing the availability of an automated Microsoft Fix it solution that disables the Windows Sidebar and Gadgets on supported editions of Windows Vista and Windows 7. Disabling the Windows Sidebar and...
Severity Rating: Important
Revision Note: V1.0 (December 13, 2011): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Microsoft Office IME (Chinese). The vulnerability could allow elevation of privilege if a logged-on user...
Revision Note: V1.0 (November 3, 2011): Advisory published.
Summary: Microsoft is investigating a vulnerability in a Microsoft Windows component, the Win32k TrueType font parsing engine. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode...
Revision Note: V2.0 (February 8, 2011): Summary and update FAQ revised to notify users that the 971029 update to Autorun that restricts AutoPlay functionality to CD and DVD media will be offered via automatic updating. Advisory Summary:Microsoft is announcing the availability of updates to the...
advisory
arbitrary
attack
autoplay
autorun
code
functionality
media
microsoft
network
protection
revision
security
server
update
usb
windows
windows vista
Revision Note: V1.1 (January 5, 2011): Added a link to the automated Microsoft Fix it solution for the Modify the Access Control List (ACL) on shimgvw.dll workaround.Summary: Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker...
access
advisory
arbitrary
control
data
engine
exploit
fix
graphics
microsoft
programs
remote
rendering
rights
security
user account
users
vulnerability
workaround
Revision Note: V1.1 (January 5, 2011): Added a link to the automated Microsoft Fix it solution for the Modify the Access Control List (ACL) on shimgvw.dll workaround. Advisory Summary:Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An...
access
advisory
arbitrary
attack
code
control
data
engine
exploit
fix
graphics
microsoft
programs
remote
rendering
security
user rights
vulnerability
windows
workaround
Bulletin Severity Rating:Important - This security update resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of these vulnerabilities could allow elevation of privilege due to an error in the processing of a specific input buffer. An attacker who is able to log...