Severity Rating: Critical - Revision Note: V1.0 (April 12, 2011): Bulletin published.Summary: This security update resolves a privately reported vulnerability in the OpenType Compact Font Format (CFF) driver. The vulnerability could allow remote code execution if a user views content rendered in...
Severity Rating: Critical - Revision Note: V1.0 (April 12, 2011): Bulletin published.Summary: This security update resolves two privately reported vulnerabilities and one publicly disclosed vulnerability in Microsoft software. The vulnerabilities could allow remote code execution if a user views...
Severity Rating: Critical - Revision Note: V1.0 (April 12, 2011): Bulletin published.Summary: This security update resolves a privately reported vulnerability in the JScript and VBScript scripting engines. The vulnerability could allow remote code execution if a user visited a specially crafted...
Severity Rating: Critical - Revision Note: V1.0 (April 12, 2011): Bulletin published.Summary: This security update resolves a privately reported vulnerability in Microsoft Windows GDI+. The vulnerability could allow remote code execution if a user viewed a specially crafted image file using...
Bulletin Severity Rating:Critical - This security update resolves a privately reported vulnerability in the JScript and VBScript scripting engines. The vulnerability could allow remote code execution if a user visited a specially crafted Web site. An attacker would have no way to force users to...
Revision Note: V2.0 (February 8, 2011): Advisory updated to reflect publication of security bulletin. Advisory Summary:Microsoft has completed the investigation into public reports of this vulnerability. We have issued MS11-003 to address this issue. For more information about this issue...
Revision Note: V1.3 (January 11, 2011): Revised the workaround, Prevent the recursive loading of CSS style sheets in Internet Explorer, to add the impact for the workaround. Advisory Summary:Microsoft is investigating new, public reports of limited attacks attempting to exploit a vulnerability...
Bulletin Severity Rating:Critical - This security update resolves two privately reported vulnerabilities in Microsoft Data Access Components. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page. An attacker who successfully exploited this...
Revision Note: V1.0 (December 22, 2010): Advisory published. Advisory Summary:Microsoft is investigating new, public reports of a vulnerability in all supported versions of Internet Explorer. The main impact of the vulnerability is remote code execution. This advisory contains workarounds and...
Revision Note: V2.0 (December 14, 2010): Advisory updated to reflect publication of security bulletin. Advisory Summary:Microsoft has completed the investigation into a public report of this vulnerability. We have issued MS10-090 to address this issue. For more information about this issue...
Severity Rating: Critical - Revision Note: V1.0 (December 14, 2010): Bulletin published.Summary: This security update resolves several privately reported vulnerabilities in the Windows Open Type Font (OTF) driver that could allow remote code execution. An attacker could host a specially crafted...
Revision Note: V1.1 (November 3, 2010): Added the opening of HTML mail in the Restricted sites zone as a mitigating factor, the automated Microsoft Fix it solution to the CSS workaround, and a finder acknowledgment. Removed reading e-mail in plain text as a workaround. Also clarified content in...
Bulletin Severity Rating:Critical - This security update resolves one publicly disclosed vulnerability and four privately reported vulnerabilities in Microsoft Office. The most severe vulnerability could allow remote code execution if a user opens or previews a specially crafted RTF e-mail...
Revision Note: V1.1 (November 3, 2010): Added the opening of HTML mail in the Restricted sites zone as a mitigating factor, the automated Microsoft Fix it solution to the CSS workaround, and a finder acknowledgment. Removed reading e-mail in plain text as a workaround. Also clarified content in...
advisory
code execution
css
dep
email reading
emet
execution
html mail
impact
internet explorer
investigation
microsoft
mitigations
public reports
remotecode
restricted sites
security
vulnerability
workarounds
Severity Rating: Important - Revision Note: V1.0 (October 12, 2010): Bulletin published.Summary: This security update resolves thirteen privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file or...
attack
bulletin
excel
execution
exploitation
file access
important
malware
microsoft
october 2010
office
privately reported
remotecode
risk
security
software
update
user rights
vulnerabilities
warning
Severity Rating: Important - Revision Note: V1.0 (October 12, 2010): Bulletin published.Summary: This security update resolves a privately reported vulnerability in the Windows common control library. The vulnerability could allow remote code execution if a user visited a specially crafted Web...
Bulletin Severity Rating:Important - This security update resolves thirteen privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file or a specially crafted Lotus 1-2-3 file. An attacker who...
admin rights
cybersecurity
excel
execution
important
lotus 1-2-3
microsoft
office
patch
privately reported
remotecode
risk management
security
software
threats
update
user rights
vulnerabilities
Revision Note: V1.1 (August 31, 2010) Added a link to Microsoft Knowledge Base Article 2264107 to provide an automated Microsoft Fix it solution for the workaround, Disable loading of libraries from WebDAV and remote network shares. Advisory Summary:Microsoft is aware that research has been...
Revision Note: V2.0 (August 2, 2010): Advisory updated to reflect publication of security bulletin. Advisory Summary:Microsoft has completed the investigation into a public report of this vulnerability.
Link Removed due to 404 Error
Revision Note: V1.2 (July 20, 2010): Clarified the vulnerability exploit description and updated the workarounds.Summary: Microsoft has completed the investigation into a public report of this vulnerability.
Link Removed due to 404 Error