|
Bulletin Severity Rating:Critical - This critical update resolves one publicly disclosed vulnerability and two privately reported vulnerabilities in addition to other security issues identified during the course of the investigation. These vulnerabilities could allow remote code execution i
|
|
Full View / NID: 16775 / Submitted by: The Spirit of Zuron
|
|
Bulletin Severity Rating:Critical - This important security update resolves one publicly disclosed vulnerability. This vulnerability could allow remote code execution if a user viewed a specially crafted Microsoft Office Publisher file. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. User interaction is required to exploit this vulnerability.
|
|
Full View / NID: 16774 / Submitted by: The Spirit of Zuron
|
|
Bulletin Severity Rating:Important - This important update resolves two privately discovered and responsibly reported vulnerabilities in addition to other security issues identified during the course of the investigation. The privately reported vulnerabilities could allow remote code execution if a user opened a specially crafted Visio file. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. User interaction is required to exploit these vulnerabilities.
|
|
Full View / NID: 16392 / Submitted by: The Spirit of Zuron
|
|
This update fixes a problem in which a calendar item that is marked as private is opened if it is found by using the Search Desktop feature. The update also fixes performance issues that occur when you work with items in a large .pst file or .ost file.
|
|
Full View / NID: 16405 / Submitted by: TACKtech Team
|
|
With Microsoft Office Outlook Connector Beta, you can use Microsoft Office Outlook 2003 or Microsoft Office Outlook 2007 to access and manage your Microsoft Windows Live Hotmail or Microsoft Office Live Mail accounts, including e-mail messages and contacts for free!
|
|
Full View / NID: 16403 / Submitted by: TACKtech Team
|
|
Bulletin Severity Rating:Critical - This update resolves several newly discovered, privately reported vulnerabilities. Each vulnerability is documented in its own subsection in the Vulnerability Details section of this bulletin.
|
|
Full View / NID: 15974 / Submitted by: The Spirit of Zuron
|
|
Bulletin Severity Rating:Critical - This update resolves several newly discovered, privately and publicly reported vulnerabilities. Each vulnerability is documented in its own subsection in the Vulnerability Details section of this bulletin.
|
|
Full View / NID: 15973 / Submitted by: The Spirit of Zuron
|
|
Bulletin Severity Rating:Critical - This update resolves a privately reported vulnerability. The vulnerability is documented in its own subsection in the Vulnerability Details section of this bulletin.
|
|
Full View / NID: 15972 / Submitted by: The Spirit of Zuron
|
|
This update provides the Junk E-mail Filter in Microsoft Office Outlook 2007 with a more current definition of which e-mail messages should be considered junk e-mail. This update was released in April 2007.
|
|
Full View / NID: 15607 / Submitted by: TACKtech Team
|
|
Bulletin Severity Rating:Critical - This update resolves several newly discovered, privately and publicly reported vulnerabilities. Each vulnerability is documented in its own subsection in the "Vulnerability Details" section of this bulletin. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. We recommend that customers apply the update immediately.
|
|
Full View / NID: 14804 / Submitted by: The Spirit of Zuron
|
|
Bulletin Severity Rating:Critical - This update resolves two newly discovered, privately and publicly reported vulnerabilities. Each vulnerability is documented in its own subsection in the "Vulnerability Details" section of this bulletin. When using vulnerable versions of Office, if a user were logged on with administrative user rights, an attacker who successfully exploited these vulnerabilities could take complete control of the system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. We recommend that customers apply the update immediately.
|
|
Full View / NID: 14803 / Submitted by: The Spirit of Zuron
|
|
Microsoft Outlook VEVENT Vulnerability - CVE-2007-0033
A remote code execution vulnerability exists in Microsoft Outlook. An attacker could exploit this vulnerability when Outlook parses a file and processes a malformed VEVENT record.
|
|
Full View / NID: 14234 / Submitted by: TACKtech Team
|
|
Excel Malformed IMDATA Record Vulnerability - CVE-2007-0027:
A remote code execution vulnerability exists in Microsoft Excel. An attacker could exploit this vulnerability when Excel parses a file and processes a malformed IMDATA record.
|
|
Full View / NID: 14233 / Submitted by: TACKtech Team
|
|
This Microsoft Office Enterprise 2007 software evaluation program is appropriate for Developers and IT Professionals. In order to take advantage of this Microsoft Office Enterprise 2007 evaluation program, you will need to first register to obtain a trial product key.
|
|
Full View / NID: 13950 / Submitted by: TACKtech Team
|
|
PowerPoint Viewer 2007 lets you view full-featured presentations created in PowerPoint 97 and later versions. This viewer also supports opening password-protected Microsoft PowerPoint presentations. You can view and print presentations, but you cannot edit them in the PowerPoint Viewer 2007.
|
|
Full View / NID: 14755 / Submitted by: TACKtech Team
|
|
Office Improper Memory Access Vulnerability - CVE-2006-3434:
Office Malformed Chart Record Vulnerability - CVE-2006-3650:
Office Malformed Record Memory Corruption Vulnerability - CVE-2006-3864:
Microsoft Office Smart Tag Parsing Vulnerability - CVE-2006-3868:
|
|
Full View / NID: 12788 / Submitted by: TACKtech Team
|
|
Microsoft Word Vulnerability - CVE-2006-3647:
Microsoft Word Mail Merge Vulnerability - CVE-2006-3651:
Microsoft Word Malformed Stack Vulnerability - CVE-2006-4534:
Microsoft Word for Mac Vulnerability - CVE-2006-4693:
Replaces Microsoft Security Bulletin MS06-027.
|
|
Full View / NID: 12786 / Submitted by: TACKtech Team
|
|
Excel Malformed DATETIME Record Vulnerability - CVE-2006-2387:
Excel Malformed STYLE Record Vulnerability - CVE-2006-3431:
Excel Handling of Lotus 1-2-3 File Vulnerability - CVE-2006-3867:
Malformed COLINFO Record Vulnerability - CVE-2006-3875:
|
|
Full View / NID: 12785 / Submitted by: TACKtech Team
|
|
PowerPoint Malformed Object Pointer Vulnerability - CVE-2006-3435:
PowerPoint Malformed Data Record Vulnerability - CVE-2006-3876:
PowerPoint Malformed Record Memory Corruption Vulnerability - CVE-2006-3877:
PowerPoint Malformed Record Vulnerability - CVE-2006-4694:
Replaces Microsoft Security Bulletin MS06-028
|
|
Full View / NID: 12784 / Submitted by: TACKtech Team
|
|
Microsoft Publisher Vulnerability - CVE-2006-0001
A remote code execution vulnerability exists in Publisher. An attacker could exploit this vulnerability when Publisher parses a file with a malformed string.
If a user were logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less affected than users who operate with administrative user rights.
|
|
Full View / NID: 12417 / Submitted by: TACKtech Team
|