|
Microsoft Office 2004 for Mac Test Drive includes essential tools that can help you transform the way you create, share, and manage ideas and information using all four Office 2004 for Mac programs: Word, Excel, PowerPoint, and Entourage. After you install the Test Drive, you can use it for 30 days. It includes almost all the features found in Office 2004.
|
|
Full View / NID: 2944 / Submitted by: Zero_Tolerance
|
|
A security vulnerability exists within Outlook 2002 that could allow Internet Explorer to execute script code in the Local Machine zone on an affected system. The parsing of specially crafted mailto URLs by Outlook 2002 causes this vulnerability. To exploit this vulnerability, an attacker would have to host a malicious Web site that contained a Web page designed to exploit the vulnerability and then persuade a user to view the Web page.
|
|
Full View / NID: 2446 / Submitted by: Travis
|
|
Office XP Service Pack 3 (SP3) contains significant security enhancements, in addition to stability and performance improvements.
|
|
Full View / NID: 2441 / Submitted by: TACKtech Team
|
|
In North America, Office service packs can be obtained free of charge on CD-ROM. You should be able to get the other service packs by calling the number listed.
|
|
Full View / NID: 2393 / Submitted by: Anthony
|
|
This update addresses a problem where Visio 2003 overwrites some registry settings for msxml2.dll and msxml3.dll. The problem may prevent applications utilizing these files from running properly.
|
|
Full View / NID: 2247 / Submitted by: Travis
|
|
With this add-in you can permanently remove hidden and collaboration data, such as change tracking and comments, from Word 2003/XP, Excel 2003/XP, and PowerPoint 2003/XP files.
|
|
Full View / NID: 2448 / Submitted by: TACKtech Team
|
|
This bulletin addresses two new security vulnerabilities in Microsoft FrontPage Server Extensions, the most serious of which could enable an attacker to run arbitrary code on a user's system.
|
|
Full View / NID: 1707 / Submitted by: Travis
|
|
A security vulnerability exists in Microsoft Excel that could allow malicious code execution. This vulnerability exists because of the method Excel uses to check the spreadsheet before reading the macro instructions. If successfully exploited, an attacker could craft a malicious file that could bypass the macro security model. If an affected spreadsheet was opened, this vulnerability could allow a malicious macro embedded in the file to be executed automatically, regardless of the level at which the macro security is set. The malicious macro could then take the same actions that the user had permissions to carry out, such as adding, changing or deleting data or files, communicating with a web site or formatting the hard drive.
|
|
Full View / NID: 1706 / Submitted by: Travis
|
|
There is a flaw in the way that the Microsoft WordPerfect converter handles Corel® WordPerfect documents. A security vulnerability results because the converter does not correctly validate certain parameters when it opens a WordPerfect document, which results in an unchecked buffer. As a result, an attacker could craft a malicious WordPerfect document that could allow code of their choice to be executed if an application that used the WordPerfect converter opened the document. Microsoft Word and Microsoft PowerPoint (which are part of the Office suite), FrontPage (which is available as part of the Office suite or separately), Publisher, and Microsoft Works Suite can all use the Microsoft Office WordPerfect converter.
|
|
Full View / NID: 1216 / Submitted by: Travis
|
|
A vulnerability exists because it is possible for an attacker to craft a malicious document that will bypass the macro security model. If the document was opened, this flaw could allow a malicious macro embedded in the document to be executed automatically, regardless of the level at which macro security is set. The malicious macro could take the same actions that the user had permissions to carry out, such as adding, changing or deleting data or files, communicating with a web site or formatting the hard drive.
|
|
Full View / NID: 1214 / Submitted by: Travis
|
|
A vulnerability exists because of a flaw in the way that Snapshot Viewer validates parameters. Because the parameters are not correctly checked, a buffer overrun can occur, which could allow an attacker to execute the code of their choice in the security context of the logged-on user.
|
|
Full View / NID: 1212 / Submitted by: Travis
|
|
A flaw exists in the way VBA checks document properties passed to it when a document is opened by the host application. A buffer overrun exists which if exploited successfully could allow an attacker to execute code of their choice in the context of the logged on user.
|
|
Full View / NID: 1207 / Submitted by: Travis
|
|
Outlook Permissions Addin allows the you to move file types from a level 1 setting to a level 2 setting so that you can interact with blocked files within the Outlook application. To use the application simply requires, downloading and running the setup. After that start Outlook and select the options menu from the tools menu. you will see a new tab labeled File restrictions (shown below). Use this interface to add/remove file types from the level 2 group. This program is Free.
|
|
Full View / NID: 930 / Submitted by: TACKtech Team
|
|
The Jet replication update, Jet40Repl.exe, is a Setup program that updates certain files that are used by Microsoft Replication Manager 4.0. These files are updated with the release of Microsoft Jet 4.0 Service Pack 7 (SP7).
|
|
Full View / NID: 912 / Submitted by: TACKtech Team
|
|
Microsoft Corp. has begun dropping the prices of some of its flagship software products, starting with the Office XP family. The Redmond, Wash., software company on Wednesday will announce that it is cutting retail prices by between 15 percent and 30 percent on a number of products in its Office XP product family. Microsoft is cutting the retail price of both the Standard and Professional Office XP products by some 15 percent, while also dropping the price for stand-alone applications like Word 2002, Excel 2002, PowerPoint 2002 and Access 2002 by some 30 percent. Retail pricing before the cuts was $479 for the Office XP Standard Edition and $579 for the Professional Edition. The price reductions take effect Wednesday in the United States and Canada; they will also be rolled out globally.
|
|
Full View / NID: 781 / Submitted by: TheComputerDoc
|
|
The FrontPage Add-in Center surpassed 2 million visits and 1 million downloads as of April 2003. Haven't visited the Add-in Center yet? See why so many people are checking it out!
|
|
Full View / NID: 726 / Submitted by: Zero_Tolerance
|
|
The Outlook 2002 Update: January 22, 2003 offers the highest levels of stability and security available for Microsoft Outlook 2002. This update fixes an issue in Microsoft Outlook 2002 that occurs when encrypting HTML e-mail using a V1 Exchange Server Security certificate issued by the Microsoft Exchange Key Management Service (KMS). Under this specific scenario it is possible for some messages to remain unencrypted, and this update corrects the issue. The Outlook 2002 Update: January 22, 2003 is part of Microsoft’s continued effort to provide the latest product updates to customers.
|
|
Full View / NID: 479 / Submitted by: TACKtech Team
|
|
The Outlook 2002 Update: December 4, 2002 offers the highest levels of stability and security available for Microsoft Outlook 2002. This update fixes an instability problem introduced in Office XP Service Pack 2 (SP2) that affects Outlook POP3 / SMTP clients. This update also fixes a vulnerability that could allow an attacker to send a malformed message which would make the user's Outlook session unresponsive. The Outlook 2002 Update: December 4, 2002 is part of Microsoft's continued effort to provide the latest product updates to customers.
|
|
Full View / NID: 405 / Submitted by: TACKtech Team
|
|
Microsoft Office 2000 Service Pack 3 (SP-3) provides the latest updates to Microsoft Office 2000. Office 2000 SP-3 contains significant security enhancements and improvements in stability and performance. Some of the fixes that are included with Office 2000 SP-3 were released earlier as separate updates. This service pack combines the updates into one integrated package and includes a number of other changes that are designed to improve the reliability and performance of your Office 2000 programs.
|
|
Full View / NID: 364 / Submitted by: TACKtech Team
|
|
It is possible to maliciously use field codes and external updates to secretly steal information from a user. Certain events can trigger the external update and the field code to be updated: for example, when the user saves a document or manually updates the links. Typically, the user is aware of these updates when they occur. However, a specially crafted field code or external update can be used to trigger an update without any indication to the user. This can permit an attacker to create a document that, when opened, updates itself to include the contents of a file from the user's local computer.
|
|
Full View / NID: 302 / Submitted by: Travis
|