![]() ![]() ![]() If the current user is logged on with administrative user rights, an attacker could then install programs view, change, or delete data or create new accounts with full user rights. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. The vulnerability could allow remote code execution if an attacker convinces a user to open a specially crafted Microsoft Word file. This security update resolves one privately reported vulnerability in Microsoft Office. Version: 1.0 General Information Executive Summary Feedback In this article Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution (3000434)
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |