The Active Network
ActiveMac Anonymous | Create a User | Reviews | News | Forums | Advertise  
 

  *  

  Microsoft Security Bulletin MS08-014 - Critical: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (949029)
Time: 08:38 EST/13:38 GMT | News Source: ActiveWin.com | Posted By: Robert Stein

Updated 3/13: This security update resolves several privately reported and publicly reported vulnerabilities in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This security update is rated Critical for Microsoft Office Excel 2000 Service Pack 3 and rated Important for Excel 2002 Service Pack 3, Excel 2003 Service Pack 2, Excel Viewer 2003, Excel 2007, Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats, Office 2004 for Mac, and Office 2008 for Mac. For more information, see the subsection, Affected and Non-Affected Software, in this section

Write Comment
Return to News

  Displaying 676 through 676 of 676
Prev | First
  The time now is 10:33:45 AM ET.
Any comment problems? E-mail us
#676 By 4240821 (82.115.4.230) at 11/10/2025 3:39:43 AM
https://sluts.su/activhdfg5f4313
https://sluts.su/activbbgfde4d1b
https://smutty.su/activfeeb4ah44e
https://sexonly.su/activcg5cf5b1eh
https://sexonly.top/activh33abb3b5d
https://sexonly.su/activh412ed4e14
https://lustful.su/activ3a5dhhce5e
https://lustful.su/activcd5bg1gea2
https://nsfw.su/activdg4h2d3d4c
https://sluts.su/activb35f3h4ggg

Write Comment
Return to News
  Displaying 676 through 676 of 676
Prev | First
  The time now is 10:33:45 AM ET.
Any comment problems? E-mail us
User name and password:

 

  *  
  *   *