![]() ![]() ![]() ![]() Instead, an attacker would have to persuade users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. In all cases, however, an attacker would have no way to force users to visit these Web sites. In addition, compromised Web sites and Web sites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In a Web-based attack scenario, an attacker could host a Web site that contains a Web page that is used to exploit this vulnerability.The following mitigating factors may be helpful in your situation: Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. Microsoft Excel Web App 2010 and Microsoft Excel Web App 2010 Service Pack 1įrequently Asked Questions (FAQ) Related to This Security Update Microsoft Office Compatibility Pack Service Pack 3 Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Service Pack 2 Microsoft Excel 2010 and Microsoft Excel 2010 Service Pack 1 (64-bit editions) Microsoft Excel 2010 and Microsoft Excel 2010 Service Pack 1 (32-bit editions) Microsoft Excel 2007 Service Pack 2 and Microsoft Excel 2007 Service Pack 3 **Non-Affected Software** Office and Other Software Affected Software Microsoft Office Suite and Other Software ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |