{"id":73020,"date":"2008-12-09T08:23:12","date_gmt":"2008-12-09T08:23:12","guid":{"rendered":"https:\/\/localhost\/wordpress\/?p=73020"},"modified":"2008-12-09T08:23:12","modified_gmt":"2008-12-09T08:23:12","slug":"microsoft-updates-4","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/microsoft-updates-4\/","title":{"rendered":"Microsoft Updates"},"content":{"rendered":"<p>Overview of the December 2008 Microsoft patches and their status. 8 crtical and important updates have been covered.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/technet\/security\/Bulletin\/MS08-070.mspx\">MS08-070<\/a> Multiple vulnerabilities in activeX controls from visual basic 6.0&#8217;s runtime allow random code execution. Also affects Visual studio, Foxpro, Frontpage, and MS Project. The vulnerable files are distributed with 3rd party applications as well.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/technet\/security\/Bulletin\/MS08-071.mspx\">MS08-071<\/a> Multiple overflow vulnerabilities allow code execution with the rights of the logged on user via crafted WMF files. Replaces MS08-021.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/technet\/security\/Bulletin\/MS08-072.mspx\">MS08-072<\/a> A multitude of vulnerabilities allow random code execution in office (and via extension Outlook). Also affects the mac versions of office (Office 2004 and Office 2008).<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/technet\/security\/Bulletin\/MS08-073.mspx\">MS08-073<\/a> Multiple vulnerabilities allow random code execution with the rights of the logged on user.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/technet\/security\/Bulletin\/MS08-074.mspx\">MS08-074<\/a> Multiple vulnerabilities allo allow random code execution in office. Also affects the mac versions of office (Office 2004 and Office 2008). Replaces MS08-058.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/technet\/security\/Bulletin\/MS08-075.mspx\">MS08-075<\/a> Multiple vulnerabilities allow random code execution with the rights of the logged on user.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/technet\/security\/Bulletin\/MS08-076.mspx\">MS08-076<\/a> Multiple vulnerabilities allow random code execution with the rights of the logged-on user.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/technet\/security\/Bulletin\/MS08-077.mspx\">MS08-077<\/a> Bypassing authentication is possible on sharepoint servers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview of the December 2008 Microsoft patches and their status. 8 crtical and important updates have been covered. MS08-070 Multiple vulnerabilities in activeX controls from visual basic 6.0&#8217;s runtime allow random code execution. Also affects Visual studio, Foxpro, Frontpage, and MS Project. The vulnerable files are distributed with 3rd party applications as well. MS08-071 Multiple [&hellip;]<\/p>\n","protected":false},"author":22,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-73020","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/73020"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=73020"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/73020\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=73020"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=73020"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=73020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}