![]() ![]() See the frequently asked questions (FAQ) section of this bulletin for the complete list. Security Update Replacement: This bulletin replaces a prior security update. Recommendation: Customers should apply the update immediately Impact of Vulnerability: Remote Code Execution Who Should Read this Document: Customers using Microsoft Office applications or applications that use Microsoft Visual Basic for Applications. Change the name of this DWORD to "AllowSubfolders" and right click and modify.Security Bulletin Microsoft Security Bulletin MS06-047 - Critical Vulnerability in Microsoft Visual Basic for Applications Could Allow Remote Code Execution (921645).To include sub directories as trusted locations, add a DWORD by right clicking the new key, selecting New > DWORD (32-bit) Value. ![]() the Value Data to the path or network name required (ie "Z:\" or "\servername" )
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |