Source
Microsoft Security Response Center
Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally.
External control of file name or path in WebDAV allows an unauthorized attacker to execute code over a network.
Improper privilege management in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally.
Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network.
Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to elevate privileges locally.
Improper privilege management in Windows Kernel allows an unauthorized attacker to elevate privileges locally.
Out-of-bounds read in Windows Storage Port Driver allows an authorized attacker to disclose information locally.
Buffer over-read in Windows Storage Management Provider allows an authorized attacker to disclose information locally.