Today is the day when Microsoft would have issued out two bulletins that it will look at trying to fix. These are a few vulnerabilities which are critical enough and have been discovered in Microsoft products like Visual Basic applications, its MS Office applications etc. There were probably a few glitches that Microsoft needs to take care of urgently, and it’s high time it did!

So how is Microsoft-the technological giant going to execute this feat? If you thought that this would be executed just like how it happened in a few cars production, where a certain batch was called back to replace faulty engines, then you thought primitive. Its technology, and who other than Microsoft will play it right to their benefit! So Microsoft will fix these mighty vulnerabilities by simply making available its code and executing it remotely. Now this is what most Microsoft users are afraid off and that is about the remote code execution where there could be attacks against other systems. It all sounds too geeky we do understand however this remote execution could mean attacks that can be launched against the other systems, where the code could be injected though either the Internet or even remote networks.

The good news though is that there will not be an astounding number of patches that Microsoft will send out to its users. It will not be any thing like the last month patches where almost 20 of them were sent out remotely to users.

However according to Microsoft, the updates that would be added would not take effect easily, like a few other updates that Microsoft usually sends. This particular update will need you to reboot your computer system so that its effects are noted and the application functions as new all over again.

So if your wondering what the excitement is all about this patch then you would want to make a note that the patch that will take effect as of Tuesday is something that will not be published. According to the news that was released by the Microsoft Security center also known as the MSRC the patch would be largely for the cross-site scripting flaw because of with Windows SharePoint Services 3.0 and the Office SharePoint 2007 are always vulnerable to virus attacks over the network or the internet.

This was a flaw that should have been taken care of a long time back, although now is not a bad time either, as long as Microsoft developers have finally acknowledged the flaw and decided to repair it is good enough. On the other hand what might concern most of us who use the SharePoint is that the Security Advisory 983438 will be kept on hold and not be released with the other updates for its May bulletin. Microsoft is a bit concerned over that patch and has for now offered an apology to those users who were eagerly waiting for that patch to arrive. However they might have to wait a bit longer and in the mean time try and apply a few workarounds to take care of the issue.