Skeleton in the closet. MS Office vulnerability you didn’t know about
https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about [embedi.com]
2017-11-16 00:44
It’s a common truth that usually Legacy code is the legacy (excuse tautology) of those distant times when no one followed secure development guidelines. In other words, there is a high probability that its source code has been irrevocably lost, and a binary file is the only thing left.
These simple procedures have vital importance as they enable detecting dangerous components installed in a system, i.e. outdated ones as well as those compiled without security mitigations.
source: solar