This script is Copyright (C) 2012-2017 Tenable Network Security, Inc.
Opening a specially crafted Microsoft Office file could result in
arbitrary code execution.
The remote Windows host does not include ClickOnce application file
types in the Windows Packager unsafe file type list.
An attacker could leverage this issue to execute arbitrary code in the
context of the current user on the affected host if he can trick the
user into opening a Microsoft Office file with a malicious ClickOnce
application embedded in it.
See also :
Microsoft has released a set of patches for Windows XP, 2003, Vista,
2008, 7, and 2008 R2.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.7
Public Exploit Available : true