Microsoft Security Advisory MS10-042:
Microsoft Help and Support Center contains a programming error that may allow a remote attacker to bypass security restrictions on an affected system. The error occurs when invalid hex-encoded characters are used as a parameter to a search query using the hcp:// URI schema.
Microsoft Security Advisory MS10-043:
The Microsoft Canonical Display Driver (cdd.dll) contains a programming error that may allow a remote attacker to execute code on a vulnerable system.
Microsoft Security Advisory MS10-044:
Microsoft Access contains mulitple vulnerabilities that may allow a remote attacker to execute code on an affected system.
Microsoft Security Advisory MS10-045:
Microsoft Outlook contains a programming error that may allow a remote attacker to execute code on an affected system.
Additionally, this release introduces three new rule groups, botnet-cnc.rules, blocklist.rules and phishing-spam.rules. These rule groups represent a decentralization of existing coverage from spyware-put.rules and specific-threats.rules. The rules themselves are gleaned from honeypot and malware data collected by the Sourcefire VRT.
As always, details are available here: http://www.snort.org/vrt/advisories/2010/07/13/vrt-rules-2010-07-13.html/