Known Vulnerabilities in Microsoft Office LTSC page 3