The highlight of Microsoft's security bulletins is the fix for Microsoft's online help vulnerability (MS10-042) identified by Google security researcher, Tavis Ormandy, which could allow an attacker to take control of a computer by luring a computer user to a malicious Web site. 

Also as Microsoft's July security bulletins also address vulnerabilities in Windows XP, Josh Abraham, Rapid7 Security Researcher recommends that “customers should keep in-mind that Windows XP SP2 is now end-of-life. Therefore, organizations should be verifying (if they have not done so already) that all of their systems have already been migrated to SP3. One area to double check is third-party vendor devices which may need to be replaced and/or upgraded by the vendor" 

Here's a quick take on Microsoft's four security bulletins addressing five vulnerabilities in Office and Windows: 

MS10-042  (1 vulnerability)
Help Center URL Validation Vulnerability
Rated: Critical
CVE-2010-1885
Exploit already in the wild. (Note: There is a Metasploit module for this vulnerability.) 

This security update resolves a publicly disclosed vulnerability in the Windows Help and Support Center feature that is delivered with supported editions of Windows XP and Windows Server 2003. This vulnerability could allow remote code execution if a user views a specially crafted Web page using a Web browser or clicks a specially crafted link in an e-mail message. The vulnerability cannot be exploited automatically through e-mail. For an attack to be successful,
a user must click a link listed within an e-mail message. 

MS10-044  (2 vulnerabilities)
Rated: Critical 

This security update resolves two privately reported vulnerabilities in Microsoft Office Access ActiveX Controls. The vulnerabilities could allow remote code execution if a user opens a specially crafted Office file or views a Web page that instantiates Access ActiveX controls. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. 

Access ActiveX control vulnerability
CVE-2010-0814
Exploit - 1 (exploit code likely) 

A remote code execution vulnerability exists in Access ActiveX controls due to the way that multiple ActiveX controls are loaded by Internet Explorer.  An attacker who successfully exploits this vulnerability could run arbitrary code as the logged-on user. If a user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.  Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. 

ACCWIZ.dll Uninitialized Variable vulnerability
CVE-2010-1881
Exploit - 1 (exploit code likely) 

A remote code execution vulnerability exists in the way that the FieldList ActiveX control is instantiated by Microsoft Office and Internet Explorer.  An attacker who successfully exploits this vulnerability could run arbitrary code as the logged-on user. If a user is logged on with         administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. 

MS10-043 (1 vulnerability)
Rated: Critical
Canonical Display Driver Integer Overflow
CVE-2009-3678
Exploit -2 (Inconsistent exploit likely) 

This security update resolves a publicly disclosed vulnerability in the Canonical Display Driver (cdd.dll).  Although it is possible that the vulnerability could allow code execution, successful code execution is unlikely due to memory randomization. In most scenarios, it is much    more likely that an attacker who successfully exploited this vulnerability could cause the affected system to stop responding and automatically restart. 

MS10-045 (1 vulnerability)
Rated: Important
Microsoft Outlook SMB Attachment Vulnerability
CVE-2010-0266
Exploit - 1 exploit code likely 

This security update resolves a privately reported vulnerability. The vulnerability could allow remote code execution if a user opened an attachment in a specially crafted e-mail message using an affected version of Microsoft Office Outlook.  An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.