<html><body>
<p><font size="2" face="sans-serif">Content in the Patches for Windows (English) has been modified:</font><br>
<br>
<br>
<font size="2" face="sans-serif">Fully Superseded Fixlet Messages:</font><br>
<font size="2" face="sans-serif">[Major] MS99-033: "Malformed Telnet Argument" Patch for Windows 98 Telnet Client - CORRUPT PATCH (Superseded) (ID: 9903302)</font><br>
<font size="2" face="sans-serif">[Major] MS01-012: "Malformed vCard" Vulnerability in Outlook/Outlook Express - CORRUPT PATCH (Superseded) (ID: 101202)</font><br>
<font size="2" face="sans-serif">[Major] MS01-041: Malformed RPC Request Vulnerability in Exchange 5.5 - CORRUPT PATCH (Superseded) (ID: 104102)</font><br>
<font size="2" face="sans-serif">[Major] MS01-047: OWA Function Allows Unauthenticated User to Enumerate Global Address List - CORRUPT PATCH (Superseded) (ID: 104702)</font><br>
<font size="2" face="sans-serif">[Major] MS02-003: Exchange 2000 System Attendant Incorrectly Sets Remote Registry Permissions - CORRUPT PATCH (Superseded) (ID: 200302)</font><br>
<font size="2" face="sans-serif">[Major] MS02-033: Unchecked Buffer in Profile Service in Commerce Server 2002 - CORRUPT PATCH (Superseded) (ID: 203304)</font><br>
<font size="2" face="sans-serif">[Major] MS02-057: Flaw in Services for Unix 3.0 Interix SDK Could Allow Code Execution - CORRUPT PATCH (Superseded) (ID: 205702)</font><br>
<font size="2" face="sans-serif">[Major] MS03-030: Unchecked Buffer in DirectX Could Enable System Compromise - DirectX 9.0a - CORRUPT PATCH (Superseded) (ID: 303010)</font><br>
<font size="2" face="sans-serif">[Major] MS04-024: Vulnerability in Windows Shell Could Allow Remote Code Execution - Windows NT with Active Desktop - CORRUPT PATCH (Superseded) (ID: 402414)</font><br>
<br>
<br>
<font size="2" face="sans-serif">Reason for Update:</font><br>
<font size="2" face="sans-serif">Microsoft has stopped offering the deployed binary for these Fixlets.</font><br>
<br>
<br>
<font size="2" face="sans-serif">Actions to Take:</font><br>
<br>
<font size="2" face="sans-serif">None</font><br>
<br>
<br>
<font size="2" face="sans-serif">Published site version:</font><br>
<br>
<font size="2" face="sans-serif">Patches for Windows (English), version 2019.</font><br>
<br>
<br>
<font size="2" face="sans-serif">Additional links:</font><br>
<br>
<font size="2" face="sans-serif">None</font><br>
<br>
<br>
<font size="2" face="sans-serif">Application Engineering Team</font><br>
<font size="2" face="sans-serif">IBM Endpoint Manager</font><br>
<br>
</body></html>