<html xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
font-size:12.0pt;
font-family:"Calibri",sans-serif;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:12.0pt;
font-family:"Calibri",sans-serif;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style>
</head>
<body lang="EN-US" link="#0563C1" vlink="#954F72" style="word-wrap:break-word">
<div class="WordSection1">
<p class="MsoNormal"><span style="font-size:11.0pt">Content in the Patches for Windows site has been modified<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Modified:<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:433691901) MS18-JUL: Security update for remote code execution vulnerability - Visual Studio 2010 SP1 - KB4336919
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:409134601) MS18-APR: Security update for the information disclosure vulnerability - Visual Studio 2010 SP1 - KB4091346
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:250158405) 2501584: Office File Validation Add-in - Office 2003 / Office 2007 / Office 2010 - KB2501584
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1101511) MS11-015: Vulnerabilities in Windows Media Could Allow Remote Code Execution - Windows 7 Gold/SP1
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1102433) MS11-024: Vulnerability in Windows Fax Cover Page Editor Could Allow Remote Code Execution - Windows 7 Gold/SP1 (KB2491683)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1102437) MS11-024: Vulnerability in Windows Fax Cover Page Editor Could Allow Remote Code Execution - Windows 7 Gold/SP1 (KB2491683) (x64)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1102435) MS11-024: Vulnerability in Windows Fax Cover Page Editor Could Allow Remote Code Execution - Windows 7 Gold/SP1 (KB2506212)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1103011) MS11-030: Vulnerability in DNS Resolution Could Allow Remote Code Execution - Windows 7 Gold/SP1
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1103013) MS11-030: Vulnerability in DNS Resolution Could Allow Remote Code Execution - Windows 7 Gold/SP1 (x64)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1103139) MS11-031: Vulnerability in JScript and VBScript Scripting Engines Could Allow Remote Code Execution - JScript 5.8 and VBScript 5.8 - Windows 7 Gold/SP1
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1103719) MS11-037: Vulnerability in MHTML Could Allow Information Disclosure - Windows 7 Gold/SP1 (x64)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1104617) MS11-046: Vulnerability in Ancillary Function Driver Could Allow Elevation of Privilege - Windows 7 Gold
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1105309) MS11-053: Vulnerability in Bluetooth Stack Could Allow Remote Code Execution - Windows 7 Gold/SP1
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1105311) MS11-053: Vulnerability in Bluetooth Stack Could Allow Remote Code Execution - Windows 7 Gold/SP1 (x64)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1105903) MS11-059: Vulnerability in Data Access Components Could Allow Remote Code Execution - Windows 7 Gold/SP1 (x64)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1105905) MS11-059: Vulnerability in Data Access Components Could Allow Remote Code Execution - Windows Server 2008 R2 Gold/SP1 (x64)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1107117) MS11-071: Vulnerability in Windows Components Could Allow Remote Code Execution - Windows 7 Gold/SP1
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1107119) MS11-071: Vulnerability in Windows Components Could Allow Remote Code Execution - Windows 7 Gold/SP1 (x64)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1107517) MS11-075: Vulnerability in Microsoft Active Accessibility Could Allow Remote Code Execution - Windows 7 Gold/SP1
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1107519) MS11-075: Vulnerability in Microsoft Active Accessibility Could Allow Remote Code Execution - Windows 7 Gold/SP1 (x64)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1107521) MS11-075: Vulnerability in Microsoft Active Accessibility Could Allow Remote Code Execution - Windows Server 2008 R2 Gold/SP1 (x64)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1107605) MS11-076: Vulnerability in Windows Media Center Could Allow Remote Code Execution - Windows 7 Gold/SP1
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1109213) MS11-092: Vulnerability in Windows Media Could Allow Remote Code Execution - Windows 7 Gold/SP1 (x64)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1109211) MS11-092: Vulnerability in Windows Media Could Allow Remote Code Execution - Windows 7 Gold/SP1
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:453570603) 4535706: Update for SQL Server 2016 SP2 CU11 - SQL Server 2016 SP2 - KB4535706 (x64) (Superseded)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:453570601) MS20-FEB: Security update for SQL Server 2016 SP2 CU11 - SQL Server 2016 SP2 - KB4535706 (x64) (Superseded)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"> <o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Reason for Update:<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Updated extra relevance check on KB4336919 and KB4091346 to resolve the false positive issue<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Updated action script with new hash values on MS11- fixlets since MS has changed the file binary<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* updated action script new file binary on KB2501584 since MS modified it<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Superseded old SQL with the available one as per MS<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Actions to Take:<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">None<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Published site version:<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Site Name: Patches for Windows<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Version: 3744<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Additional links:<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Application Engineering Team<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">HCL BigFix<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><o:p> </o:p></p>
</div>
</body>
</html>