<html xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
font-size:12.0pt;
font-family:"Calibri",sans-serif;}
span.EmailStyle17
{mso-style-type:personal-compose;
font-family:"Calibri",sans-serif;
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:12.0pt;
font-family:"Calibri",sans-serif;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style>
</head>
<body lang="EN-US" link="#0563C1" vlink="#954F72" style="word-wrap:break-word">
<div class="WordSection1">
<p class="MsoNormal"><span style="font-size:11.0pt">Content in the Patches for Windows site has been modified<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"> <o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">New:<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:500379101) Windows 10 Version 21H2 Available via Windows 10, version 21H2 Enablement Package - KB5003791
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:500379105) Windows 10 Version 21H2 Available via Windows 10, version 21H2 Enablement Package - KB5003791 (x64)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Modified:<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1510117) MS15-101: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - Windows Server 2012 R2 Gold / Windows 8.1 Gold - .NET Framework 4.5.1 - KB3074228 (x64)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:500636401) 5006364: Cumulative Update for .NET Framework 3.5 and 4.8 for Windows Server 2022 - Windows Server 2022 - KB5006364 (x64)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1110007) MS11-100: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - Microsoft .NET Framework 4 - Windows 7 Gold
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1309109) MS13-091: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP1 (file format converters)(2553284) (x64)(Superseded)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1105101) MS11-051: Vulnerability in Active Directory Certificate Services Web Enrollment Could Allow Elevation of Privilege - Windows Server 2003 SP2
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1105103) MS11-051: Vulnerability in Active Directory Certificate Services Web Enrollment Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1105301) MS11-053: Vulnerability in Bluetooth Stack Could Allow Remote Code Execution - Windows Vista SP1
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1105305) MS11-053: Vulnerability in Bluetooth Stack Could Allow Remote Code Execution - Windows Vista SP1 (x64)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1105303) MS11-053: Vulnerability in Bluetooth Stack Could Allow Remote Code Execution - Windows Vista SP2
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1105307) MS11-053: Vulnerability in Bluetooth Stack Could Allow Remote Code Execution - Windows Vista SP2 (x64)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1105409) MS11-054: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Vista SP1
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1105411) MS11-054: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Vista SP1 (x64)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1105606) MS11-056: Vulnerabilities in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1105609) MS11-056: Vulnerabilities in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Vista SP1/SP2
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1105611) MS11-056: Vulnerabilities in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Vista SP1/SP2 (x64)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1105603) MS11-056: Vulnerabilities in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows XP SP2 (x64)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1105604) MS11-056: Vulnerabilities in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows XP SP2 (x64) - CORRUPT PATCH
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1106208) MS11-062: Vulnerability in Remote Access Service NDISTAPI Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) - CORRUPT PATCH
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1106203) MS11-062: Vulnerability in Remote Access Service NDISTAPI Driver Could Allow Elevation of Privilege - Windows XP SP2 (x64)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1106204) MS11-062: Vulnerability in Remote Access Service NDISTAPI Driver Could Allow Elevation of Privilege - Windows XP SP2 (x64) - CORRUPT PATCH
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1107002) MS11-070: Vulnerability in WINS Could Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1107003) MS11-070: Vulnerability in WINS Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1107004) MS11-070: Vulnerability in WINS Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) - CORRUPT PATCH
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1107009) MS11-070: Vulnerability in WINS Could Allow Elevation of Privilege - Windows Server 2008 R2 Gold/SP1 (x64)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1107103) MS11-071: Vulnerability in Windows Components Could Allow Remote Code Execution - Windows XP SP2 (x64)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"> <o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Reason for Update:<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Modified old fixlets with new URL and superseded few where the download links are not available from MS<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Enablement package update for windows 10 21H2<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Updated KB5006364 to resolve false positive<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Actions to Take:<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* None<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Published site version:<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Site Name: Patches for Windows<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Version: 3879<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Additional links:<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Application Engineering Team<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">HCL BigFix<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
</div>
</body>
</html>