<html xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
font-size:12.0pt;
font-family:"Calibri",sans-serif;}
span.EmailStyle17
{mso-style-type:personal-compose;
font-family:"Calibri",sans-serif;
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:12.0pt;
font-family:"Calibri",sans-serif;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style>
</head>
<body lang="EN-US" link="#0563C1" vlink="#954F72" style="word-wrap:break-word">
<div class="WordSection1">
<p class="MsoNormal"><span style="font-size:11.0pt">Content in the Patches for Windows site has been modified<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Modified:<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1102215) MS11-022: Vulnerabilities in Microsoft PowerPoint Could Allow Remote Code Execution - Powerpoint 2010 Viewer (Superseded)<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1107311) MS11-073: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 Gold (Superseded)<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1406807) MS14-068: Vulnerability in Kerberos Could Allow Elevation of Privilege - Windows Server 2012 R2 Gold - KB3011780 (x64) (Superseded)<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1402305) MS14-023: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP1 - KB2878284 (Superseded)<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1402313) MS14-023: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP1 - KB2878284 (x64)(Superseded)<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1402407) MS14-024: Vulnerability in a Microsoft Common Control Could Allow Security Feature Bypass - Office 2010 SP1 - KB2810073 (Superseded)<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1505007) MS15-050: Vulnerability in Service Control Manager Could Allow Elevation of Privilege - Windows Server 2012 Gold - KB3055642 (x64) (Superseded)<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1513213) MS15-132: Security Update for Microsoft Windows to Address Remote Code Execution - Windows 8.1 Gold - KB3108381 (Superseded)<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1513217) MS15-132: Security Update for Microsoft Windows to Address Remote Code Execution - Windows Server 2012 R2 Gold - KB3108381 (x64) (Superseded)<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Major (ID:1513245) MS15-132: Security Update for Microsoft Windows to Address Remote Code Execution - Windows 8.1 Gold - KB3108381 (x64) (Superseded)<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Reason for Update:<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* Old fixlets have been superseded<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Actions to Take:<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">* None<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Published site version:<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Site Name: Patches for Windows<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Version: 3989<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Additional links:<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">Application Engineering Team<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt">HCL BigFix<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt"><o:p> </o:p></span></p>
</div>
</body>
</html>