[BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)'

autonotify at bigfix.com autonotify at bigfix.com
Fri Aug 13 02:30:20 PDT 2010


Fixlet Site - 'Patches for Windows (Japanese)'
Current Version: 371	Published: Thu, 12 Aug 2010 22:27:01  GMT

New Fixlets:
============

***************************************************************
Title: MS10-047: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1004701
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-047.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-047: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1004702
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-047.mspx

***************************************************************
Title: MS10-047: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Vista SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1004703
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-047.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-047: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1004705
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-047.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-047: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Important
Fixlet ID: 1004709
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-047.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-047: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1004713
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-047.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-047: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows 7 Gold (Japanese)
Severity: Moderate
Fixlet ID: 1004717
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-047.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-047: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows 7 Gold (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1004719
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-047.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-047: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2008 R2 Gold (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1004721
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-047.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-048: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1004801
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-048.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and four privately reported vulnerabilities in the Windows kernel-mode drivers. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-048: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1004802
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-048.mspx

***************************************************************
Title: MS10-048: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1004803
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-048.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and four privately reported vulnerabilities in the Windows kernel-mode drivers. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-048: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1004804
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-048.mspx

***************************************************************
Title: MS10-048: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1004805
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-048.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and four privately reported vulnerabilities in the Windows kernel-mode drivers. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-048: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1004806
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-048.mspx

***************************************************************
Title: MS10-048: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1004807
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-048.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and four privately reported vulnerabilities in the Windows kernel-mode drivers. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-048: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1004808
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-048.mspx

***************************************************************
Title: MS10-048: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Vista SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1004809
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-048.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and four privately reported vulnerabilities in the Windows kernel-mode drivers. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-048: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1004811
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-048.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and four privately reported vulnerabilities in the Windows kernel-mode drivers. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-048: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Important
Fixlet ID: 1004813
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-048.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and four privately reported vulnerabilities in the Windows kernel-mode drivers. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-048: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1004815
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-048.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and four privately reported vulnerabilities in the Windows kernel-mode drivers. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-048: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows 7 (Japanese)
Severity: Important
Fixlet ID: 1004817
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-048.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and four privately reported vulnerabilities in the Windows kernel-mode drivers. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-048: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows 7 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 1004819
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-048.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and four privately reported vulnerabilities in the Windows kernel-mode drivers. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-048: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2008 R2 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 1004821
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-048.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and four privately reported vulnerabilities in the Windows kernel-mode drivers. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-049: Vulnerabilities in SChannel could allow Remote Code Execution - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1004901
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-049.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in the Secure Channel (SChannel) security package in Windows. The more severe of these vulnerabilities could allow remote code execution if a user visits a specially crafted Web site that is designed to exploit these vulnerabilities through an Internet Web browser. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or in an Instant Messenger message that takes users to the attacker's Web site. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-049: Vulnerabilities in SChannel could allow Remote Code Execution - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1004902
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-049.mspx

***************************************************************
Title: MS10-049: Vulnerabilities in SChannel could allow Remote Code Execution - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1004903
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-049.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in the Secure Channel (SChannel) security package in Windows. The more severe of these vulnerabilities could allow remote code execution if a user visits a specially crafted Web site that is designed to exploit these vulnerabilities through an Internet Web browser. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or in an Instant Messenger message that takes users to the attacker's Web site. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-049: Vulnerabilities in SChannel could allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1004904
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-049.mspx

***************************************************************
Title: MS10-049: Vulnerabilities in SChannel could allow Remote Code Execution - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1004905
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-049.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in the Secure Channel (SChannel) security package in Windows. The more severe of these vulnerabilities could allow remote code execution if a user visits a specially crafted Web site that is designed to exploit these vulnerabilities through an Internet Web browser. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or in an Instant Messenger message that takes users to the attacker's Web site. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-049: Vulnerabilities in SChannel could allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1004906
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-049.mspx

***************************************************************
Title: MS10-049: Vulnerabilities in SChannel could allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1004907
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-049.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in the Secure Channel (SChannel) security package in Windows. The more severe of these vulnerabilities could allow remote code execution if a user visits a specially crafted Web site that is designed to exploit these vulnerabilities through an Internet Web browser. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or in an Instant Messenger message that takes users to the attacker's Web site. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-049: Vulnerabilities in SChannel could allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1004908
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-049.mspx

***************************************************************
Title: MS10-049: Vulnerabilities in SChannel could allow Remote Code Execution - Windows Vista SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1004909
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-049.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in the Secure Channel (SChannel) security package in Windows. The more severe of these vulnerabilities could allow remote code execution if a user visits a specially crafted Web site that is designed to exploit these vulnerabilities through an Internet Web browser. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or in an Instant Messenger message that takes users to the attacker's Web site. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-049: Vulnerabilities in SChannel could allow Remote Code Execution - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1004911
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-049.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in the Secure Channel (SChannel) security package in Windows. The more severe of these vulnerabilities could allow remote code execution if a user visits a specially crafted Web site that is designed to exploit these vulnerabilities through an Internet Web browser. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or in an Instant Messenger message that takes users to the attacker's Web site. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-049: Vulnerabilities in SChannel could allow Remote Code Execution - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Important
Fixlet ID: 1004913
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-049.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in the Secure Channel (SChannel) security package in Windows. The more severe of these vulnerabilities could allow remote code execution if a user visits a specially crafted Web site that is designed to exploit these vulnerabilities through an Internet Web browser. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or in an Instant Messenger message that takes users to the attacker's Web site. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-049: Vulnerabilities in SChannel could allow Remote Code Execution - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1004915
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-049.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in the Secure Channel (SChannel) security package in Windows. The more severe of these vulnerabilities could allow remote code execution if a user visits a specially crafted Web site that is designed to exploit these vulnerabilities through an Internet Web browser. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or in an Instant Messenger message that takes users to the attacker's Web site. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-049: Vulnerabilities in SChannel could allow Remote Code Execution - Windows 7 (Japanese)
Severity: Important
Fixlet ID: 1004917
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-049.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in the Secure Channel (SChannel) security package in Windows. The more severe of these vulnerabilities could allow remote code execution if a user visits a specially crafted Web site that is designed to exploit these vulnerabilities through an Internet Web browser. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or in an Instant Messenger message that takes users to the attacker's Web site. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-049: Vulnerabilities in SChannel could allow Remote Code Execution - Windows 7 (x64) (Japanese)
Severity: Important
Fixlet ID: 1004919
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-049.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in the Secure Channel (SChannel) security package in Windows. The more severe of these vulnerabilities could allow remote code execution if a user visits a specially crafted Web site that is designed to exploit these vulnerabilities through an Internet Web browser. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or in an Instant Messenger message that takes users to the attacker's Web site. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-049: Vulnerabilities in SChannel could allow Remote Code Execution - Windows Server 2008 R2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1004921
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-049.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in the Secure Channel (SChannel) security package in Windows. The more severe of these vulnerabilities could allow remote code execution if a user visits a specially crafted Web site that is designed to exploit these vulnerabilities through an Internet Web browser. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or in an Instant Messenger message that takes users to the attacker's Web site. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-050: Vulnerability in Windows Movie Maker Could Allow Remote Code Execution - Movie Maker 2.1 - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1005001
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-050.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows Movie Maker. The vulnerability could allow remote code execution if an attacker sent a specially crafted Movie Maker project file and convinced the user to open the specially crafted file. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-050: Vulnerability in Windows Movie Maker Could Allow Remote Code Execution - Movie Maker 2.1 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1005002
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-050.mspx

***************************************************************
Title: MS10-050: Vulnerability in Windows Movie Maker Could Allow Remote Code Execution - Movie Maker 2.1 - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1005003
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-050.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows Movie Maker. The vulnerability could allow remote code execution if an attacker sent a specially crafted Movie Maker project file and convinced the user to open the specially crafted file. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-050: Vulnerability in Windows Movie Maker Could Allow Remote Code Execution - Movie Maker 2.1 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1005004
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-050.mspx

***************************************************************
Title: MS10-050: Vulnerability in Windows Movie Maker Could Allow Remote Code Execution - Movie Maker 6.0 - Windows Vista SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1005005
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-050.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows Movie Maker. The vulnerability could allow remote code execution if an attacker sent a specially crafted Movie Maker project file and convinced the user to open the specially crafted file. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-050: Vulnerability in Windows Movie Maker Could Allow Remote Code Execution - Movie Maker 2.6 - Windows Vista SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1005007
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-050.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows Movie Maker. The vulnerability could allow remote code execution if an attacker sent a specially crafted Movie Maker project file and convinced the user to open the specially crafted file. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-050: Vulnerability in Windows Movie Maker Could Allow Remote Code Execution - Movie Maker 6.0 - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1005009
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-050.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows Movie Maker. The vulnerability could allow remote code execution if an attacker sent a specially crafted Movie Maker project file and convinced the user to open the specially crafted file. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-050: Vulnerability in Windows Movie Maker Could Allow Remote Code Execution - Movie Maker 2.6 - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1005011
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-050.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows Movie Maker. The vulnerability could allow remote code execution if an attacker sent a specially crafted Movie Maker project file and convinced the user to open the specially crafted file. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-051: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution - Microsoft XML Core Services 3.0 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1005101
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-051.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft XML Core Services. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. An attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to persuade users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-051: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution - Microsoft XML Core Services 3.0 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1005102
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-051.mspx

***************************************************************
Title: MS10-051: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution - Microsoft XML Core Services 3.0 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1005103
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-051.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft XML Core Services. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. An attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to persuade users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-051: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution - Microsoft XML Core Services 3.0 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1005104
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-051.mspx

***************************************************************
Title: MS10-051: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution - Microsoft XML Core Services 3.0 - Windows Server 2003 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1005105
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-051.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft XML Core Services. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. An attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to persuade users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-051: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution - Microsoft XML Core Services 3.0 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1005106
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-051.mspx

***************************************************************
Title: MS10-051: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution - Microsoft XML Core Services 3.0 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1005107
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-051.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft XML Core Services. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. An attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to persuade users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-051: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution - Microsoft XML Core Services 3.0 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1005108
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-051.mspx

***************************************************************
Title: MS10-051: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution - Microsoft XML Core Services 3.0 - Windows Vista SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 1005109
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-051.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft XML Core Services. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. An attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to persuade users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-051: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution - Microsoft XML Core Services 3.0 - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1005111
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-051.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft XML Core Services. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. An attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to persuade users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-051: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution - Microsoft XML Core Services 3.0 - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1005113
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-051.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft XML Core Services. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. An attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to persuade users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-051: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution - Microsoft XML Core Services 3.0 - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1005115
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-051.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft XML Core Services. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. An attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to persuade users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-051: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution - Microsoft XML Core Services 3.0 - Windows 7 Gold (Japanese)
Severity: Critical
Fixlet ID: 1005117
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-051.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft XML Core Services. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. An attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to persuade users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-051: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution - Microsoft XML Core Services 3.0 - Windows 7 Gold (x64) (Japanese)
Severity: Critical
Fixlet ID: 1005119
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-051.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft XML Core Services. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. An attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to persuade users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-051: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution - Microsoft XML Core Services 3.0 - Windows Server 2008 R2 Gold (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1005121
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-051.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft XML Core Services. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. An attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to persuade users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-052: Vulnerability in Microsoft MPEG Layer-3 Codecs Could Allow Remote Code Execution - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1005201
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-052.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft MPEG Layer-3 audio codecs. The vulnerability could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-052: Vulnerability in Microsoft MPEG Layer-3 Codecs Could Allow Remote Code Execution - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1005202
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-052.mspx

***************************************************************
Title: MS10-052: Vulnerability in Microsoft MPEG Layer-3 Codecs Could Allow Remote Code Execution - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1005203
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-052.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft MPEG Layer-3 audio codecs. The vulnerability could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-052: Vulnerability in Microsoft MPEG Layer-3 Codecs Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1005204
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-052.mspx

***************************************************************
Title: MS10-052: Vulnerability in Microsoft MPEG Layer-3 Codecs Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1005205
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-052.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft MPEG Layer-3 audio codecs. The vulnerability could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-052: Vulnerability in Microsoft MPEG Layer-3 Codecs Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1005206
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-052.mspx

***************************************************************
Title: MS10-052: Vulnerability in Microsoft MPEG Layer-3 Codecs Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1005207
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-052.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft MPEG Layer-3 audio codecs. The vulnerability could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-052: Vulnerability in Microsoft MPEG Layer-3 Codecs Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1005208
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-052.mspx

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1005301
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

Fixlet Description: Microsoft has released a security update that resolves six privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1005302
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1005303
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

Fixlet Description: Microsoft has released a security update that resolves six privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1005304
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1005305
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

Fixlet Description: Microsoft has released a security update that resolves six privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1005306
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1005307
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

Fixlet Description: Microsoft has released a security update that resolves six privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1005308
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1005309
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

Fixlet Description: Microsoft has released a security update that resolves six privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1005310
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1005311
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

Fixlet Description: Microsoft has released a security update that resolves six privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1005312
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1005313
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

Fixlet Description: Microsoft has released a security update that resolves six privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1005314
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1005315
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

Fixlet Description: Microsoft has released a security update that resolves six privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1005316
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 1005317
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

Fixlet Description: Microsoft has released a security update that resolves six privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1005319
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

Fixlet Description: Microsoft has released a security update that resolves six privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Critical
Fixlet ID: 1005321
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

Fixlet Description: Microsoft has released a security update that resolves six privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1005323
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

Fixlet Description: Microsoft has released a security update that resolves six privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1005325
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

Fixlet Description: Microsoft has released a security update that resolves six privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1005326
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1005327
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

Fixlet Description: Microsoft has released a security update that resolves six privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1005328
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1005329
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

Fixlet Description: Microsoft has released a security update that resolves six privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1005330
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1005331
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

Fixlet Description: Microsoft has released a security update that resolves six privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1005332
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 8 - Windows Vista SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 1005333
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

Fixlet Description: Microsoft has released a security update that resolves six privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 8 - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1005335
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

Fixlet Description: Microsoft has released a security update that resolves six privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Critical
Fixlet ID: 1005337
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

Fixlet Description: Microsoft has released a security update that resolves six privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1005339
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

Fixlet Description: Microsoft has released a security update that resolves six privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 8 - Windows 7 Gold (Japanese)
Severity: Critical
Fixlet ID: 1005341
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

Fixlet Description: Microsoft has released a security update that resolves six privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 8 - Windows 7 Gold (x64) (Japanese)
Severity: Critical
Fixlet ID: 1005343
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

Fixlet Description: Microsoft has released a security update that resolves six privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-053: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 R2 Gold (x64) (Japanese)
Severity: Critical
Fixlet ID: 1005345
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx

Fixlet Description: Microsoft has released a security update that resolves six privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-054: Vulnerabilities in SMB Server Could Allow Remote Code Execution - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1005401
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-054.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker created a specially crafted SMB packet and sent the packet to an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks originating outside the enterprise perimeter that would attempt to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-054: Vulnerabilities in SMB Server Could Allow Remote Code Execution - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1005402
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-054.mspx

***************************************************************
Title: MS10-054: Vulnerabilities in SMB Server Could Allow Remote Code Execution - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1005403
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-054.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker created a specially crafted SMB packet and sent the packet to an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks originating outside the enterprise perimeter that would attempt to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-054: Vulnerabilities in SMB Server Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1005404
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-054.mspx

***************************************************************
Title: MS10-054: Vulnerabilities in SMB Server Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1005405
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-054.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker created a specially crafted SMB packet and sent the packet to an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks originating outside the enterprise perimeter that would attempt to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-054: Vulnerabilities in SMB Server Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1005406
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-054.mspx

***************************************************************
Title: MS10-054: Vulnerabilities in SMB Server Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1005407
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-054.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker created a specially crafted SMB packet and sent the packet to an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks originating outside the enterprise perimeter that would attempt to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-054: Vulnerabilities in SMB Server Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1005408
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-054.mspx

***************************************************************
Title: MS10-054: Vulnerabilities in SMB Server Could Allow Remote Code Execution - Windows Vista SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1005409
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-054.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker created a specially crafted SMB packet and sent the packet to an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks originating outside the enterprise perimeter that would attempt to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-054: Vulnerabilities in SMB Server Could Allow Remote Code Execution - Windows Vista SP1/ SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1005411
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-054.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker created a specially crafted SMB packet and sent the packet to an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks originating outside the enterprise perimeter that would attempt to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-054: Vulnerabilities in SMB Server Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Important
Fixlet ID: 1005413
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-054.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker created a specially crafted SMB packet and sent the packet to an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks originating outside the enterprise perimeter that would attempt to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-054: Vulnerabilities in SMB Server Could Allow Remote Code Execution - Windows Server 2008 Gold/ SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1005415
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-054.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker created a specially crafted SMB packet and sent the packet to an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks originating outside the enterprise perimeter that would attempt to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-054: Vulnerabilities in SMB Server Could Allow Remote Code Execution - Windows 7 Gold (Japanese)
Severity: Important
Fixlet ID: 1005417
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-054.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker created a specially crafted SMB packet and sent the packet to an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks originating outside the enterprise perimeter that would attempt to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-054: Vulnerabilities in SMB Server Could Allow Remote Code Execution - Windows 7 (x64) (Japanese)
Severity: Important
Fixlet ID: 1005419
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-054.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker created a specially crafted SMB packet and sent the packet to an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks originating outside the enterprise perimeter that would attempt to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-054: Vulnerabilities in SMB Server Could Allow Remote Code Execution - Windows Server 2008 R2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1005421
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-054.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker created a specially crafted SMB packet and sent the packet to an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks originating outside the enterprise perimeter that would attempt to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-055: Vulnerability in Cinepak Codec Could Allow Remote Code Execution - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1005501
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-055.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Cinepak Codec. The vulnerability could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-055: Vulnerability in Cinepak Codec Could Allow Remote Code Execution - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1005502
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-055.mspx

***************************************************************
Title: MS10-055: Vulnerability in Cinepak Codec Could Allow Remote Code Execution - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1005503
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-055.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Cinepak Codec. The vulnerability could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-055: Vulnerability in Cinepak Codec Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1005504
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-055.mspx

***************************************************************
Title: MS10-055: Vulnerability in Cinepak Codec Could Allow Remote Code Execution - Windows Vista SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 1005505
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-055.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Cinepak Codec. The vulnerability could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-055: Vulnerability in Cinepak Codec Could Allow Remote Code Execution - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1005507
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-055.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Cinepak Codec. The vulnerability could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-055: Vulnerability in Cinepak Codec Could Allow Remote Code Execution - Windows 7 (Japanese)
Severity: Critical
Fixlet ID: 1005509
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-055.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Cinepak Codec. The vulnerability could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-055: Vulnerability in Cinepak Codec Could Allow Remote Code Execution - Windows 7 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1005511
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-055.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Cinepak Codec. The vulnerability could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-056: Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution - Office XP SP3 (Local/Network Install) (Japanese)
Severity: Important
Fixlet ID: 1005601
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-056.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Office. The most severe vulnerabilities could allow remote code execution if a user opens or previews a specially crafted RTF e-mail message. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-056: Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution - Office XP SP3 (Administrative Install) (Japanese)
Severity: Important
Fixlet ID: 1005603
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-056.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Office. The most severe vulnerabilities could allow remote code execution if a user opens or previews a specially crafted RTF e-mail message. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-056: Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution - Office 2003 SP3 (Local/Network Install) (Japanese)
Severity: Important
Fixlet ID: 1005606
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-056.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Office. The most severe vulnerabilities could allow remote code execution if a user opens or previews a specially crafted RTF e-mail message. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-056: Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution - Office 2003 SP3 (Administrative Install) (Japanese)
Severity: Important
Fixlet ID: 1005608
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-056.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Office. The most severe vulnerabilities could allow remote code execution if a user opens or previews a specially crafted RTF e-mail message. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-056: Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution - Office 2007 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1005611
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-056.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Office. The most severe vulnerabilities could allow remote code execution if a user opens or previews a specially crafted RTF e-mail message. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-056: Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution - Office Word Viewer 2003 (Japanese)
Severity: Important
Fixlet ID: 1005631
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-056.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Office. The most severe vulnerabilities could allow remote code execution if a user opens or previews a specially crafted RTF e-mail message. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-056: Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution - Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1005636
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-056.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Office. The most severe vulnerabilities could allow remote code execution if a user opens or previews a specially crafted RTF e-mail message. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-057: Vulnerability in Microsoft Office Excel Could Allow Remote Code Execution - Office XP SP3 (Local/Network Install) (Japanese)
Severity: Important
Fixlet ID: 1005701
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-057.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-057: Vulnerability in Microsoft Office Excel Could Allow Remote Code Execution - Office XP SP3 (Administrative Install) (Japanese)
Severity: Important
Fixlet ID: 1005703
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-057.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-057: Vulnerability in Microsoft Office Excel Could Allow Remote Code Execution - Office 2003 SP3 (Local/Network Install) (Japanese)
Severity: Important
Fixlet ID: 1005706
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-057.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-057: Vulnerability in Microsoft Office Excel Could Allow Remote Code Execution - Office 2003 SP3 (Administrative Install) (Japanese)
Severity: Important
Fixlet ID: 1005708
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-057.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-058: Vulnerabilities in TCP/IP Could Allow Elevation of Privilege - Windows Vista SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1005801
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-058.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of these vulnerabilities could allow elevation of privilege due to an error in the processing of a specific input buffer. An attacker who is able to log on to the target system could exploit this vulnerability and run arbitrary code with system-level privileges. The attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-058: Vulnerabilities in TCP/IP Could Allow Elevation of Privilege - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1005803
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-058.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of these vulnerabilities could allow elevation of privilege due to an error in the processing of a specific input buffer. An attacker who is able to log on to the target system could exploit this vulnerability and run arbitrary code with system-level privileges. The attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-058: Vulnerabilities in TCP/IP Could Allow Elevation of Privilege - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Important
Fixlet ID: 1005805
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-058.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of these vulnerabilities could allow elevation of privilege due to an error in the processing of a specific input buffer. An attacker who is able to log on to the target system could exploit this vulnerability and run arbitrary code with system-level privileges. The attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-058: Vulnerabilities in TCP/IP Could Allow Elevation of Privilege - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1005807
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-058.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of these vulnerabilities could allow elevation of privilege due to an error in the processing of a specific input buffer. An attacker who is able to log on to the target system could exploit this vulnerability and run arbitrary code with system-level privileges. The attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-058: Vulnerabilities in TCP/IP Could Allow Elevation of Privilege - Windows 7 (Japanese)
Severity: Important
Fixlet ID: 1005809
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-058.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of these vulnerabilities could allow elevation of privilege due to an error in the processing of a specific input buffer. An attacker who is able to log on to the target system could exploit this vulnerability and run arbitrary code with system-level privileges. The attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-058: Vulnerabilities in TCP/IP Could Allow Elevation of Privilege - Windows 7 (x64) (Japanese)
Severity: Important
Fixlet ID: 1005811
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-058.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of these vulnerabilities could allow elevation of privilege due to an error in the processing of a specific input buffer. An attacker who is able to log on to the target system could exploit this vulnerability and run arbitrary code with system-level privileges. The attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-058: Vulnerabilities in TCP/IP Could Allow Elevation of Privilege - Windows Server 2008 R2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1005813
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-058.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of these vulnerabilities could allow elevation of privilege due to an error in the processing of a specific input buffer. An attacker who is able to log on to the target system could exploit this vulnerability and run arbitrary code with system-level privileges. The attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-059: Vulnerabilities in the Tracing Feature for Services Could Allow Elevation of Privilege - Windows Vista SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1005901
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-059.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in the Tracing Feature for Services. The vulnerabilities could allow elevation of privilege if an attacker runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-059: Vulnerabilities in the Tracing Feature for Services Could Allow Elevation of Privilege - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1005903
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-059.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in the Tracing Feature for Services. The vulnerabilities could allow elevation of privilege if an attacker runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-059: Vulnerabilities in the Tracing Feature for Services Could Allow Elevation of Privilege - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Important
Fixlet ID: 1005905
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-059.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in the Tracing Feature for Services. The vulnerabilities could allow elevation of privilege if an attacker runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-059: Vulnerabilities in the Tracing Feature for Services Could Allow Elevation of Privilege - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1005907
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-059.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in the Tracing Feature for Services. The vulnerabilities could allow elevation of privilege if an attacker runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-059: Vulnerabilities in the Tracing Feature for Services Could Allow Elevation of Privilege - Windows 7 (Japanese)
Severity: Important
Fixlet ID: 1005909
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-059.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in the Tracing Feature for Services. The vulnerabilities could allow elevation of privilege if an attacker runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-059: Vulnerabilities in the Tracing Feature for Services Could Allow Elevation of Privilege - Windows 7 (x64) (Japanese)
Severity: Important
Fixlet ID: 1005911
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-059.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in the Tracing Feature for Services. The vulnerabilities could allow elevation of privilege if an attacker runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-059: Vulnerabilities in the Tracing Feature for Services Could Allow Elevation of Privilege - Windows Server 2008 R2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1005913
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-059.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in the Tracing Feature for Services. The vulnerabilities could allow elevation of privilege if an attacker runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-060: Vulnerabilities in the Microsoft .NET Common Language Runtime and in Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 3.5 - Windows XP/2003 (Japanese)
Severity: Critical
Fixlet ID: 1006001
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-060.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in convincing a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing the page, as could be the case in a Web hosting scenario. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-060: Vulnerabilities in the Microsoft .NET Common Language Runtime and in Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 2.0 SP2 / 3.5 SP1 - Windows XP/2003 (Japanese)
Severity: Critical
Fixlet ID: 1006003
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-060.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in convincing a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing the page, as could be the case in a Web hosting scenario. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-060: Vulnerabilities in the Microsoft .NET Common Language Runtime and in Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 3.5 - Windows Vista SP1 / Windows Server 2008 Gold (Japanese)
Severity: Critical
Fixlet ID: 1006005
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-060.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in convincing a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing the page, as could be the case in a Web hosting scenario. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-060: Vulnerabilities in the Microsoft .NET Common Language Runtime and in Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 2.0 SP2 / 3.5 SP1 - Windows Vista SP1 / Windows Server 2008 Gold (Japanese)
Severity: Critical
Fixlet ID: 1006007
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-060.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in convincing a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing the page, as could be the case in a Web hosting scenario. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-060: Vulnerabilities in the Microsoft .NET Common Language Runtime and in Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 2.0 SP2 / 3.5 SP1 - Windows Vista SP2 / Windows Server 2008 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1006009
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-060.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in convincing a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing the page, as could be the case in a Web hosting scenario. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-060: Vulnerabilities in the Microsoft .NET Common Language Runtime and in Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 3.5.1 - Windows 7 (Japanese)
Severity: Critical
Fixlet ID: 1006011
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-060.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in convincing a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing the page, as could be the case in a Web hosting scenario. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-060: Vulnerabilities in the Microsoft .NET Common Language Runtime and in Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 3.5.1 - Windows 7 / Server 2008 R2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1006013
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-060.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in convincing a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing the page, as could be the case in a Web hosting scenario. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-060: Vulnerabilities in the Microsoft .NET Common Language Runtime and in Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 2.0 SP2 / 3.5 SP1 - Windows Vista SP2 / Windows Server 2008 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1006015
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-060.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in convincing a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing the page, as could be the case in a Web hosting scenario. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-060: Vulnerabilities in the Microsoft .NET Common Language Runtime and in Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 2.0 SP2 / 3.5 SP1 - Windows Vista SP1 / Windows Server 2008 Gold (x64) (Japanese)
Severity: Critical
Fixlet ID: 1006017
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-060.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in convincing a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing the page, as could be the case in a Web hosting scenario. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-060: Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution - Microsoft Silverlight 2/3 (Japanese)
Severity: Critical
Fixlet ID: 1006023
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS10-060.mspx

Fixlet Description: Microsoft has released a security update resolves two privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in convincing a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing the page, as could be the case in a Web hosting scenario. Microsoft recommends that users upgrade Microsoft Silverlight 2 to Microsoft Silverlight 3, which addresses the vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-060: Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution - Microsoft Silverlight 3 for Developers (Japanese)
Severity: Critical
Fixlet ID: 1006025
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS10-060.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in convincing a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing the page, as could be the case in a Web hosting scenario. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-060: Vulnerabilities in the Microsoft .NET Common Language Runtime and in Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 2.0 SP2 / 3.5 SP1 - Windows XP SP2 / Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1006027
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-060.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in convincing a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing the page, as could be the case in a Web hosting scenario. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-060: Vulnerabilities in the Microsoft .NET Common Language Runtime and in Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 3.5 - Windows XP SP2 / Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1006029
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-060.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in convincing a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing the page, as could be the case in a Web hosting scenario. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-060: Vulnerabilities in the Microsoft .NET Common Language Runtime and in Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 3.5 - Windows Vista SP1 / Windows Server 2008 Gold (x64) (Japanese)
Severity: Critical
Fixlet ID: 1006031
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-060.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in convincing a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing the page, as could be the case in a Web hosting scenario. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.



More information about the BigFix-Announcements-Japan mailing list