[BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)'

autonotify at bigfix.com autonotify at bigfix.com
Fri Jun 11 02:30:25 PDT 2010


Fixlet Site - 'Patches for Windows (Japanese)'
Current Version: 361	Published: Fri, 11 Jun 2010 02:57:30  GMT

New Fixlets:
============

***************************************************************
Title: MS10-032: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows 2000 SP4 (Japanese)
Severity: Important
Fixlet ID: 1003201
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-032.mspx

Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in the Windows kernel-mode drivers. The vulnerabilities could allow elevation of privilege if a user views content rendered in a specially crafted TrueType font. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-032: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1003202
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-032.mspx

***************************************************************
Title: MS10-032: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows XP SP2/SP3 (Japanese)
Severity: Important
Fixlet ID: 1003203
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-032.mspx

Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in the Windows kernel-mode drivers. The vulnerabilities could allow elevation of privilege if a user views content rendered in a specially crafted TrueType font. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-032: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1003204
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-032.mspx

***************************************************************
Title: MS10-032: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1003205
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-032.mspx

Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in the Windows kernel-mode drivers. The vulnerabilities could allow elevation of privilege if a user views content rendered in a specially crafted TrueType font. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-032: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1003206
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-032.mspx

***************************************************************
Title: MS10-032: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1003207
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-032.mspx

Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in the Windows kernel-mode drivers. The vulnerabilities could allow elevation of privilege if a user views content rendered in a specially crafted TrueType font. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-032: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1003208
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-032.mspx

***************************************************************
Title: MS10-032: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1003209
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-032.mspx

Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in the Windows kernel-mode drivers. The vulnerabilities could allow elevation of privilege if a user views content rendered in a specially crafted TrueType font. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-032: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1003210
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-032.mspx

***************************************************************
Title: MS10-032: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Vista SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1003211
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-032.mspx

Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in the Windows kernel-mode drivers. The vulnerabilities could allow elevation of privilege if a user views content rendered in a specially crafted TrueType font. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-032: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1003213
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-032.mspx

Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in the Windows kernel-mode drivers. The vulnerabilities could allow elevation of privilege if a user views content rendered in a specially crafted TrueType font. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-032: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Important
Fixlet ID: 1003215
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-032.mspx

Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in the Windows kernel-mode drivers. The vulnerabilities could allow elevation of privilege if a user views content rendered in a specially crafted TrueType font. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-032: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1003217
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-032.mspx

Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in the Windows kernel-mode drivers. The vulnerabilities could allow elevation of privilege if a user views content rendered in a specially crafted TrueType font. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-032: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows 7 (Japanese)
Severity: Important
Fixlet ID: 1003219
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-032.mspx

Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in the Windows kernel-mode drivers. The vulnerabilities could allow elevation of privilege if a user views content rendered in a specially crafted TrueType font. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-032: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows 7 (x64) (Japanese)
Severity: Important
Fixlet ID: 1003221
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-032.mspx

Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in the Windows kernel-mode drivers. The vulnerabilities could allow elevation of privilege if a user views content rendered in a specially crafted TrueType font. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-032: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2008 R2 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 1003223
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-032.mspx

Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in the Windows kernel-mode drivers. The vulnerabilities could allow elevation of privilege if a user views content rendered in a specially crafted TrueType font. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Quartz.dll (DirectShow) (DirectX 9) - Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 1003301
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.<BR><BR>After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.<BR><BR>Note: Affected computers may report back as 'Pending Restart' once the update has run successfully, but will not report back their final status until the computer has been restarted.<BR><BR>Note: Microsoft has announced that this update may be included in a future service pack or update rollup.<BR><BR>Note: This security update is also referenced under KB975562.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Quartz.dll (DirectShow) (DirectX 9) - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1003302
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Windows Media Format Runtime  9 - Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 1003303
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Windows Media Format Runtime  9 - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1003304
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Windows Media Encoder 9 - Windows 2000/XP/2003 (Japanese)
Severity: Important
Fixlet ID: 1003305
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Windows Media Encoder 9 - Windows 2000/XP/2003 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1003306
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Asycfilt.dll (COM component) - Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 1003307
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Asycfilt.dll (COM component) - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1003308
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Quartz.dll (DirectShow) - Windows XP SP2/SP3 (Japanese)
Severity: Critical
Fixlet ID: 1003309
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Quartz.dll (DirectShow) - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1003310
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Windows Media Format Runtime 9/9.5/11 - Windows XP SP2 (Japanese)
Severity: Critical
Fixlet ID: 1003311
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Windows Media Format Runtime 9/9.5/11 - Windows XP SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1003312
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Windows Media Format Runtime 9/9.5/11 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1003313
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Windows Media Format Runtime 9/9.5/11 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1003314
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Asycfilt.dll (COM component) - Windows XP SP2/SP3 (Japanese)
Severity: Critical
Fixlet ID: 1003315
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Asycfilt.dll (COM component) - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1003316
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Quartz.dll (DirectShow) - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1003317
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Quartz.dll (DirectShow) - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1003318
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Windows Media Format Runtime 9.5 (32-bit) - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1003319
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Windows Media Format Runtime 9.5 (32-bit) - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1003320
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Windows Media Format Runtime 9.5 (64-bit) - Windows XP/2003 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1003321
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Windows Media Format Runtime 9.5 (64-bit) - Windows XP/2003 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1003322
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Windows Media Format Runtime 11 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1003323
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Windows Media Format Runtime 11 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1003324
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Windows Media Encoder 9 (32-bit) - Windows XP/2003 (x64) (Japanese)
Severity: Important
Fixlet ID: 1003325
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Windows Media Encoder 9 (32-bit) - Windows XP/2003 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1003326
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Windows Media Encoder 9 (64-bit) - Windows XP/ 2003 (x64) (Japanese)
Severity: Important
Fixlet ID: 1003327
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Windows Media Encoder 9 (64-bit) - Windows XP/2003 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1003328
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Asycfilt.dll (COM component) - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1003329
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Asycfilt.dll (COM component) - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1003330
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Quartz.dll (DirectShow) - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1003331
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Quartz.dll (DirectShow) - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1003332
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Windows Media Format Runtime 9.5 - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1003333
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Windows Media Format Runtime 9.5 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1003334
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Asycfilt.dll (COM component) - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1003335
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Asycfilt.dll (COM component) - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1003336
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Quartz.dll (DirectShow) - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1003337
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Quartz.dll (DirectShow) - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1003338
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Windows Media Format Runtime 9.5 (32-bit) - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1003339
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Windows Media Format Runtime 9.5 (32-bit) - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1003340
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Asycfilt.dll (COM component) - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1003341
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Asycfilt.dll (COM component) - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1003342
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Quartz.dll (DirectShow) - Windows Vista SP1 (Japanese)
Severity: Critical
Fixlet ID: 1003343
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Asycfilt.dll (COM component) - Windows Vista SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 1003345
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Windows Media Encoder 9 - Windows Vista SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1003347
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Quartz.dll (DirectShow) - Windows Vista SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1003349
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Asycfilt.dll (COM component) - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1003351
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Windows Media Encoder 9 (32-bit) - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1003353
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Windows Media Encoder 9 (64-bit) - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1003355
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Quartz.dll (DirectShow) - Windows Server 2008 Gold (Japanese)
Severity: Critical
Fixlet ID: 1003357
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Asycfilt.dll (COM component) - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Critical
Fixlet ID: 1003359
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Windows Media Encoder 9 - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Important
Fixlet ID: 1003361
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Quartz.dll (DirectShow) - Windows Server 2008 Gold (x64) (Japanese)
Severity: Critical
Fixlet ID: 1003362
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Asycfilt.dll (COM component) - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1003363
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Windows Media Encoder 9 (64-bit) - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1003365
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Asycfilt.dll (COM component) - Windows 7 (Japanese)
Severity: Critical
Fixlet ID: 1003367
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Asycfilt.dll (COM component) - Windows 7 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1003369
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Asycfilt.dll (COM component) - Windows Server 2008 R2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1003371
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code Execution - Windows Media Encoder 9 (32-bit) - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1003387
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-033.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-034: Cumulative Security Update of ActiveX Kill Bits - Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 1003401
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-034.mspx

Fixlet Description: Microsoft has released a security update that addresses two privately reported vulnerabilities for Microsoft software. This security update is rated Critical for all supported editions of Microsoft Windows 2000, Windows XP, Windows Vista, and Windows 7, and Moderate for all supported editions of Windows Server 2003, Windows Server2008, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-034: Cumulative Security Update of ActiveX Kill Bits - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1003402
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-034.mspx

***************************************************************
Title: MS10-034: Cumulative Security Update of ActiveX Kill Bits - Windows XP SP2/SP3 (Japanese)
Severity: Critical
Fixlet ID: 1003403
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-034.mspx

Fixlet Description: Microsoft has released a security update that addresses two privately reported vulnerabilities for Microsoft software. This security update is rated Critical for all supported editions of Microsoft Windows 2000, Windows XP, Windows Vista, and Windows 7, and Moderate for all supported editions of Windows Server 2003, Windows Server2008, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-034: Cumulative Security Update of ActiveX Kill Bits - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1003404
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-034.mspx

***************************************************************
Title: MS10-034: Cumulative Security Update of ActiveX Kill Bits - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1003405
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-034.mspx

Fixlet Description: Microsoft has released a security update that addresses two privately reported vulnerabilities for Microsoft software. This security update is rated Critical for all supported editions of Microsoft Windows 2000, Windows XP, Windows Vista, and Windows 7, and Moderate for all supported editions of Windows Server 2003, Windows Server2008, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-034: Cumulative Security Update of ActiveX Kill Bits - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1003406
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-034.mspx

***************************************************************
Title: MS10-034: Cumulative Security Update of ActiveX Kill Bits - Windows Server 2003 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1003407
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-034.mspx

Fixlet Description: Microsoft has released a security update that addresses two privately reported vulnerabilities for Microsoft software. This security update is rated Critical for all supported editions of Microsoft Windows 2000, Windows XP, Windows Vista, and Windows 7, and Moderate for all supported editions of Windows Server 2003, Windows Server2008, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-034: Cumulative Security Update of ActiveX Kill Bits - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1003408
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-034.mspx

***************************************************************
Title: MS10-034: Cumulative Security Update of ActiveX Kill Bits - Windows Vista SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 1003409
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-034.mspx

Fixlet Description: Microsoft has released a security update that addresses two privately reported vulnerabilities for Microsoft software. This security update is rated Critical for all supported editions of Microsoft Windows 2000, Windows XP, Windows Vista, and Windows 7, and Moderate for all supported editions of Windows Server 2003, Windows Server2008, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-034: Cumulative Security Update of ActiveX Kill Bits - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1003411
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-034.mspx

Fixlet Description: Microsoft has released a security update that addresses two privately reported vulnerabilities for Microsoft software. This security update is rated Critical for all supported editions of Microsoft Windows 2000, Windows XP, Windows Vista, and Windows 7, and Moderate for all supported editions of Windows Server 2003, Windows Server2008, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-034: Cumulative Security Update of ActiveX Kill Bits - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1003413
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-034.mspx

Fixlet Description: Microsoft has released a security update that addresses two privately reported vulnerabilities for Microsoft software. This security update is rated Critical for all supported editions of Microsoft Windows 2000, Windows XP, Windows Vista, and Windows 7, and Moderate for all supported editions of Windows Server 2003, Windows Server2008, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-034: Cumulative Security Update of ActiveX Kill Bits - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1003415
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-034.mspx

Fixlet Description: Microsoft has released a security update that addresses two privately reported vulnerabilities for Microsoft software. This security update is rated Critical for all supported editions of Microsoft Windows 2000, Windows XP, Windows Vista, and Windows 7, and Moderate for all supported editions of Windows Server 2003, Windows Server2008, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-034: Cumulative Security Update of ActiveX Kill Bits - Windows 7 (Japanese)
Severity: Critical
Fixlet ID: 1003417
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-034.mspx

Fixlet Description: Microsoft has released a security update that addresses two privately reported vulnerabilities for Microsoft software. This security update is rated Critical for all supported editions of Microsoft Windows 2000, Windows XP, Windows Vista, and Windows 7, and Moderate for all supported editions of Windows Server 2003, Windows Server2008, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-034: Cumulative Security Update of ActiveX Kill Bits - Windows 7 Gold (x64) (Japanese)
Severity: Critical
Fixlet ID: 1003419
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-034.mspx

Fixlet Description: Microsoft has released a security update that addresses two privately reported vulnerabilities for Microsoft software. This security update is rated Critical for all supported editions of Microsoft Windows 2000, Windows XP, Windows Vista, and Windows 7, and Moderate for all supported editions of Windows Server 2003, Windows Server2008, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-034: Cumulative Security Update of ActiveX Kill Bits - Windows Server 2008 R2 Gold (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1003421
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-034.mspx

Fixlet Description: Microsoft has released a security update that addresses two privately reported vulnerabilities for Microsoft software. This security update is rated Critical for all supported editions of Microsoft Windows 2000, Windows XP, Windows Vista, and Windows 7, and Moderate for all supported editions of Windows Server 2003, Windows Server2008, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-034: Cumulative Security Update of ActiveX Kill Bits - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1003423
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-034.mspx

Fixlet Description: Microsoft has released a security update that addresses two privately reported vulnerabilities for Microsoft software. This security update is rated Critical for all supported editions of Microsoft Windows 2000, Windows XP, Windows Vista, and Windows 7, and Moderate for all supported editions of Windows Server 2003, Windows Server2008, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-034: Cumulative Security Update of ActiveX Kill Bits - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1003424
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-034.mspx

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 5.01 SP4 - Windows 2000 SP4 (Japanese)
Severity: No severity rating[1]
Fixlet ID: 1003501
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 5.01 SP4 - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: No severity rating[1]
Fixlet ID: 1003502
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 6 SP1 - Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 1003503
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 6 SP1 - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1003504
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2/SP3 (Japanese)
Severity: Critical
Fixlet ID: 1003505
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1003506
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1003507
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1003508
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1003509
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1003510
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1003511
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1003512
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2/SP3 (Japanese)
Severity: Critical
Fixlet ID: 1003513
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1003514
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1003515
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1003516
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1003517
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1003518
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1003519
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1003520
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 1003521
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1003523
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1003525
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1003527
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2/SP3 (Japanese)
Severity: Critical
Fixlet ID: 1003529
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1003530
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1003531
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1003532
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1003533
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1003534
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1003535
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1003536
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 8 - Windows Vista SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 1003537
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 8 - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1003539
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1003541
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1003543
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 8 - Windows 7 (Japanese)
Severity: Critical
Fixlet ID: 1003545
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 8 - Windows 7 Gold (x64) (Japanese)
Severity: Critical
Fixlet ID: 1003547
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-035: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 R2 Gold (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1003549
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-035.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-036: Vulnerability in COM Validation in Microsoft Office Could Allow Remote Code Execution - Office 2003 SP3 (Local/Network Install) (Japanese)
Severity: Important
Fixlet ID: 1003601
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-036.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in COM validation in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Excel, Word, Visio, Publisher, or PowerPoint file with an affected version of Microsoft Office. The vulnerability cannot be exploited automatically through e-mail. For an attack to be successful a user must open an attachment that is sent in an e-mail message. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-036: Vulnerability in COM Validation in Microsoft Office Could Allow Remote Code Execution - Office 2003 SP3 (Administrative Install) (Japanese)
Severity: Important
Fixlet ID: 1003603
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-036.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in COM validation in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Excel, Word, Visio, Publisher, or PowerPoint file with an affected version of Microsoft Office. The vulnerability cannot be exploited automatically through e-mail. For an attack to be successful a user must open an attachment that is sent in an e-mail message. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-036: Vulnerability in COM Validation in Microsoft Office Could Allow Remote Code Execution - Excel 2003 SP3 (Local/Network Install) (Japanese)
Severity: Important
Fixlet ID: 1003606
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-036.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in COM validation in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Excel, Word, Visio, Publisher, or PowerPoint file with an affected version of Microsoft Office. The vulnerability cannot be exploited automatically through e-mail. For an attack to be successful a user must open an attachment that is sent in an e-mail message. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-036: Vulnerability in COM Validation in Microsoft Office Could Allow Remote Code Execution - Excel 2003 SP3(Administrative Install) (Japanese)
Severity: Important
Fixlet ID: 1003608
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-036.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in COM validation in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Excel, Word, Visio, Publisher, or PowerPoint file with an affected version of Microsoft Office. The vulnerability cannot be exploited automatically through e-mail. For an attack to be successful a user must open an attachment that is sent in an e-mail message. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-036: Vulnerability in COM Validation in Microsoft Office Could Allow Remote Code Execution - PowerPoint 2003 SP3 (Local/Network Install) (Japanese)
Severity: Important
Fixlet ID: 1003611
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-036.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in COM validation in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Excel, Word, Visio, Publisher, or PowerPoint file with an affected version of Microsoft Office. The vulnerability cannot be exploited automatically through e-mail. For an attack to be successful a user must open an attachment that is sent in an e-mail message. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-036: Vulnerability in COM Validation in Microsoft Office Could Allow Remote Code Execution - PowerPoint 2003 SP3 (Administrative Install) (Japanese)
Severity: Important
Fixlet ID: 1003613
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-036.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in COM validation in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Excel, Word, Visio, Publisher, or PowerPoint file with an affected version of Microsoft Office. The vulnerability cannot be exploited automatically through e-mail. For an attack to be successful a user must open an attachment that is sent in an e-mail message. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-036: Vulnerability in COM Validation in Microsoft Office Could Allow Remote Code Execution - Publisher 2003 SP3 (Local/Network Install) (Japanese)
Severity: Important
Fixlet ID: 1003616
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-036.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in COM validation in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Excel, Word, Visio, Publisher, or PowerPoint file with an affected version of Microsoft Office. The vulnerability cannot be exploited automatically through e-mail. For an attack to be successful a user must open an attachment that is sent in an e-mail message. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-036: Vulnerability in COM Validation in Microsoft Office Could Allow Remote Code Execution - Publisher 2003 SP3  (Administrative Install) (Japanese)
Severity: Important
Fixlet ID: 1003618
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-036.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in COM validation in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Excel, Word, Visio, Publisher, or PowerPoint file with an affected version of Microsoft Office. The vulnerability cannot be exploited automatically through e-mail. For an attack to be successful a user must open an attachment that is sent in an e-mail message. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-036: Vulnerability in COM Validation in Microsoft Office Could Allow Remote Code Execution - Visio 2003 SP3 (Local/Network Install) (Japanese)
Severity: Important
Fixlet ID: 1003621
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-036.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in COM validation in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Excel, Word, Visio, Publisher, or PowerPoint file with an affected version of Microsoft Office. The vulnerability cannot be exploited automatically through e-mail. For an attack to be successful a user must open an attachment that is sent in an e-mail message. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-036: Vulnerability in COM Validation in Microsoft Office Could Allow Remote Code Execution - Visio 2003 SP3 (Administrative Install) (Japanese)
Severity: Important
Fixlet ID: 1003623
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-036.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in COM validation in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Excel, Word, Visio, Publisher, or PowerPoint file with an affected version of Microsoft Office. The vulnerability cannot be exploited automatically through e-mail. For an attack to be successful a user must open an attachment that is sent in an e-mail message. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-036: Vulnerability in COM Validation in Microsoft Office Could Allow Remote Code Execution - Word 2003 SP3 (Local/Network Install) (Japanese)
Severity: Important
Fixlet ID: 1003626
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-036.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in COM validation in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Excel, Word, Visio, Publisher, or PowerPoint file with an affected version of Microsoft Office. The vulnerability cannot be exploited automatically through e-mail. For an attack to be successful a user must open an attachment that is sent in an e-mail message. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-036: Vulnerability in COM Validation in Microsoft Office Could Allow Remote Code Execution - Word 2003 SP3 (Administrative Install) (Japanese)
Severity: Important
Fixlet ID: 1003628
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-036.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in COM validation in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Excel, Word, Visio, Publisher, or PowerPoint file with an affected version of Microsoft Office. The vulnerability cannot be exploited automatically through e-mail. For an attack to be successful a user must open an attachment that is sent in an e-mail message. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-036: Vulnerability in COM Validation in Microsoft Office Could Allow Remote Code Execution - Office 2007 SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1003631
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-036.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in COM validation in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Excel, Word, Visio, Publisher, or PowerPoint file with an affected version of Microsoft Office. The vulnerability cannot be exploited automatically through e-mail. For an attack to be successful a user must open an attachment that is sent in an e-mail message. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-036: Vulnerability in COM Validation in Microsoft Office Could Allow Remote Code Execution - Excel 2007 SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1003636
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-036.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in COM validation in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Excel, Word, Visio, Publisher, or PowerPoint file with an affected version of Microsoft Office. The vulnerability cannot be exploited automatically through e-mail. For an attack to be successful a user must open an attachment that is sent in an e-mail message. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

Important Note: In addition to this update, customers also need to install the update for 2007 Microsoft Office System Service Pack 1 and 2007 Microsoft Office System Service Pack 2 (KB982312) to be protected from the vulnerability described in this bulletin.Note: Microsoft has announced that this update may be included in a future service pack or update rollup.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-036: Vulnerability in COM Validation in Microsoft Office Could Allow Remote Code Execution - PowerPoint 2007 SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1003641
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-036.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in COM validation in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Excel, Word, Visio, Publisher, or PowerPoint file with an affected version of Microsoft Office. The vulnerability cannot be exploited automatically through e-mail. For an attack to be successful a user must open an attachment that is sent in an e-mail message. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

Important Note: In addition to this update, customers also need to install the update for 2007 Microsoft Office System Service Pack 1 and 2007 Microsoft Office System Service Pack 2 (KB982312) to be protected from the vulnerability described in this bulletin.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-036: Vulnerability in COM Validation in Microsoft Office Could Allow Remote Code Execution - Publisher 2007 SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1003646
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-036.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in COM validation in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Excel, Word, Visio, Publisher, or PowerPoint file with an affected version of Microsoft Office. The vulnerability cannot be exploited automatically through e-mail. For an attack to be successful a user must open an attachment that is sent in an e-mail message. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-036: Vulnerability in COM Validation in Microsoft Office Could Allow Remote Code Execution - Visio 2007 SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1003651
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-036.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in COM validation in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Excel, Word, Visio, Publisher, or PowerPoint file with an affected version of Microsoft Office. The vulnerability cannot be exploited automatically through e-mail. For an attack to be successful a user must open an attachment that is sent in an e-mail message. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

Important Note: In addition to this update, customers also need to install the update for 2007 Microsoft Office System Service Pack 1 and 2007 Microsoft Office System Service Pack 2 (KB982312) to be protected from the vulnerability described in this bulletin.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-036: Vulnerability in COM Validation in Microsoft Office Could Allow Remote Code Execution - Word 2007 SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1003656
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-036.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in COM validation in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Excel, Word, Visio, Publisher, or PowerPoint file with an affected version of Microsoft Office. The vulnerability cannot be exploited automatically through e-mail. For an attack to be successful a user must open an attachment that is sent in an e-mail message. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

Important Note: In addition to this update, customers also need to install the update for 2007 Microsoft Office System Service Pack 1 and 2007 Microsoft Office System Service Pack 2 (KB982312) to be protected from the vulnerability described in this bulletin.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-037: Vulnerability in the OpenType Compact Font Format (CFF) Driver Could Allow Elevation of Privilege - Windows 2000 SP4 (Japanese)
Severity: Important
Fixlet ID: 1003701
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-037.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows OpenType Compact Font Format (CFF) driver. The vulnerability could allow elevation of privilege if a user views content rendered in a specially crafted CFF font. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-037: Vulnerability in the OpenType Compact Font Format (CFF) Driver Could Allow Elevation of Privilege - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1003702
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-037.mspx

***************************************************************
Title: MS10-037: Vulnerability in the OpenType Compact Font Format (CFF) Driver Could Allow Elevation of Privilege - Windows XP SP2/SP3 (Japanese)
Severity: Important
Fixlet ID: 1003703
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-037.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows OpenType Compact Font Format (CFF) driver. The vulnerability could allow elevation of privilege if a user views content rendered in a specially crafted CFF font. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-037: Vulnerability in the OpenType Compact Font Format (CFF) Driver Could Allow Elevation of Privilege - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1003704
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-037.mspx

***************************************************************
Title: MS10-037: Vulnerability in the OpenType Compact Font Format (CFF) Driver Could Allow Elevation of Privilege - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1003705
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-037.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows OpenType Compact Font Format (CFF) driver. The vulnerability could allow elevation of privilege if a user views content rendered in a specially crafted CFF font. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-037: Vulnerability in the OpenType Compact Font Format (CFF) Driver Could Allow Elevation of Privilege - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1003706
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-037.mspx

***************************************************************
Title: MS10-037: Vulnerability in the OpenType Compact Font Format (CFF) Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1003707
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-037.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows OpenType Compact Font Format (CFF) driver. The vulnerability could allow elevation of privilege if a user views content rendered in a specially crafted CFF font. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-037: Vulnerability in the OpenType Compact Font Format (CFF) Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1003708
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-037.mspx

***************************************************************
Title: MS10-037: Vulnerability in the OpenType Compact Font Format (CFF) Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1003709
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-037.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows OpenType Compact Font Format (CFF) driver. The vulnerability could allow elevation of privilege if a user views content rendered in a specially crafted CFF font. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-037: Vulnerability in the OpenType Compact Font Format (CFF) Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1003710
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-037.mspx

***************************************************************
Title: MS10-037: Vulnerability in the OpenType Compact Font Format (CFF) Driver Could Allow Elevation of Privilege - Windows Vista SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1003711
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-037.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows OpenType Compact Font Format (CFF) driver. The vulnerability could allow elevation of privilege if a user views content rendered in a specially crafted CFF font. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-037: Vulnerability in the OpenType Compact Font Format (CFF) Driver Could Allow Elevation of Privilege - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1003713
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-037.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows OpenType Compact Font Format (CFF) driver. The vulnerability could allow elevation of privilege if a user views content rendered in a specially crafted CFF font. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-037: Vulnerability in the OpenType Compact Font Format (CFF) Driver Could Allow Elevation of Privilege - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Important
Fixlet ID: 1003715
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-037.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows OpenType Compact Font Format (CFF) driver. The vulnerability could allow elevation of privilege if a user views content rendered in a specially crafted CFF font. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-037: Vulnerability in the OpenType Compact Font Format (CFF) Driver Could Allow Elevation of Privilege - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1003717
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-037.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows OpenType Compact Font Format (CFF) driver. The vulnerability could allow elevation of privilege if a user views content rendered in a specially crafted CFF font. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-037: Vulnerability in the OpenType Compact Font Format (CFF) Driver Could Allow Elevation of Privilege - Windows 7 (Japanese)
Severity: Important
Fixlet ID: 1003719
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-037.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows OpenType Compact Font Format (CFF) driver. The vulnerability could allow elevation of privilege if a user views content rendered in a specially crafted CFF font. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-037: Vulnerability in the OpenType Compact Font Format (CFF) Driver Could Allow Elevation of Privilege - Windows 7 (x64) (Japanese)
Severity: Important
Fixlet ID: 1003721
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-037.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows OpenType Compact Font Format (CFF) driver. The vulnerability could allow elevation of privilege if a user views content rendered in a specially crafted CFF font. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-037: Vulnerability in the OpenType Compact Font Format (CFF) Driver Could Allow Elevation of Privilege - Windows Server 2008 R2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1003723
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-037.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows OpenType Compact Font Format (CFF) driver. The vulnerability could allow elevation of privilege if a user views content rendered in a specially crafted CFF font. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-038: Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution - Office XP SP3 (Local/Network Install) (Japanese)
Severity: Important
Fixlet ID: 1003801
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-038.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Microsoft Office. The more severe vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-038: Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution - Office XP SP3 (Administrative Install) (Japanese)
Severity: Important
Fixlet ID: 1003803
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-038.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Microsoft Office. The more severe vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-038: Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution - Office 2003 SP3 (Local/Network Install) (Japanese)
Severity: Important
Fixlet ID: 1003806
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-038.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Microsoft Office. The more severe vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-038: Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution - Office 2003 SP3 (Administrative Install) (Japanese)
Severity: Important
Fixlet ID: 1003808
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-038.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Microsoft Office. The more severe vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-038: Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution - Office 2007 SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1003811
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-038.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Microsoft Office. The more severe vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-038: Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution - Excel Viewer SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1003831
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-038.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Microsoft Office. The more severe vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-038: Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution - Office Compatibility Pack for Excel 2007 File Formats SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1003836
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-038.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Microsoft Office. The more severe vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-039: Vulnerabilities in Microsoft SharePoint Could Allow Elevation of Privilege - Office InfoPath 2003 SP3 (Japanese)
Severity: Important
Fixlet ID: 1003901
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-039.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and two privately reported vulnerabilities in Microsoft SharePoint. The most severe vulnerability could allow elevation of privilege if an attacker convinced a user of a targeted SharePoint site to click on a specially crafted link After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-039: Vulnerabilities in Microsoft SharePoint Could Allow Elevation of Privilege - Office InfoPath 2007 SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1003906
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-039.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and two privately reported vulnerabilities in Microsoft SharePoint. The most severe vulnerability could allow elevation of privilege if an attacker convinced a user of a targeted SharePoint site to click on a specially crafted link After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-039: Vulnerabilities in Microsoft SharePoint Could Allow Elevation of Privilege - Sharepoint Server 2007 SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1003911
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-039.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and two privately reported vulnerabilities in Microsoft SharePoint. The most severe vulnerability could allow elevation of privilege if an attacker convinced a user of a targeted SharePoint site to click on a specially crafted link After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-039: Vulnerabilities in Microsoft SharePoint Could Allow Elevation of Privilege - SharePoint Server 2007 SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1003916
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-039.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and two privately reported vulnerabilities in Microsoft SharePoint. The most severe vulnerability could allow elevation of privilege if an attacker convinced a user of a targeted SharePoint site to click on a specially crafted link After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-039: Vulnerabilities in Microsoft SharePoint Could Allow Elevation of Privilege - Sharepoint Services 3.0 SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1003926
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-039.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and two privately reported vulnerabilities in Microsoft SharePoint. The most severe vulnerability could allow elevation of privilege if an attacker convinced a user of a targeted SharePoint site to click on a specially crafted link After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-039: Vulnerabilities in Microsoft SharePoint Could Allow Elevation of Privilege - SharePoint Services 3.0 SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1003931
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-039.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and two privately reported vulnerabilities in Microsoft SharePoint. The most severe vulnerability could allow elevation of privilege if an attacker convinced a user of a targeted SharePoint site to click on a specially crafted link After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-040: Vulnerability in Internet Information Services Could Allow Remote Code Execution - Internet Information Services 6.0 - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1004001
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-040.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Internet Information Services (IIS). The vulnerability could allow remote code execution if a user received a specially crafted HTTP request. An attacker who successfully exploited this vulnerability could take complete control of an affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-040: Vulnerability in Internet Information Services Could Allow Remote Code Execution - Internet Information Services 6.0 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1004002
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-040.mspx

***************************************************************
Title: MS10-040: Vulnerability in Internet Information Services Could Allow Remote Code Execution - Internet Information Services 6.0 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1004003
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-040.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Internet Information Services (IIS). The vulnerability could allow remote code execution if a user received a specially crafted HTTP request. An attacker who successfully exploited this vulnerability could take complete control of an affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-040: Vulnerability in Internet Information Services Could Allow Remote Code Execution - Internet Information Services 6.0 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1004004
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-040.mspx

***************************************************************
Title: MS10-040: Vulnerability in Internet Information Services Could Allow Remote Code Execution - Internet Information Services 7.0 - Windows Vista SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1004005
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-040.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Internet Information Services (IIS). The vulnerability could allow remote code execution if a user received a specially crafted HTTP request. An attacker who successfully exploited this vulnerability could take complete control of an affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-040: Vulnerability in Internet Information Services Could Allow Remote Code Execution - Internet Information Services 7.0 - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1004007
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-040.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Internet Information Services (IIS). The vulnerability could allow remote code execution if a user received a specially crafted HTTP request. An attacker who successfully exploited this vulnerability could take complete control of an affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-040: Vulnerability in Internet Information Services Could Allow Remote Code Execution - Internet Information Services 7.0 - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Important
Fixlet ID: 1004009
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-040.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Internet Information Services (IIS). The vulnerability could allow remote code execution if a user received a specially crafted HTTP request. An attacker who successfully exploited this vulnerability could take complete control of an affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-040: Vulnerability in Internet Information Services Could Allow Remote Code Execution - Internet Information Services 7.0 - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1004011
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-040.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Internet Information Services (IIS). The vulnerability could allow remote code execution if a user received a specially crafted HTTP request. An attacker who successfully exploited this vulnerability could take complete control of an affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-040: Vulnerability in Internet Information Services Could Allow Remote Code Execution - Internet Information Services 7.5 - Windows 7 (Japanese)
Severity: Important
Fixlet ID: 1004013
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-040.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Internet Information Services (IIS). The vulnerability could allow remote code execution if a user received a specially crafted HTTP request. An attacker who successfully exploited this vulnerability could take complete control of an affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-040: Vulnerability in Internet Information Services Could Allow Remote Code Execution - Internet Information Services 7.5 - Windows 7 (x64) (Japanese)
Severity: Important
Fixlet ID: 1004015
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-040.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Internet Information Services (IIS). The vulnerability could allow remote code execution if a user received a specially crafted HTTP request. An attacker who successfully exploited this vulnerability could take complete control of an affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-040: Vulnerability in Internet Information Services Could Allow Remote Code Execution - Internet Information Services 7.5 - Windows Server 2008 R2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1004017
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-040.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Internet Information Services (IIS). The vulnerability could allow remote code execution if a user received a specially crafted HTTP request. An attacker who successfully exploited this vulnerability could take complete control of an affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-041: Vulnerability in Microsoft .NET Framework Could Allow Tampering - Microsoft .NET Framework 1.1 SP1 - Windows 2000/XP/Vista/2008 (Japanese)
Severity: Important
Fixlet ID: 1004101
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-041.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft .NET Framework. The vulnerability could allow data tampering of signed XML content without being detected. In custom applications, the security impact depends on how the signed content is used in the specific application. Scenarios in which signed XML messages are transmitted over a secure channel (such as SSL) are not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-041: Vulnerability in Microsoft .NET Framework Could Allow Tampering - Microsoft .NET Framework 2.0 SP2 / 3.5 SP1 - Windows 2000/XP/2003 (Japanese)
Severity: Important
Fixlet ID: 1004103
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-041.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft .NET Framework. The vulnerability could allow data tampering of signed XML content without being detected. In custom applications, the security impact depends on how the signed content is used in the specific application. Scenarios in which signed XML messages are transmitted over a secure channel (such as SSL) are not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-041: Vulnerability in Microsoft .NET Framework Could Allow Tampering - Microsoft .NET Framework 1.0 SP3 (Windows XP Media Center Edition / Tablet PC Edition) (Japanese)
Severity: Important
Fixlet ID: 1004105
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-041.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft .NET Framework. The vulnerability could allow data tampering of signed XML content without being detected. In custom applications, the security impact depends on how the signed content is used in the specific application. Scenarios in which signed XML messages are transmitted over a secure channel (such as SSL) are not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-041: Vulnerability in Microsoft .NET Framework Could Allow Tampering - Microsoft .NET Framework 1.0 SP3 (Windows XP Media Center Edition / Tablet PC Edition) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1004106
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-041.mspx

***************************************************************
Title: MS10-041: Vulnerability in Microsoft .NET Framework Could Allow Tampering - Microsoft .NET Framework 3.5 - Windows XP/2003 (Japanese)
Severity: Important
Fixlet ID: 1004107
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-041.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft .NET Framework. The vulnerability could allow data tampering of signed XML content without being detected. In custom applications, the security impact depends on how the signed content is used in the specific application. Scenarios in which signed XML messages are transmitted over a secure channel (such as SSL) are not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-041: Vulnerability in Microsoft .NET Framework Could Allow Tampering - Microsoft .NET Framework 1.1 SP1 - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1004109
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-041.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft .NET Framework. The vulnerability could allow data tampering of signed XML content without being detected. In custom applications, the security impact depends on how the signed content is used in the specific application. Scenarios in which signed XML messages are transmitted over a secure channel (such as SSL) are not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-041: Vulnerability in Microsoft .NET Framework Could Allow Tampering - Microsoft .NET Framework 1.1 SP1 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1004110
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-041.mspx

***************************************************************
Title: MS10-041: Vulnerability in Microsoft .NET Framework Could Allow Tampering - Microsoft .NET Framework 2.0 SP1 / 3.5 - Windows Vista SP1 / Windows Server 2008 Gold (Japanese)
Severity: Important
Fixlet ID: 1004111
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-041.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft .NET Framework. The vulnerability could allow data tampering of signed XML content without being detected. In custom applications, the security impact depends on how the signed content is used in the specific application. Scenarios in which signed XML messages are transmitted over a secure channel (such as SSL) are not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-041: Vulnerability in Microsoft .NET Framework Could Allow Tampering - Microsoft .NET Framework 2.0 SP2 / 3.5 SP1 - Windows Vista SP1 / Windows Server 2008 Gold (Japanese)
Severity: Important
Fixlet ID: 1004113
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-041.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft .NET Framework. The vulnerability could allow data tampering of signed XML content without being detected. In custom applications, the security impact depends on how the signed content is used in the specific application. Scenarios in which signed XML messages are transmitted over a secure channel (such as SSL) are not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-041: Vulnerability in Microsoft .NET Framework Could Allow Tampering - Microsoft .NET Framework 2.0 SP2 / 3.5 SP1 - Windows Vista SP2 / Windows Server 2008 SP2 (Japanese)
Severity: Important
Fixlet ID: 1004115
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-041.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft .NET Framework. The vulnerability could allow data tampering of signed XML content without being detected. In custom applications, the security impact depends on how the signed content is used in the specific application. Scenarios in which signed XML messages are transmitted over a secure channel (such as SSL) are not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-041: Vulnerability in Microsoft .NET Framework Could Allow Tampering - Microsoft .NET Framework 3.5.1 - Windows 7 (Japanese)
Severity: Important
Fixlet ID: 1004119
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-041.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft .NET Framework. The vulnerability could allow data tampering of signed XML content without being detected. In custom applications, the security impact depends on how the signed content is used in the specific application. Scenarios in which signed XML messages are transmitted over a secure channel (such as SSL) are not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-041: Vulnerability in Microsoft .NET Framework Could Allow Tampering - .NET Framework 2.0 SP2 / 3.5 SP1 - Windows XP/2003 (x64) (Japanese)
Severity: Important
Fixlet ID: 1004139
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-041.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft .NET Framework. The vulnerability could allow data tampering of signed XML content without being detected. In custom applications, the security impact depends on how the signed content is used in the specific application. Scenarios in which signed XML messages are transmitted over a secure channel (such as SSL) are not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-041: Vulnerability in Microsoft .NET Framework Could Allow Tampering - .NET Framework 2.0 SP1 / 3.5 Gold - Windows XP/2003 (x64) (Japanese)
Severity: Important
Fixlet ID: 1004141
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-041.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft .NET Framework. The vulnerability could allow data tampering of signed XML content without being detected. In custom applications, the security impact depends on how the signed content is used in the specific application. Scenarios in which signed XML messages are transmitted over a secure channel (such as SSL) are not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-041: Vulnerability in Microsoft .NET Framework Could Allow Tampering - .NET Framework 2.0 SP1 / 3.5 Gold - Windows Vista/2008 (x64) (Japanese)
Severity: Important
Fixlet ID: 1004143
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-041.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft .NET Framework. The vulnerability could allow data tampering of signed XML content without being detected. In custom applications, the security impact depends on how the signed content is used in the specific application. Scenarios in which signed XML messages are transmitted over a secure channel (such as SSL) are not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-041: Vulnerability in Microsoft .NET Framework Could Allow Tampering - .NET Framework 2.0 SP2 / 3.5 SP1 - Windows Vista SP1 / Windows Server 2008 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 1004145
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-041.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft .NET Framework. The vulnerability could allow data tampering of signed XML content without being detected. In custom applications, the security impact depends on how the signed content is used in the specific application. Scenarios in which signed XML messages are transmitted over a secure channel (such as SSL) are not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-041: Vulnerability in Microsoft .NET Framework Could Allow Tampering - .NET Framework 2.0 SP2 / 3.5 SP1 - Windows Vista SP2 / Windows Server 2008 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1004151
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-041.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft .NET Framework. The vulnerability could allow data tampering of signed XML content without being detected. In custom applications, the security impact depends on how the signed content is used in the specific application. Scenarios in which signed XML messages are transmitted over a secure channel (such as SSL) are not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-041: Vulnerability in Microsoft .NET Framework Could Allow Tampering - .NET Framework 3.5.1 - Windows 7 / Windows Server 2008 R2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1004153
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-041.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft .NET Framework. The vulnerability could allow data tampering of signed XML content without being detected. In custom applications, the security impact depends on how the signed content is used in the specific application. Scenarios in which signed XML messages are transmitted over a secure channel (such as SSL) are not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 981793: May. 2010 Cumulative Time Zone Update - Windows XP SP2/SP3 (Japanese)
Severity: <Unspecified>
Fixlet ID: 98179301
Fixlet Link: http://support.microsoft.com/kb/981793

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.

***************************************************************
Title: 981793: May. 2010 Cumulative Time Zone Update - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: <Unspecified>
Fixlet ID: 98179302
Fixlet Link: http://support.microsoft.com/kb/981793

***************************************************************
Title: 981793: May. 2010 Cumulative Time Zone Update - Windows Server 2003 SP2 (Japanese)
Severity: <Unspecified>
Fixlet ID: 98179303
Fixlet Link: http://support.microsoft.com/kb/981793

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.

***************************************************************
Title: 981793: May. 2010 Cumulative Time Zone Update - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: <Unspecified>
Fixlet ID: 98179304
Fixlet Link: http://support.microsoft.com/kb/981793

***************************************************************
Title: 981793: May. 2010 Cumulative Time Zone Update - Windows Vista SP1/SP2 (Japanese)
Severity: <Unspecified>
Fixlet ID: 98179305
Fixlet Link: http://support.microsoft.com/kb/981793

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.

***************************************************************
Title: 981793: May. 2010 Cumulative Time Zone Update - Windows Server 2008 Gold/SP2 (Japanese)
Severity: <Unspecified>
Fixlet ID: 98179307
Fixlet Link: http://support.microsoft.com/kb/981793

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.

***************************************************************
Title: 981793: May. 2010 Cumulative Time Zone Update - Windows 7 (Japanese)
Severity: <Unspecified>
Fixlet ID: 98179311
Fixlet Link: http://support.microsoft.com/kb/981793

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.

***************************************************************
Title: 981793: May. 2010 Cumulative Time Zone Update - Windows XP SP2 (x64) (Japanese)
Severity: <Unspecified>
Fixlet ID: 98179313
Fixlet Link: http://support.microsoft.com/kb/981793

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.

***************************************************************
Title: 981793: May. 2010 Cumulative Time Zone Update - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: <Unspecified>
Fixlet ID: 98179314
Fixlet Link: http://support.microsoft.com/kb/981793

***************************************************************
Title: 981793: May. 2010 Cumulative Time Zone Update - Windows Server 2003 SP2 (x64) (Japanese)
Severity: <Unspecified>
Fixlet ID: 98179315
Fixlet Link: http://support.microsoft.com/kb/981793

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.

***************************************************************
Title: 981793: May. 2010 Cumulative Time Zone Update - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: <Unspecified>
Fixlet ID: 98179316
Fixlet Link: http://support.microsoft.com/kb/981793

***************************************************************
Title: 981793: May. 2010 Cumulative Time Zone Update - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: <Unspecified>
Fixlet ID: 98179317
Fixlet Link: http://support.microsoft.com/kb/981793

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.

***************************************************************
Title: 981793: May. 2010 Cumulative Time Zone Update - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: <Unspecified>
Fixlet ID: 98179319
Fixlet Link: http://support.microsoft.com/kb/981793

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.

***************************************************************
Title: 981793: May. 2010 Cumulative Time Zone Update - Windows 7 (x64) (Japanese)
Severity: <Unspecified>
Fixlet ID: 98179321
Fixlet Link: http://support.microsoft.com/kb/981793

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.

***************************************************************
Title: 981793: May. 2010 Cumulative Time Zone Update - Windows Server 2008 R2 (x64) (Japanese)
Severity: <Unspecified>
Fixlet ID: 98179323
Fixlet Link: http://support.microsoft.com/kb/981793

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.



More information about the BigFix-Announcements-Japan mailing list