[BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)'

autonotify at us.ibm.com autonotify at us.ibm.com
Thu Feb 14 02:32:13 PST 2013


Fixlet Site - 'Patches for Windows (Japanese)'
Current Version: 506	Published: Thu, 14 Feb 2013 10:10:54  GMT

New Fixlets:
============

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1300901
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1300902
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1300903
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1300904
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1300905
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1300906
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1300907
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1300908
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1300909
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1300910
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1300911
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1300912
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1300913
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1300914
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1300915
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1300916
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista SP2 (Japanese)
Severity: Critical
Fixlet ID: 1300917
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1300919
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1300921
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1300923
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1300925
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1300926
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1300927
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1300928
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1300929
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1300930
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1300931
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1300932
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 8 - Windows Vista SP2 (Japanese)
Severity: Critical
Fixlet ID: 1300933
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 8 - Windows Vista SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1300935
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1300937
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1300939
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 8 - Windows 7 Gold/SP1 (Japanese)
Severity: Critical
Fixlet ID: 1300941
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 8 - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1300943
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1300945
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 9 - Windows Vista SP2 (Japanese)
Severity: Critical
Fixlet ID: 1300947
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 9 - Windows Vista SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1300949
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1300951
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1300953
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 9 - Windows 7 Gold/SP1 (Japanese)
Severity: Critical
Fixlet ID: 1300955
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 9 - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1300957
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1300959
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 10 - Windows 8 Gold (Japanese)
Severity: Critical
Fixlet ID: 1300961
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 10 - Windows 8 Gold (x64) (Japanese)
Severity: Critical
Fixlet ID: 1300963
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-009: Cumulative Security Update for Internet Explorer - IE 10 - Windows Server 2012 Gold (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1300965
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-009

Fixlet Description: Microsoft has released a security update that resolves thirteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 6 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1301001
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 6 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1301002
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 6 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1301003
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 6 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1301004
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 6 - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1301005
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 6 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1301006
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 6 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1301007
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 6 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1301008
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 7 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1301009
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 7 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1301010
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 7 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1301011
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 7 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1301012
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 7 - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1301013
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 7 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1301014
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 7 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1301015
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 7 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1301016
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 7 - Windows Vista SP2 (Japanese)
Severity: Critical
Fixlet ID: 1301017
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 7 - Windows Vista SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1301019
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 7 - Windows Server 2008 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1301021
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 7 - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1301023
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 8 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1301025
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 8 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1301026
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 8 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1301027
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 8 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1301028
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 8 - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1301029
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 8 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1301030
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 8 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1301031
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 8 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1301032
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 8 - Windows Vista SP2 (Japanese)
Severity: Critical
Fixlet ID: 1301033
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 8 - Windows Vista SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1301035
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 8 - Windows Server 2008 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1301037
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 8 - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1301039
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 8 - Windows 7 Gold/SP1 (Japanese)
Severity: Critical
Fixlet ID: 1301041
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 8 - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1301043
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 8 - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1301045
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 9 - Windows Vista SP2 (Japanese)
Severity: Critical
Fixlet ID: 1301047
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 9 - Windows Vista SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1301049
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 9 - Windows Server 2008 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1301051
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 9 - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1301053
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 9 - Windows 7 Gold/SP1 (Japanese)
Severity: Critical
Fixlet ID: 1301055
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 9 - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1301057
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 9 - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1301059
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 10 - Windows 8 Gold (Japanese)
Severity: Critical
Fixlet ID: 1301061
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 10 - Windows 8 Gold (x64) (Japanese)
Severity: Critical
Fixlet ID: 1301063
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 10 - Windows Server 2012 Gold (x64) (Japanese)
Severity: Critical
Fixlet ID: 1301065
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-010

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). The vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-011: Vulnerability in Media Decompression Could Allow Remote Code Execution - Quartz.dll (DirectShow) - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1301101
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-011

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted media file (such as an .mpg file), opens a Microsoft Office document (such as a .ppt file) that contains a specially crafted embedded media file, or receives specially crafted streaming content. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-011: Vulnerability in Media Decompression Could Allow Remote Code Execution - Quartz.dll (DirectShow) - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1301102
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-011

***************************************************************
Title: MS13-011: Vulnerability in Media Decompression Could Allow Remote Code Execution - Quartz.dll (DirectShow) - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1301103
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-011

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted media file (such as an .mpg file), opens a Microsoft Office document (such as a .ppt file) that contains a specially crafted embedded media file, or receives specially crafted streaming content. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-011: Vulnerability in Media Decompression Could Allow Remote Code Execution - Quartz.dll (DirectShow) - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1301104
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-011

***************************************************************
Title: MS13-011: Vulnerability in Media Decompression Could Allow Remote Code Execution - Quartz.dll (DirectShow) - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1301105
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-011

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted media file (such as an .mpg file), opens a Microsoft Office document (such as a .ppt file) that contains a specially crafted embedded media file, or receives specially crafted streaming content. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-011: Vulnerability in Media Decompression Could Allow Remote Code Execution - Quartz.dll (DirectShow) - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1301106
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-011

***************************************************************
Title: MS13-011: Vulnerability in Media Decompression Could Allow Remote Code Execution - Quartz.dll (DirectShow) - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1301107
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-011

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted media file (such as an .mpg file), opens a Microsoft Office document (such as a .ppt file) that contains a specially crafted embedded media file, or receives specially crafted streaming content. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-011: Vulnerability in Media Decompression Could Allow Remote Code Execution - Quartz.dll (DirectShow) - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1301108
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-011

***************************************************************
Title: MS13-011: Vulnerability in Media Decompression Could Allow Remote Code Execution - Quartz.dll (DirectShow) - Windows Vista SP2 (Japanese)
Severity: Critical
Fixlet ID: 1301109
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-011

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted media file (such as an .mpg file), opens a Microsoft Office document (such as a .ppt file) that contains a specially crafted embedded media file, or receives specially crafted streaming content. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-011: Vulnerability in Media Decompression Could Allow Remote Code Execution - Quartz.dll (DirectShow) - Windows Vista SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1301111
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-011

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted media file (such as an .mpg file), opens a Microsoft Office document (such as a .ppt file) that contains a specially crafted embedded media file, or receives specially crafted streaming content. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-011: Vulnerability in Media Decompression Could Allow Remote Code Execution - Quartz.dll (DirectShow) - Windows Server 2008 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1301113
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-011

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted media file (such as an .mpg file), opens a Microsoft Office document (such as a .ppt file) that contains a specially crafted embedded media file, or receives specially crafted streaming content. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-011: Vulnerability in Media Decompression Could Allow Remote Code Execution - Quartz.dll (DirectShow) - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1301115
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-011

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted media file (such as an .mpg file), opens a Microsoft Office document (such as a .ppt file) that contains a specially crafted embedded media file, or receives specially crafted streaming content. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-012: Vulnerabilities in Microsoft Exchange Server Could Allow Remote Code Execution - Exchange Server 2007 SP3 (KB2788321) (Japanese)
Severity: Critical
Fixlet ID: 1301201
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-012

Fixlet Description: Microsoft has released a security update that resolves publicly disclosed vulnerabilities in Microsoft Exchange Server. The most severe vulnerability is in Microsoft Exchange Server WebReady Document Viewing, and could allow remote code execution in the security context of the transcoding service on the Exchange server if a user previews a specially crafted file using Outlook Web App (OWA). The transcoding service in Exchange that is used for WebReady Document Viewing is running in the LocalService account. The LocalService account has minimum privileges on the local computer and presents anonymous credentials on the network. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-012: Vulnerabilities in Microsoft Exchange Server Could Allow Remote Code Execution - Exchange Server 2010 SP2 (KB2746164) (x64) (Japanese)
Severity: Critical
Fixlet ID: 1301203
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-012

Fixlet Description: Microsoft has released a security update that resolves publicly disclosed vulnerabilities in Microsoft Exchange Server. The most severe vulnerability is in Microsoft Exchange Server WebReady Document Viewing, and could allow remote code execution in the security context of the transcoding service on the Exchange server if a user previews a specially crafted file using Outlook Web App (OWA). The transcoding service in Exchange that is used for WebReady Document Viewing is running in the LocalService account. The LocalService account has minimum privileges on the local computer and presents anonymous credentials on the network. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-012: Vulnerabilities in Microsoft Exchange Server Could Allow Remote Code Execution - Exchange Server 2007 SP3 (KB2788321) (x64) (Japanese)
Severity: Critical
Fixlet ID: 1301205
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-012

Fixlet Description: Microsoft has released a security update that resolves publicly disclosed vulnerabilities in Microsoft Exchange Server. The most severe vulnerability is in Microsoft Exchange Server WebReady Document Viewing, and could allow remote code execution in the security context of the transcoding service on the Exchange server if a user previews a specially crafted file using Outlook Web App (OWA). The transcoding service in Exchange that is used for WebReady Document Viewing is running in the LocalService account. The LocalService account has minimum privileges on the local computer and presents anonymous credentials on the network. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-014: Vulnerability in NFS Server Could Allow Denial of Service - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1301401
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-014

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker attempts a file operation on a read only share. An attacker who exploited this vulnerability could cause the affected system to stop responding and restart. The vulnerability only affects Windows servers with the NFS role enabled. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-014: Vulnerability in NFS Server Could Allow Denial of Service - Windows Server 2012 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 1301403
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-014

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker attempts a file operation on a read only share. An attacker who exploited this vulnerability could cause the affected system to stop responding and restart. The vulnerability only affects Windows servers with the NFS role enabled. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-015: Vulnerability in .NET Framework Could Allow Elevation of Privilege - .NET Framework 2.0 SP2 - Windows XP SP3 / Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1301501
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-015

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in the .NET Framework. The vulnerability could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-015: Vulnerability in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4 - Windows XP SP3 / Windows Server 2003 SP2 / Windows Vista SP2 / Windows Server 2008 SP2 / Windows 7 Gold/SP1 (Japanese)
Severity: Important
Fixlet ID: 1301503
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-015

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in the .NET Framework. The vulnerability could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-015: Vulnerability in .NET Framework Could Allow Elevation of Privilege - .NET Framework 2.0 SP2 - Windows XP SP2 / Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1301505
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-015

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in the .NET Framework. The vulnerability could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-015: Vulnerability in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4 - Windows XP SP2 / 2003 SP2 / Vista SP2 / 2008 SP2 / 7 Gold/SP1 / 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1301507
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-015

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in the .NET Framework. The vulnerability could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-015: Vulnerability in .NET Framework Could Allow Elevation of Privilege - .NET Framework 2.0 SP2 - Windows Vista SP2 / Windows Server 2008 SP2 (Japanese)
Severity: Important
Fixlet ID: 1301509
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-015

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in the .NET Framework. The vulnerability could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-015: Vulnerability in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4.5 - Windows Vista SP2 / Windows Server 2008 SP2 / Windows 7 SP1 (Japanese)
Severity: Important
Fixlet ID: 1301511
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-015

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in the .NET Framework. The vulnerability could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-015: Vulnerability in .NET Framework Could Allow Elevation of Privilege - .NET Framework 2.0 SP2 - Windows Vista SP2 / Windows Server 2008 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1301513
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-015

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in the .NET Framework. The vulnerability could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-015: Vulnerability in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4.5 - Windows Vista SP2 / Windows Server 2008 SP2 / Windows 7 SP1 / Windows Server 2008 R2 SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1301515
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-015

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in the .NET Framework. The vulnerability could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-015: Vulnerability in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5.1 - Windows 7 Gold (Japanese)
Severity: Important
Fixlet ID: 1301517
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-015

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in the .NET Framework. The vulnerability could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-015: Vulnerability in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5.1 - Windows 7 SP1 (Japanese)
Severity: Important
Fixlet ID: 1301519
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-015

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in the .NET Framework. The vulnerability could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-015: Vulnerability in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5.1 - Windows 7 Gold / Windows Server 2008 R2 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 1301521
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-015

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in the .NET Framework. The vulnerability could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-015: Vulnerability in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5.1 - Windows 7 SP1 / Windows Server 2008 R2 SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1301523
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-015

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in the .NET Framework. The vulnerability could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-015: Vulnerability in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5 - Windows 8 Gold / Windows Server 2012 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 1301525
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-015

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in the .NET Framework. The vulnerability could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-015: Vulnerability in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4.5 - Windows 8 Gold / Windows Server 2012 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 1301527
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-015

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in the .NET Framework. The vulnerability could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-015: Vulnerability in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4.5 - Windows 8 Gold (Japanese)
Severity: Important
Fixlet ID: 1301529
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-015

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in the .NET Framework. The vulnerability could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-015: Vulnerability in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5 - Windows 8 Gold (Japanese)
Severity: Important
Fixlet ID: 1301531
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-015

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in the .NET Framework. The vulnerability could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-016: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1301601
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-016

Fixlet Description: Microsoft has released a security update that resolves 30 privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-016: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1301602
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-016

***************************************************************
Title: MS13-016: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1301603
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-016

Fixlet Description: Microsoft has released a security update that resolves 30 privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-016: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1301604
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-016

***************************************************************
Title: MS13-016: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1301605
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-016

Fixlet Description: Microsoft has released a security update that resolves 30 privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-016: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1301606
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-016

***************************************************************
Title: MS13-016: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1301607
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-016

Fixlet Description: Microsoft has released a security update that resolves 30 privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-016: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1301608
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-016

***************************************************************
Title: MS13-016: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Vista SP2 (Japanese)
Severity: Important
Fixlet ID: 1301609
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-016

Fixlet Description: Microsoft has released a security update that resolves 30 privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-016: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Vista SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1301611
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-016

Fixlet Description: Microsoft has released a security update that resolves 30 privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-016: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Server 2008 SP2 (Japanese)
Severity: Important
Fixlet ID: 1301613
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-016

Fixlet Description: Microsoft has released a security update that resolves 30 privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-016: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1301615
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-016

Fixlet Description: Microsoft has released a security update that resolves 30 privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-016: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows 7 Gold/SP1 (Japanese)
Severity: Important
Fixlet ID: 1301617
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-016

Fixlet Description: Microsoft has released a security update that resolves 30 privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-016: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1301619
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-016

Fixlet Description: Microsoft has released a security update that resolves 30 privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-016: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1301621
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-016

Fixlet Description: Microsoft has released a security update that resolves 30 privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-016: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows 8 Gold (Japanese)
Severity: <Unspecified>
Fixlet ID: 1301623
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-016

Fixlet Description: Microsoft has released a security update that resolves 30 privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-016: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows 8 Gold (x64) (Japanese)
Severity: <Unspecified>
Fixlet ID: 1301625
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-016

Fixlet Description: Microsoft has released a security update that resolves 30 privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-016: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Server 2012 Gold (x64) (Japanese)
Severity: <Unspecified>
Fixlet ID: 1301627
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-016

Fixlet Description: Microsoft has released a security update that resolves 30 privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-017: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1301701
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-017

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in all supported releases of Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-017: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1301702
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-017

***************************************************************
Title: MS13-017: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1301703
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-017

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in all supported releases of Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-017: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1301704
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-017

***************************************************************
Title: MS13-017: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1301705
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-017

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in all supported releases of Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-017: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1301706
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-017

***************************************************************
Title: MS13-017: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1301707
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-017

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in all supported releases of Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-017: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1301708
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-017

***************************************************************
Title: MS13-017: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Vista SP2 (Japanese)
Severity: Important
Fixlet ID: 1301709
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-017

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in all supported releases of Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-017: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Vista SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1301711
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-017

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in all supported releases of Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-017: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2008 SP2 (Japanese)
Severity: Important
Fixlet ID: 1301713
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-017

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in all supported releases of Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-017: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1301715
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-017

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in all supported releases of Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-017: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows 7 Gold/SP1 (Japanese)
Severity: Important
Fixlet ID: 1301717
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-017

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in all supported releases of Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-017: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1301719
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-017

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in all supported releases of Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-017: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1301721
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-017

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in all supported releases of Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-017: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows 8 Gold (Japanese)
Severity: Important
Fixlet ID: 1301723
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-017

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in all supported releases of Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-017: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows 8 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 1301725
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-017

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in all supported releases of Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-017: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2012 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 1301727
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-017

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in all supported releases of Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-018: Vulnerability in TCP/IP Could Allow Denial of Service - Windows Vista SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1301801
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-018

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an unauthenticated attacker sends a specially crafted connection termination packet to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-018: Vulnerability in TCP/IP Could Allow Denial of Service - Windows Vista SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1301803
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-018

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an unauthenticated attacker sends a specially crafted connection termination packet to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-018: Vulnerability in TCP/IP Could Allow Denial of Service - Windows Server 2008 SP2 (Japanese)
Severity: Important
Fixlet ID: 1301805
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-018

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an unauthenticated attacker sends a specially crafted connection termination packet to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-018: Vulnerability in TCP/IP Could Allow Denial of Service - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1301807
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-018

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an unauthenticated attacker sends a specially crafted connection termination packet to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-018: Vulnerability in TCP/IP Could Allow Denial of Service - Windows 7 Gold/SP1 (Japanese)
Severity: Moderate
Fixlet ID: 1301809
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-018

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an unauthenticated attacker sends a specially crafted connection termination packet to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-018: Vulnerability in TCP/IP Could Allow Denial of Service - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1301811
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-018

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an unauthenticated attacker sends a specially crafted connection termination packet to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-018: Vulnerability in TCP/IP Could Allow Denial of Service - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1301813
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-018

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an unauthenticated attacker sends a specially crafted connection termination packet to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-018: Vulnerability in TCP/IP Could Allow Denial of Service - Windows 8 Gold (Japanese)
Severity: Moderate
Fixlet ID: 1301815
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-018

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an unauthenticated attacker sends a specially crafted connection termination packet to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-018: Vulnerability in TCP/IP Could Allow Denial of Service - Windows 8 Gold (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1301817
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-018

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an unauthenticated attacker sends a specially crafted connection termination packet to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-018: Vulnerability in TCP/IP Could Allow Denial of Service - Windows Server 2012 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 1301819
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-018

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an unauthenticated attacker sends a specially crafted connection termination packet to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-019: Vulnerability in Windows Client/Server Run-time Subsystem (CSRSS) Could Allow Elevation of Privilege - Windows 7 Gold/SP1 (Japanese)
Severity: Important
Fixlet ID: 1301901
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-019

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to a system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-019: Vulnerability in Windows Client/Server Run-time Subsystem (CSRSS) Could Allow Elevation of Privilege - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1301903
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-019

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to a system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-019: Vulnerability in Windows Client/Server Run-time Subsystem (CSRSS) Could Allow Elevation of Privilege - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1301905
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-019

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to a system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-020: Vulnerability in OLE Automation Could Allow Remote Code Execution - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1302001
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-020

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows Object Linking and Embedding (OLE) Automation. The vulnerability could allow remote code execution if a user opens a specially crafted file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-020: Vulnerability in OLE Automation Could Allow Remote Code Execution - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1302002
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-020

***************************************************************
Title: 2803748: Failover Cluster Management snap-in crashes after you install update 2750149 on a Windows 2012-based failover cluster - Windows 8 Gold (Japanese)
Severity: N/A
Fixlet ID: 280374801
Fixlet Link: http://support.microsoft.com/kb/2803748

Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2803748: Failover Cluster Management snap-in crashes after you install update 2750149 on a Windows 2012-based failover cluster - Windows 8 Gold (x64) (Japanese)
Severity: N/A
Fixlet ID: 280374805
Fixlet Link: http://support.microsoft.com/kb/2803748

Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2803748: Failover Cluster Management snap-in crashes after you install update 2750149 on a Windows 2012-based failover cluster - Windows 2012 Gold (x64) (Japanese)
Severity: N/A
Fixlet ID: 280374807
Fixlet Link: http://support.microsoft.com/kb/2803748

Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2805940: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10 - Windows 2012 Gold (x64) (Japanese)
Severity: N/A
Fixlet ID: 280594001
Fixlet Link: http://support.microsoft.com/kb/2805940

Fixlet Description: Security issues have been identified that could allow an attacker to compromise a computer running Internet Explorer Flash Player for Windows Server 2012 and gain control over it.You can help protect your computer by installing this update from Microsoft.After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2805940: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10 - Windows 8 Gold (Japanese)
Severity: N/A
Fixlet ID: 280594003
Fixlet Link: http://support.microsoft.com/kb/2805940

Fixlet Description: Security issues have been identified that could allow an attacker to compromise a computer running Internet Explorer Flash Player for Windows 8 and gain control over it.You can help protect your computer by installing this update from Microsoft.After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2805940: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10 - Windows 8 Gold (x64) (Japanese)
Severity: N/A
Fixlet ID: 280594007
Fixlet Link: http://support.microsoft.com/kb/2805940

Fixlet Description: Security issues have been identified that could allow an attacker to compromise a computer running Internet Explorer Flash Player for Windows 8 x64 and gain control over it.You can help protect your computer by installing this update from Microsoft.After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2811522: Microsoft Security Advisory: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10 - Windows 2012 Gold (x64) (Japanese) (Superseded)
Severity: N/A
Fixlet ID: 281152201
Fixlet Link: http://support.microsoft.com/kb/2811522

Fixlet Description: Note: This patch has been superseded by KB2805940. Security issues have been identified that could allow an attacker to compromise a computer running Internet Explorer Flash Player for Windows Server 2012 and gain control over it.You can help protect your computer by installing this update from Microsoft.After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2811522: Microsoft Security Advisory: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10 - Windows 8 Gold (Japanese) (Superseded)
Severity: N/A
Fixlet ID: 281152203
Fixlet Link: http://support.microsoft.com/kb/2811522

Fixlet Description: Note: This patch has been superseded by KB2805940. Security issues have been identified that could allow an attacker to compromise a computer running Internet Explorer Flash Player for Windows 8 and gain control over it.You can help protect your computer by installing this update from Microsoft.After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2811522: Microsoft Security Advisory: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10 - Windows 8 Gold (x64) (Japanese) (Superseded)
Severity: N/A
Fixlet ID: 281152207
Fixlet Link: http://support.microsoft.com/kb/2811522

Fixlet Description: Note: This patch has been superseded by KB2805940. Security issues have been identified that could allow an attacker to compromise a computer running Internet Explorer Flash Player for Windows 8 x64 and gain control over it.You can help protect your computer by installing this update from Microsoft.After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: Update: Service Pack 6 for Visual Basic 6.0 - Windows XP SP3 / Windows 2003 SP2 (Japanese)
Severity: N/A
Fixlet ID: 2004032501
Fixlet Link: http://www.microsoft.com/JA-JP/download/details.aspx?id=5721

Fixlet Description: Service Pack 6 for Visual Basic 6.0 provides the latest updates to Visual Basic 6.0. It is recommended for all users of Visual Basic 6.0.



More information about the BigFix-Announcements-Japan mailing list