From autonotify at us.ibm.com Fri Feb 14 02:35:01 2014 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Fri, 14 Feb 2014 02:35:01 -0800 Subject: [BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)' Message-ID: <201402141035.s1EAZ1KL010886@d01av04.pok.ibm.com> Fixlet Site - 'Patches for Windows (Japanese)' Current Version: 551 Published: Fri, 14 Feb 2014 09:03:40 GMT New Fixlets: ============ *************************************************************** Title: MS14-005: Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure - XML Core Services 3.0 - Windows XP SP3 (Japanese) Severity: Important Fixlet ID: 1400501 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-005 Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft XML Core Services included in Microsoft Windows. The vulnerability could allow information disclosure if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to view specially crafted content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to an attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-005: Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure - XML Core Services 3.0 - Windows XP SP3 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1400502 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-005 *************************************************************** Title: MS14-005: Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure - XML Core Services 3.0 - Windows XP SP2 (x64) (Japanese) Severity: Important Fixlet ID: 1400503 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-005 Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft XML Core Services included in Microsoft Windows. The vulnerability could allow information disclosure if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to view specially crafted content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to an attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-005: Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure - XML Core Services 3.0 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1400504 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-005 *************************************************************** Title: MS14-005: Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure - XML Core Services 3.0 - Windows Server 2003 SP2 (Japanese) Severity: Low Fixlet ID: 1400505 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-005 Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft XML Core Services included in Microsoft Windows. The vulnerability could allow information disclosure if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to view specially crafted content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to an attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-005: Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure - XML Core Services 3.0 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese) Severity: Low Fixlet ID: 1400506 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-005 *************************************************************** Title: MS14-005: Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure - XML Core Services 3.0 - Windows Server 2003 SP2 (x64) (Japanese) Severity: Low Fixlet ID: 1400507 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-005 Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft XML Core Services included in Microsoft Windows. The vulnerability could allow information disclosure if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to view specially crafted content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to an attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-005: Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure - XML Core Services 3.0 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Low Fixlet ID: 1400508 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-005 *************************************************************** Title: MS14-005: Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure - XML Core Services 3.0 - Windows Vista SP2 (Japanese) Severity: Important Fixlet ID: 1400509 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-005 Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft XML Core Services included in Microsoft Windows. The vulnerability could allow information disclosure if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to view specially crafted content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to an attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-005: Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure - XML Core Services 3.0 - Windows Vista SP2 (x64) (Japanese) Severity: Important Fixlet ID: 1400511 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-005 Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft XML Core Services included in Microsoft Windows. The vulnerability could allow information disclosure if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to view specially crafted content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to an attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-005: Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure - XML Core Services 3.0 - Windows Server 2008 SP2 (Japanese) Severity: Low Fixlet ID: 1400513 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-005 Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft XML Core Services included in Microsoft Windows. The vulnerability could allow information disclosure if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to view specially crafted content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to an attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-005: Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure - XML Core Services 3.0 - Windows Server 2008 SP2 (x64) (Japanese) Severity: Low Fixlet ID: 1400515 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-005 Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft XML Core Services included in Microsoft Windows. The vulnerability could allow information disclosure if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to view specially crafted content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to an attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-005: Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure - XML Core Services 3.0 - Windows 7 SP1 (Japanese) Severity: Important Fixlet ID: 1400517 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-005 Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft XML Core Services included in Microsoft Windows. The vulnerability could allow information disclosure if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to view specially crafted content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to an attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-005: Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure - XML Core Services 3.0 - Windows 7 SP1 (x64) (Japanese) Severity: Important Fixlet ID: 1400519 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-005 Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft XML Core Services included in Microsoft Windows. The vulnerability could allow information disclosure if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to view specially crafted content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to an attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-005: Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure - XML Core Services 3.0 - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: Low Fixlet ID: 1400521 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-005 Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft XML Core Services included in Microsoft Windows. The vulnerability could allow information disclosure if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to view specially crafted content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to an attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-005: Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure - XML Core Services 3.0 - Windows 8 Gold (Japanese) Severity: Important Fixlet ID: 1400523 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-005 Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft XML Core Services included in Microsoft Windows. The vulnerability could allow information disclosure if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to view specially crafted content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to an attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-005: Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure - XML Core Services 3.0 - Windows 8 Gold (x64) (Japanese) Severity: Important Fixlet ID: 1400525 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-005 Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft XML Core Services included in Microsoft Windows. The vulnerability could allow information disclosure if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to view specially crafted content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to an attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-005: Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure - XML Core Services 3.0 - Windows 8.1 Gold (Japanese) Severity: Important Fixlet ID: 1400527 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-005 Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft XML Core Services included in Microsoft Windows. The vulnerability could allow information disclosure if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to view specially crafted content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to an attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-005: Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure - XML Core Services 3.0 - Windows 8.1 Gold (x64) (Japanese) Severity: Important Fixlet ID: 1400529 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-005 Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft XML Core Services included in Microsoft Windows. The vulnerability could allow information disclosure if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to view specially crafted content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to an attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-005: Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure - XML Core Services 3.0 - Windows Server 2012 Gold (x64) (Japanese) Severity: Low Fixlet ID: 1400531 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-005 Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft XML Core Services included in Microsoft Windows. The vulnerability could allow information disclosure if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to view specially crafted content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to an attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-005: Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure - XML Core Services 3.0 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Low Fixlet ID: 1400533 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-005 Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft XML Core Services included in Microsoft Windows. The vulnerability could allow information disclosure if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to view specially crafted content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to an attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-006: Vulnerability in IPv6 Could Allow Denial of Service - Windows 8 Gold (Japanese) Severity: Important Fixlet ID: 1400601 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-006 Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sends a large number of specially crafted IPv6 packets to an affected system. To exploit the vulnerability, an attacker's system must belong to the same subnet as the target system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-006: Vulnerability in IPv6 Could Allow Denial of Service - Windows 8 Gold (x64) (Japanese) Severity: Important Fixlet ID: 1400603 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-006 Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sends a large number of specially crafted IPv6 packets to an affected system. To exploit the vulnerability, an attacker's system must belong to the same subnet as the target system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-006: Vulnerability in IPv6 Could Allow Denial of Service - Windows Server 2012 Gold (x64) (Japanese) Severity: Important Fixlet ID: 1400605 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-006 Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sends a large number of specially crafted IPv6 packets to an affected system. To exploit the vulnerability, an attacker's system must belong to the same subnet as the target system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-007: Vulnerability in Direct2D Could Allow Remote Code Execution - Windows 7 SP1 (Japanese) Severity: Critical Fixlet ID: 1400701 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-007 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to view specially crafted content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to an attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-007: Vulnerability in Direct2D Could Allow Remote Code Execution - Windows 7 SP1 (x64) (Japanese) Severity: Critical Fixlet ID: 1400703 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-007 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to view specially crafted content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to an attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-007: Vulnerability in Direct2D Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: Critical Fixlet ID: 1400705 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-007 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to view specially crafted content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to an attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-007: Vulnerability in Direct2D Could Allow Remote Code Execution - Windows 8 Gold (Japanese) Severity: Critical Fixlet ID: 1400707 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-007 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to view specially crafted content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to an attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-007: Vulnerability in Direct2D Could Allow Remote Code Execution - Windows 8 Gold (x64) (Japanese) Severity: Critical Fixlet ID: 1400709 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-007 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to view specially crafted content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to an attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-007: Vulnerability in Direct2D Could Allow Remote Code Execution - Windows 8.1 Gold (Japanese) Severity: Critical Fixlet ID: 1400711 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-007 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to view specially crafted content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to an attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-007: Vulnerability in Direct2D Could Allow Remote Code Execution - Windows 8.1 Gold (x64) (Japanese) Severity: Critical Fixlet ID: 1400713 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-007 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to view specially crafted content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to an attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-007: Vulnerability in Direct2D Could Allow Remote Code Execution - Windows Server 2012 Gold (x64) (Japanese) Severity: Critical Fixlet ID: 1400715 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-007 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to view specially crafted content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to an attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-007: Vulnerability in Direct2D Could Allow Remote Code Execution - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Critical Fixlet ID: 1400717 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-007 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to view specially crafted content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to an attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 1.0 SP3 - KB2904878 - Tablet PC/Media Center Edition (Japanese) Severity: Important Fixlet ID: 1400901 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 1.0 SP3 - KB2904878 - Tablet PC/Media Center Edition - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1400902 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 2.0 SP2 - KB2901111 - Windows XP SP3 / Windows Server 2003 SP2 (Japanese) Severity: Important Fixlet ID: 1400903 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 2.0 SP2 - KB2898856 - Windows XP SP3 / Windows Server 2003 SP2 (Japanese) Severity: Important Fixlet ID: 1400905 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4 - KB2901110 - Windows XP SP3 / Windows Server 2003 SP2 / Windows Vista SP2 / Windows Server 2008 SP2 / Windows 7 SP1 (Japanese) Severity: Important Fixlet ID: 1400907 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4 - KB2898855 - Windows XP SP3 / Windows Server 2003 SP2 / Windows Vista SP2 / Windows Server 2008 SP2 / Windows 7 SP1 (Japanese) Severity: Important Fixlet ID: 1400909 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 2.0 SP2 - KB2901111 - Windows XP SP2 / Windows Server 2003 SP2 (x64) (Japanese) Severity: Important Fixlet ID: 1400911 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 2.0 SP2 - KB2898856 - Windows XP SP2 / Windows Server 2003 SP2 (x64) (Japanese) Severity: Important Fixlet ID: 1400913 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4 - KB2901110 - Windows XP SP2 / Server 2003 SP2 / Vista SP2 / Server 2008 SP2 / Windows 7 SP1 / 2008 R2 SP1 (x64) (Japanese) Severity: Important Fixlet ID: 1400915 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4 - KB2898855 - Windows XP SP2 / Server 2003 SP2 / Vista SP2 / Server 2008 SP2 / 7 SP1 / Server 2008 R2 SP1 (x64) (Japanese) Severity: Important Fixlet ID: 1400917 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 1.1 SP1 - KB2901115 - Windows Server 2003 SP2 (Japanese) Severity: Important Fixlet ID: 1400919 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 1.1 SP1 - KB2901115 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1400920 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 1.1 SP1 - KB2898860 - Windows Server 2003 SP2 (Japanese) Severity: Important Fixlet ID: 1400921 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 1.1 SP1 - KB2898860 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1400922 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 2.0 SP2 - KB2901113 - Windows Vista SP2 / Windows Server 2008 SP2 (Japanese) Severity: Important Fixlet ID: 1400923 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 2.0 SP2 - KB2898858 - Windows Vista SP2 / Windows Server 2008 SP2 (Japanese) Severity: Important Fixlet ID: 1400925 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 2.0 SP2 - KB2911502 - Windows Vista SP2 / Windows Server 2008 SP2 (Japanese) Severity: Important Fixlet ID: 1400927 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4.5 - KB2901118 - Windows Vista SP2 / Windows Server 2008 SP2 / Windows 7 SP1 (Japanese) Severity: Important Fixlet ID: 1400929 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4.5 - KB2898864 - Windows Vista SP2 / Windows Server 2008 SP2 / Windows 7 SP1 (Japanese) Severity: Important Fixlet ID: 1400931 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4.5.1 - KB2901126 - Windows Vista SP2 / Windows Server 2008 SP2 / Windows 7 SP1 (Japanese) Severity: Important Fixlet ID: 1400933 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4.5.1 - KB2898869 - Windows Vista SP2 / Windows Server 2008 SP2 / Windows 7 SP1 (Japanese) Severity: Important Fixlet ID: 1400935 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 2.0 SP2 - KB2901113 - Windows Vista SP2 / Windows Server 2008 SP2 (x64) (Japanese) Severity: Important Fixlet ID: 1400937 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 2.0 SP2 - KB2898858 - Windows Vista SP2 / Windows Server 2008 SP2 (x64) (Japanese) Severity: Important Fixlet ID: 1400939 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 2.0 SP2 - KB2911502 - Windows Vista SP2 / Windows Server 2008 SP2 (x64) (Japanese) Severity: Important Fixlet ID: 1400941 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4.5 - KB2901118 - Windows Vista SP2 / Windows Server 2008 SP2 / Windows 7 SP1 / Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: Important Fixlet ID: 1400943 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4.5 - KB2898864 - Windows Vista SP2 / Windows Server 2008 SP2 / Windows 7 SP1 / Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: Important Fixlet ID: 1400945 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4.5.1 - KB2901126 - Windows Vista SP2 / Windows Server 2008 SP2 / Windows 7 SP1 / Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: Important Fixlet ID: 1400947 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4.5.1 - KB2898869 - Windows Vista SP2 / Server 2008 SP2 / 7 SP1 / Server 2008 R2 SP1 (x64) (Japanese) Severity: Important Fixlet ID: 1400949 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5.1 - KB2901112 - Windows 7 SP1 (Japanese) Severity: Important Fixlet ID: 1400951 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5.1 - KB2898857 - Windows 7 SP1 (Japanese) Severity: Important Fixlet ID: 1400953 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5.1 - KB2911501 - Windows 7 SP1 (Japanese) Severity: Important Fixlet ID: 1400955 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5.1 - KB2901112 - Windows 7 SP1 / Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: Important Fixlet ID: 1400957 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5.1 - KB2898857 - Windows 7 SP1 / Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: Important Fixlet ID: 1400959 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5.1 - KB2911501 - Windows 7 SP1 / Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: Important Fixlet ID: 1400961 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5 - KB2901120 - Windows 8 Gold (Japanese) Severity: Important Fixlet ID: 1400963 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5 - KB2898866 - Windows 8 Gold (Japanese) Severity: Important Fixlet ID: 1400965 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4.5 - KB2901119 - Windows 8 Gold (Japanese) Severity: Important Fixlet ID: 1400967 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4.5 - KB2898865 - Windows 8 Gold (Japanese) Severity: Important Fixlet ID: 1400969 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4.5.1 - KB2901127 - Windows 8 Gold (Japanese) Severity: Important Fixlet ID: 1400971 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4.5.1 - KB2898870 - Windows 8 Gold (Japanese) Severity: Important Fixlet ID: 1400973 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5 - KB2901120 - Windows 8 / Windows Server 2012 Gold (x64) (Japanese) Severity: Important Fixlet ID: 1400975 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5 - KB2898866 - Windows 8 / Windows Server 2012 Gold (x64) (Japanese) Severity: Important Fixlet ID: 1400977 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4.5 - KB2901119 - Windows 8 / Windows Server 2012 Gold (x64) (Japanese) Severity: Important Fixlet ID: 1400979 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4.5 - KB2898865 - Windows 8 / Windows Server 2012 Gold (x64) (Japanese) Severity: Important Fixlet ID: 1400981 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4.5.1 - KB2901127 - Windows 8 / Windows Server 2012 Gold (x64) (Japanese) Severity: Important Fixlet ID: 1400983 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4.5.1 - KB2898870 - Windows 8 / Windows Server 2012 Gold (x64) (Japanese) Severity: Important Fixlet ID: 1400985 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5 - KB2901125 - Windows 8.1 Gold (Japanese) Severity: Important Fixlet ID: 1400987 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5 - KB2898868 - Windows 8.1 Gold (Japanese) Severity: Important Fixlet ID: 1400989 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4.5.1 - KB2901128 - Windows 8.1 Gold (Japanese) Severity: Important Fixlet ID: 1400991 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4.5.1 - KB2898871 - Windows 8.1 Gold (Japanese) Severity: Important Fixlet ID: 1400993 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5 - KB2901125 - Windows 8.1 / Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Important Fixlet ID: 1400995 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5 - KB2898868 - Windows 8.1 / Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Important Fixlet ID: 1400997 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4.5.1 - KB2901128 - Windows 8.1 / Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Important Fixlet ID: 1400999 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP3 (Japanese) Severity: Critical Fixlet ID: 1401001 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP3 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 1401002 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 1401003 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 1401004 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (Japanese) Severity: Moderate Fixlet ID: 1401005 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1401006 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (x64) (Japanese) Severity: Moderate Fixlet ID: 1401007 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1401008 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP3 (Japanese) Severity: Critical Fixlet ID: 1401009 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP3 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 1401010 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 1401011 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 1401012 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (Japanese) Severity: Moderate Fixlet ID: 1401013 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1401014 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (x64) (Japanese) Severity: Moderate Fixlet ID: 1401015 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1401016 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista SP2 (Japanese) Severity: Critical Fixlet ID: 1401017 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 1401019 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 SP2 (Japanese) Severity: Moderate Fixlet ID: 1401021 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 SP2 (x64) (Japanese) Severity: Moderate Fixlet ID: 1401023 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP3 (Japanese) Severity: Critical Fixlet ID: 1401025 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP3 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 1401026 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 1401027 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 1401028 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (Japanese) Severity: Important Fixlet ID: 1401029 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1401030 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (x64) (Japanese) Severity: Important Fixlet ID: 1401031 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1401032 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 8 - Windows Vista SP2 (Japanese) Severity: Critical Fixlet ID: 1401033 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 8 - Windows Vista SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 1401035 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 SP2 (Japanese) Severity: Important Fixlet ID: 1401037 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 SP2 (x64) (Japanese) Severity: Important Fixlet ID: 1401039 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 8 - Windows 7 SP1 (Japanese) Severity: Critical Fixlet ID: 1401041 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 8 - Windows 7 SP1 (x64) (Japanese) Severity: Critical Fixlet ID: 1401043 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: Important Fixlet ID: 1401045 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 9 - Windows Vista SP2 (Japanese) Severity: Critical Fixlet ID: 1401047 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 9 - Windows Vista SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 1401049 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 SP2 (Japanese) Severity: Important Fixlet ID: 1401051 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 SP2 (x64) (Japanese) Severity: Important Fixlet ID: 1401053 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 9 - Windows 7 SP1 (Japanese) Severity: Critical Fixlet ID: 1401055 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 9 - Windows 7 SP1 (x64) (Japanese) Severity: Critical Fixlet ID: 1401057 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: Important Fixlet ID: 1401059 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 10 - Windows 7 SP1 (Japanese) Severity: Critical Fixlet ID: 1401061 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 10 - Windows 7 SP1 (x64) (Japanese) Severity: Critical Fixlet ID: 1401063 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 10 - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: Important Fixlet ID: 1401065 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 10 - Windows 8 Gold (Japanese) Severity: Critical Fixlet ID: 1401067 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 10 - Windows 8 Gold (x64) (Japanese) Severity: Critical Fixlet ID: 1401069 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 10 - Windows Server 2012 Gold (x64) (Japanese) Severity: Important Fixlet ID: 1401071 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 11 - Windows 7 SP1 (Japanese) Severity: Critical Fixlet ID: 1401073 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 11 - Windows 7 SP1 (x64) (Japanese) Severity: Critical Fixlet ID: 1401075 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 11 - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: Important Fixlet ID: 1401077 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 11 - Windows 8.1 Gold (Japanese) Severity: Critical Fixlet ID: 1401079 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 11 - Windows 8.1 Gold (x64) (Japanese) Severity: Critical Fixlet ID: 1401081 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-010: Cumulative Security Update for Internet Explorer - IE 11 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Important Fixlet ID: 1401083 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-010 Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.6 - Windows XP SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 1401101 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.6 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 1401102 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.6 - Windows Server 2003 SP2 (Japanese) Severity: Moderate Fixlet ID: 1401103 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.6 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1401104 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.6 - Windows Server 2003 SP2 (x64) (Japanese) Severity: Moderate Fixlet ID: 1401105 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.6 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1401106 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.7 - Windows XP SP3 (Japanese) Severity: Critical Fixlet ID: 1401107 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.7 - Windows XP SP3 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 1401108 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.7 - Windows XP SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 1401109 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.7 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 1401110 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.7 - Windows Server 2003 SP2 (Japanese) Severity: Moderate Fixlet ID: 1401111 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.7 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1401112 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.7 - Windows Server 2003 SP2 (x64) (Japanese) Severity: Moderate Fixlet ID: 1401113 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.7 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1401114 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.7 - Windows Vista SP2 (Japanese) Severity: Critical Fixlet ID: 1401115 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.7 - Windows Vista SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 1401117 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.7 - Windows Server 2008 SP2 (Japanese) Severity: Moderate Fixlet ID: 1401119 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.7 - Windows Server 2008 SP2 (x64) (Japanese) Severity: Moderate Fixlet ID: 1401121 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.8 - Windows XP SP3 (Japanese) Severity: Critical Fixlet ID: 1401123 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.8 - Windows XP SP3 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 1401124 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.8 - Windows XP SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 1401125 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.8 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 1401126 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.8 - Windows Server 2003 SP2 (Japanese) Severity: Moderate Fixlet ID: 1401127 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.8 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1401128 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.8 - Windows Server 2003 SP2 (x64) (Japanese) Severity: Moderate Fixlet ID: 1401129 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.8 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1401130 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.8 - Windows Vista SP2 (Japanese) Severity: Critical Fixlet ID: 1401131 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.8 - Windows Vista SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 1401133 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.8 - Windows Server 2008 SP2 (Japanese) Severity: Moderate Fixlet ID: 1401135 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.8 - Windows Server 2008 SP2 (x64) (Japanese) Severity: Moderate Fixlet ID: 1401137 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.8 - Windows 7 SP1 (Japanese) Severity: Critical Fixlet ID: 1401139 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.8 - Windows 7 SP1 (x64) (Japanese) Severity: Critical Fixlet ID: 1401141 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.8 - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: Moderate Fixlet ID: 1401143 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.8 - Windows 7 SP1 (Japanese) Severity: Critical Fixlet ID: 1401145 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.8 - Windows 7 SP1 (x64) (Japanese) Severity: Critical Fixlet ID: 1401147 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.8 - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: Moderate Fixlet ID: 1401149 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.8 - Windows 8 Gold (Japanese) Severity: Critical Fixlet ID: 1401151 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.8 - Windows 8 Gold (x64) (Japanese) Severity: Critical Fixlet ID: 1401153 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.8 - Windows Server 2012 Gold (x64) (Japanese) Severity: Moderate Fixlet ID: 1401155 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.8 - Windows 7 SP1 (Japanese) Severity: Critical Fixlet ID: 1401157 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.8 - Windows 7 SP1 (x64) (Japanese) Severity: Critical Fixlet ID: 1401159 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.8 - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: Moderate Fixlet ID: 1401161 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.8 - Windows 8.1 Gold (Japanese) Severity: Critical Fixlet ID: 1401163 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.8 - Windows 8.1 Gold (x64) (Japanese) Severity: Critical Fixlet ID: 1401165 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - VBScript 5.8 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Moderate Fixlet ID: 1401167 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-011 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4.5.1 - KB2898871 - Windows 8.1 / Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Important Fixlet ID: 14009101 Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS14-009 Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: 2728738: You experience a long logon time when you try to log on to a Windows 7-based or a Windows Server 2008 R2-based client computer that uses roaming profiles - Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 272873801 Fixlet Link: http://support.microsoft.com/kb/2728738 Fixlet Description: A supported hotfix is available from Microsoft. However, this hotfix is intended to correct only the problem that is described in this article. Apply this hotfix only to systems that are experiencing the problem described in this article. This hotfix might receive additional testing. Therefore, if you are not severely affected by this problem, we recommend that you wait for the next software update that contains this hotfix. *************************************************************** Title: 2728738: You experience a long logon time when you try to log on to a Windows 7-based or a Windows Server 2008 R2-based client computer that uses roaming profiles - Windows 7 SP1 / Windows 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 272873803 Fixlet Link: http://support.microsoft.com/kb/2728738 Fixlet Description: A supported hotfix is available from Microsoft. However, this hotfix is intended to correct only the problem that is described in this article. Apply this hotfix only to systems that are experiencing the problem described in this article. This hotfix might receive additional testing. Therefore, if you are not severely affected by this problem, we recommend that you wait for the next software update that contains this hotfix. *************************************************************** Title: 2732673:"Delayed write failed" error message when .pst files are stored on a network file server that is running Windows 7 SP1 /Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 273267305 Fixlet Link: http://support.microsoft.com/kb/2732673 Fixlet Description: A supported hotfix is available from Microsoft. However, this hotfix is intended to correct only the problem that is described in this article. Apply this hotfix only to systems that are experiencing the problem described in this article. This hotfix might receive additional testing. Therefore, if you are not severely affected by this problem, we recommend that you wait for the next software update that contains this hotfix. *************************************************************** Title: 2732673:"Delayed write failed" error message when .pst files are stored on a network file server that is running Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 273267307 Fixlet Link: http://support.microsoft.com/kb/2732673 Fixlet Description: A supported hotfix is available from Microsoft. However, this hotfix is intended to correct only the problem that is described in this article. Apply this hotfix only to systems that are experiencing the problem described in this article. This hotfix might receive additional testing. Therefore, if you are not severely affected by this problem, we recommend that you wait for the next software update that contains this hotfix. *************************************************************** Title: 2791026: Description of the Outlook 2010 hotfix package (Outlook-x-none.msp) - Outlook 2010 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 279102603 Fixlet Link: http://support.microsoft.com/kb/2791026 Fixlet Description: A supported hotfix is available from Microsoft. However, this hotfix is intended to correct only the problem that is described in this article. Apply this hotfix only to systems that are experiencing the problem described in this article. This hotfix might receive additional testing. Therefore, if you are not severely affected by this problem, we recommend that you wait for the next software update that contains this hotfix. Issues that this hotfix package fixes After you create a new folder in the Inbox in Outlook 2010, the new folder is not selected. When you run the Publish to GAL function in Outlook 2010 and then send an encrypted message, recipients cannot open the encrypted message. *************************************************************** Title: 2791026: Description of the Outlook 2010 hotfix package (Outlook-x-none.msp) - Outlook 2010 SP1 (Japanese) Severity: N/A Fixlet ID: 279102605 Fixlet Link: http://support.microsoft.com/kb/2791026 Fixlet Description: A supported hotfix is available from Microsoft. However, this hotfix is intended to correct only the problem that is described in this article. Apply this hotfix only to systems that are experiencing the problem described in this article. This hotfix might receive additional testing. Therefore, if you are not severely affected by this problem, we recommend that you wait for the next software update that contains this hotfix. Issues that this hotfix package fixes After you create a new folder in the Inbox in Outlook 2010, the new folder is not selected. When you run the Publish to GAL function in Outlook 2010 and then send an encrypted message, recipients cannot open the encrypted message. *************************************************************** Title: 2904440: A servicing stack update is available for Windows RT 8.1, Windows 8.1 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 290444001 Fixlet Link: http://support.microsoft.com/kb/2904440 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2904440: A servicing stack update is available for Windows RT 8.1, Windows 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 290444003 Fixlet Link: http://support.microsoft.com/kb/2904440 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2904440: A servicing stack update is available for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 290444005 Fixlet Link: http://support.microsoft.com/kb/2904440 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2913431: Update fixes an issue that causes Windows to crash - Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 291343101 Fixlet Link: http://support.microsoft.com/kb/2913431 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2913431: Update fixes an issue that causes Windows to crash - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 291343103 Fixlet Link: http://support.microsoft.com/kb/2913431 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2913431: Update fixes an issue that causes Windows to crash - Windows 7 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 291343105 Fixlet Link: http://support.microsoft.com/kb/2913431 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2929825: Microsoft Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer: February 4, 2014 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 292982503 Fixlet Link: http://support.microsoft.com/kb/2929825 Fixlet Description: This update addresses the vulnerability discussed in Microsoft Security Advisory (KB2929825). To find out if other security updates are available for you, see the Additional Information section at the bottom of this page. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2929825: Microsoft Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer: February 4, 2014 - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 292982505 Fixlet Link: http://support.microsoft.com/kb/2929825 Fixlet Description: This update addresses the vulnerability discussed in Microsoft Security Advisory (KB2929825).To find out if other security updates are available for you, see the Additional Information section at the bottom of this page. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2929825: Microsoft Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer: February 4, 2014 - Windows Server 2012 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 292982507 Fixlet Link: http://support.microsoft.com/kb/2929825 Fixlet Description: This update addresses the vulnerability discussed in Microsoft Security Advisory (KB2929825).To find out if other security updates are available for you, see the Additional Information section at the bottom of this page. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2929825: Microsoft Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer: February 4, 2014 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 292982509 Fixlet Link: http://support.microsoft.com/kb/2929825 Fixlet Description: This update addresses the vulnerability discussed in Microsoft Security Advisory (KB2929825). To find out if other security updates are available for you, see the Additional Information section at the bottom of this page. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2929825: Microsoft Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer: February 4, 2014 - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 292982511 Fixlet Link: http://support.microsoft.com/kb/2929825 Fixlet Description: This update addresses the vulnerability discussed in Microsoft Security Advisory (KB2929825).To find out if other security updates are available for you, see the Additional Information section at the bottom of this page. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2929825: Microsoft Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer: February 4, 2014 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 292982513 Fixlet Link: http://support.microsoft.com/kb/2929825 Fixlet Description: This update addresses the vulnerability discussed in Microsoft Security Advisory (KB2929825). To find out if other security updates are available for you, see the Additional Information section at the bottom of this page. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. From autonotify at us.ibm.com Thu Feb 27 02:32:02 2014 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Thu, 27 Feb 2014 02:32:02 -0800 Subject: [BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)' Message-ID: <201402271032.s1RAW2P9002470@d01av02.pok.ibm.com> Fixlet Site - 'Patches for Windows (Japanese)' Current Version: 552 Published: Wed, 26 Feb 2014 14:15:18 GMT New Fixlets: ============ *************************************************************** Title: 2687404: Description of the Outlook 2007 update - Office 2007 (Japanese) Severity: N/A Fixlet ID: 268740401 Fixlet Link: http://support.microsoft.com/kb/2687404 Fixlet Description: Microsoft has released an update for Microsoft Office Outlook 2007 . This update provides the latest fixes to Microsoft Office Outlook 2007 . Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2687567: Description of the Outlook 2010 update 2687567 - Office 2010 (x64) (Japanese) Severity: N/A Fixlet ID: 268756701 Fixlet Link: http://support.microsoft.com/kb/2687567 Fixlet Description: Microsoft has released an update for Microsoft Outlook 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Outlook 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2687567: Description of the Outlook 2010 update 2687567 - Office 2010 (Japanese) Severity: N/A Fixlet ID: 268756703 Fixlet Link: http://support.microsoft.com/kb/2687567 Fixlet Description: Microsoft has released an update for Microsoft Outlook 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Outlook 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2713128: A network printer is displayed incorrectly as offline on a computer that is running Windows 7 or Windows Server 2008 R2 - Windows 7 Gold/SP1 (Japanese) Severity: N/A Fixlet ID: 271312801 Fixlet Link: http://support.microsoft.com/kb/2713128 Fixlet Description: A supported hotfix is available from Microsoft. However, this hotfix is intended to correct only the problem that is described in this article. Apply this hotfix only to systems that are experiencing the problem described in this article. This hotfix might receive additional testing. Therefore, if you are not severely affected by this problem, we recommend that you wait for the next software update that contains this hotfix. *************************************************************** Title: 2713128: A network printer is displayed incorrectly as offline on a computer that is running Windows 7 or Windows Server 2008 R2 - Windows 7 Gold/SP1 / Windows 2008 R2 Gold/SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 271312803 Fixlet Link: http://support.microsoft.com/kb/2713128 Fixlet Description: A supported hotfix is available from Microsoft. However, this hotfix is intended to correct only the problem that is described in this article. Apply this hotfix only to systems that are experiencing the problem described in this article. This hotfix might receive additional testing. Therefore, if you are not severely affected by this problem, we recommend that you wait for the next software update that contains this hotfix. *************************************************************** Title: 2760601: Description of the SharePoint Workspace 2010 update 2760601 - Office 2010 (x64) (Japanese) Severity: N/A Fixlet ID: 276060101 Fixlet Link: http://support.microsoft.com/kb/2760601 Fixlet Description: Microsoft has released an update for Microsoft SharePoint Workspace 2010 64-Bit Edition. This update provides the latest fixes to Microsoft SharePoint Workspace 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2760601: Description of the SharePoint Workspace 2010 update 2760601 - Office 2010 (Japanese) Severity: N/A Fixlet ID: 276060103 Fixlet Link: http://support.microsoft.com/kb/2760601 Fixlet Description: Microsoft has released an update for Microsoft SharePoint Workspace 2010 32-Bit Edition. This update provides the latest fixes to Microsoft SharePoint Workspace 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2775360: Description of the PowerPoint 2010 update 2775360 - Office 2010 (Japanese) Severity: N/A Fixlet ID: 277536001 Fixlet Link: http://support.microsoft.com/kb/2775360 Fixlet Description: Microsoft has released an update for Microsoft PowerPoint 2010 32-Bit Edition. This update provides the latest fixes to Microsoft PowerPoint 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2775360: Description of the PowerPoint 2010 update 2775360 - Office 2010 (x64) (Japanese) Severity: N/A Fixlet ID: 277536003 Fixlet Link: http://support.microsoft.com/kb/2775360 Fixlet Description: Microsoft has released an update for Microsoft PowerPoint 2010 64-Bit Edition. This update provides the latest fixes to Microsoft PowerPoint 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2817369: Description of the InfoPath 2010 update 2817369 - Office 2010 (x64) (Japanese) Severity: N/A Fixlet ID: 281736901 Fixlet Link: http://support.microsoft.com/kb/2817369 Fixlet Description: Microsoft has released an update for Microsoft InfoPath 2010 64-Bit Edition. This update provides the latest fixes to Microsoft InfoPath 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2817369: Description of the InfoPath 2010 update 2817369 - Office 2010 (Japanese) Severity: N/A Fixlet ID: 281736903 Fixlet Link: http://support.microsoft.com/kb/2817369 Fixlet Description: Microsoft has released an update for Microsoft InfoPath 2010 32-Bit Edition. This update provides the latest fixes to Microsoft InfoPath 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2817396: Description of the InfoPath 2010 update 2817396 - Office 2010 (x64) (Japanese) Severity: N/A Fixlet ID: 281739601 Fixlet Link: http://support.microsoft.com/kb/2817396 Fixlet Description: Microsoft has released an update for Microsoft InfoPath 2010 64-Bit Edition. This update provides the latest fixes to Microsoft InfoPath 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2817396: Description of the InfoPath 2010 update 2817396 - Office 2010 (Japanese) Severity: N/A Fixlet ID: 281739603 Fixlet Link: http://support.microsoft.com/kb/2817396 Fixlet Description: Microsoft has released an update for Microsoft InfoPath 2010 32-Bit Edition. This update provides the latest fixes to Microsoft InfoPath 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2817479: Description of the Visio 2010 update 2817479 - Office 2010 (Japanese) Severity: N/A Fixlet ID: 281747901 Fixlet Link: http://support.microsoft.com/kb/2817479 Fixlet Description: Microsoft has released an update for Microsoft Visio 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Visio 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2817479: Description of the Visio 2010 update 2817479 - Office 2010 (x64) (Japanese) Severity: N/A Fixlet ID: 281747903 Fixlet Link: http://support.microsoft.com/kb/2817479 Fixlet Description: Microsoft has released an update for Microsoft Visio 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Visio 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2836940: An update is available for the .NET Framework 3.5 SP1 - Windows Server 2003 SP2 / Windows Server 2008 SP2 / Windows Vista SP2 / Windows XP SP3 (Japanese) Severity: N/A Fixlet ID: 283694011 Fixlet Link: http://support.microsoft.com/kb/2836940 Fixlet Description: Update for Microsoft .NET Framework 3.5 Service Pack 1 on Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008 - KB2836940 After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2836940: An update is available for the .NET Framework 3.5 SP1 - Windows Server 2003 SP2 / Windows Server 2008 SP2 / Windows Vista SP2 / Windows XP SP2 (x64) (Japanese) Severity: N/A Fixlet ID: 283694013 Fixlet Link: http://support.microsoft.com/kb/2836940 Fixlet Description: Update for Microsoft .NET Framework 3.5 Service Pack 1 on Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008 - KB2836940 After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2836942: Update for the .NET Framework 3.5.1 on Windows 7 SP1 and Windows Server 2008 R2 SP1 - Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 283694201 Fixlet Link: http://support.microsoft.com/kb/2836942 Fixlet Description: Update for Microsoft .NET Framework 3.5.1 on Windows 7 Service Pack 1 and Windows Server 2008 R2 Service Pack 1 - KB2836942 After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2836942: Update for the .NET Framework 3.5.1 on Windows 7 SP1 and Windows Server 2008 R2 SP1 - Windows 7 SP1 / Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 283694203 Fixlet Link: http://support.microsoft.com/kb/2836942 Fixlet Description: Update for Microsoft .NET Framework 3.5.1 on Windows 7 Service Pack 1 and Windows Server 2008 R2 Service Pack 1 - KB2836942 After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2836945: An update is available for the .NET Framework 2.0 SP2 on Windows Server 2008 SP2 - Windows Server 2008 SP2 (x64) (Japanese) Severity: N/A Fixlet ID: 283694501 Fixlet Link: http://support.microsoft.com/kb/2836945 Fixlet Description: Update for Microsoft .NET Framework 3.5 Service Pack 1 on Windows Server 2008 Service Pack 2 - KB2836945 After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2836945: An update is available for the .NET Framework 2.0 SP2 on Windows Server 2008 SP2 - Windows Server 2008 SP2 (Japanese) Severity: N/A Fixlet ID: 283694503 Fixlet Link: http://support.microsoft.com/kb/2836945 Fixlet Description: Update for Microsoft .NET Framework 3.5 Service Pack 1 on Windows Server 2008 Service Pack 2 - KB2836945 After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2836946: An update is available for the .NET Framework 3.5 on Windows 8 and Windows Server 2012 - Windows 8 Gold / Windows Server 2012 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 283694601 Fixlet Link: http://support.microsoft.com/kb/2836946 Fixlet Description: Update for Microsoft .NET Framework 3.5 on Windows 8 and Windows Server 2012 - KB2836946 After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2836946: An update is available for the .NET Framework 3.5 on Windows 8 and Windows Server 2012 - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 283694603 Fixlet Link: http://support.microsoft.com/kb/2836946 Fixlet Description: Update for Microsoft .NET Framework 3.5 on Windows 8 and Windows Server 2012 - KB2836946 After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2836947: An update is available for the .NET Framework 3.5 on Windows 8 and Windows Server 2012 - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 283694701 Fixlet Link: http://support.microsoft.com/kb/2836947 Fixlet Description: Update for Microsoft .NET Framework 3.5 on Windows 8 and Windows Server 2012 - KB2836947 After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2836947: An update is available for the .NET Framework 3.5 on Windows 8 and Windows Server 2012 - Windows 8 Gold / Windows Server 2012 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 283694703 Fixlet Link: http://support.microsoft.com/kb/2836947 Fixlet Description: Update for Microsoft .NET Framework 3.5 on Windows 8 and Windows Server 2012 - KB2836947 After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2837583: Description of the Office 2010 update 2837583 - Office 2010 (Japanese) Severity: N/A Fixlet ID: 283758301 Fixlet Link: http://support.microsoft.com/kb/2837583 Fixlet Description: Microsoft has released an update for Microsoft Office 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2837583: Description of the Office 2010 update 2837583 - Office 2010 (x64) (Japanese) Severity: N/A Fixlet ID: 283758303 Fixlet Link: http://support.microsoft.com/kb/2837583 Fixlet Description: Microsoft has released an update for Microsoft Office 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2837595: Description of the OneNote 2010 update 2837595 - Office 2010 (x64) (Japanese) Severity: N/A Fixlet ID: 283759501 Fixlet Link: http://support.microsoft.com/kb/2837595 Fixlet Description: Microsoft has released an update for Microsoft OneNote 2010 64-Bit Edition. This update provides the latest fixes to Microsoft OneNote 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2837595: Description of the OneNote 2010 update 2837595 - Office 2010 (Japanese) Severity: N/A Fixlet ID: 283759503 Fixlet Link: http://support.microsoft.com/kb/2837595 Fixlet Description: Microsoft has released an update for Microsoft OneNote 2010 32-Bit Edition. This update provides the latest fixes to Microsoft OneNote 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2911101: Windows RT, Windows 8, and Windows Server 2012 update rollup - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 291110101 Fixlet Link: http://support.microsoft.com/kb/2911101 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2911101: Windows RT, Windows 8, and Windows Server 2012 update rollup - Windows Server 2012 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 291110103 Fixlet Link: http://support.microsoft.com/kb/2911101 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2911101: Windows RT, Windows 8, and Windows Server 2012 update rollup - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 291110105 Fixlet Link: http://support.microsoft.com/kb/2911101 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2911106: Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 update rollup - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 291110601 Fixlet Link: http://support.microsoft.com/kb/2911106 Fixlet Description: These updates (*.msu) provide a collection of performance and reliability improvements that are designed to improve the Windows 8.1 experience. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2911106: Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 update rollup - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 291110603 Fixlet Link: http://support.microsoft.com/kb/2911106 Fixlet Description: These updates (*.msu) provide a collection of performance and reliability improvements that are designed to improve the Windows 8.1 experience. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2911106: Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 update rollup - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 291110605 Fixlet Link: http://support.microsoft.com/kb/2911106 Fixlet Description: These updates (*.msu) provide a collection of performance and reliability improvements that are designed to improve the Windows Server 2012 R2 experience. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2911106: Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 update rollup - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 291110607 Fixlet Link: http://support.microsoft.com/kb/2911106 Fixlet Description: These updates (*.msu) provide a collection of performance and reliability improvements that are designed to improve the Windows Server 2012 R2 experience. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2911106: Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 update rollup - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 291110609 Fixlet Link: http://support.microsoft.com/kb/2911106 Fixlet Description: These updates (*.msu) provide a collection of performance and reliability improvements that are designed to improve the Windows 8.1 experience. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2911106: Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 update rollup - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 291110611 Fixlet Link: http://support.microsoft.com/kb/2911106 Fixlet Description: These updates (*.msu) provide a collection of performance and reliability improvements that are designed to improve the Windows 8.1 experience. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2913751: Smart card redirection in remote sessions fails in a Windows 7 SP1-based RDP 8.1 client - Windows 7 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 291375101 Fixlet Link: http://support.microsoft.com/kb/2913751 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2913751: Smart card redirection in remote sessions fails in a Windows 7 SP1-based RDP 8.1 client - Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 291375103 Fixlet Link: http://support.microsoft.com/kb/2913751 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2913751: Smart card redirection in remote sessions fails in a Windows 7 SP1-based RDP 8.1 client - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 291375105 Fixlet Link: http://support.microsoft.com/kb/2913751 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2922474: Unexpected DPI appears when a Windows 8.1-based device that has iSCT enabled resumes from sleep - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 292247401 Fixlet Link: http://support.microsoft.com/kb/2922474 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2922474: Unexpected DPI appears when a Windows 8.1-based device that has iSCT enabled resumes from sleep - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 292247403 Fixlet Link: http://support.microsoft.com/kb/2922474 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2922474: Unexpected DPI appears when a Windows 8.1-based device that has iSCT enabled resumes from sleep - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 292247405 Fixlet Link: http://support.microsoft.com/kb/2922474 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2934088: Vulnerability in Internet Explorer could allow remote code execution - Enable MSHTML Shim Workaround - IE 9 / 10 (Japanese) Severity: N/A Fixlet ID: 293408801 Fixlet Link: http://technet.microsoft.com/JA-JP/security/advisory/2934088 Fixlet Description: Microsoft is investigating public reports of a vulnerability in all supported versions of Internet Explorer. Microsoft is aware of targeted attacks that attempt to exploit this vulnerability in Internet Explorer 8 and Internet Explorer 9. Applying the Microsoft Fix it solution, "CVE-2013-3893 MSHTML Shim Workaround," prevents the exploitation of this issue. The vulnerability is a remote code execution vulnerability. The vulnerability exists in the way that Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated. The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer. An attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website. *************************************************************** Title: 2934088: Vulnerability in Internet Explorer could allow remote code execution - Disable MSHTML Shim Workaround - IE 9 / 10 (Japanese) Severity: N/A Fixlet ID: 293408803 Fixlet Link: http://technet.microsoft.com/JA-JP/security/advisory/2934088 Fixlet Description: Microsoft is aware of limited, targeted attacks that attempt to exploit a vulnerability in Internet Explorer 10. Only Internet Explorer 9 and Internet Explorer 10 are affected by this vulnerability. Other supported versions of Internet Explorer are not affected. Applying the Microsoft Fix it solution, "MSHTML Shim Workaround," prevents the exploitation of this issue. See the Suggested Actions section of this advisory for more information. The vulnerability is a remote code execution vulnerability. The vulnerability exists in the way that Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated. The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer. An attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website. *************************************************************** Title: 2934802: Microsoft Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 293480201 Fixlet Link: http://support.microsoft.com/kb/2934802 Fixlet Description: This update addresses the vulnerability discussed in Microsoft Security Advisory (KB2934802). To find out if other security updates are available for you, see the Additional Information section at the bottom of this page. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2934802: Microsoft Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 293480203 Fixlet Link: http://support.microsoft.com/kb/2934802 Fixlet Description: This update addresses the vulnerability discussed in Microsoft Security Advisory (KB2934802). To find out if other security updates are available for you, see the Additional Information section at the bottom of this page. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2934802: Microsoft Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows Server 2012 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 293480205 Fixlet Link: http://support.microsoft.com/kb/2934802 Fixlet Description: This update addresses the vulnerability discussed in Microsoft Security Advisory (KB2934802).To find out if other security updates are available for you, see the Additional Information section at the bottom of this page. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2934802: Microsoft Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 293480207 Fixlet Link: http://support.microsoft.com/kb/2934802 Fixlet Description: This update addresses the vulnerability discussed in Microsoft Security Advisory (KB2934802).To find out if other security updates are available for you, see the Additional Information section at the bottom of this page. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2934802: Microsoft Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 293480209 Fixlet Link: http://support.microsoft.com/kb/2934802 Fixlet Description: This update addresses the vulnerability discussed in Microsoft Security Advisory (KB2934802).To find out if other security updates are available for you, see the Additional Information section at the bottom of this page. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2934802: Microsoft Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 293480211 Fixlet Link: http://support.microsoft.com/kb/2934802 Fixlet Description: This update addresses the vulnerability discussed in Microsoft Security Advisory (KB2934802). To find out if other security updates are available for you, see the Additional Information section at the bottom of this page. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.