From autonotify at us.ibm.com Fri Nov 7 02:38:42 2014 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Fri, 7 Nov 2014 02:38:42 -0800 Subject: [BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)' Message-ID: <201411071038.sA7Achr4024487@d01av02.pok.ibm.com> Fixlet Site - 'Patches for Windows (Japanese)' Current Version: 614 Published: Thu, 06 Nov 2014 09:48:55 GMT New Fixlets: ============ *************************************************************** Title: 940349: Availability of a Volume Shadow Copy Service (VSS) update rollup package for Windows Server 2003 to resolve some VSS snapshot issues - Windows Server 2003 SP1/SP2 (x64) (Japanese) Severity: N/A Fixlet ID: 94034901 Fixlet Link: http://support.microsoft.com/kb/940349 Fixlet Description: Install this update to improve the reliability, scalability, and memory optimization of the Volume Shadow Copy Service (VSS) in Windows Server 2003. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 940349: Availability of a Volume Shadow Copy Service (VSS) update rollup package for Windows Server 2003 to resolve some VSS snapshot issues - Windows Server 2003 SP1/SP2 (Japanese) Severity: N/A Fixlet ID: 94034905 Fixlet Link: http://support.microsoft.com/kb/940349 Fixlet Description: Install this update to improve the reliability, scalability, and memory optimization of the Volume Shadow Copy Service (VSS) in Windows Server 2003. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2806748: Incorrect results when you run AD Windows PowerShell cmdlets on a Windows Server 2012 or Windows Server 2008 R2-based domain controller - Windows 2008 R2 Gold/SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 280674801 Fixlet Link: http://support.microsoft.com/kb/2806748 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2808208: Exchange Server 2010 Service Pack 3 Available (x64) (Japanese) Severity: N/A Fixlet ID: 280820801 Fixlet Link: http://support.microsoft.com/kb/2808208 Fixlet Description: Service Pack 3 for Exhchange Server 2010 64-Bit Edition contains new updates. Important Note: Due to the complexity of the installation, this update must be completed manually. *************************************************************** Title: 2961522: Update Rollup 7 for Exchange Server 2010 Service Pack 3 - Exchange Server 2010 SP3 (x64) (Japanese) Severity: N/A Fixlet ID: 296152201 Fixlet Link: http://support.microsoft.com/kb/2961522 Fixlet Description: Update Rollup 7 For Exchange 2010 SP3 contains new updates. Important Note: Due to the complexity of the installation, this update must be completed manually. *************************************************************** Title: 2961810: Cumulative Update 6 for Exchange Server 2013 - Exchange Server 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 296181001 Fixlet Link: http://support.microsoft.com/kb/2961810 Fixlet Description: Cumulative Update 6 for Exchange Server 2013 contains new updates. Important Note: Due to the complexity of the installation, this update must be completed manually. *************************************************************** Title: 3001652: Update rollup for Visual Studio 2010 Tools for Office Runtime (Japanese) Severity: N/A Fixlet ID: 300165201 Fixlet Link: http://support.microsoft.com/kb/3001652 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. From autonotify at us.ibm.com Fri Nov 14 02:34:20 2014 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Fri, 14 Nov 2014 02:34:20 -0800 Subject: [BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)' Message-ID: <201411141034.sAEAYLwF007295@d01av04.pok.ibm.com> Fixlet Site - 'Patches for Windows (Japanese)' Current Version: 616 Published: Thu, 13 Nov 2014 09:33:19 GMT New Fixlets: ============ *************************************************************** Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3006226 (x64) (Japanese) Severity: Critical Fixlet ID: 1406401 Fixlet Link: http://technet.microsoft.com/library/security/MS14-064 Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Server 2012 R2 Gold - KB3006226 (x64) (Japanese) Severity: Critical Fixlet ID: 1406403 Fixlet Link: http://technet.microsoft.com/library/security/MS14-064 Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB3006226 (x64) (Japanese) Severity: Critical Fixlet ID: 1406405 Fixlet Link: http://technet.microsoft.com/library/security/MS14-064 Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3006226 (Japanese) Severity: Critical Fixlet ID: 1406407 Fixlet Link: http://technet.microsoft.com/library/security/MS14-064 Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Server 2012 Gold - KB3006226 (x64) (Japanese) Severity: Critical Fixlet ID: 1406409 Fixlet Link: http://technet.microsoft.com/library/security/MS14-064 Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Vista SP2 - KB3006226 (x64) (Japanese) Severity: Critical Fixlet ID: 1406411 Fixlet Link: http://technet.microsoft.com/library/security/MS14-064 Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows 7 SP1 - KB3006226 (x64) (Japanese) Severity: Critical Fixlet ID: 1406413 Fixlet Link: http://technet.microsoft.com/library/security/MS14-064 Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3006226 (x64) (Japanese) Severity: Critical Fixlet ID: 1406415 Fixlet Link: http://technet.microsoft.com/library/security/MS14-064 Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3006226 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 1406416 Fixlet Link: http://technet.microsoft.com/library/security/MS14-064 *************************************************************** Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows 7 SP1 - KB3010788 (Japanese) Severity: Critical Fixlet ID: 1406417 Fixlet Link: http://technet.microsoft.com/library/security/MS14-064 Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows 8 Gold - KB3006226 (x64) (Japanese) Severity: Critical Fixlet ID: 1406419 Fixlet Link: http://technet.microsoft.com/library/security/MS14-064 Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Server 2012 Gold - KB3010788 (x64) (Japanese) Severity: Critical Fixlet ID: 1406421 Fixlet Link: http://technet.microsoft.com/library/security/MS14-064 Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Vista SP2 - KB3006226 (Japanese) Severity: Critical Fixlet ID: 1406423 Fixlet Link: http://technet.microsoft.com/library/security/MS14-064 Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows 8 Gold - KB3010788 (x64) (Japanese) Severity: Critical Fixlet ID: 1406425 Fixlet Link: http://technet.microsoft.com/library/security/MS14-064 Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows 8 Gold - KB3006226 (Japanese) Severity: Critical Fixlet ID: 1406427 Fixlet Link: http://technet.microsoft.com/library/security/MS14-064 Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3010788 (x64) (Japanese) Severity: Critical Fixlet ID: 1406429 Fixlet Link: http://technet.microsoft.com/library/security/MS14-064 Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows 7 SP1 - KB3010788 (x64) (Japanese) Severity: Critical Fixlet ID: 1406431 Fixlet Link: http://technet.microsoft.com/library/security/MS14-064 Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3010788 (Japanese) Severity: Critical Fixlet ID: 1406433 Fixlet Link: http://technet.microsoft.com/library/security/MS14-064 Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows 8.1 Gold - KB3006226 (Japanese) Severity: Critical Fixlet ID: 1406435 Fixlet Link: http://technet.microsoft.com/library/security/MS14-064 Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows 8 Gold - KB3010788 (Japanese) Severity: Critical Fixlet ID: 1406437 Fixlet Link: http://technet.microsoft.com/library/security/MS14-064 Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Vista SP2 - KB3010788 (x64) (Japanese) Severity: Critical Fixlet ID: 1406439 Fixlet Link: http://technet.microsoft.com/library/security/MS14-064 Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows 8.1 Gold - KB3010788 (Japanese) Severity: Critical Fixlet ID: 1406441 Fixlet Link: http://technet.microsoft.com/library/security/MS14-064 Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Server 2012 R2 Gold - KB3010788 (x64) (Japanese) Severity: Critical Fixlet ID: 1406443 Fixlet Link: http://technet.microsoft.com/library/security/MS14-064 Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows 8.1 Gold - KB3010788 (x64) (Japanese) Severity: Critical Fixlet ID: 1406445 Fixlet Link: http://technet.microsoft.com/library/security/MS14-064 Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows 7 SP1 - KB3006226 (Japanese) Severity: Critical Fixlet ID: 1406447 Fixlet Link: http://technet.microsoft.com/library/security/MS14-064 Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows 8.1 Gold - KB3006226 (x64) (Japanese) Severity: Critical Fixlet ID: 1406449 Fixlet Link: http://technet.microsoft.com/library/security/MS14-064 Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Vista SP2 - KB3010788 (Japanese) Severity: Critical Fixlet ID: 1406451 Fixlet Link: http://technet.microsoft.com/library/security/MS14-064 Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3006226 (Japanese) Severity: Critical Fixlet ID: 1406453 Fixlet Link: http://technet.microsoft.com/library/security/MS14-064 Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3006226 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 1406454 Fixlet Link: http://technet.microsoft.com/library/security/MS14-064 *************************************************************** Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB3010788 (x64) (Japanese) Severity: Critical Fixlet ID: 1406455 Fixlet Link: http://technet.microsoft.com/library/security/MS14-064 Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 8 - KB3003057 (x64) (Japanese) Severity: Moderate Fixlet ID: 1406501 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 7 - KB3003057 (x64) (Japanese) Severity: Moderate Fixlet ID: 1406503 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 7 - KB3003057 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1406504 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 8 - KB3003057 (x64) (Japanese) Severity: Critical Fixlet ID: 1406505 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2012 Gold - IE 10 - KB3003057 (x64) (Japanese) Severity: Moderate Fixlet ID: 1406507 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 11 - KB3003057 (x64) (Japanese) Severity: Critical Fixlet ID: 1406509 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 7 - KB3003057 (Japanese) Severity: Moderate Fixlet ID: 1406511 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 7 - KB3003057 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1406512 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 9 - KB3003057 (x64) (Japanese) Severity: Critical Fixlet ID: 1406513 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 11 - KB3003057 (Japanese) Severity: Critical Fixlet ID: 1406515 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 10 - KB3003057 (x64) (Japanese) Severity: Critical Fixlet ID: 1406517 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 9 - KB3003057 (Japanese) Severity: Moderate Fixlet ID: 1406519 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 8 - KB3003057 (Japanese) Severity: Critical Fixlet ID: 1406521 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 9 - KB3003057 (x64) (Japanese) Severity: Moderate Fixlet ID: 1406523 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 6 - KB3003057 (Japanese) Severity: Moderate Fixlet ID: 1406525 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 6 - KB3003057 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1406526 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 7 - KB3003057 (x64) (Japanese) Severity: Critical Fixlet ID: 1406527 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 9 - KB3003057 (Japanese) Severity: Critical Fixlet ID: 1406529 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 11 - KB3003057 (x64) (Japanese) Severity: Moderate Fixlet ID: 1406531 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows 8.1 Gold - IE 11 - KB3003057 (Japanese) Severity: Critical Fixlet ID: 1406533 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 10 - KB3003057 (x64) (Japanese) Severity: Moderate Fixlet ID: 1406535 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 6 - KB3003057 (x64) (Japanese) Severity: Moderate Fixlet ID: 1406537 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 6 - KB3003057 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1406538 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 7 - KB3003057 (Japanese) Severity: Moderate Fixlet ID: 1406539 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows 8.1 Gold - IE 11 - KB3003057 (x64) (Japanese) Severity: Critical Fixlet ID: 1406541 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 10 - KB3003057 (Japanese) Severity: Critical Fixlet ID: 1406543 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows 8 Gold - IE 10 - KB3003057 (Japanese) Severity: Critical Fixlet ID: 1406545 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 7 - KB3003057 (x64) (Japanese) Severity: Moderate Fixlet ID: 1406547 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 9 - KB3003057 (x64) (Japanese) Severity: Critical Fixlet ID: 1406549 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows 8 Gold - IE 10 - KB3003057 (x64) (Japanese) Severity: Critical Fixlet ID: 1406551 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2012 R2 Gold - IE 11 - KB3003057 (x64) (Japanese) Severity: Moderate Fixlet ID: 1406553 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 9 - KB3003057 (x64) (Japanese) Severity: Moderate Fixlet ID: 1406555 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 7 - KB3003057 (Japanese) Severity: Critical Fixlet ID: 1406557 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 9 - KB3003057 (Japanese) Severity: Critical Fixlet ID: 1406559 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 8 - KB3003057 (Japanese) Severity: Moderate Fixlet ID: 1406561 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 8 - KB3003057 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1406562 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 8 - KB3003057 (x64) (Japanese) Severity: Moderate Fixlet ID: 1406563 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 8 - KB3003057 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1406564 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 8 - KB3003057 (Japanese) Severity: Critical Fixlet ID: 1406565 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 8 - KB3003057 (x64) (Japanese) Severity: Critical Fixlet ID: 1406567 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 8 - KB3003057 (Japanese) Severity: Moderate Fixlet ID: 1406569 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 8 - KB3003057 (x64) (Japanese) Severity: Moderate Fixlet ID: 1406571 Fixlet Link: http://technet.microsoft.com/library/security/MS14-065 Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows 8.1 Gold - KB2992611 (x64) (Japanese) Severity: Critical Fixlet ID: 1406601 Fixlet Link: http://technet.microsoft.com/library/security/MS14-066 Fixlet Description: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB2992611 (x64) (Japanese) Severity: Critical Fixlet ID: 1406603 Fixlet Link: http://technet.microsoft.com/library/security/MS14-066 Fixlet Description: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB2992611 (x64) (Japanese) Severity: Critical Fixlet ID: 1406605 Fixlet Link: http://technet.microsoft.com/library/security/MS14-066 Fixlet Description: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB2992611 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 1406606 Fixlet Link: http://technet.microsoft.com/library/security/MS14-066 *************************************************************** Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB2992611 (Japanese) Severity: Critical Fixlet ID: 1406607 Fixlet Link: http://technet.microsoft.com/library/security/MS14-066 Fixlet Description: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB2992611 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 1406608 Fixlet Link: http://technet.microsoft.com/library/security/MS14-066 *************************************************************** Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB2992611 (x64) (Japanese) Severity: Critical Fixlet ID: 1406609 Fixlet Link: http://technet.microsoft.com/library/security/MS14-066 Fixlet Description: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB2992611 (Japanese) Severity: Critical Fixlet ID: 1406611 Fixlet Link: http://technet.microsoft.com/library/security/MS14-066 Fixlet Description: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows 7 SP1 - KB2992611 (Japanese) Severity: Critical Fixlet ID: 1406613 Fixlet Link: http://technet.microsoft.com/library/security/MS14-066 Fixlet Description: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows Server 2012 R2 Gold - KB2992611 (x64) (Japanese) Severity: Critical Fixlet ID: 1406615 Fixlet Link: http://technet.microsoft.com/library/security/MS14-066 Fixlet Description: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows Vista SP2 - KB2992611 (x64) (Japanese) Severity: Critical Fixlet ID: 1406617 Fixlet Link: http://technet.microsoft.com/library/security/MS14-066 Fixlet Description: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows 8 Gold - KB2992611 (Japanese) Severity: Critical Fixlet ID: 1406619 Fixlet Link: http://technet.microsoft.com/library/security/MS14-066 Fixlet Description: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows Vista SP2 - KB2992611 (Japanese) Severity: Critical Fixlet ID: 1406621 Fixlet Link: http://technet.microsoft.com/library/security/MS14-066 Fixlet Description: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows 8 Gold - KB2992611 (x64) (Japanese) Severity: Critical Fixlet ID: 1406623 Fixlet Link: http://technet.microsoft.com/library/security/MS14-066 Fixlet Description: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows Server 2012 Gold - KB2992611 (x64) (Japanese) Severity: Critical Fixlet ID: 1406625 Fixlet Link: http://technet.microsoft.com/library/security/MS14-066 Fixlet Description: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows 8.1 Gold - KB2992611 (Japanese) Severity: Critical Fixlet ID: 1406627 Fixlet Link: http://technet.microsoft.com/library/security/MS14-066 Fixlet Description: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows 7 SP1 - KB2992611 (x64) (Japanese) Severity: Critical Fixlet ID: 1406629 Fixlet Link: http://technet.microsoft.com/library/security/MS14-066 Fixlet Description: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows 8 Gold - KB2993958 (Japanese) Severity: Critical Fixlet ID: 1406701 Fixlet Link: http://technet.microsoft.com/library/security/MS14-067 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a logged-on user visits a specially crafted website that is designed to invoke Microsoft XML Core Services (MSXML) through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows Vista SP2 - KB2993958 (x64) (Japanese) Severity: Critical Fixlet ID: 1406703 Fixlet Link: http://technet.microsoft.com/library/security/MS14-067 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a logged-on user visits a specially crafted website that is designed to invoke Microsoft XML Core Services (MSXML) through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB2993958 (x64) (Japanese) Severity: Important Fixlet ID: 1406705 Fixlet Link: http://technet.microsoft.com/library/security/MS14-067 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a logged-on user visits a specially crafted website that is designed to invoke Microsoft XML Core Services (MSXML) through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB2993958 (x64) (Japanese) Severity: Important Fixlet ID: 1406707 Fixlet Link: http://technet.microsoft.com/library/security/MS14-067 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a logged-on user visits a specially crafted website that is designed to invoke Microsoft XML Core Services (MSXML) through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows 8.1 Gold - KB2993958 (x64) (Japanese) Severity: Critical Fixlet ID: 1406709 Fixlet Link: http://technet.microsoft.com/library/security/MS14-067 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a logged-on user visits a specially crafted website that is designed to invoke Microsoft XML Core Services (MSXML) through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows Server 2012 R2 Gold - KB2993958 (x64) (Japanese) Severity: Important Fixlet ID: 1406711 Fixlet Link: http://technet.microsoft.com/library/security/MS14-067 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a logged-on user visits a specially crafted website that is designed to invoke Microsoft XML Core Services (MSXML) through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows 7 SP1 - KB2993958 (x64) (Japanese) Severity: Critical Fixlet ID: 1406713 Fixlet Link: http://technet.microsoft.com/library/security/MS14-067 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a logged-on user visits a specially crafted website that is designed to invoke Microsoft XML Core Services (MSXML) through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB2993958 (Japanese) Severity: Important Fixlet ID: 1406715 Fixlet Link: http://technet.microsoft.com/library/security/MS14-067 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a logged-on user visits a specially crafted website that is designed to invoke Microsoft XML Core Services (MSXML) through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB2993958 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1406716 Fixlet Link: http://technet.microsoft.com/library/security/MS14-067 *************************************************************** Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows Vista SP2 - KB2993958 (Japanese) Severity: Critical Fixlet ID: 1406717 Fixlet Link: http://technet.microsoft.com/library/security/MS14-067 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a logged-on user visits a specially crafted website that is designed to invoke Microsoft XML Core Services (MSXML) through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows 7 SP1 - KB2993958 (Japanese) Severity: Critical Fixlet ID: 1406719 Fixlet Link: http://technet.microsoft.com/library/security/MS14-067 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a logged-on user visits a specially crafted website that is designed to invoke Microsoft XML Core Services (MSXML) through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows Server 2012 Gold - KB2993958 (x64) (Japanese) Severity: Important Fixlet ID: 1406721 Fixlet Link: http://technet.microsoft.com/library/security/MS14-067 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a logged-on user visits a specially crafted website that is designed to invoke Microsoft XML Core Services (MSXML) through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB2993958 (x64) (Japanese) Severity: Important Fixlet ID: 1406723 Fixlet Link: http://technet.microsoft.com/library/security/MS14-067 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a logged-on user visits a specially crafted website that is designed to invoke Microsoft XML Core Services (MSXML) through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB2993958 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1406724 Fixlet Link: http://technet.microsoft.com/library/security/MS14-067 *************************************************************** Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB2993958 (Japanese) Severity: Important Fixlet ID: 1406725 Fixlet Link: http://technet.microsoft.com/library/security/MS14-067 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a logged-on user visits a specially crafted website that is designed to invoke Microsoft XML Core Services (MSXML) through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows 8.1 Gold - KB2993958 (Japanese) Severity: Critical Fixlet ID: 1406727 Fixlet Link: http://technet.microsoft.com/library/security/MS14-067 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a logged-on user visits a specially crafted website that is designed to invoke Microsoft XML Core Services (MSXML) through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows 8 Gold - KB2993958 (x64) (Japanese) Severity: Critical Fixlet ID: 1406729 Fixlet Link: http://technet.microsoft.com/library/security/MS14-067 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a logged-on user visits a specially crafted website that is designed to invoke Microsoft XML Core Services (MSXML) through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-069: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Word 2007 SP3 - KB2899527 (Japanese) Severity: Important Fixlet ID: 1406901 Fixlet Link: http://technet.microsoft.com/library/security/MS14-069 Fixlet Description: This security update resolves three privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a specially crafted file is opened in an affected edition of Microsoft Office 2007. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-069: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office Compatibility Pack SP3 - KB2899526 (Japanese) Severity: Important Fixlet ID: 1406903 Fixlet Link: http://technet.microsoft.com/library/security/MS14-069 Fixlet Description: This security update resolves three privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a specially crafted file is opened in an affected edition of Microsoft Office 2007. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-069: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Word Viewer - KB2899553 (Japanese) Severity: Important Fixlet ID: 1406905 Fixlet Link: http://technet.microsoft.com/library/security/MS14-069 Fixlet Description: This security update resolves three privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a specially crafted file is opened in an affected edition of Microsoft Office 2007. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-070: Vulnerability in TCP/IP Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB2989935 (Japanese) Severity: Important Fixlet ID: 1407001 Fixlet Link: http://technet.microsoft.com/library/security/MS14-070 Fixlet Description: This security update resolves a publically reported vulnerability in TCP/IP that occurs during input/output control (IOCTL) processing. This vulnerability could allow elevation of privilege if an attacker logs on to a system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of another process. If this process runs with administrator privileges, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-070: Vulnerability in TCP/IP Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB2989935 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1407002 Fixlet Link: http://technet.microsoft.com/library/security/MS14-070 *************************************************************** Title: MS14-070: Vulnerability in TCP/IP Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB2989935 (x64) (Japanese) Severity: Important Fixlet ID: 1407003 Fixlet Link: http://technet.microsoft.com/library/security/MS14-070 Fixlet Description: This security update resolves a publically reported vulnerability in TCP/IP that occurs during input/output control (IOCTL) processing. This vulnerability could allow elevation of privilege if an attacker logs on to a system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of another process. If this process runs with administrator privileges, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-070: Vulnerability in TCP/IP Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB2989935 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1407004 Fixlet Link: http://technet.microsoft.com/library/security/MS14-070 *************************************************************** Title: MS14-071: Vulnerability in Windows Audio Service Could Allow Elevation of Privilege - Windows Server 2012 Gold - KB3005607 (x64) (Japanese) Severity: Important Fixlet ID: 1407101 Fixlet Link: http://technet.microsoft.com/library/security/MS14-071 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an application uses the Microsoft Windows Audio service. The vulnerability by itself does not allow arbitrary code to be run. The vulnerability would have to be used in conjunction with another vulnerability that allowed remote code execution. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-071: Vulnerability in Windows Audio Service Could Allow Elevation of Privilege - Windows 8.1 Gold - KB3005607 (x64) (Japanese) Severity: Important Fixlet ID: 1407103 Fixlet Link: http://technet.microsoft.com/library/security/MS14-071 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an application uses the Microsoft Windows Audio service. The vulnerability by itself does not allow arbitrary code to be run. The vulnerability would have to be used in conjunction with another vulnerability that allowed remote code execution. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-071: Vulnerability in Windows Audio Service Could Allow Elevation of Privilege - Windows Vista SP2 - KB3005607 (x64) (Japanese) Severity: Important Fixlet ID: 1407105 Fixlet Link: http://technet.microsoft.com/library/security/MS14-071 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an application uses the Microsoft Windows Audio service. The vulnerability by itself does not allow arbitrary code to be run. The vulnerability would have to be used in conjunction with another vulnerability that allowed remote code execution. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-071: Vulnerability in Windows Audio Service Could Allow Elevation of Privilege - Windows Server 2012 R2 Gold - KB3005607 (x64) (Japanese) Severity: Important Fixlet ID: 1407107 Fixlet Link: http://technet.microsoft.com/library/security/MS14-071 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an application uses the Microsoft Windows Audio service. The vulnerability by itself does not allow arbitrary code to be run. The vulnerability would have to be used in conjunction with another vulnerability that allowed remote code execution. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-071: Vulnerability in Windows Audio Service Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3005607 (Japanese) Severity: Important Fixlet ID: 1407109 Fixlet Link: http://technet.microsoft.com/library/security/MS14-071 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an application uses the Microsoft Windows Audio service. The vulnerability by itself does not allow arbitrary code to be run. The vulnerability would have to be used in conjunction with another vulnerability that allowed remote code execution. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-071: Vulnerability in Windows Audio Service Could Allow Elevation of Privilege - Windows 8 Gold - KB3005607 (Japanese) Severity: Important Fixlet ID: 1407111 Fixlet Link: http://technet.microsoft.com/library/security/MS14-071 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an application uses the Microsoft Windows Audio service. The vulnerability by itself does not allow arbitrary code to be run. The vulnerability would have to be used in conjunction with another vulnerability that allowed remote code execution. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-071: Vulnerability in Windows Audio Service Could Allow Elevation of Privilege - Windows 7 SP1 - KB3005607 (x64) (Japanese) Severity: Important Fixlet ID: 1407113 Fixlet Link: http://technet.microsoft.com/library/security/MS14-071 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an application uses the Microsoft Windows Audio service. The vulnerability by itself does not allow arbitrary code to be run. The vulnerability would have to be used in conjunction with another vulnerability that allowed remote code execution. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-071: Vulnerability in Windows Audio Service Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3005607 (x64) (Japanese) Severity: Important Fixlet ID: 1407115 Fixlet Link: http://technet.microsoft.com/library/security/MS14-071 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an application uses the Microsoft Windows Audio service. The vulnerability by itself does not allow arbitrary code to be run. The vulnerability would have to be used in conjunction with another vulnerability that allowed remote code execution. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-071: Vulnerability in Windows Audio Service Could Allow Elevation of Privilege - Windows Vista SP2 - KB3005607 (Japanese) Severity: Important Fixlet ID: 1407117 Fixlet Link: http://technet.microsoft.com/library/security/MS14-071 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an application uses the Microsoft Windows Audio service. The vulnerability by itself does not allow arbitrary code to be run. The vulnerability would have to be used in conjunction with another vulnerability that allowed remote code execution. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-071: Vulnerability in Windows Audio Service Could Allow Elevation of Privilege - Windows 8.1 Gold - KB3005607 (Japanese) Severity: Important Fixlet ID: 1407119 Fixlet Link: http://technet.microsoft.com/library/security/MS14-071 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an application uses the Microsoft Windows Audio service. The vulnerability by itself does not allow arbitrary code to be run. The vulnerability would have to be used in conjunction with another vulnerability that allowed remote code execution. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-071: Vulnerability in Windows Audio Service Could Allow Elevation of Privilege - Windows 7 SP1 - KB3005607 (Japanese) Severity: Important Fixlet ID: 1407121 Fixlet Link: http://technet.microsoft.com/library/security/MS14-071 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an application uses the Microsoft Windows Audio service. The vulnerability by itself does not allow arbitrary code to be run. The vulnerability would have to be used in conjunction with another vulnerability that allowed remote code execution. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-071: Vulnerability in Windows Audio Service Could Allow Elevation of Privilege - Windows 8 Gold - KB3005607 (x64) (Japanese) Severity: Important Fixlet ID: 1407123 Fixlet Link: http://technet.microsoft.com/library/security/MS14-071 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an application uses the Microsoft Windows Audio service. The vulnerability by itself does not allow arbitrary code to be run. The vulnerability would have to be used in conjunction with another vulnerability that allowed remote code execution. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-071: Vulnerability in Windows Audio Service Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 - KB3005607 (x64) (Japanese) Severity: Important Fixlet ID: 1407125 Fixlet Link: http://technet.microsoft.com/library/security/MS14-071 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an application uses the Microsoft Windows Audio service. The vulnerability by itself does not allow arbitrary code to be run. The vulnerability would have to be used in conjunction with another vulnerability that allowed remote code execution. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 2.0 SP2 - KB2978116 (x64) (Japanese) Severity: Important Fixlet ID: 1407201 Fixlet Link: http://technet.microsoft.com/library/security/MS14-072 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 / Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1/4.5.2 - KB2978128 (x64) (Japanese) Severity: Important Fixlet ID: 1407203 Fixlet Link: http://technet.microsoft.com/library/security/MS14-072 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows Server 2012 Gold / Windows 8 Gold - .NET Framework 4.5/4.5.1/4.5.2 - KB2978127 (x64) (Japanese) Severity: Important Fixlet ID: 1407205 Fixlet Link: http://technet.microsoft.com/library/security/MS14-072 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1/4.5.2 - KB2978128 (Japanese) Severity: Important Fixlet ID: 1407207 Fixlet Link: http://technet.microsoft.com/library/security/MS14-072 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows Server 2003 SP2 - .NET Framework 2.0 SP2 - KB2978124 (Japanese) Severity: Important Fixlet ID: 1407209 Fixlet Link: http://technet.microsoft.com/library/security/MS14-072 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows 8 Gold - .NET Framework 4.5/4.5.1/4.5.2 - KB2978127 (Japanese) Severity: Important Fixlet ID: 1407211 Fixlet Link: http://technet.microsoft.com/library/security/MS14-072 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows 7 SP1 - .NET Framework 3.5.1 - KB2978120 (Japanese) Severity: Important Fixlet ID: 1407213 Fixlet Link: http://technet.microsoft.com/library/security/MS14-072 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows 8.1 Gold - .NET Framework 3.5 - KB2978122 (Japanese) Severity: Important Fixlet ID: 1407215 Fixlet Link: http://technet.microsoft.com/library/security/MS14-072 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 / Windows 7 SP1 - .NET Framework 3.5.1 - KB2978120 (x64) (Japanese) Severity: Important Fixlet ID: 1407217 Fixlet Link: http://technet.microsoft.com/library/security/MS14-072 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows Server 2012 R2 Gold / Windows 8.1 Gold - .NET Framework 4.5.1/4.5.2 - KB2978126 (x64) (Japanese) Severity: Important Fixlet ID: 1407219 Fixlet Link: http://technet.microsoft.com/library/security/MS14-072 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows Server 2003 SP2 - .NET Framework 1.1 SP1 - KB2978114 (Japanese) Severity: Important Fixlet ID: 1407221 Fixlet Link: http://technet.microsoft.com/library/security/MS14-072 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows Server 2003 SP2 - .NET Framework 1.1 SP1 - KB2978114 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1407222 Fixlet Link: http://technet.microsoft.com/library/security/MS14-072 *************************************************************** Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 / Windows Server 2003 SP2 - .NET Framework 4 - KB2978125 (Japanese) Severity: Important Fixlet ID: 1407223 Fixlet Link: http://technet.microsoft.com/library/security/MS14-072 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows Server 2003 SP2 - .NET Framework 2.0 SP2 - KB2978124 (x64) (Japanese) Severity: Important Fixlet ID: 1407225 Fixlet Link: http://technet.microsoft.com/library/security/MS14-072 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 2.0 SP2 - KB2978116 (Japanese) Severity: Important Fixlet ID: 1407227 Fixlet Link: http://technet.microsoft.com/library/security/MS14-072 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows 8.1 Gold - .NET Framework 4.5.1/4.5.2 - KB2978126 (Japanese) Severity: Important Fixlet ID: 1407229 Fixlet Link: http://technet.microsoft.com/library/security/MS14-072 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows 8 Gold - .NET Framework 3.5 - KB2978121 (Japanese) Severity: Important Fixlet ID: 1407231 Fixlet Link: http://technet.microsoft.com/library/security/MS14-072 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows Server 2012 R2 Gold / Windows 8.1 Gold - .NET Framework 3.5 - KB2978122 (x64) (Japanese) Severity: Important Fixlet ID: 1407233 Fixlet Link: http://technet.microsoft.com/library/security/MS14-072 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows Server 2012 Gold / Windows 8 Gold - .NET Framework 3.5 - KB2978121 (x64) (Japanese) Severity: Important Fixlet ID: 1407235 Fixlet Link: http://technet.microsoft.com/library/security/MS14-072 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 / Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 / Windows Server 2003 SP2 - .NET Framework 4 - KB29781 (Japanese) Severity: Important Fixlet ID: 1407237 Fixlet Link: http://technet.microsoft.com/library/security/MS14-072 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-073: Vulnerability in Microsoft SharePoint Foundation Could Allow Elevation of Privilege - SharePoint Foundation 2010 SP2 - KB2889838 (x64) (Japanese) Severity: Important Fixlet ID: 1407301 Fixlet Link: http://technet.microsoft.com/library/security/MS14-073 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft SharePoint Server. An authenticated attacker who successfully exploited this vulnerability could run arbitrary script in the context of the user on the current SharePoint site. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit these vulnerabilities and then convince a user to view the website. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit these vulnerabilities. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to the attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-074: Vulnerability in Remote Desktop Protocol Could Allow Security Feature Bypass - Windows 8 Gold - KB3003743 (Japanese) Severity: Important Fixlet ID: 1407401 Fixlet Link: http://technet.microsoft.com/library/security/MS14-074 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass when Remote Desktop Protocol (RDP) fails to properly log audit events. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-074: Vulnerability in Remote Desktop Protocol Could Allow Security Feature Bypass - Windows Vista SP2 - KB3003743 (x64) (Japanese) Severity: Important Fixlet ID: 1407403 Fixlet Link: http://technet.microsoft.com/library/security/MS14-074 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass when Remote Desktop Protocol (RDP) fails to properly log audit events. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-074: Vulnerability in Remote Desktop Protocol Could Allow Security Feature Bypass - Windows Vista SP2 - KB3003743 (Japanese) Severity: Important Fixlet ID: 1407405 Fixlet Link: http://technet.microsoft.com/library/security/MS14-074 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass when Remote Desktop Protocol (RDP) fails to properly log audit events. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-074: Vulnerability in Remote Desktop Protocol Could Allow Security Feature Bypass - Windows 8.1 Gold - KB3003743 (Japanese) Severity: Important Fixlet ID: 1407407 Fixlet Link: http://technet.microsoft.com/library/security/MS14-074 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass when Remote Desktop Protocol (RDP) fails to properly log audit events. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-074: Vulnerability in Remote Desktop Protocol Could Allow Security Feature Bypass - Windows 7 SP1 - KB3003743 (x64) (Japanese) Severity: Important Fixlet ID: 1407409 Fixlet Link: http://technet.microsoft.com/library/security/MS14-074 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass when Remote Desktop Protocol (RDP) fails to properly log audit events. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-074: Vulnerability in Remote Desktop Protocol Could Allow Security Feature Bypass - Windows 7 SP1 - KB3003743 (Japanese) Severity: Important Fixlet ID: 1407411 Fixlet Link: http://technet.microsoft.com/library/security/MS14-074 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass when Remote Desktop Protocol (RDP) fails to properly log audit events. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-074: Vulnerability in Remote Desktop Protocol Could Allow Security Feature Bypass - Windows 8 Gold - KB3003743 (x64) (Japanese) Severity: Important Fixlet ID: 1407413 Fixlet Link: http://technet.microsoft.com/library/security/MS14-074 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass when Remote Desktop Protocol (RDP) fails to properly log audit events. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-074: Vulnerability in Remote Desktop Protocol Could Allow Security Feature Bypass - Windows Server 2008 SP2 - KB3003743 (Japanese) Severity: Important Fixlet ID: 1407415 Fixlet Link: http://technet.microsoft.com/library/security/MS14-074 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass when Remote Desktop Protocol (RDP) fails to properly log audit events. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-074: Vulnerability in Remote Desktop Protocol Could Allow Security Feature Bypass - Windows 8.1 Gold - KB3003743 (x64) (Japanese) Severity: Important Fixlet ID: 1407417 Fixlet Link: http://technet.microsoft.com/library/security/MS14-074 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass when Remote Desktop Protocol (RDP) fails to properly log audit events. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-074: Vulnerability in Remote Desktop Protocol Could Allow Security Feature Bypass - Windows Server 2012 Gold - KB3003743 (x64) (Japanese) Severity: Important Fixlet ID: 1407419 Fixlet Link: http://technet.microsoft.com/library/security/MS14-074 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass when Remote Desktop Protocol (RDP) fails to properly log audit events. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-074: Vulnerability in Remote Desktop Protocol Could Allow Security Feature Bypass - Windows Server 2008 SP2 - KB3003743 (x64) (Japanese) Severity: Important Fixlet ID: 1407421 Fixlet Link: http://technet.microsoft.com/library/security/MS14-074 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass when Remote Desktop Protocol (RDP) fails to properly log audit events. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-074: Vulnerability in Remote Desktop Protocol Could Allow Security Feature Bypass - Windows Server 2012 R2 Gold - KB3003743 (x64) (Japanese) Severity: Important Fixlet ID: 1407423 Fixlet Link: http://technet.microsoft.com/library/security/MS14-074 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass when Remote Desktop Protocol (RDP) fails to properly log audit events. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-074: Vulnerability in Remote Desktop Protocol Could Allow Security Feature Bypass - Windows Server 2008 R2 SP1 - KB3003743 (x64) (Japanese) Severity: Important Fixlet ID: 1407425 Fixlet Link: http://technet.microsoft.com/library/security/MS14-074 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass when Remote Desktop Protocol (RDP) fails to properly log audit events. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-076: Vulnerability in Internet Information Services (IIS) Could Allow Security Feature Bypass - Windows 8.1 Gold - IIS 8.5 - KB2982998 (x64) (Japanese) Severity: Important Fixlet ID: 1407601 Fixlet Link: http://technet.microsoft.com/library/security/MS14-076 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Internet Information Services (IIS) that could lead to a bypass of the "IP and domain restrictions" security feature. Successful exploitation of this vulnerability could result in clients from restricted or blocked domains having access to restricted web resources. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-076: Vulnerability in Internet Information Services (IIS) Could Allow Security Feature Bypass - Windows 8.1 Gold - IIS 8.5 - KB2982998 (Japanese) Severity: Important Fixlet ID: 1407603 Fixlet Link: http://technet.microsoft.com/library/security/MS14-076 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Internet Information Services (IIS) that could lead to a bypass of the "IP and domain restrictions" security feature. Successful exploitation of this vulnerability could result in clients from restricted or blocked domains having access to restricted web resources. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-076: Vulnerability in Internet Information Services (IIS) Could Allow Security Feature Bypass - Windows 8 Gold - IIS 8.0 - KB2982998 (x64) (Japanese) Severity: Important Fixlet ID: 1407605 Fixlet Link: http://technet.microsoft.com/library/security/MS14-076 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Internet Information Services (IIS) that could lead to a bypass of the "IP and domain restrictions" security feature. Successful exploitation of this vulnerability could result in clients from restricted or blocked domains having access to restricted web resources. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-076: Vulnerability in Internet Information Services (IIS) Could Allow Security Feature Bypass - Windows Server 2012 Gold - IIS 8.0 - KB2982998 (x64) (Japanese) Severity: Important Fixlet ID: 1407607 Fixlet Link: http://technet.microsoft.com/library/security/MS14-076 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Internet Information Services (IIS) that could lead to a bypass of the "IP and domain restrictions" security feature. Successful exploitation of this vulnerability could result in clients from restricted or blocked domains having access to restricted web resources. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-076: Vulnerability in Internet Information Services (IIS) Could Allow Security Feature Bypass - Windows Server 2012 R2 Gold - IIS 8.5 - KB2982998 (x64) (Japanese) Severity: Important Fixlet ID: 1407609 Fixlet Link: http://technet.microsoft.com/library/security/MS14-076 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Internet Information Services (IIS) that could lead to a bypass of the "IP and domain restrictions" security feature. Successful exploitation of this vulnerability could result in clients from restricted or blocked domains having access to restricted web resources. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-076: Vulnerability in Internet Information Services (IIS) Could Allow Security Feature Bypass - Windows 8 Gold - IIS 8.0 - KB2982998 (Japanese) Severity: Important Fixlet ID: 1407611 Fixlet Link: http://technet.microsoft.com/library/security/MS14-076 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Internet Information Services (IIS) that could lead to a bypass of the "IP and domain restrictions" security feature. Successful exploitation of this vulnerability could result in clients from restricted or blocked domains having access to restricted web resources. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-077: Vulnerability in Active Directory Federation Services Could Allow Information Disclosure - Windows Server 2008 SP2 - ADFS 2.0 - KB3003381 (x64) (Japanese) Severity: Important Fixlet ID: 1407701 Fixlet Link: http://technet.microsoft.com/library/security/MS14-077 Fixlet Description: This security update resolves a privately reported vulnerability in Active Directory Federation Services (AD FS). The vulnerability could allow information disclosure if a user leaves their browser open after logging off from an application, and an attacker reopens the application in the browser immediately after the user has logged off. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-077: Vulnerability in Active Directory Federation Services Could Allow Information Disclosure - Windows Server 2012 R2 Gold - ADFS 3.0 - KB3003381 (x64) (Japanese) Severity: Important Fixlet ID: 1407703 Fixlet Link: http://technet.microsoft.com/library/security/MS14-077 Fixlet Description: This security update resolves a privately reported vulnerability in Active Directory Federation Services (AD FS). The vulnerability could allow information disclosure if a user leaves their browser open after logging off from an application, and an attacker reopens the application in the browser immediately after the user has logged off. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-077: Vulnerability in Active Directory Federation Services Could Allow Information Disclosure - Windows Server 2008 R2 SP1 - ADFS 2.0 - KB3003381 (x64) (Japanese) Severity: Important Fixlet ID: 1407705 Fixlet Link: http://technet.microsoft.com/library/security/MS14-077 Fixlet Description: This security update resolves a privately reported vulnerability in Active Directory Federation Services (AD FS). The vulnerability could allow information disclosure if a user leaves their browser open after logging off from an application, and an attacker reopens the application in the browser immediately after the user has logged off. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-077: Vulnerability in Active Directory Federation Services Could Allow Information Disclosure - Windows Server 2012 Gold - ADFS 2.1 - KB3003381 (x64) (Japanese) Severity: Important Fixlet ID: 1407707 Fixlet Link: http://technet.microsoft.com/library/security/MS14-077 Fixlet Description: This security update resolves a privately reported vulnerability in Active Directory Federation Services (AD FS). The vulnerability could allow information disclosure if a user leaves their browser open after logging off from an application, and an attacker reopens the application in the browser immediately after the user has logged off. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-077: Vulnerability in Active Directory Federation Services Could Allow Information Disclosure - Windows Server 2008 SP2 - ADFS 2.0 - KB3003381 (Japanese) Severity: Important Fixlet ID: 1407709 Fixlet Link: http://technet.microsoft.com/library/security/MS14-077 Fixlet Description: This security update resolves a privately reported vulnerability in Active Directory Federation Services (AD FS). The vulnerability could allow information disclosure if a user leaves their browser open after logging off from an application, and an attacker reopens the application in the browser immediately after the user has logged off. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-078: Vulnerability in IME (Japanese) Could Allow Elevation of Privilege - Windows 7 SP1 - KB2991963 (Japanese) Severity: Moderate Fixlet ID: 1407801 Fixlet Link: http://technet.microsoft.com/library/security/MS14-078 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Input Method Editor (IME) (Japanese). The vulnerability could allow sandbox escape based on the application sandbox policy on a system where an affected version of the Microsoft IME (Japanese) is installed. An attacker who successfully exploited this vulnerability could escape the sandbox of a vulnerable application and gain access to the affected system with logged-in user rights. If the affected system is logged in with administrative rights, an attacker could then install programs; view, change or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-078: Vulnerability in IME (Japanese) Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB2991963 (x64) (Japanese) Severity: Moderate Fixlet ID: 1407803 Fixlet Link: http://technet.microsoft.com/library/security/MS14-078 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Input Method Editor (IME) (Japanese). The vulnerability could allow sandbox escape based on the application sandbox policy on a system where an affected version of the Microsoft IME (Japanese) is installed. An attacker who successfully exploited this vulnerability could escape the sandbox of a vulnerable application and gain access to the affected system with logged-in user rights. If the affected system is logged in with administrative rights, an attacker could then install programs; view, change or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-078: Vulnerability in IME (Japanese) Could Allow Elevation of Privilege - Windows Vista SP2 - KB2991963 (x64) (Japanese) Severity: Moderate Fixlet ID: 1407805 Fixlet Link: http://technet.microsoft.com/library/security/MS14-078 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Input Method Editor (IME) (Japanese). The vulnerability could allow sandbox escape based on the application sandbox policy on a system where an affected version of the Microsoft IME (Japanese) is installed. An attacker who successfully exploited this vulnerability could escape the sandbox of a vulnerable application and gain access to the affected system with logged-in user rights. If the affected system is logged in with administrative rights, an attacker could then install programs; view, change or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-078: Vulnerability in IME (Japanese) Could Allow Elevation of Privilege - Windows Vista SP2 - KB2991963 (Japanese) Severity: Moderate Fixlet ID: 1407807 Fixlet Link: http://technet.microsoft.com/library/security/MS14-078 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Input Method Editor (IME) (Japanese). The vulnerability could allow sandbox escape based on the application sandbox policy on a system where an affected version of the Microsoft IME (Japanese) is installed. An attacker who successfully exploited this vulnerability could escape the sandbox of a vulnerable application and gain access to the affected system with logged-in user rights. If the affected system is logged in with administrative rights, an attacker could then install programs; view, change or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-078: Vulnerability in IME (Japanese) Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB2991963 (x64) (Japanese) Severity: Moderate Fixlet ID: 1407809 Fixlet Link: http://technet.microsoft.com/library/security/MS14-078 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Input Method Editor (IME) (Japanese). The vulnerability could allow sandbox escape based on the application sandbox policy on a system where an affected version of the Microsoft IME (Japanese) is installed. An attacker who successfully exploited this vulnerability could escape the sandbox of a vulnerable application and gain access to the affected system with logged-in user rights. If the affected system is logged in with administrative rights, an attacker could then install programs; view, change or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-078: Vulnerability in IME (Japanese) Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB2991963 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1407810 Fixlet Link: http://technet.microsoft.com/library/security/MS14-078 *************************************************************** Title: MS14-078: Vulnerability in IME (Japanese) Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB2991963 (Japanese) Severity: Moderate Fixlet ID: 1407811 Fixlet Link: http://technet.microsoft.com/library/security/MS14-078 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Input Method Editor (IME) (Japanese). The vulnerability could allow sandbox escape based on the application sandbox policy on a system where an affected version of the Microsoft IME (Japanese) is installed. An attacker who successfully exploited this vulnerability could escape the sandbox of a vulnerable application and gain access to the affected system with logged-in user rights. If the affected system is logged in with administrative rights, an attacker could then install programs; view, change or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-078: Vulnerability in IME (Japanese) Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 - KB2991963 (x64) (Japanese) Severity: Moderate Fixlet ID: 1407813 Fixlet Link: http://technet.microsoft.com/library/security/MS14-078 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Input Method Editor (IME) (Japanese). The vulnerability could allow sandbox escape based on the application sandbox policy on a system where an affected version of the Microsoft IME (Japanese) is installed. An attacker who successfully exploited this vulnerability could escape the sandbox of a vulnerable application and gain access to the affected system with logged-in user rights. If the affected system is logged in with administrative rights, an attacker could then install programs; view, change or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-078: Vulnerability in IME (Japanese) Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB2991963 (Japanese) Severity: Moderate Fixlet ID: 1407815 Fixlet Link: http://technet.microsoft.com/library/security/MS14-078 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Input Method Editor (IME) (Japanese). The vulnerability could allow sandbox escape based on the application sandbox policy on a system where an affected version of the Microsoft IME (Japanese) is installed. An attacker who successfully exploited this vulnerability could escape the sandbox of a vulnerable application and gain access to the affected system with logged-in user rights. If the affected system is logged in with administrative rights, an attacker could then install programs; view, change or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-078: Vulnerability in IME (Japanese) Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB2991963 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1407816 Fixlet Link: http://technet.microsoft.com/library/security/MS14-078 *************************************************************** Title: MS14-078: Vulnerability in IME (Japanese) Could Allow Elevation of Privilege - Windows 7 SP1 - KB2991963 (x64) (Japanese) Severity: Moderate Fixlet ID: 1407817 Fixlet Link: http://technet.microsoft.com/library/security/MS14-078 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Input Method Editor (IME) (Japanese). The vulnerability could allow sandbox escape based on the application sandbox policy on a system where an affected version of the Microsoft IME (Japanese) is installed. An attacker who successfully exploited this vulnerability could escape the sandbox of a vulnerable application and gain access to the affected system with logged-in user rights. If the affected system is logged in with administrative rights, an attacker could then install programs; view, change or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-078: Vulnerability in IME (Japanese) Could Allow Elevation of Privilege - Office 2007 SP3 - Office 2007 IME (Japanese) - KB2889913 (Japanese) Severity: Moderate Fixlet ID: 1407819 Fixlet Link: http://technet.microsoft.com/library/security/MS14-078 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Input Method Editor (IME) (Japanese). The vulnerability could allow sandbox escape based on the application sandbox policy on a system where an affected version of the Microsoft IME (Japanese) is installed. An attacker who successfully exploited this vulnerability could escape the sandbox of a vulnerable application and gain access to the affected system with logged-in user rights. If the affected system is logged in with administrative rights, an attacker could then install programs; view, change or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows Server 2008 SP2 - KB3002885 (x64) (Japanese) Severity: Moderate Fixlet ID: 1407901 Fixlet Link: http://technet.microsoft.com/library/security/MS14-079 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker places a specially crafted TrueType font on a network share and a user subsequently navigates there in Windows Explorer. In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to persuade users to visit a website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows Vista SP2 - KB3002885 (x64) (Japanese) Severity: Moderate Fixlet ID: 1407903 Fixlet Link: http://technet.microsoft.com/library/security/MS14-079 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker places a specially crafted TrueType font on a network share and a user subsequently navigates there in Windows Explorer. In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to persuade users to visit a website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows Server 2012 R2 Gold - KB3002885 (x64) (Japanese) Severity: Moderate Fixlet ID: 1407905 Fixlet Link: http://technet.microsoft.com/library/security/MS14-079 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker places a specially crafted TrueType font on a network share and a user subsequently navigates there in Windows Explorer. In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to persuade users to visit a website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows 8 Gold - KB3002885 (Japanese) Severity: Moderate Fixlet ID: 1407907 Fixlet Link: http://technet.microsoft.com/library/security/MS14-079 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker places a specially crafted TrueType font on a network share and a user subsequently navigates there in Windows Explorer. In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to persuade users to visit a website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows 8.1 Gold - KB3002885 (Japanese) Severity: Moderate Fixlet ID: 1407909 Fixlet Link: http://technet.microsoft.com/library/security/MS14-079 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker places a specially crafted TrueType font on a network share and a user subsequently navigates there in Windows Explorer. In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to persuade users to visit a website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows Server 2003 SP2 - KB3002885 (x64) (Japanese) Severity: Moderate Fixlet ID: 1407911 Fixlet Link: http://technet.microsoft.com/library/security/MS14-079 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker places a specially crafted TrueType font on a network share and a user subsequently navigates there in Windows Explorer. In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to persuade users to visit a website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows Server 2003 SP2 - KB3002885 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1407912 Fixlet Link: http://technet.microsoft.com/library/security/MS14-079 *************************************************************** Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows Vista SP2 - KB3002885 (Japanese) Severity: Moderate Fixlet ID: 1407913 Fixlet Link: http://technet.microsoft.com/library/security/MS14-079 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker places a specially crafted TrueType font on a network share and a user subsequently navigates there in Windows Explorer. In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to persuade users to visit a website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows Server 2008 R2 SP1 - KB3002885 (x64) (Japanese) Severity: Moderate Fixlet ID: 1407915 Fixlet Link: http://technet.microsoft.com/library/security/MS14-079 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker places a specially crafted TrueType font on a network share and a user subsequently navigates there in Windows Explorer. In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to persuade users to visit a website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows 8.1 Gold - KB3002885 (x64) (Japanese) Severity: Moderate Fixlet ID: 1407917 Fixlet Link: http://technet.microsoft.com/library/security/MS14-079 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker places a specially crafted TrueType font on a network share and a user subsequently navigates there in Windows Explorer. In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to persuade users to visit a website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows 8 Gold - KB3002885 (x64) (Japanese) Severity: Moderate Fixlet ID: 1407919 Fixlet Link: http://technet.microsoft.com/library/security/MS14-079 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker places a specially crafted TrueType font on a network share and a user subsequently navigates there in Windows Explorer. In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to persuade users to visit a website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows Server 2012 Gold - KB3002885 (x64) (Japanese) Severity: Moderate Fixlet ID: 1407921 Fixlet Link: http://technet.microsoft.com/library/security/MS14-079 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker places a specially crafted TrueType font on a network share and a user subsequently navigates there in Windows Explorer. In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to persuade users to visit a website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows Server 2008 SP2 - KB3002885 (Japanese) Severity: Moderate Fixlet ID: 1407923 Fixlet Link: http://technet.microsoft.com/library/security/MS14-079 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker places a specially crafted TrueType font on a network share and a user subsequently navigates there in Windows Explorer. In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to persuade users to visit a website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows 7 SP1 - KB3002885 (Japanese) Severity: Moderate Fixlet ID: 1407925 Fixlet Link: http://technet.microsoft.com/library/security/MS14-079 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker places a specially crafted TrueType font on a network share and a user subsequently navigates there in Windows Explorer. In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to persuade users to visit a website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows 7 SP1 - KB3002885 (x64) (Japanese) Severity: Moderate Fixlet ID: 1407927 Fixlet Link: http://technet.microsoft.com/library/security/MS14-079 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker places a specially crafted TrueType font on a network share and a user subsequently navigates there in Windows Explorer. In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to persuade users to visit a website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows Server 2003 SP2 - KB3002885 (Japanese) Severity: Moderate Fixlet ID: 1407929 Fixlet Link: http://technet.microsoft.com/library/security/MS14-079 Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker places a specially crafted TrueType font on a network share and a user subsequently navigates there in Windows Explorer. In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to persuade users to visit a website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows Server 2003 SP2 - KB3002885 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1407930 Fixlet Link: http://technet.microsoft.com/library/security/MS14-079 *************************************************************** Title: 2852386: Disk Cleanup Wizard addon lets users delete outdated Windows updates on Windows 7 SP1 or Windows Server 2008 R2 SP1 - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 285238605 Fixlet Link: http://support.microsoft.com/kb/2852386 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3004150: Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 300415001 Fixlet Link: http://support.microsoft.com/kb/3004150 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3004150: Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows Server 2012 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 300415003 Fixlet Link: http://support.microsoft.com/kb/3004150 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3004150: Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 300415005 Fixlet Link: http://support.microsoft.com/kb/3004150 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3004150: Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 300415007 Fixlet Link: http://support.microsoft.com/kb/3004150 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3004150: Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 300415009 Fixlet Link: http://support.microsoft.com/kb/3004150 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3004150: Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 300415011 Fixlet Link: http://support.microsoft.com/kb/3004150 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. From autonotify at us.ibm.com Thu Nov 20 02:34:17 2014 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Thu, 20 Nov 2014 02:34:17 -0800 Subject: [BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)' Message-ID: <201411201034.sAKAYIIK029344@d01av02.pok.ibm.com> Fixlet Site - 'Patches for Windows (Japanese)' Current Version: 617 Published: Thu, 20 Nov 2014 06:57:37 GMT New Fixlets: ============ *************************************************************** Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB3018238 (x64) (Japanese) Severity: Critical Fixlet ID: 1406631 Fixlet Link: http://technet.microsoft.com/library/security/MS14-066 Fixlet Description: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows Server 2012 Gold - KB3018238 (x64) (Japanese) Severity: Critical Fixlet ID: 1406633 Fixlet Link: http://technet.microsoft.com/library/security/MS14-066 Fixlet Description: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: MS14-068: Vulnerability in Kerberos Could Allow Elevation of Privilege - Windows 8 Gold - KB3011780 (x64) (Japanese) Severity: N/A Fixlet ID: 1406801 Fixlet Link: http://technet.microsoft.com/library/security/MS14-068 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows Kerberos KDC that could allow an attacker to elevate unprivileged domain user account privileges to those of the domain administrator account. An attacker could use these elevated privileges to compromise any computer in the domain, including domain controllers. An attacker must have valid domain credentials to exploit this vulnerability. The affected component is available remotely to users who have standard user accounts with domain credentials; this is not the case for users with local account credentials only. When this security bulletin was issued, Microsoft was aware of limited, targeted attacks that attempt to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-068: Vulnerability in Kerberos Could Allow Elevation of Privilege - Windows 7 SP1 - KB3011780 (Japanese) Severity: N/A Fixlet ID: 1406803 Fixlet Link: http://technet.microsoft.com/library/security/MS14-068 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows Kerberos KDC that could allow an attacker to elevate unprivileged domain user account privileges to those of the domain administrator account. An attacker could use these elevated privileges to compromise any computer in the domain, including domain controllers. An attacker must have valid domain credentials to exploit this vulnerability. The affected component is available remotely to users who have standard user accounts with domain credentials; this is not the case for users with local account credentials only. When this security bulletin was issued, Microsoft was aware of limited, targeted attacks that attempt to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-068: Vulnerability in Kerberos Could Allow Elevation of Privilege - Windows 8.1 Gold - KB3011780 (x64) (Japanese) Severity: N/A Fixlet ID: 1406805 Fixlet Link: http://technet.microsoft.com/library/security/MS14-068 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows Kerberos KDC that could allow an attacker to elevate unprivileged domain user account privileges to those of the domain administrator account. An attacker could use these elevated privileges to compromise any computer in the domain, including domain controllers. An attacker must have valid domain credentials to exploit this vulnerability. The affected component is available remotely to users who have standard user accounts with domain credentials; this is not the case for users with local account credentials only. When this security bulletin was issued, Microsoft was aware of limited, targeted attacks that attempt to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-068: Vulnerability in Kerberos Could Allow Elevation of Privilege - Windows Server 2012 R2 Gold - KB3011780 (x64) (Japanese) Severity: Critical Fixlet ID: 1406807 Fixlet Link: http://technet.microsoft.com/library/security/MS14-068 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows Kerberos KDC that could allow an attacker to elevate unprivileged domain user account privileges to those of the domain administrator account. An attacker could use these elevated privileges to compromise any computer in the domain, including domain controllers. An attacker must have valid domain credentials to exploit this vulnerability. The affected component is available remotely to users who have standard user accounts with domain credentials; this is not the case for users with local account credentials only. When this security bulletin was issued, Microsoft was aware of limited, targeted attacks that attempt to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-068: Vulnerability in Kerberos Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3011780 (x64) (Japanese) Severity: Critical Fixlet ID: 1406809 Fixlet Link: http://technet.microsoft.com/library/security/MS14-068 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows Kerberos KDC that could allow an attacker to elevate unprivileged domain user account privileges to those of the domain administrator account. An attacker could use these elevated privileges to compromise any computer in the domain, including domain controllers. An attacker must have valid domain credentials to exploit this vulnerability. The affected component is available remotely to users who have standard user accounts with domain credentials; this is not the case for users with local account credentials only. When this security bulletin was issued, Microsoft was aware of limited, targeted attacks that attempt to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-068: Vulnerability in Kerberos Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB3011780 (x64) (Japanese) Severity: Critical Fixlet ID: 1406811 Fixlet Link: http://technet.microsoft.com/library/security/MS14-068 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows Kerberos KDC that could allow an attacker to elevate unprivileged domain user account privileges to those of the domain administrator account. An attacker could use these elevated privileges to compromise any computer in the domain, including domain controllers. An attacker must have valid domain credentials to exploit this vulnerability. The affected component is available remotely to users who have standard user accounts with domain credentials; this is not the case for users with local account credentials only. When this security bulletin was issued, Microsoft was aware of limited, targeted attacks that attempt to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-068: Vulnerability in Kerberos Could Allow Elevation of Privilege - Windows 7 SP1 - KB3011780 (x64) (Japanese) Severity: N/A Fixlet ID: 1406813 Fixlet Link: http://technet.microsoft.com/library/security/MS14-068 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows Kerberos KDC that could allow an attacker to elevate unprivileged domain user account privileges to those of the domain administrator account. An attacker could use these elevated privileges to compromise any computer in the domain, including domain controllers. An attacker must have valid domain credentials to exploit this vulnerability. The affected component is available remotely to users who have standard user accounts with domain credentials; this is not the case for users with local account credentials only. When this security bulletin was issued, Microsoft was aware of limited, targeted attacks that attempt to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-068: Vulnerability in Kerberos Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 - KB3011780 (x64) (Japanese) Severity: Critical Fixlet ID: 1406815 Fixlet Link: http://technet.microsoft.com/library/security/MS14-068 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows Kerberos KDC that could allow an attacker to elevate unprivileged domain user account privileges to those of the domain administrator account. An attacker could use these elevated privileges to compromise any computer in the domain, including domain controllers. An attacker must have valid domain credentials to exploit this vulnerability. The affected component is available remotely to users who have standard user accounts with domain credentials; this is not the case for users with local account credentials only. When this security bulletin was issued, Microsoft was aware of limited, targeted attacks that attempt to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-068: Vulnerability in Kerberos Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3011780 (Japanese) Severity: Critical Fixlet ID: 1406817 Fixlet Link: http://technet.microsoft.com/library/security/MS14-068 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows Kerberos KDC that could allow an attacker to elevate unprivileged domain user account privileges to those of the domain administrator account. An attacker could use these elevated privileges to compromise any computer in the domain, including domain controllers. An attacker must have valid domain credentials to exploit this vulnerability. The affected component is available remotely to users who have standard user accounts with domain credentials; this is not the case for users with local account credentials only. When this security bulletin was issued, Microsoft was aware of limited, targeted attacks that attempt to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-068: Vulnerability in Kerberos Could Allow Elevation of Privilege - Windows Vista SP2 - KB3011780 (Japanese) Severity: N/A Fixlet ID: 1406819 Fixlet Link: http://technet.microsoft.com/library/security/MS14-068 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows Kerberos KDC that could allow an attacker to elevate unprivileged domain user account privileges to those of the domain administrator account. An attacker could use these elevated privileges to compromise any computer in the domain, including domain controllers. An attacker must have valid domain credentials to exploit this vulnerability. The affected component is available remotely to users who have standard user accounts with domain credentials; this is not the case for users with local account credentials only. When this security bulletin was issued, Microsoft was aware of limited, targeted attacks that attempt to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-068: Vulnerability in Kerberos Could Allow Elevation of Privilege - Windows 8.1 Gold - KB3011780 (Japanese) Severity: N/A Fixlet ID: 1406821 Fixlet Link: http://technet.microsoft.com/library/security/MS14-068 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows Kerberos KDC that could allow an attacker to elevate unprivileged domain user account privileges to those of the domain administrator account. An attacker could use these elevated privileges to compromise any computer in the domain, including domain controllers. An attacker must have valid domain credentials to exploit this vulnerability. The affected component is available remotely to users who have standard user accounts with domain credentials; this is not the case for users with local account credentials only. When this security bulletin was issued, Microsoft was aware of limited, targeted attacks that attempt to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-068: Vulnerability in Kerberos Could Allow Elevation of Privilege - Windows Vista SP2 - KB3011780 (x64) (Japanese) Severity: N/A Fixlet ID: 1406823 Fixlet Link: http://technet.microsoft.com/library/security/MS14-068 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows Kerberos KDC that could allow an attacker to elevate unprivileged domain user account privileges to those of the domain administrator account. An attacker could use these elevated privileges to compromise any computer in the domain, including domain controllers. An attacker must have valid domain credentials to exploit this vulnerability. The affected component is available remotely to users who have standard user accounts with domain credentials; this is not the case for users with local account credentials only. When this security bulletin was issued, Microsoft was aware of limited, targeted attacks that attempt to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-068: Vulnerability in Kerberos Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB3011780 (Japanese) Severity: Critical Fixlet ID: 1406825 Fixlet Link: http://technet.microsoft.com/library/security/MS14-068 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows Kerberos KDC that could allow an attacker to elevate unprivileged domain user account privileges to those of the domain administrator account. An attacker could use these elevated privileges to compromise any computer in the domain, including domain controllers. An attacker must have valid domain credentials to exploit this vulnerability. The affected component is available remotely to users who have standard user accounts with domain credentials; this is not the case for users with local account credentials only. When this security bulletin was issued, Microsoft was aware of limited, targeted attacks that attempt to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-068: Vulnerability in Kerberos Could Allow Elevation of Privilege - Windows Server 2012 Gold - KB3011780 (x64) (Japanese) Severity: Critical Fixlet ID: 1406827 Fixlet Link: http://technet.microsoft.com/library/security/MS14-068 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows Kerberos KDC that could allow an attacker to elevate unprivileged domain user account privileges to those of the domain administrator account. An attacker could use these elevated privileges to compromise any computer in the domain, including domain controllers. An attacker must have valid domain credentials to exploit this vulnerability. The affected component is available remotely to users who have standard user accounts with domain credentials; this is not the case for users with local account credentials only. When this security bulletin was issued, Microsoft was aware of limited, targeted attacks that attempt to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS14-068: Vulnerability in Kerberos Could Allow Elevation of Privilege - Windows 8 Gold - KB3011780 (Japanese) Severity: N/A Fixlet ID: 1406829 Fixlet Link: http://technet.microsoft.com/library/security/MS14-068 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows Kerberos KDC that could allow an attacker to elevate unprivileged domain user account privileges to those of the domain administrator account. An attacker could use these elevated privileges to compromise any computer in the domain, including domain controllers. An attacker must have valid domain credentials to exploit this vulnerability. The affected component is available remotely to users who have standard user accounts with domain credentials; this is not the case for users with local account credentials only. When this security bulletin was issued, Microsoft was aware of limited, targeted attacks that attempt to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 925474: Microsoft Exchange Server 2007 Enterprise Anti-spam Filter Updates v3.3.14227.472 - Exchange Server 2007 (x64) (Japanese) Severity: N/A Fixlet ID: 92547401 Fixlet Link: http://support.microsoft.com/kb/925474 Fixlet Description: Microsoft Exchange Server 2007 Enterprise Anti-spam Filter Updates keep the heuristics for the anti-spam content filter current.After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 925474: Microsoft Exchange Server 2007 Enterprise Block List Updates v3.3.14225.043 - Exchange Server 2007 (x64) (Japanese) Severity: N/A Fixlet ID: 92547403 Fixlet Link: http://support.microsoft.com/kb/925474 Fixlet Description: Microsoft Exchange Server 2007 Enterprise Anti-spam Filter Updates keep the heuristics for the anti-spam content filter current.After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 925474: Microsoft Exchange Server Standard Anti-spam Filter Updates v3.3.14227.472 - Exchange Server 2007 (x64) (Japanese) Severity: N/A Fixlet ID: 92547405 Fixlet Link: http://support.microsoft.com/kb/925474 Fixlet Description: Microsoft Exchange Server 2007 Enterprise Anti-spam Filter Updates keep the heuristics for the anti-spam content filter current.After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2958429: SQL Server 2012 Service Pack 2 Available (x64) (Japanese) Severity: N/A Fixlet ID: 295842901 Fixlet Link: http://msdn.microsoft.com/JA-JP/library/67cb8b3e-3d82-47f4-840d-0f12a3bff565 Fixlet Description: Microsoft has released SQL Server 2012 Service Pack 2. Microsoft SQL Server 2012 service packs are cumulative updates and upgrade all editions and service levels of SQL Server 2012 to SP2. This service pack contains up to and including SQL Server 2012 Service Pack1 Cumulative Update 9 (CU9). Important Note: SQL Server instances operating in a non-Microsoft cluster environment should be upgraded using the CLUSTERPASSIVE option. Please use the second action below to upgrade in these environments. *************************************************************** Title: 2958429: SQL Server 2012 Service Pack 2 Available (Japanese) Severity: N/A Fixlet ID: 295842903 Fixlet Link: http://msdn.microsoft.com/JA-JP/library/67cb8b3e-3d82-47f4-840d-0f12a3bff565 Fixlet Description: Microsoft has released SQL Server 2012 Service Pack 2. Microsoft SQL Server 2012 service packs are cumulative updates and upgrade all editions and service levels of SQL Server 2012 to SP2. This service pack contains up to and including SQL Server 2012 Service Pack1 Cumulative Update 9 (CU9). Important Note: SQL Server instances operating in a non-Microsoft cluster environment should be upgraded using the CLUSTERPASSIVE option. Please use the second action below to upgrade in these environments. From autonotify at us.ibm.com Sun Nov 30 02:34:21 2014 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Sun, 30 Nov 2014 02:34:21 -0800 Subject: [BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)' Message-ID: <201411301034.sAUAYMA2026492@d01av02.pok.ibm.com> Fixlet Site - 'Patches for Windows (Japanese)' Current Version: 618 Published: Sat, 29 Nov 2014 17:14:00 GMT New Fixlets: ============ *************************************************************** Title: 2589386: Update for Office 2010 - KB2589386 - Office 2010 (x64) (Japanese) Severity: N/A Fixlet ID: 258938601 Fixlet Link: http://support.microsoft.com/kb/2589386 Fixlet Description: Microsoft has released an update for Microsoft Office 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2589386: Update for Office 2010 - KB2589386 - Office 2010 (Japanese) Severity: N/A Fixlet ID: 258938603 Fixlet Link: http://support.microsoft.com/kb/2589386 Fixlet Description: Microsoft has released an update for Microsoft Office 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2597972: Update for PowerPoint 2007 - KB2597972 - PowerPoint 2007 (Japanese) Severity: N/A Fixlet ID: 259797201 Fixlet Link: http://support.microsoft.com/kb/2597972 Fixlet Description: Microsoft has released an update for Microsoft Office PowerPoint 2007 . This update provides the latest fixes to Microsoft Office PowerPoint 2007 . Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2687275: Update for Office 2010 - KB2687275 - Office 2010 (Japanese) Severity: N/A Fixlet ID: 268727501 Fixlet Link: http://support.microsoft.com/kb/2687275 Fixlet Description: Microsoft has released an update for Microsoft Office 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2687275: Update for Office 2010 - KB2687275 - Office 2010 (x64) (Japanese) Severity: N/A Fixlet ID: 268727503 Fixlet Link: http://support.microsoft.com/kb/2687275 Fixlet Description: Microsoft has released an update for Microsoft Office 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2837584: Update for SharePoint Server 2010 Excel Web App Excel Services - KB2837584 - Office Web Apps 2010 SP2 (x64) (Japanese) Severity: N/A Fixlet ID: 283758401 Fixlet Link: http://support.microsoft.com/kb/2837584 Fixlet Description: Microsoft has released an update for Microsoft Excel Web App . This update provides the latest fixes to Microsoft Excel Web App . Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2837585: Update for SharePoint Server 2010 - KB2837585 - Sharepoint Server 2010 (x64) (Japanese) Severity: N/A Fixlet ID: 283758501 Fixlet Link: http://support.microsoft.com/kb/2837585 Fixlet Description: Microsoft has released an update for Microsoft SharePoint Server 2010 . This update provides the latest fixes to Microsoft SharePoint Server 2010 . Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2837602: Update for Office 2010 - KB2837602 - Office 2010 (Japanese) Severity: N/A Fixlet ID: 283760201 Fixlet Link: http://support.microsoft.com/kb/2837602 Fixlet Description: Microsoft has released an update for Microsoft Office 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2837602: Update for Office 2010 - KB2837602 - Office 2010 (x64) (Japanese) Severity: N/A Fixlet ID: 283760203 Fixlet Link: http://support.microsoft.com/kb/2837602 Fixlet Description: Microsoft has released an update for Microsoft Office 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2837654: Update for Office 2013 - KB2837654 - Office 2013 (Japanese) Severity: N/A Fixlet ID: 283765401 Fixlet Link: http://support.microsoft.com/kb/2837654 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2837654: Update for Office 2013 - KB2837654 - Office 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 283765403 Fixlet Link: http://support.microsoft.com/kb/2837654 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2863859: Update for Access 2013 - KB2863859 - Office 2013 (Japanese) Severity: N/A Fixlet ID: 286385901 Fixlet Link: http://support.microsoft.com/kb/2863859 Fixlet Description: Microsoft has released an update for Microsoft Access 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Access 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2863859: Update for Access 2013 - KB2863859 - Office 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 286385903 Fixlet Link: http://support.microsoft.com/kb/2863859 Fixlet Description: Microsoft has released an update for Microsoft Access 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Access 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2878251: Update for PowerPoint 2010 - KB2878251 - Office 2010 (x64) (Japanese) Severity: N/A Fixlet ID: 287825101 Fixlet Link: http://support.microsoft.com/kb/2878251 Fixlet Description: Microsoft has released an update for Microsoft PowerPoint 2010 64-Bit Edition. This update provides the latest fixes to Microsoft PowerPoint 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2878251: Update for PowerPoint 2010 - KB2878251 - Office 2010 (Japanese) Severity: N/A Fixlet ID: 287825103 Fixlet Link: http://support.microsoft.com/kb/2878251 Fixlet Description: Microsoft has released an update for Microsoft PowerPoint 2010 32-Bit Edition. This update provides the latest fixes to Microsoft PowerPoint 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2881008: Update for Office 2013 - KB2881008 - Office 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 288100801 Fixlet Link: http://support.microsoft.com/kb/2881008 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2881008: Update for Office 2013 - KB2881008 - Office 2013 (Japanese) Severity: N/A Fixlet ID: 288100803 Fixlet Link: http://support.microsoft.com/kb/2881008 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2883055: Update for SharePoint Server 2013 - KB2883055 - Sharepoint Server 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 288305501 Fixlet Link: http://support.microsoft.com/kb/2883055 Fixlet Description: Microsoft has released an update for Microsoft SharePoint Enterprise Server 2013 . This update provides the latest fixes to Microsoft SharePoint Enterprise Server 2013 . Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2883099: Update for SharePoint Server 2010 - KB2883099 - Sharepoint Server 2010 (x64) (Japanese) Severity: N/A Fixlet ID: 288309901 Fixlet Link: http://support.microsoft.com/kb/2883099 Fixlet Description: Microsoft has released an update for 2010 Microsoft Business Productivity Servers . This update provides the latest fixes to 2010 Microsoft Business Productivity Servers . Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2887535: Update to Microsoft Update client - Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 288753501 Fixlet Link: http://support.microsoft.com/kb/2887535 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2887535: Update to Microsoft Update client - Windows 7 SP1 / Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 288753503 Fixlet Link: http://support.microsoft.com/kb/2887535 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2889828: Update for Office 2010 - KB2889828 (x64) (Japanese) Severity: N/A Fixlet ID: 288982801 Fixlet Link: http://support.microsoft.com/kb/2889828 Fixlet Description: Microsoft has released an update for Microsoft Office 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2889828: Update for Office 2010 - KB2889828 (Japanese) Severity: N/A Fixlet ID: 288982803 Fixlet Link: http://support.microsoft.com/kb/2889828 Fixlet Description: Microsoft has released an update for Microsoft Office 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2889835: Update for SharePoint Server 2010 Office Web Apps - KB2889835 - Office Web Apps 2010 (x64) (Japanese) Severity: N/A Fixlet ID: 288983501 Fixlet Link: http://support.microsoft.com/kb/2889835 Fixlet Description: Microsoft has released an update for Microsoft Web Applications . This update provides the latest fixes to Microsoft Web Applications . Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2889845: Update for SharePoint Server 2013 - KB2889845 - Sharepoint Server 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 288984501 Fixlet Link: http://support.microsoft.com/kb/2889845 Fixlet Description: Microsoft has released an update for Microsoft SharePoint Enterprise Server 2013 . This update provides the latest fixes to Microsoft SharePoint Enterprise Server 2013 . Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2889857: Update for Office 2013 - KB2889857 - Office 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 288985701 Fixlet Link: http://support.microsoft.com/kb/2889857 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2889857: Update for Office 2013 - KB2889857 - Office 2013 (Japanese) Severity: N/A Fixlet ID: 288985703 Fixlet Link: http://support.microsoft.com/kb/2889857 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2889935: Update for Excel 2010 - KB2889935 - Office 2010 (x64) (Japanese) Severity: N/A Fixlet ID: 288993501 Fixlet Link: http://support.microsoft.com/kb/2889935 Fixlet Description: Microsoft has released an update for Microsoft Excel 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Excel 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2889935: Update for Excel 2010 - KB2889935 - Office 2010 (Japanese) Severity: N/A Fixlet ID: 288993503 Fixlet Link: http://support.microsoft.com/kb/2889935 Fixlet Description: Microsoft has released an update for Microsoft Excel 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Excel 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2889936: Update for PowerPoint 2013 - KB2889936 - Office 2013 (Japanese) Severity: N/A Fixlet ID: 288993601 Fixlet Link: http://support.microsoft.com/kb/2889936 Fixlet Description: Microsoft has released an update for Microsoft PowerPoint 2013 32-Bit Edition. This update provides the latest fixes to Microsoft PowerPoint 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2889936: Update for PowerPoint 2013 - KB2889936 - Office 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 288993603 Fixlet Link: http://support.microsoft.com/kb/2889936 Fixlet Description: Microsoft has released an update for Microsoft PowerPoint 2013 64-Bit Edition. This update provides the latest fixes to Microsoft PowerPoint 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2899493: Update for Office 2013 - Office 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 289949301 Fixlet Link: http://support.microsoft.com/kb/2899493 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2899493: Update for Office 2013 - Office 2013 (Japanese) Severity: N/A Fixlet ID: 289949303 Fixlet Link: http://support.microsoft.com/kb/2899493 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2899494: Update for SharePoint Server 2013 - Sharepoint Server 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 289949401 Fixlet Link: http://support.microsoft.com/kb/2899494 Fixlet Description: Microsoft has released an update for Microsoft SharePoint Enterprise Server 2013 . This update provides the latest fixes to Microsoft SharePoint Enterprise Server 2013 . Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2899497: Update for Visio 2013 - Office 2013 (Japanese) Severity: N/A Fixlet ID: 289949701 Fixlet Link: http://support.microsoft.com/kb/2899497 Fixlet Description: Microsoft has released an update for Microsoft Visio 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Visio 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2899497: Update for Visio 2013 - Office 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 289949703 Fixlet Link: http://support.microsoft.com/kb/2899497 Fixlet Description: Microsoft has released an update for Microsoft Visio 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Visio 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2899500: Update for Word 2013 -Office 2013 (Japanese) Severity: N/A Fixlet ID: 289950001 Fixlet Link: http://support.microsoft.com/kb/2899500 Fixlet Description: Microsoft has released an update for Microsoft Word 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Word 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2899500: Update for Word 2013 -Office 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 289950003 Fixlet Link: http://support.microsoft.com/kb/2899500 Fixlet Description: Microsoft has released an update for Microsoft Word 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Word 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2899504: Update for Outlook 2013 - Office 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 289950401 Fixlet Link: http://support.microsoft.com/kb/2899504 Fixlet Description: Microsoft has released an update for Microsoft Outlook 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Outlook 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2899504: Update for Outlook 2013 - Office 2013 (Japanese) Severity: N/A Fixlet ID: 289950403 Fixlet Link: http://support.microsoft.com/kb/2899504 Fixlet Description: Microsoft has released an update for Microsoft Outlook 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Outlook 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2899507: Update for Lync 2013 - Office 2013 (Japanese) Severity: N/A Fixlet ID: 289950705 Fixlet Link: http://support.microsoft.com/kb/2899507 Fixlet Description: Microsoft has released an update for Microsoft Lync 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Lync 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2899507: Update for Lync 2013 - Office 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 289950711 Fixlet Link: http://support.microsoft.com/kb/2899507 Fixlet Description: Microsoft has released an update for Microsoft Lync 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Lync 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2899508: Update for SharePoint Foundation 2013 - Sharepoint Foundation 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 289950801 Fixlet Link: http://support.microsoft.com/kb/2899508 Fixlet Description: Microsoft has released an update for Microsoft SharePoint Foundation 2013 . This update provides the latest fixes to Microsoft SharePoint Foundation 2013 . Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2899509: Update for Excel 2013 - Office 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 289950901 Fixlet Link: http://support.microsoft.com/kb/2899509 Fixlet Description: Microsoft has released an update for Microsoft Excel 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Excel 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2899509: Update for Excel 2013 - Office 2013 (Japanese) Severity: N/A Fixlet ID: 289950903 Fixlet Link: http://support.microsoft.com/kb/2899509 Fixlet Description: Microsoft has released an update for Microsoft Excel 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Excel 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2899510: Update for Office 2013 - Office 2013 (Japanese) Severity: N/A Fixlet ID: 289951001 Fixlet Link: http://support.microsoft.com/kb/2899510 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2899510: Update for Office 2013 - Office 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 289951003 Fixlet Link: http://support.microsoft.com/kb/2899510 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2899513: Update for OneDrive for Business - OneDrive Business (Japanese) Severity: N/A Fixlet ID: 289951301 Fixlet Link: http://support.microsoft.com/kb/2899513 Fixlet Description: Microsoft has released an update for Microsoft OneDrive for Business 32-Bit Edition. This update provides the latest fixes to Microsoft OneDrive for Business 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2899513: Update for OneDrive for Business - OneDrive Business (x64) (Japanese) Severity: N/A Fixlet ID: 289951303 Fixlet Link: http://support.microsoft.com/kb/2899513 Fixlet Description: Microsoft has released an update for Microsoft OneDrive for Business 64-Bit Edition. This update provides the latest fixes to Microsoft OneDrive for Business 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2899515: Update for SharePoint Server 2010 - Sharepoint Server 2010 (x64) (Japanese) Severity: N/A Fixlet ID: 289951501 Fixlet Link: http://support.microsoft.com/kb/2899515 Fixlet Description: Microsoft has released an update for Microsoft SharePoint Server 2010 . This update provides the latest fixes to Microsoft SharePoint Server 2010 . Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2899520: Update for SharePoint Server 2010 Office Web Apps - Office Web Apps (x64) (Japanese) Severity: N/A Fixlet ID: 289952001 Fixlet Link: http://support.microsoft.com/kb/2899520 Fixlet Description: Microsoft has released an update for Microsoft Web Applications . This update provides the latest fixes to Microsoft Web Applications . Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2899525: Update for Outlook 2007 Junk Email Filter - Office 2007 (Japanese) Severity: N/A Fixlet ID: 289952501 Fixlet Link: http://support.microsoft.com/kb/2899525 Fixlet Description: This update provides the Junk E-mail Filter in Microsoft Office Outlook 2007 Junk Email Filter with a more current definition of which e-mail messages should be considered junk e-mail. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3000853: Update rollup for Windows RT, Windows 8, and Windows Server 2012 - KB3000853 - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 300085301 Fixlet Link: http://support.microsoft.com/kb/3000853 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 3000853: Update rollup for Windows RT, Windows 8, and Windows Server 2012 - KB3000853 - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 300085303 Fixlet Link: http://support.microsoft.com/kb/3000853 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 3000853: Update rollup for Windows RT, Windows 8, and Windows Server 2012 - KB3000853 - Windows Server 2012 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 300085305 Fixlet Link: http://support.microsoft.com/kb/3000853 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 3000853: Update rollup for Windows RT, Windows 8, and Windows Server 2012 - KB2996928 - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 300085307 Fixlet Link: http://support.microsoft.com/kb/3000853 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 3000853: Update rollup for Windows RT, Windows 8, and Windows Server 2012 - KB2996928 - Windows Server 2012 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 300085309 Fixlet Link: http://support.microsoft.com/kb/3000853 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 3000853: Update rollup for Windows RT, Windows 8, and Windows Server 2012 - KB2996928 - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 300085311 Fixlet Link: http://support.microsoft.com/kb/3000853 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 3003663: Update to support many camera-specific file formats in Windows 8 and Windows RT - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 300366301 Fixlet Link: http://support.microsoft.com/kb/3003663 Fixlet Description: The update lets users view supported RAW camera files in Windows Explorer, in built-in photo applications, and in other Windows-based applications that use Windows Imaging Codecs. *************************************************************** Title: 3003663: Update to support many camera-specific file formats in Windows 8 and Windows RT - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 300366303 Fixlet Link: http://support.microsoft.com/kb/3003663 Fixlet Description: The update lets users view supported RAW camera files in Windows Explorer, in built-in photo applications, and in other Windows-based applications that use Windows Imaging Codecs. *************************************************************** Title: 3003667: Update to support many camera-specific file formats in Windows 8.1 and Windows RT 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 300366701 Fixlet Link: http://support.microsoft.com/kb/3003667 Fixlet Description: Installing the Microsoft Camera Codec Pack enables the viewing of a variety of device-specific file formats and will allow supported RAW camera files to be viewable in applications in Windows. *************************************************************** Title: 3003667: Update to support many camera-specific file formats in Windows 8.1 and Windows RT 8.1 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 300366703 Fixlet Link: http://support.microsoft.com/kb/3003667 Fixlet Description: Installing the Microsoft Camera Codec Pack enables the viewing of a variety of device-specific file formats and will allow supported RAW camera files to be viewable in applications in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3006178: MDM client update in Windows 8.1 and Windows RT 8.1 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 300617801 Fixlet Link: http://support.microsoft.com/kb/3006178 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3006178: MDM client update in Windows 8.1 and Windows RT 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 300617803 Fixlet Link: http://support.microsoft.com/kb/3006178 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3006958: Windows 8.1-based computer freezes when you load a push-button reset recovery image - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 300695801 Fixlet Link: http://support.microsoft.com/kb/3006958 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3006958: Windows 8.1-based computer freezes when you load a push-button reset recovery image - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 300695803 Fixlet Link: http://support.microsoft.com/kb/3006958 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3008188: Windows Update client improvements in Windows 8.1 or Windows Server 2012 R2 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 300818801 Fixlet Link: http://support.microsoft.com/kb/3008188 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3008188: Windows Update client improvements in Windows 8.1 or Windows Server 2012 R2 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 300818803 Fixlet Link: http://support.microsoft.com/kb/3008188 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3008188: Windows Update client improvements in Windows 8.1 or Windows Server 2012 R2 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 300818805 Fixlet Link: http://support.microsoft.com/kb/3008188 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3008627: Unexpected UAC prompt after you install update 2918614 in Windows - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 300862701 Fixlet Link: http://support.microsoft.com/kb/3008627 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3008627: Unexpected UAC prompt after you install update 2918614 in Windows - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 300862703 Fixlet Link: http://support.microsoft.com/kb/3008627 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3008627: Unexpected UAC prompt after you install update 2918614 in Windows - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 300862705 Fixlet Link: http://support.microsoft.com/kb/3008627 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3008627: Unexpected UAC prompt after you install update 2918614 in Windows - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 300862707 Fixlet Link: http://support.microsoft.com/kb/3008627 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3008627: Unexpected UAC prompt after you install update 2918614 in Windows - Windows Server 2008 SP2 (x64) (Japanese) Severity: N/A Fixlet ID: 300862711 Fixlet Link: http://support.microsoft.com/kb/3008627 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3008627: Unexpected UAC prompt after you install update 2918614 in Windows - Windows Server 2008 SP2 (Japanese) Severity: N/A Fixlet ID: 300862715 Fixlet Link: http://support.microsoft.com/kb/3008627 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3008627: Unexpected UAC prompt after you install update 2918614 in Windows - Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 300862717 Fixlet Link: http://support.microsoft.com/kb/3008627 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3008627: Unexpected UAC prompt after you install update 2918614 in Windows - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 300862719 Fixlet Link: http://support.microsoft.com/kb/3008627 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3008627: Unexpected UAC prompt after you install update 2918614 in Windows - Windows 7 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 300862721 Fixlet Link: http://support.microsoft.com/kb/3008627 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3008627: Unexpected UAC prompt after you install update 2918614 in Windows - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 300862723 Fixlet Link: http://support.microsoft.com/kb/3008627 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3018943: Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows Server 2012 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 301894301 Fixlet Link: http://support2.microsoft.com/kb/3018943 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 3018943: Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 301894303 Fixlet Link: http://support2.microsoft.com/kb/3018943 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 3018943: Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 301894307 Fixlet Link: http://support2.microsoft.com/kb/3018943 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 3018943: Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 301894309 Fixlet Link: http://support2.microsoft.com/kb/3018943 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 3018943: Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 301894311 Fixlet Link: http://support2.microsoft.com/kb/3018943 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 3018943: Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 301894313 Fixlet Link: http://support2.microsoft.com/kb/3018943 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.