[BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)'

autonotify at us.ibm.com autonotify at us.ibm.com
Fri Nov 14 02:34:20 PST 2014


Fixlet Site - 'Patches for Windows (Japanese)'
Current Version: 616	Published: Thu, 13 Nov 2014 09:33:19  GMT

New Fixlets:
============

***************************************************************
Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3006226 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406401
Fixlet Link: http://technet.microsoft.com/library/security/MS14-064

Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Server 2012 R2 Gold - KB3006226 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406403
Fixlet Link: http://technet.microsoft.com/library/security/MS14-064

Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB3006226 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406405
Fixlet Link: http://technet.microsoft.com/library/security/MS14-064

Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3006226 (Japanese)
Severity: Critical
Fixlet ID: 1406407
Fixlet Link: http://technet.microsoft.com/library/security/MS14-064

Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Server 2012 Gold - KB3006226 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406409
Fixlet Link: http://technet.microsoft.com/library/security/MS14-064

Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Vista SP2 - KB3006226 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406411
Fixlet Link: http://technet.microsoft.com/library/security/MS14-064

Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows 7 SP1 - KB3006226 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406413
Fixlet Link: http://technet.microsoft.com/library/security/MS14-064

Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3006226 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406415
Fixlet Link: http://technet.microsoft.com/library/security/MS14-064

Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3006226 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1406416
Fixlet Link: http://technet.microsoft.com/library/security/MS14-064

***************************************************************
Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows 7 SP1 - KB3010788 (Japanese)
Severity: Critical
Fixlet ID: 1406417
Fixlet Link: http://technet.microsoft.com/library/security/MS14-064

Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows 8 Gold - KB3006226 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406419
Fixlet Link: http://technet.microsoft.com/library/security/MS14-064

Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Server 2012 Gold - KB3010788 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406421
Fixlet Link: http://technet.microsoft.com/library/security/MS14-064

Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Vista SP2 - KB3006226 (Japanese)
Severity: Critical
Fixlet ID: 1406423
Fixlet Link: http://technet.microsoft.com/library/security/MS14-064

Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows 8 Gold - KB3010788 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406425
Fixlet Link: http://technet.microsoft.com/library/security/MS14-064

Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows 8 Gold - KB3006226 (Japanese)
Severity: Critical
Fixlet ID: 1406427
Fixlet Link: http://technet.microsoft.com/library/security/MS14-064

Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3010788 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406429
Fixlet Link: http://technet.microsoft.com/library/security/MS14-064

Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows 7 SP1 - KB3010788 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406431
Fixlet Link: http://technet.microsoft.com/library/security/MS14-064

Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3010788 (Japanese)
Severity: Critical
Fixlet ID: 1406433
Fixlet Link: http://technet.microsoft.com/library/security/MS14-064

Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows 8.1 Gold - KB3006226 (Japanese)
Severity: Critical
Fixlet ID: 1406435
Fixlet Link: http://technet.microsoft.com/library/security/MS14-064

Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows 8 Gold - KB3010788 (Japanese)
Severity: Critical
Fixlet ID: 1406437
Fixlet Link: http://technet.microsoft.com/library/security/MS14-064

Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Vista SP2 - KB3010788 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406439
Fixlet Link: http://technet.microsoft.com/library/security/MS14-064

Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows 8.1 Gold - KB3010788 (Japanese)
Severity: Critical
Fixlet ID: 1406441
Fixlet Link: http://technet.microsoft.com/library/security/MS14-064

Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Server 2012 R2 Gold - KB3010788 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406443
Fixlet Link: http://technet.microsoft.com/library/security/MS14-064

Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows 8.1 Gold - KB3010788 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406445
Fixlet Link: http://technet.microsoft.com/library/security/MS14-064

Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows 7 SP1 - KB3006226 (Japanese)
Severity: Critical
Fixlet ID: 1406447
Fixlet Link: http://technet.microsoft.com/library/security/MS14-064

Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows 8.1 Gold - KB3006226 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406449
Fixlet Link: http://technet.microsoft.com/library/security/MS14-064

Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Vista SP2 - KB3010788 (Japanese)
Severity: Critical
Fixlet ID: 1406451
Fixlet Link: http://technet.microsoft.com/library/security/MS14-064

Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3006226 (Japanese)
Severity: Critical
Fixlet ID: 1406453
Fixlet Link: http://technet.microsoft.com/library/security/MS14-064

Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3006226 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1406454
Fixlet Link: http://technet.microsoft.com/library/security/MS14-064

***************************************************************
Title: MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB3010788 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406455
Fixlet Link: http://technet.microsoft.com/library/security/MS14-064

Fixlet Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows Object Linking and Embedding ( OLE ). The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 8 - KB3003057 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1406501
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 7 - KB3003057 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1406503
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 7 - KB3003057 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1406504
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 8 - KB3003057 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406505
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2012 Gold - IE 10 - KB3003057 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1406507
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 11 - KB3003057 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406509
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 7 - KB3003057 (Japanese)
Severity: Moderate
Fixlet ID: 1406511
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 7 - KB3003057 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1406512
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 9 - KB3003057 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406513
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 11 - KB3003057 (Japanese)
Severity: Critical
Fixlet ID: 1406515
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 10 - KB3003057 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406517
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 9 - KB3003057 (Japanese)
Severity: Moderate
Fixlet ID: 1406519
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 8 - KB3003057 (Japanese)
Severity: Critical
Fixlet ID: 1406521
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 9 - KB3003057 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1406523
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 6 - KB3003057 (Japanese)
Severity: Moderate
Fixlet ID: 1406525
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 6 - KB3003057 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1406526
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 7 - KB3003057 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406527
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 9 - KB3003057 (Japanese)
Severity: Critical
Fixlet ID: 1406529
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 11 - KB3003057 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1406531
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows 8.1 Gold - IE 11 - KB3003057 (Japanese)
Severity: Critical
Fixlet ID: 1406533
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 10 - KB3003057 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1406535
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 6 - KB3003057 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1406537
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 6 - KB3003057 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1406538
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 7 - KB3003057 (Japanese)
Severity: Moderate
Fixlet ID: 1406539
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows 8.1 Gold - IE 11 - KB3003057 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406541
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 10 - KB3003057 (Japanese)
Severity: Critical
Fixlet ID: 1406543
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows 8 Gold - IE 10 - KB3003057 (Japanese)
Severity: Critical
Fixlet ID: 1406545
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 7 - KB3003057 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1406547
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 9 - KB3003057 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406549
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows 8 Gold - IE 10 - KB3003057 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406551
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2012 R2 Gold - IE 11 - KB3003057 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1406553
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 9 - KB3003057 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1406555
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 7 - KB3003057 (Japanese)
Severity: Critical
Fixlet ID: 1406557
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 9 - KB3003057 (Japanese)
Severity: Critical
Fixlet ID: 1406559
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 8 - KB3003057 (Japanese)
Severity: Moderate
Fixlet ID: 1406561
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 8 - KB3003057 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1406562
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 8 - KB3003057 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1406563
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 8 - KB3003057 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1406564
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 8 - KB3003057 (Japanese)
Severity: Critical
Fixlet ID: 1406565
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 8 - KB3003057 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406567
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 8 - KB3003057 (Japanese)
Severity: Moderate
Fixlet ID: 1406569
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-065: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 8 - KB3003057 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1406571
Fixlet Link: http://technet.microsoft.com/library/security/MS14-065

Fixlet Description: This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows 8.1 Gold - KB2992611 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406601
Fixlet Link: http://technet.microsoft.com/library/security/MS14-066

Fixlet Description: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB2992611 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406603
Fixlet Link: http://technet.microsoft.com/library/security/MS14-066

Fixlet Description: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB2992611 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406605
Fixlet Link: http://technet.microsoft.com/library/security/MS14-066

Fixlet Description: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB2992611 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1406606
Fixlet Link: http://technet.microsoft.com/library/security/MS14-066

***************************************************************
Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB2992611 (Japanese)
Severity: Critical
Fixlet ID: 1406607
Fixlet Link: http://technet.microsoft.com/library/security/MS14-066

Fixlet Description: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB2992611 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1406608
Fixlet Link: http://technet.microsoft.com/library/security/MS14-066

***************************************************************
Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB2992611 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406609
Fixlet Link: http://technet.microsoft.com/library/security/MS14-066

Fixlet Description: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB2992611 (Japanese)
Severity: Critical
Fixlet ID: 1406611
Fixlet Link: http://technet.microsoft.com/library/security/MS14-066

Fixlet Description: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows 7 SP1 - KB2992611 (Japanese)
Severity: Critical
Fixlet ID: 1406613
Fixlet Link: http://technet.microsoft.com/library/security/MS14-066

Fixlet Description: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows Server 2012 R2 Gold - KB2992611 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406615
Fixlet Link: http://technet.microsoft.com/library/security/MS14-066

Fixlet Description: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows Vista SP2 - KB2992611 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406617
Fixlet Link: http://technet.microsoft.com/library/security/MS14-066

Fixlet Description: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows 8 Gold - KB2992611 (Japanese)
Severity: Critical
Fixlet ID: 1406619
Fixlet Link: http://technet.microsoft.com/library/security/MS14-066

Fixlet Description: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows Vista SP2 - KB2992611 (Japanese)
Severity: Critical
Fixlet ID: 1406621
Fixlet Link: http://technet.microsoft.com/library/security/MS14-066

Fixlet Description: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows 8 Gold - KB2992611 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406623
Fixlet Link: http://technet.microsoft.com/library/security/MS14-066

Fixlet Description: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows Server 2012 Gold - KB2992611 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406625
Fixlet Link: http://technet.microsoft.com/library/security/MS14-066

Fixlet Description: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows 8.1 Gold - KB2992611 (Japanese)
Severity: Critical
Fixlet ID: 1406627
Fixlet Link: http://technet.microsoft.com/library/security/MS14-066

Fixlet Description: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution - Windows 7 SP1 - KB2992611 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406629
Fixlet Link: http://technet.microsoft.com/library/security/MS14-066

Fixlet Description: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows 8 Gold - KB2993958 (Japanese)
Severity: Critical
Fixlet ID: 1406701
Fixlet Link: http://technet.microsoft.com/library/security/MS14-067

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a logged-on user visits a specially crafted website that is designed to invoke Microsoft XML Core Services (MSXML) through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows Vista SP2 - KB2993958 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406703
Fixlet Link: http://technet.microsoft.com/library/security/MS14-067

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a logged-on user visits a specially crafted website that is designed to invoke Microsoft XML Core Services (MSXML) through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB2993958 (x64) (Japanese)
Severity: Important
Fixlet ID: 1406705
Fixlet Link: http://technet.microsoft.com/library/security/MS14-067

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a logged-on user visits a specially crafted website that is designed to invoke Microsoft XML Core Services (MSXML) through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB2993958 (x64) (Japanese)
Severity: Important
Fixlet ID: 1406707
Fixlet Link: http://technet.microsoft.com/library/security/MS14-067

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a logged-on user visits a specially crafted website that is designed to invoke Microsoft XML Core Services (MSXML) through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows 8.1 Gold - KB2993958 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406709
Fixlet Link: http://technet.microsoft.com/library/security/MS14-067

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a logged-on user visits a specially crafted website that is designed to invoke Microsoft XML Core Services (MSXML) through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows Server 2012 R2 Gold - KB2993958 (x64) (Japanese)
Severity: Important
Fixlet ID: 1406711
Fixlet Link: http://technet.microsoft.com/library/security/MS14-067

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a logged-on user visits a specially crafted website that is designed to invoke Microsoft XML Core Services (MSXML) through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows 7 SP1 - KB2993958 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406713
Fixlet Link: http://technet.microsoft.com/library/security/MS14-067

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a logged-on user visits a specially crafted website that is designed to invoke Microsoft XML Core Services (MSXML) through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB2993958 (Japanese)
Severity: Important
Fixlet ID: 1406715
Fixlet Link: http://technet.microsoft.com/library/security/MS14-067

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a logged-on user visits a specially crafted website that is designed to invoke Microsoft XML Core Services (MSXML) through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB2993958 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1406716
Fixlet Link: http://technet.microsoft.com/library/security/MS14-067

***************************************************************
Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows Vista SP2 - KB2993958 (Japanese)
Severity: Critical
Fixlet ID: 1406717
Fixlet Link: http://technet.microsoft.com/library/security/MS14-067

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a logged-on user visits a specially crafted website that is designed to invoke Microsoft XML Core Services (MSXML) through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows 7 SP1 - KB2993958 (Japanese)
Severity: Critical
Fixlet ID: 1406719
Fixlet Link: http://technet.microsoft.com/library/security/MS14-067

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a logged-on user visits a specially crafted website that is designed to invoke Microsoft XML Core Services (MSXML) through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows Server 2012 Gold - KB2993958 (x64) (Japanese)
Severity: Important
Fixlet ID: 1406721
Fixlet Link: http://technet.microsoft.com/library/security/MS14-067

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a logged-on user visits a specially crafted website that is designed to invoke Microsoft XML Core Services (MSXML) through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB2993958 (x64) (Japanese)
Severity: Important
Fixlet ID: 1406723
Fixlet Link: http://technet.microsoft.com/library/security/MS14-067

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a logged-on user visits a specially crafted website that is designed to invoke Microsoft XML Core Services (MSXML) through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB2993958 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1406724
Fixlet Link: http://technet.microsoft.com/library/security/MS14-067

***************************************************************
Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB2993958 (Japanese)
Severity: Important
Fixlet ID: 1406725
Fixlet Link: http://technet.microsoft.com/library/security/MS14-067

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a logged-on user visits a specially crafted website that is designed to invoke Microsoft XML Core Services (MSXML) through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows 8.1 Gold - KB2993958 (Japanese)
Severity: Critical
Fixlet ID: 1406727
Fixlet Link: http://technet.microsoft.com/library/security/MS14-067

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a logged-on user visits a specially crafted website that is designed to invoke Microsoft XML Core Services (MSXML) through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-067: Vulnerability in XML Core Services Could Allow Remote Code Execution - Windows 8 Gold - KB2993958 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1406729
Fixlet Link: http://technet.microsoft.com/library/security/MS14-067

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a logged-on user visits a specially crafted website that is designed to invoke Microsoft XML Core Services (MSXML) through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-069: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Word 2007 SP3 - KB2899527 (Japanese)
Severity: Important
Fixlet ID: 1406901
Fixlet Link: http://technet.microsoft.com/library/security/MS14-069

Fixlet Description: This security update resolves three privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a specially crafted file is opened in an affected edition of Microsoft Office 2007. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-069: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office Compatibility Pack SP3 - KB2899526 (Japanese)
Severity: Important
Fixlet ID: 1406903
Fixlet Link: http://technet.microsoft.com/library/security/MS14-069

Fixlet Description: This security update resolves three privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a specially crafted file is opened in an affected edition of Microsoft Office 2007. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-069: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Word Viewer - KB2899553 (Japanese)
Severity: Important
Fixlet ID: 1406905
Fixlet Link: http://technet.microsoft.com/library/security/MS14-069

Fixlet Description: This security update resolves three privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a specially crafted file is opened in an affected edition of Microsoft Office 2007. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-070: Vulnerability in TCP/IP Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB2989935 (Japanese)
Severity: Important
Fixlet ID: 1407001
Fixlet Link: http://technet.microsoft.com/library/security/MS14-070

Fixlet Description: This security update resolves a publically reported vulnerability in TCP/IP that occurs during input/output control (IOCTL) processing. This vulnerability could allow elevation of privilege if an attacker logs on to a system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of another process. If this process runs with administrator privileges, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-070: Vulnerability in TCP/IP Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB2989935 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1407002
Fixlet Link: http://technet.microsoft.com/library/security/MS14-070

***************************************************************
Title: MS14-070: Vulnerability in TCP/IP Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB2989935 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407003
Fixlet Link: http://technet.microsoft.com/library/security/MS14-070

Fixlet Description: This security update resolves a publically reported vulnerability in TCP/IP that occurs during input/output control (IOCTL) processing. This vulnerability could allow elevation of privilege if an attacker logs on to a system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of another process. If this process runs with administrator privileges, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-070: Vulnerability in TCP/IP Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB2989935 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1407004
Fixlet Link: http://technet.microsoft.com/library/security/MS14-070

***************************************************************
Title: MS14-071: Vulnerability in Windows Audio Service Could Allow Elevation of Privilege - Windows Server 2012 Gold - KB3005607 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407101
Fixlet Link: http://technet.microsoft.com/library/security/MS14-071

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an application uses the Microsoft Windows Audio service. The vulnerability by itself does not allow arbitrary code to be run. The vulnerability would have to be used in conjunction with another vulnerability that allowed remote code execution. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-071: Vulnerability in Windows Audio Service Could Allow Elevation of Privilege - Windows 8.1 Gold - KB3005607 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407103
Fixlet Link: http://technet.microsoft.com/library/security/MS14-071

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an application uses the Microsoft Windows Audio service. The vulnerability by itself does not allow arbitrary code to be run. The vulnerability would have to be used in conjunction with another vulnerability that allowed remote code execution. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-071: Vulnerability in Windows Audio Service Could Allow Elevation of Privilege - Windows Vista SP2 - KB3005607 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407105
Fixlet Link: http://technet.microsoft.com/library/security/MS14-071

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an application uses the Microsoft Windows Audio service. The vulnerability by itself does not allow arbitrary code to be run. The vulnerability would have to be used in conjunction with another vulnerability that allowed remote code execution. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-071: Vulnerability in Windows Audio Service Could Allow Elevation of Privilege - Windows Server 2012 R2 Gold - KB3005607 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407107
Fixlet Link: http://technet.microsoft.com/library/security/MS14-071

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an application uses the Microsoft Windows Audio service. The vulnerability by itself does not allow arbitrary code to be run. The vulnerability would have to be used in conjunction with another vulnerability that allowed remote code execution. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-071: Vulnerability in Windows Audio Service Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3005607 (Japanese)
Severity: Important
Fixlet ID: 1407109
Fixlet Link: http://technet.microsoft.com/library/security/MS14-071

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an application uses the Microsoft Windows Audio service. The vulnerability by itself does not allow arbitrary code to be run. The vulnerability would have to be used in conjunction with another vulnerability that allowed remote code execution. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-071: Vulnerability in Windows Audio Service Could Allow Elevation of Privilege - Windows 8 Gold - KB3005607 (Japanese)
Severity: Important
Fixlet ID: 1407111
Fixlet Link: http://technet.microsoft.com/library/security/MS14-071

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an application uses the Microsoft Windows Audio service. The vulnerability by itself does not allow arbitrary code to be run. The vulnerability would have to be used in conjunction with another vulnerability that allowed remote code execution. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-071: Vulnerability in Windows Audio Service Could Allow Elevation of Privilege - Windows 7 SP1 - KB3005607 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407113
Fixlet Link: http://technet.microsoft.com/library/security/MS14-071

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an application uses the Microsoft Windows Audio service. The vulnerability by itself does not allow arbitrary code to be run. The vulnerability would have to be used in conjunction with another vulnerability that allowed remote code execution. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-071: Vulnerability in Windows Audio Service Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3005607 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407115
Fixlet Link: http://technet.microsoft.com/library/security/MS14-071

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an application uses the Microsoft Windows Audio service. The vulnerability by itself does not allow arbitrary code to be run. The vulnerability would have to be used in conjunction with another vulnerability that allowed remote code execution. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-071: Vulnerability in Windows Audio Service Could Allow Elevation of Privilege - Windows Vista SP2 - KB3005607 (Japanese)
Severity: Important
Fixlet ID: 1407117
Fixlet Link: http://technet.microsoft.com/library/security/MS14-071

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an application uses the Microsoft Windows Audio service. The vulnerability by itself does not allow arbitrary code to be run. The vulnerability would have to be used in conjunction with another vulnerability that allowed remote code execution. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-071: Vulnerability in Windows Audio Service Could Allow Elevation of Privilege - Windows 8.1 Gold - KB3005607 (Japanese)
Severity: Important
Fixlet ID: 1407119
Fixlet Link: http://technet.microsoft.com/library/security/MS14-071

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an application uses the Microsoft Windows Audio service. The vulnerability by itself does not allow arbitrary code to be run. The vulnerability would have to be used in conjunction with another vulnerability that allowed remote code execution. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-071: Vulnerability in Windows Audio Service Could Allow Elevation of Privilege - Windows 7 SP1 - KB3005607 (Japanese)
Severity: Important
Fixlet ID: 1407121
Fixlet Link: http://technet.microsoft.com/library/security/MS14-071

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an application uses the Microsoft Windows Audio service. The vulnerability by itself does not allow arbitrary code to be run. The vulnerability would have to be used in conjunction with another vulnerability that allowed remote code execution. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-071: Vulnerability in Windows Audio Service Could Allow Elevation of Privilege - Windows 8 Gold - KB3005607 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407123
Fixlet Link: http://technet.microsoft.com/library/security/MS14-071

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an application uses the Microsoft Windows Audio service. The vulnerability by itself does not allow arbitrary code to be run. The vulnerability would have to be used in conjunction with another vulnerability that allowed remote code execution. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-071: Vulnerability in Windows Audio Service Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 - KB3005607 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407125
Fixlet Link: http://technet.microsoft.com/library/security/MS14-071

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an application uses the Microsoft Windows Audio service. The vulnerability by itself does not allow arbitrary code to be run. The vulnerability would have to be used in conjunction with another vulnerability that allowed remote code execution. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 2.0 SP2 - KB2978116 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407201
Fixlet Link: http://technet.microsoft.com/library/security/MS14-072

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 / Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1/4.5.2 - KB2978128 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407203
Fixlet Link: http://technet.microsoft.com/library/security/MS14-072

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows Server 2012 Gold / Windows 8 Gold - .NET Framework 4.5/4.5.1/4.5.2 - KB2978127 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407205
Fixlet Link: http://technet.microsoft.com/library/security/MS14-072

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1/4.5.2 - KB2978128 (Japanese)
Severity: Important
Fixlet ID: 1407207
Fixlet Link: http://technet.microsoft.com/library/security/MS14-072

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows Server 2003 SP2 - .NET Framework 2.0 SP2 - KB2978124 (Japanese)
Severity: Important
Fixlet ID: 1407209
Fixlet Link: http://technet.microsoft.com/library/security/MS14-072

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows 8 Gold - .NET Framework 4.5/4.5.1/4.5.2 - KB2978127 (Japanese)
Severity: Important
Fixlet ID: 1407211
Fixlet Link: http://technet.microsoft.com/library/security/MS14-072

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows 7 SP1 - .NET Framework 3.5.1 - KB2978120 (Japanese)
Severity: Important
Fixlet ID: 1407213
Fixlet Link: http://technet.microsoft.com/library/security/MS14-072

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows 8.1 Gold - .NET Framework 3.5 - KB2978122 (Japanese)
Severity: Important
Fixlet ID: 1407215
Fixlet Link: http://technet.microsoft.com/library/security/MS14-072

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 / Windows 7 SP1 - .NET Framework 3.5.1 - KB2978120 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407217
Fixlet Link: http://technet.microsoft.com/library/security/MS14-072

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows Server 2012 R2 Gold / Windows 8.1 Gold - .NET Framework 4.5.1/4.5.2 - KB2978126 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407219
Fixlet Link: http://technet.microsoft.com/library/security/MS14-072

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows Server 2003 SP2 - .NET Framework 1.1 SP1 - KB2978114 (Japanese)
Severity: Important
Fixlet ID: 1407221
Fixlet Link: http://technet.microsoft.com/library/security/MS14-072

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows Server 2003 SP2 - .NET Framework 1.1 SP1 - KB2978114 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1407222
Fixlet Link: http://technet.microsoft.com/library/security/MS14-072

***************************************************************
Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 / Windows Server 2003 SP2 - .NET Framework 4 - KB2978125 (Japanese)
Severity: Important
Fixlet ID: 1407223
Fixlet Link: http://technet.microsoft.com/library/security/MS14-072

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows Server 2003 SP2 - .NET Framework 2.0 SP2 - KB2978124 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407225
Fixlet Link: http://technet.microsoft.com/library/security/MS14-072

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 2.0 SP2 - KB2978116 (Japanese)
Severity: Important
Fixlet ID: 1407227
Fixlet Link: http://technet.microsoft.com/library/security/MS14-072

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows 8.1 Gold - .NET Framework 4.5.1/4.5.2 - KB2978126 (Japanese)
Severity: Important
Fixlet ID: 1407229
Fixlet Link: http://technet.microsoft.com/library/security/MS14-072

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows 8 Gold - .NET Framework 3.5 - KB2978121 (Japanese)
Severity: Important
Fixlet ID: 1407231
Fixlet Link: http://technet.microsoft.com/library/security/MS14-072

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows Server 2012 R2 Gold / Windows 8.1 Gold - .NET Framework 3.5 - KB2978122 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407233
Fixlet Link: http://technet.microsoft.com/library/security/MS14-072

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows Server 2012 Gold / Windows 8 Gold - .NET Framework 3.5 - KB2978121 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407235
Fixlet Link: http://technet.microsoft.com/library/security/MS14-072

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 / Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 / Windows Server 2003 SP2 - .NET Framework 4 - KB29781 (Japanese)
Severity: Important
Fixlet ID: 1407237
Fixlet Link: http://technet.microsoft.com/library/security/MS14-072

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an attacker sends specially crafted data to an affected workstation or server that uses.NET Remoting. Only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-073: Vulnerability in Microsoft SharePoint Foundation Could Allow Elevation of Privilege - SharePoint Foundation 2010 SP2 - KB2889838 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407301
Fixlet Link: http://technet.microsoft.com/library/security/MS14-073

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft SharePoint Server. An authenticated attacker who successfully exploited this vulnerability could run arbitrary script in the context of the user on the current SharePoint site. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit these vulnerabilities and then convince a user to view the website. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit these vulnerabilities. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to the attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-074: Vulnerability in Remote Desktop Protocol Could Allow Security Feature Bypass - Windows 8 Gold - KB3003743 (Japanese)
Severity: Important
Fixlet ID: 1407401
Fixlet Link: http://technet.microsoft.com/library/security/MS14-074

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass when Remote Desktop Protocol (RDP) fails to properly log audit events. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-074: Vulnerability in Remote Desktop Protocol Could Allow Security Feature Bypass - Windows Vista SP2 - KB3003743 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407403
Fixlet Link: http://technet.microsoft.com/library/security/MS14-074

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass when Remote Desktop Protocol (RDP) fails to properly log audit events. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-074: Vulnerability in Remote Desktop Protocol Could Allow Security Feature Bypass - Windows Vista SP2 - KB3003743 (Japanese)
Severity: Important
Fixlet ID: 1407405
Fixlet Link: http://technet.microsoft.com/library/security/MS14-074

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass when Remote Desktop Protocol (RDP) fails to properly log audit events. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-074: Vulnerability in Remote Desktop Protocol Could Allow Security Feature Bypass - Windows 8.1 Gold - KB3003743 (Japanese)
Severity: Important
Fixlet ID: 1407407
Fixlet Link: http://technet.microsoft.com/library/security/MS14-074

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass when Remote Desktop Protocol (RDP) fails to properly log audit events. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-074: Vulnerability in Remote Desktop Protocol Could Allow Security Feature Bypass - Windows 7 SP1 - KB3003743 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407409
Fixlet Link: http://technet.microsoft.com/library/security/MS14-074

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass when Remote Desktop Protocol (RDP) fails to properly log audit events. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-074: Vulnerability in Remote Desktop Protocol Could Allow Security Feature Bypass - Windows 7 SP1 - KB3003743 (Japanese)
Severity: Important
Fixlet ID: 1407411
Fixlet Link: http://technet.microsoft.com/library/security/MS14-074

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass when Remote Desktop Protocol (RDP) fails to properly log audit events. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-074: Vulnerability in Remote Desktop Protocol Could Allow Security Feature Bypass - Windows 8 Gold - KB3003743 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407413
Fixlet Link: http://technet.microsoft.com/library/security/MS14-074

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass when Remote Desktop Protocol (RDP) fails to properly log audit events. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-074: Vulnerability in Remote Desktop Protocol Could Allow Security Feature Bypass - Windows Server 2008 SP2 - KB3003743 (Japanese)
Severity: Important
Fixlet ID: 1407415
Fixlet Link: http://technet.microsoft.com/library/security/MS14-074

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass when Remote Desktop Protocol (RDP) fails to properly log audit events. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-074: Vulnerability in Remote Desktop Protocol Could Allow Security Feature Bypass - Windows 8.1 Gold - KB3003743 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407417
Fixlet Link: http://technet.microsoft.com/library/security/MS14-074

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass when Remote Desktop Protocol (RDP) fails to properly log audit events. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-074: Vulnerability in Remote Desktop Protocol Could Allow Security Feature Bypass - Windows Server 2012 Gold - KB3003743 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407419
Fixlet Link: http://technet.microsoft.com/library/security/MS14-074

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass when Remote Desktop Protocol (RDP) fails to properly log audit events. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-074: Vulnerability in Remote Desktop Protocol Could Allow Security Feature Bypass - Windows Server 2008 SP2 - KB3003743 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407421
Fixlet Link: http://technet.microsoft.com/library/security/MS14-074

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass when Remote Desktop Protocol (RDP) fails to properly log audit events. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-074: Vulnerability in Remote Desktop Protocol Could Allow Security Feature Bypass - Windows Server 2012 R2 Gold - KB3003743 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407423
Fixlet Link: http://technet.microsoft.com/library/security/MS14-074

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass when Remote Desktop Protocol (RDP) fails to properly log audit events. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-074: Vulnerability in Remote Desktop Protocol Could Allow Security Feature Bypass - Windows Server 2008 R2 SP1 - KB3003743 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407425
Fixlet Link: http://technet.microsoft.com/library/security/MS14-074

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass when Remote Desktop Protocol (RDP) fails to properly log audit events. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-076: Vulnerability in Internet Information Services (IIS) Could Allow Security Feature Bypass - Windows 8.1 Gold - IIS 8.5 - KB2982998 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407601
Fixlet Link: http://technet.microsoft.com/library/security/MS14-076

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Internet Information Services (IIS) that could lead to a bypass of the "IP and domain restrictions" security feature. Successful exploitation of this vulnerability could result in clients from restricted or blocked domains having access to restricted web resources. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-076: Vulnerability in Internet Information Services (IIS) Could Allow Security Feature Bypass - Windows 8.1 Gold - IIS 8.5 - KB2982998 (Japanese)
Severity: Important
Fixlet ID: 1407603
Fixlet Link: http://technet.microsoft.com/library/security/MS14-076

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Internet Information Services (IIS) that could lead to a bypass of the "IP and domain restrictions" security feature. Successful exploitation of this vulnerability could result in clients from restricted or blocked domains having access to restricted web resources. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-076: Vulnerability in Internet Information Services (IIS) Could Allow Security Feature Bypass - Windows 8 Gold - IIS 8.0 - KB2982998 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407605
Fixlet Link: http://technet.microsoft.com/library/security/MS14-076

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Internet Information Services (IIS) that could lead to a bypass of the "IP and domain restrictions" security feature. Successful exploitation of this vulnerability could result in clients from restricted or blocked domains having access to restricted web resources. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-076: Vulnerability in Internet Information Services (IIS) Could Allow Security Feature Bypass - Windows Server 2012 Gold - IIS 8.0 - KB2982998 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407607
Fixlet Link: http://technet.microsoft.com/library/security/MS14-076

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Internet Information Services (IIS) that could lead to a bypass of the "IP and domain restrictions" security feature. Successful exploitation of this vulnerability could result in clients from restricted or blocked domains having access to restricted web resources. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-076: Vulnerability in Internet Information Services (IIS) Could Allow Security Feature Bypass - Windows Server 2012 R2 Gold - IIS 8.5 - KB2982998 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407609
Fixlet Link: http://technet.microsoft.com/library/security/MS14-076

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Internet Information Services (IIS) that could lead to a bypass of the "IP and domain restrictions" security feature. Successful exploitation of this vulnerability could result in clients from restricted or blocked domains having access to restricted web resources. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-076: Vulnerability in Internet Information Services (IIS) Could Allow Security Feature Bypass - Windows 8 Gold - IIS 8.0 - KB2982998 (Japanese)
Severity: Important
Fixlet ID: 1407611
Fixlet Link: http://technet.microsoft.com/library/security/MS14-076

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Internet Information Services (IIS) that could lead to a bypass of the "IP and domain restrictions" security feature. Successful exploitation of this vulnerability could result in clients from restricted or blocked domains having access to restricted web resources. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-077: Vulnerability in Active Directory Federation Services Could Allow Information Disclosure - Windows Server 2008 SP2 - ADFS 2.0 - KB3003381 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407701
Fixlet Link: http://technet.microsoft.com/library/security/MS14-077

Fixlet Description: This security update resolves a privately reported vulnerability in Active Directory Federation Services (AD FS). The vulnerability could allow information disclosure if a user leaves their browser open after logging off from an application, and an attacker reopens the application in the browser immediately after the user has logged off. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-077: Vulnerability in Active Directory Federation Services Could Allow Information Disclosure - Windows Server 2012 R2 Gold - ADFS 3.0 - KB3003381 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407703
Fixlet Link: http://technet.microsoft.com/library/security/MS14-077

Fixlet Description: This security update resolves a privately reported vulnerability in Active Directory Federation Services (AD FS). The vulnerability could allow information disclosure if a user leaves their browser open after logging off from an application, and an attacker reopens the application in the browser immediately after the user has logged off. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-077: Vulnerability in Active Directory Federation Services Could Allow Information Disclosure - Windows Server 2008 R2 SP1 - ADFS 2.0 - KB3003381 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407705
Fixlet Link: http://technet.microsoft.com/library/security/MS14-077

Fixlet Description: This security update resolves a privately reported vulnerability in Active Directory Federation Services (AD FS). The vulnerability could allow information disclosure if a user leaves their browser open after logging off from an application, and an attacker reopens the application in the browser immediately after the user has logged off. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-077: Vulnerability in Active Directory Federation Services Could Allow Information Disclosure - Windows Server 2012 Gold - ADFS 2.1 - KB3003381 (x64) (Japanese)
Severity: Important
Fixlet ID: 1407707
Fixlet Link: http://technet.microsoft.com/library/security/MS14-077

Fixlet Description: This security update resolves a privately reported vulnerability in Active Directory Federation Services (AD FS). The vulnerability could allow information disclosure if a user leaves their browser open after logging off from an application, and an attacker reopens the application in the browser immediately after the user has logged off. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-077: Vulnerability in Active Directory Federation Services Could Allow Information Disclosure - Windows Server 2008 SP2 - ADFS 2.0 - KB3003381 (Japanese)
Severity: Important
Fixlet ID: 1407709
Fixlet Link: http://technet.microsoft.com/library/security/MS14-077

Fixlet Description: This security update resolves a privately reported vulnerability in Active Directory Federation Services (AD FS). The vulnerability could allow information disclosure if a user leaves their browser open after logging off from an application, and an attacker reopens the application in the browser immediately after the user has logged off. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-078: Vulnerability in IME (Japanese) Could Allow Elevation of Privilege - Windows 7 SP1 - KB2991963 (Japanese)
Severity: Moderate
Fixlet ID: 1407801
Fixlet Link: http://technet.microsoft.com/library/security/MS14-078

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Input Method Editor (IME) (Japanese). The vulnerability could allow sandbox escape based on the application sandbox policy on a system where an affected version of the Microsoft IME (Japanese) is installed. An attacker who successfully exploited this vulnerability could escape the sandbox of a vulnerable application and gain access to the affected system with logged-in user rights. If the affected system is logged in with administrative rights, an attacker could then install programs; view, change or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-078: Vulnerability in IME (Japanese) Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB2991963 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1407803
Fixlet Link: http://technet.microsoft.com/library/security/MS14-078

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Input Method Editor (IME) (Japanese). The vulnerability could allow sandbox escape based on the application sandbox policy on a system where an affected version of the Microsoft IME (Japanese) is installed. An attacker who successfully exploited this vulnerability could escape the sandbox of a vulnerable application and gain access to the affected system with logged-in user rights. If the affected system is logged in with administrative rights, an attacker could then install programs; view, change or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-078: Vulnerability in IME (Japanese) Could Allow Elevation of Privilege - Windows Vista SP2 - KB2991963 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1407805
Fixlet Link: http://technet.microsoft.com/library/security/MS14-078

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Input Method Editor (IME) (Japanese). The vulnerability could allow sandbox escape based on the application sandbox policy on a system where an affected version of the Microsoft IME (Japanese) is installed. An attacker who successfully exploited this vulnerability could escape the sandbox of a vulnerable application and gain access to the affected system with logged-in user rights. If the affected system is logged in with administrative rights, an attacker could then install programs; view, change or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-078: Vulnerability in IME (Japanese) Could Allow Elevation of Privilege - Windows Vista SP2 - KB2991963 (Japanese)
Severity: Moderate
Fixlet ID: 1407807
Fixlet Link: http://technet.microsoft.com/library/security/MS14-078

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Input Method Editor (IME) (Japanese). The vulnerability could allow sandbox escape based on the application sandbox policy on a system where an affected version of the Microsoft IME (Japanese) is installed. An attacker who successfully exploited this vulnerability could escape the sandbox of a vulnerable application and gain access to the affected system with logged-in user rights. If the affected system is logged in with administrative rights, an attacker could then install programs; view, change or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-078: Vulnerability in IME (Japanese) Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB2991963 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1407809
Fixlet Link: http://technet.microsoft.com/library/security/MS14-078

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Input Method Editor (IME) (Japanese). The vulnerability could allow sandbox escape based on the application sandbox policy on a system where an affected version of the Microsoft IME (Japanese) is installed. An attacker who successfully exploited this vulnerability could escape the sandbox of a vulnerable application and gain access to the affected system with logged-in user rights. If the affected system is logged in with administrative rights, an attacker could then install programs; view, change or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-078: Vulnerability in IME (Japanese) Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB2991963 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1407810
Fixlet Link: http://technet.microsoft.com/library/security/MS14-078

***************************************************************
Title: MS14-078: Vulnerability in IME (Japanese) Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB2991963 (Japanese)
Severity: Moderate
Fixlet ID: 1407811
Fixlet Link: http://technet.microsoft.com/library/security/MS14-078

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Input Method Editor (IME) (Japanese). The vulnerability could allow sandbox escape based on the application sandbox policy on a system where an affected version of the Microsoft IME (Japanese) is installed. An attacker who successfully exploited this vulnerability could escape the sandbox of a vulnerable application and gain access to the affected system with logged-in user rights. If the affected system is logged in with administrative rights, an attacker could then install programs; view, change or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-078: Vulnerability in IME (Japanese) Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 - KB2991963 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1407813
Fixlet Link: http://technet.microsoft.com/library/security/MS14-078

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Input Method Editor (IME) (Japanese). The vulnerability could allow sandbox escape based on the application sandbox policy on a system where an affected version of the Microsoft IME (Japanese) is installed. An attacker who successfully exploited this vulnerability could escape the sandbox of a vulnerable application and gain access to the affected system with logged-in user rights. If the affected system is logged in with administrative rights, an attacker could then install programs; view, change or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-078: Vulnerability in IME (Japanese) Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB2991963 (Japanese)
Severity: Moderate
Fixlet ID: 1407815
Fixlet Link: http://technet.microsoft.com/library/security/MS14-078

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Input Method Editor (IME) (Japanese). The vulnerability could allow sandbox escape based on the application sandbox policy on a system where an affected version of the Microsoft IME (Japanese) is installed. An attacker who successfully exploited this vulnerability could escape the sandbox of a vulnerable application and gain access to the affected system with logged-in user rights. If the affected system is logged in with administrative rights, an attacker could then install programs; view, change or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-078: Vulnerability in IME (Japanese) Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB2991963 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1407816
Fixlet Link: http://technet.microsoft.com/library/security/MS14-078

***************************************************************
Title: MS14-078: Vulnerability in IME (Japanese) Could Allow Elevation of Privilege - Windows 7 SP1 - KB2991963 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1407817
Fixlet Link: http://technet.microsoft.com/library/security/MS14-078

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Input Method Editor (IME) (Japanese). The vulnerability could allow sandbox escape based on the application sandbox policy on a system where an affected version of the Microsoft IME (Japanese) is installed. An attacker who successfully exploited this vulnerability could escape the sandbox of a vulnerable application and gain access to the affected system with logged-in user rights. If the affected system is logged in with administrative rights, an attacker could then install programs; view, change or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-078: Vulnerability in IME (Japanese) Could Allow Elevation of Privilege - Office 2007 SP3 - Office 2007 IME (Japanese) - KB2889913 (Japanese)
Severity: Moderate
Fixlet ID: 1407819
Fixlet Link: http://technet.microsoft.com/library/security/MS14-078

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Input Method Editor (IME) (Japanese). The vulnerability could allow sandbox escape based on the application sandbox policy on a system where an affected version of the Microsoft IME (Japanese) is installed. An attacker who successfully exploited this vulnerability could escape the sandbox of a vulnerable application and gain access to the affected system with logged-in user rights. If the affected system is logged in with administrative rights, an attacker could then install programs; view, change or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows Server 2008 SP2 - KB3002885 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1407901
Fixlet Link: http://technet.microsoft.com/library/security/MS14-079

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker places a specially crafted TrueType font on a network share and a user subsequently navigates there in Windows Explorer. In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to persuade users to visit a website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows Vista SP2 - KB3002885 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1407903
Fixlet Link: http://technet.microsoft.com/library/security/MS14-079

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker places a specially crafted TrueType font on a network share and a user subsequently navigates there in Windows Explorer. In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to persuade users to visit a website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows Server 2012 R2 Gold - KB3002885 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1407905
Fixlet Link: http://technet.microsoft.com/library/security/MS14-079

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker places a specially crafted TrueType font on a network share and a user subsequently navigates there in Windows Explorer. In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to persuade users to visit a website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows 8 Gold - KB3002885 (Japanese)
Severity: Moderate
Fixlet ID: 1407907
Fixlet Link: http://technet.microsoft.com/library/security/MS14-079

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker places a specially crafted TrueType font on a network share and a user subsequently navigates there in Windows Explorer. In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to persuade users to visit a website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows 8.1 Gold - KB3002885 (Japanese)
Severity: Moderate
Fixlet ID: 1407909
Fixlet Link: http://technet.microsoft.com/library/security/MS14-079

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker places a specially crafted TrueType font on a network share and a user subsequently navigates there in Windows Explorer. In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to persuade users to visit a website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows Server 2003 SP2 - KB3002885 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1407911
Fixlet Link: http://technet.microsoft.com/library/security/MS14-079

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker places a specially crafted TrueType font on a network share and a user subsequently navigates there in Windows Explorer. In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to persuade users to visit a website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows Server 2003 SP2 - KB3002885 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1407912
Fixlet Link: http://technet.microsoft.com/library/security/MS14-079

***************************************************************
Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows Vista SP2 - KB3002885 (Japanese)
Severity: Moderate
Fixlet ID: 1407913
Fixlet Link: http://technet.microsoft.com/library/security/MS14-079

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker places a specially crafted TrueType font on a network share and a user subsequently navigates there in Windows Explorer. In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to persuade users to visit a website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows Server 2008 R2 SP1 - KB3002885 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1407915
Fixlet Link: http://technet.microsoft.com/library/security/MS14-079

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker places a specially crafted TrueType font on a network share and a user subsequently navigates there in Windows Explorer. In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to persuade users to visit a website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows 8.1 Gold - KB3002885 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1407917
Fixlet Link: http://technet.microsoft.com/library/security/MS14-079

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker places a specially crafted TrueType font on a network share and a user subsequently navigates there in Windows Explorer. In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to persuade users to visit a website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows 8 Gold - KB3002885 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1407919
Fixlet Link: http://technet.microsoft.com/library/security/MS14-079

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker places a specially crafted TrueType font on a network share and a user subsequently navigates there in Windows Explorer. In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to persuade users to visit a website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows Server 2012 Gold - KB3002885 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1407921
Fixlet Link: http://technet.microsoft.com/library/security/MS14-079

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker places a specially crafted TrueType font on a network share and a user subsequently navigates there in Windows Explorer. In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to persuade users to visit a website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows Server 2008 SP2 - KB3002885 (Japanese)
Severity: Moderate
Fixlet ID: 1407923
Fixlet Link: http://technet.microsoft.com/library/security/MS14-079

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker places a specially crafted TrueType font on a network share and a user subsequently navigates there in Windows Explorer. In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to persuade users to visit a website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows 7 SP1 - KB3002885 (Japanese)
Severity: Moderate
Fixlet ID: 1407925
Fixlet Link: http://technet.microsoft.com/library/security/MS14-079

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker places a specially crafted TrueType font on a network share and a user subsequently navigates there in Windows Explorer. In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to persuade users to visit a website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows 7 SP1 - KB3002885 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1407927
Fixlet Link: http://technet.microsoft.com/library/security/MS14-079

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker places a specially crafted TrueType font on a network share and a user subsequently navigates there in Windows Explorer. In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to persuade users to visit a website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows Server 2003 SP2 - KB3002885 (Japanese)
Severity: Moderate
Fixlet ID: 1407929
Fixlet Link: http://technet.microsoft.com/library/security/MS14-079

Fixlet Description: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker places a specially crafted TrueType font on a network share and a user subsequently navigates there in Windows Explorer. In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to persuade users to visit a website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows Server 2003 SP2 - KB3002885 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1407930
Fixlet Link: http://technet.microsoft.com/library/security/MS14-079

***************************************************************
Title: 2852386: Disk Cleanup Wizard addon lets users delete outdated Windows updates on Windows 7 SP1 or Windows Server 2008 R2 SP1 - Windows Server 2008 R2 SP1 (x64) (Japanese)
Severity: N/A
Fixlet ID: 285238605
Fixlet Link: http://support.microsoft.com/kb/2852386

Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3004150: Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8 Gold (x64) (Japanese)
Severity: N/A
Fixlet ID: 300415001
Fixlet Link: http://support.microsoft.com/kb/3004150

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3004150: Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows Server 2012 Gold (x64) (Japanese)
Severity: N/A
Fixlet ID: 300415003
Fixlet Link: http://support.microsoft.com/kb/3004150

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3004150: Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows Server 2012 R2 Gold (x64) (Japanese)
Severity: N/A
Fixlet ID: 300415005
Fixlet Link: http://support.microsoft.com/kb/3004150

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3004150: Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8.1 Gold (x64) (Japanese)
Severity: N/A
Fixlet ID: 300415007
Fixlet Link: http://support.microsoft.com/kb/3004150

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3004150: Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8.1 Gold (Japanese)
Severity: N/A
Fixlet ID: 300415009
Fixlet Link: http://support.microsoft.com/kb/3004150

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3004150: Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8 Gold (Japanese)
Severity: N/A
Fixlet ID: 300415011
Fixlet Link: http://support.microsoft.com/kb/3004150

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.



More information about the BigFix-Announcements-Japan mailing list