[BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)'

autonotify at us.ibm.com autonotify at us.ibm.com
Fri Oct 17 02:34:33 PDT 2014


Fixlet Site - 'Patches for Windows (Japanese)'
Current Version: 609	Published: Thu, 16 Oct 2014 09:33:40  GMT

New Fixlets:
============

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 10 - KB2987107 (Japanese)
Severity: Critical
Fixlet ID: 1405601
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 8 Gold - IE 10 - KB2987107 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1405603
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 9 - KB2987107 (Japanese)
Severity: Moderate
Fixlet ID: 1405605
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 8 Gold - IE 10 - KB2987107 (Japanese)
Severity: Critical
Fixlet ID: 1405607
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 9 - KB2987107 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1405609
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 10 - KB2987107 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1405611
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 8.1 Gold - IE 11 - KB2987107 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1405613
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 8 - KB2987107 (Japanese)
Severity: Critical
Fixlet ID: 1405615
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 7 - KB2987107 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1405617
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 10 - KB2987107 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1405619
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 7 - KB2987107 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1405621
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 7 - KB2987107 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1405622
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 9 - KB2987107 (Japanese)
Severity: Critical
Fixlet ID: 1405623
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 9 - KB2987107 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1405625
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 9 - KB2987107 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1405627
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 7 - KB2987107 (Japanese)
Severity: Critical
Fixlet ID: 1405629
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 7 - KB2987107 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1405631
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2012 Gold - IE 10 - KB2987107 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1405633
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 11 - KB2987107 (Japanese)
Severity: Critical
Fixlet ID: 1405635
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 6 - KB2987107 (Japanese)
Severity: Moderate
Fixlet ID: 1405637
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 6 - KB2987107 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1405638
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 7 - KB2987107 (Japanese)
Severity: Moderate
Fixlet ID: 1405639
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 7 - KB2987107 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1405640
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 8 - KB2987107 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1405641
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 8 - KB2987107 (Japanese)
Severity: Moderate
Fixlet ID: 1405643
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 9 - KB2987107 (Japanese)
Severity: Critical
Fixlet ID: 1405645
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 8 - KB2987107 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1405647
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 8 - KB2987107 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1405648
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 8.1 Gold - IE 11 - KB2987107 (Japanese)
Severity: Critical
Fixlet ID: 1405649
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2012 R2 Gold - IE 11 - KB2987107 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1405651
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 8 - KB2987107 (Japanese)
Severity: Moderate
Fixlet ID: 1405653
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 8 - KB2987107 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1405654
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 7 - KB2987107 (Japanese)
Severity: Moderate
Fixlet ID: 1405655
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 8 - KB2987107 (Japanese)
Severity: Critical
Fixlet ID: 1405657
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 11 - KB2987107 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1405659
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 9 - KB2987107 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1405661
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 11 - KB2987107 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1405663
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 8 - KB2987107 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1405665
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 6 - KB2987107 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1405667
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 6 - KB2987107 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1405668
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 8 - KB2987107 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1405669
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056

Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2012 R2 Gold / Windows 8.1 Gold - .NET Framework 3.5 - KB2972103 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1405701
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 2.0 SP2 - KB2972098 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1405703
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2012 R2 Gold / Windows 8.1 Gold - .NET Framework 3.5 - KB2979573 (x64) (Japanese)
Severity: Important
Fixlet ID: 1405705
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 / Windows 7 SP1 - .NET Framework 3.5.1 - KB2979570 (x64) (Japanese)
Severity: Important
Fixlet ID: 1405707
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2003 SP2 - .NET Framework 2.0 SP2 - KB2979574 (Japanese)
Severity: Important
Fixlet ID: 1405709
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 / Windows Server 2003 SP2 - .NET Framework 4 - KB2972106 (Japanese)
Severity: Critical
Fixlet ID: 1405711
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2012 R2 Gold / Windows 8.1 Gold - .NET Framework 3.5 - KB2968296 (x64) (Japanese)
Severity: Important
Fixlet ID: 1405713
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2012 Gold / Windows 8 Gold - .NET Framework 4.5/4.5.1/4.5.2 - KB2978042 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1405715
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2003 SP2 - .NET Framework 2.0 SP2 - KB2972105 (Japanese)
Severity: Critical
Fixlet ID: 1405717
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 / Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1/4.5.2 - KB2979578 (x64) (Japanese)
Severity: Important
Fixlet ID: 1405719
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 8.1 Gold - .NET Framework 4.5.1/4.5.2 - KB2979576 (Japanese)
Severity: Important
Fixlet ID: 1405721
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 8.1 Gold - .NET Framework 3.5 - KB2968296 (Japanese)
Severity: Important
Fixlet ID: 1405723
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 7 SP1 - .NET Framework 3.5.1 - KB2979570 (Japanese)
Severity: Important
Fixlet ID: 1405725
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 8.1 Gold - .NET Framework 4.5.1/4.5.2 - KB2978041 (Japanese)
Severity: Critical
Fixlet ID: 1405727
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 2.0 SP2 - KB2979568 (Japanese)
Severity: Important
Fixlet ID: 1405729
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2012 Gold / Windows 8 Gold - .NET Framework 4.5/4.5.1/4.5.2 - KB2979577 (x64) (Japanese)
Severity: Important
Fixlet ID: 1405731
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 8 Gold - .NET Framework 4.5/4.5.1/4.5.2 - KB2978042 (Japanese)
Severity: Critical
Fixlet ID: 1405733
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 7 SP1 - .NET Framework 3.5.1 - KB2968294 (Japanese)
Severity: Important
Fixlet ID: 1405735
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 2.0 SP2 - KB2968292 (x64) (Japanese)
Severity: Important
Fixlet ID: 1405737
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 / Windows 7 SP1 - .NET Framework 3.5.1 - KB2968294 (x64) (Japanese)
Severity: Important
Fixlet ID: 1405739
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2012 R2 Gold / Windows 8.1 Gold - .NET Framework 4.5.1/4.5.2 - KB2978041 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1405741
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 8.1 Gold - .NET Framework 3.5 - KB2979573 (Japanese)
Severity: Important
Fixlet ID: 1405743
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 2.0 SP2 - KB2979568 (x64) (Japanese)
Severity: Important
Fixlet ID: 1405745
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 8 Gold - .NET Framework 3.5 - KB2972101 (Japanese)
Severity: Critical
Fixlet ID: 1405747
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 2.0 SP2 - KB2972098 (Japanese)
Severity: Critical
Fixlet ID: 1405749
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 / Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 / Windows Server 2003 SP2 - .NET Framework 4 - KB2979 (Japanese)
Severity: Important
Fixlet ID: 1405751
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2012 Gold / Windows 8 Gold - .NET Framework 3.5 - KB2972101 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1405753
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1/4.5.2 - KB2972107 (Japanese)
Severity: Critical
Fixlet ID: 1405755
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 8.1 Gold - .NET Framework 3.5 - KB2972103 (Japanese)
Severity: Critical
Fixlet ID: 1405757
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 2.0 SP2 - KB2968292 (Japanese)
Severity: Important
Fixlet ID: 1405759
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1/4.5.2 - KB2979578 (Japanese)
Severity: Important
Fixlet ID: 1405761
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2003 SP2 - .NET Framework 2.0 SP2 - KB2979574 (x64) (Japanese)
Severity: Important
Fixlet ID: 1405763
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2012 Gold / Windows 8 Gold - .NET Framework 3.5 - KB2979571 (x64) (Japanese)
Severity: Important
Fixlet ID: 1405765
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 / Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 / Windows Server 2003 SP2 - .NET Framework 4 - KB2972 (Japanese)
Severity: Critical
Fixlet ID: 1405767
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 / Windows 7 SP1 - .NET Framework 3.5.1 - KB2972100 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1405769
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 8 Gold - .NET Framework 4.5/4.5.1/4.5.2 - KB2979577 (Japanese)
Severity: Important
Fixlet ID: 1405771
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 / Windows Server 2003 SP2 - .NET Framework 4 - KB2979575 (Japanese)
Severity: Important
Fixlet ID: 1405773
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 7 SP1 - .NET Framework 3.5.1 - KB2972100 (Japanese)
Severity: Critical
Fixlet ID: 1405775
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 / Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1/4.5.2 - KB2972107 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1405777
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2012 R2 Gold / Windows 8.1 Gold - .NET Framework 4.5.1/4.5.2 - KB2979576 (x64) (Japanese)
Severity: Important
Fixlet ID: 1405779
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 8 Gold - .NET Framework 3.5 - KB2979571 (Japanese)
Severity: Important
Fixlet ID: 1405781
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2012 Gold / Windows 8 Gold - .NET Framework 3.5 - KB2968295 (x64) (Japanese)
Severity: Important
Fixlet ID: 1405783
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 8 Gold - .NET Framework 3.5 - KB2968295 (Japanese)
Severity: Important
Fixlet ID: 1405785
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2003 SP2 - .NET Framework 2.0 SP2 - KB2972105 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1405787
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows Server 2012 R2 Gold - KB3000061 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1405801
Fixlet Link: http://technet.microsoft.com/library/security/MS14-058

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows Vista SP2 - KB3000061 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1405803
Fixlet Link: http://technet.microsoft.com/library/security/MS14-058

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows 8.1 Gold - KB3000061 (Japanese)
Severity: Critical
Fixlet ID: 1405805
Fixlet Link: http://technet.microsoft.com/library/security/MS14-058

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows 8 Gold - KB3000061 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1405807
Fixlet Link: http://technet.microsoft.com/library/security/MS14-058

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows 8.1 Gold - KB3000061 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1405809
Fixlet Link: http://technet.microsoft.com/library/security/MS14-058

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows Vista SP2 - KB3000061 (Japanese)
Severity: Critical
Fixlet ID: 1405811
Fixlet Link: http://technet.microsoft.com/library/security/MS14-058

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows 7 SP1 - KB3000061 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1405813
Fixlet Link: http://technet.microsoft.com/library/security/MS14-058

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows 8 Gold - KB3000061 (Japanese)
Severity: Critical
Fixlet ID: 1405815
Fixlet Link: http://technet.microsoft.com/library/security/MS14-058

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3000061 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1405817
Fixlet Link: http://technet.microsoft.com/library/security/MS14-058

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3000061 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1405818
Fixlet Link: http://technet.microsoft.com/library/security/MS14-058

***************************************************************
Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows 7 SP1 - KB3000061 (Japanese)
Severity: Critical
Fixlet ID: 1405819
Fixlet Link: http://technet.microsoft.com/library/security/MS14-058

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows Server 2012 Gold - KB3000061 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1405821
Fixlet Link: http://technet.microsoft.com/library/security/MS14-058

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3000061 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1405823
Fixlet Link: http://technet.microsoft.com/library/security/MS14-058

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3000061 (Japanese)
Severity: Critical
Fixlet ID: 1405825
Fixlet Link: http://technet.microsoft.com/library/security/MS14-058

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3000061 (Japanese)
Severity: Critical
Fixlet ID: 1405827
Fixlet Link: http://technet.microsoft.com/library/security/MS14-058

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3000061 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1405828
Fixlet Link: http://technet.microsoft.com/library/security/MS14-058

***************************************************************
Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB3000061 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1405829
Fixlet Link: http://technet.microsoft.com/library/security/MS14-058

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS14-059: Vulnerability in ASP.NET MVC Could Allow Security Feature Bypass - ASP.NET MVC 2.0 - KB2993939 (Japanese)
Severity: Important
Fixlet ID: 1405901
Fixlet Link: http://technet.microsoft.com/library/security/MS14-059

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in ASP.NET MVC. The vulnerability could allow security feature bypass if an attacker convinces a user to click a specially crafted link or to visit a webpage that contains specially crafted content designed to exploit the vulnerability. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through a web browser, and then convince a user to view the website. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-059: Vulnerability in ASP.NET MVC Could Allow Security Feature Bypass - ASP.NET MVC 3.0 - KB2993937 (Japanese)
Severity: Important
Fixlet ID: 1405903
Fixlet Link: http://technet.microsoft.com/library/security/MS14-059

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in ASP.NET MVC. The vulnerability could allow security feature bypass if an attacker convinces a user to click a specially crafted link or to visit a webpage that contains specially crafted content designed to exploit the vulnerability. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through a web browser, and then convince a user to view the website. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-059: Vulnerability in ASP.NET MVC Could Allow Security Feature Bypass - ASP.NET MVC 4.0 - KB2993928 (Japanese)
Severity: Important
Fixlet ID: 1405905
Fixlet Link: http://technet.microsoft.com/library/security/MS14-059

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in ASP.NET MVC. The vulnerability could allow security feature bypass if an attacker convinces a user to click a specially crafted link or to visit a webpage that contains specially crafted content designed to exploit the vulnerability. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through a web browser, and then convince a user to view the website. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-059: Vulnerability in ASP.NET MVC Could Allow Security Feature Bypass - ASP.NET MVC 5.0 - KB2992080 (Japanese)
Severity: Important
Fixlet ID: 1405907
Fixlet Link: http://technet.microsoft.com/library/security/MS14-059

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in ASP.NET MVC. The vulnerability could allow security feature bypass if an attacker convinces a user to click a specially crafted link or to visit a webpage that contains specially crafted content designed to exploit the vulnerability. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through a web browser, and then convince a user to view the website. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-059: Vulnerability in ASP.NET MVC Could Allow Security Feature Bypass - ASP.NET MVC 5.1 - KB2994397 (Japanese)
Severity: Important
Fixlet ID: 1405909
Fixlet Link: http://technet.microsoft.com/library/security/MS14-059

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in ASP.NET MVC. The vulnerability could allow security feature bypass if an attacker convinces a user to click a specially crafted link or to visit a webpage that contains specially crafted content designed to exploit the vulnerability. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through a web browser, and then convince a user to view the website. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows Server 2012 Gold - KB3000869 (x64) (Japanese)
Severity: Important
Fixlet ID: 1406001
Fixlet Link: http://technet.microsoft.com/library/security/MS14-060

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows 7 SP1 - KB3000869 (x64) (Japanese)
Severity: Important
Fixlet ID: 1406003
Fixlet Link: http://technet.microsoft.com/library/security/MS14-060

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows 8.1 Gold - KB3000869 (Japanese)
Severity: Important
Fixlet ID: 1406005
Fixlet Link: http://technet.microsoft.com/library/security/MS14-060

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows 7 SP1 - KB3000869 (Japanese)
Severity: Important
Fixlet ID: 1406007
Fixlet Link: http://technet.microsoft.com/library/security/MS14-060

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3000869 (x64) (Japanese)
Severity: Important
Fixlet ID: 1406009
Fixlet Link: http://technet.microsoft.com/library/security/MS14-060

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows 8 Gold - KB3000869 (Japanese)
Severity: Important
Fixlet ID: 1406011
Fixlet Link: http://technet.microsoft.com/library/security/MS14-060

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows Vista SP2 - KB3000869 (x64) (Japanese)
Severity: Important
Fixlet ID: 1406013
Fixlet Link: http://technet.microsoft.com/library/security/MS14-060

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows Server 2012 R2 Gold - KB3000869 (x64) (Japanese)
Severity: Important
Fixlet ID: 1406015
Fixlet Link: http://technet.microsoft.com/library/security/MS14-060

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows Vista SP2 - KB3000869 (Japanese)
Severity: Important
Fixlet ID: 1406017
Fixlet Link: http://technet.microsoft.com/library/security/MS14-060

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3000869 (Japanese)
Severity: Important
Fixlet ID: 1406019
Fixlet Link: http://technet.microsoft.com/library/security/MS14-060

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows 8.1 Gold - KB3000869 (x64) (Japanese)
Severity: Important
Fixlet ID: 1406021
Fixlet Link: http://technet.microsoft.com/library/security/MS14-060

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB3000869 (x64) (Japanese)
Severity: Important
Fixlet ID: 1406023
Fixlet Link: http://technet.microsoft.com/library/security/MS14-060

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows 8 Gold - KB3000869 (x64) (Japanese)
Severity: Important
Fixlet ID: 1406025
Fixlet Link: http://technet.microsoft.com/library/security/MS14-060

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-061: Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution - Office 2010 SP1/SP2 - KB2883008 (Japanese)
Severity: Important
Fixlet ID: 1406103
Fixlet Link: http://technet.microsoft.com/library/security/MS14-061

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if an attacker convinces a user to open a specially crafted Microsoft Word file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-061: Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution - Word 2010 SP1/SP2 - KB2883013 (Japanese)
Severity: Important
Fixlet ID: 1406105
Fixlet Link: http://technet.microsoft.com/library/security/MS14-061

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if an attacker convinces a user to open a specially crafted Microsoft Word file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-061: Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution - Office 2010 SP1/SP2 - KB2883008 (x64) (Japanese)
Severity: Important
Fixlet ID: 1406107
Fixlet Link: http://technet.microsoft.com/library/security/MS14-061

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if an attacker convinces a user to open a specially crafted Microsoft Word file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-061: Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution - Word 2007 SP3 - KB2883032 (Japanese)
Severity: Important
Fixlet ID: 1406109
Fixlet Link: http://technet.microsoft.com/library/security/MS14-061

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if an attacker convinces a user to open a specially crafted Microsoft Word file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-061: Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution - Office 2007 SP3 / Office Compatibility Pack SP 3 - KB2883031 (Japanese)
Severity: Important
Fixlet ID: 1406111
Fixlet Link: http://technet.microsoft.com/library/security/MS14-061

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if an attacker convinces a user to open a specially crafted Microsoft Word file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-061: Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution - Office Web Apps Server 2010 Gold/SP1/SP2 - KB2889827 (x64) (Japanese)
Severity: Important
Fixlet ID: 1406113
Fixlet Link: http://technet.microsoft.com/library/security/MS14-061

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if an attacker convinces a user to open a specially crafted Microsoft Word file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-061: Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution - SharePoint Server 2010 SP1/SP2 - Word Automation Services - KB2883098 (x64) (Japanese)
Severity: Important
Fixlet ID: 1406115
Fixlet Link: http://technet.microsoft.com/library/security/MS14-061

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if an attacker convinces a user to open a specially crafted Microsoft Word file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-061: Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution - Word 2010 SP1/SP2 - KB2883013 (x64) (Japanese)
Severity: Important
Fixlet ID: 1406117
Fixlet Link: http://technet.microsoft.com/library/security/MS14-061

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if an attacker convinces a user to open a specially crafted Microsoft Word file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-062: Vulnerability in Message Queuing Service Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB2993254 (Japanese)
Severity: Important
Fixlet ID: 1406201
Fixlet Link: http://technet.microsoft.com/library/security/MS14-062

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker sends a specially crafted input/output control (IOCTL) request to the Message Queuing service. Successful exploitation of this vulnerability could lead to full access to the affected system. By default, the Message Queuing component is not installed on any affected operating system edition and can only be enabled by a user with administrative privileges. Only customers who manually enable the Message Queuing component are likely to be vulnerable to this issue. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-062: Vulnerability in Message Queuing Service Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB2993254 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1406202
Fixlet Link: http://technet.microsoft.com/library/security/MS14-062

***************************************************************
Title: MS14-062: Vulnerability in Message Queuing Service Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB2993254 (x64) (Japanese)
Severity: Important
Fixlet ID: 1406203
Fixlet Link: http://technet.microsoft.com/library/security/MS14-062

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker sends a specially crafted input/output control (IOCTL) request to the Message Queuing service. Successful exploitation of this vulnerability could lead to full access to the affected system. By default, the Message Queuing component is not installed on any affected operating system edition and can only be enabled by a user with administrative privileges. Only customers who manually enable the Message Queuing component are likely to be vulnerable to this issue. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-062: Vulnerability in Message Queuing Service Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB2993254 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1406204
Fixlet Link: http://technet.microsoft.com/library/security/MS14-062

***************************************************************
Title: MS14-063: Vulnerability in FAT32 Disk Partition Driver Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB2998579 (x64) (Japanese)
Severity: Important
Fixlet ID: 1406301
Fixlet Link: http://technet.microsoft.com/library/security/MS14-063

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. An elevation of privilege vulnerability exists in the way the Windows FASTFAT system driver interacts with FAT32 disk partitions. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated privileges. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-063: Vulnerability in FAT32 Disk Partition Driver Could Allow Elevation of Privilege - Windows Vista SP2 - KB2998579 (Japanese)
Severity: Important
Fixlet ID: 1406303
Fixlet Link: http://technet.microsoft.com/library/security/MS14-063

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. An elevation of privilege vulnerability exists in the way the Windows FASTFAT system driver interacts with FAT32 disk partitions. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated privileges. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-063: Vulnerability in FAT32 Disk Partition Driver Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB2998579 (Japanese)
Severity: Important
Fixlet ID: 1406305
Fixlet Link: http://technet.microsoft.com/library/security/MS14-063

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. An elevation of privilege vulnerability exists in the way the Windows FASTFAT system driver interacts with FAT32 disk partitions. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated privileges. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-063: Vulnerability in FAT32 Disk Partition Driver Could Allow Elevation of Privilege - Windows Vista SP2 - KB2998579 (x64) (Japanese)
Severity: Important
Fixlet ID: 1406307
Fixlet Link: http://technet.microsoft.com/library/security/MS14-063

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. An elevation of privilege vulnerability exists in the way the Windows FASTFAT system driver interacts with FAT32 disk partitions. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated privileges. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-063: Vulnerability in FAT32 Disk Partition Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB2998579 (x64) (Japanese)
Severity: Important
Fixlet ID: 1406309
Fixlet Link: http://technet.microsoft.com/library/security/MS14-063

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. An elevation of privilege vulnerability exists in the way the Windows FASTFAT system driver interacts with FAT32 disk partitions. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated privileges. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS14-063: Vulnerability in FAT32 Disk Partition Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB2998579 (Japanese)
Severity: Important
Fixlet ID: 1406311
Fixlet Link: http://technet.microsoft.com/library/security/MS14-063

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. An elevation of privilege vulnerability exists in the way the Windows FASTFAT system driver interacts with FAT32 disk partitions. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated privileges. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2889864: Update for SharePoint Server 2013 - KB2889864 - SharePoint Server 2013 (x64) (Japanese)
Severity: N/A
Fixlet ID: 288986401
Fixlet Link: http://support.microsoft.com/kb/2889864

Fixlet Description: Microsoft has released an update for Microsoft SharePoint Enterprise Server 2013 . This update provides the latest fixes to Microsoft SharePoint Enterprise Server 2013 . Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2949927: Security Advisory: Availability of SHA-2 hashing algorithm for Windows 7 and Windows Server 2008 R2 - Windows Server 2008 R2 SP1 (x64) (Japanese)
Severity: N/A
Fixlet ID: 294992703
Fixlet Link: http://support.microsoft.com/kb/2949927

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2949927: Security Advisory: Availability of SHA-2 hashing algorithm for Windows 7 and Windows Server 2008 R2 - Windows 7 SP1 (Japanese)
Severity: N/A
Fixlet ID: 294992705
Fixlet Link: http://support.microsoft.com/kb/2949927

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2949927: Security Advisory: Availability of SHA-2 hashing algorithm for Windows 7 and Windows Server 2008 R2 - Windows 7 SP1 (x64) (Japanese)
Severity: N/A
Fixlet ID: 294992709
Fixlet Link: http://support.microsoft.com/kb/2949927

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2973501: Update to support RDP restricted administration for Windows 8 and Windows Server 2012 - Windows Server 2012 Gold (x64) (Japanese)
Severity: N/A
Fixlet ID: 297350101
Fixlet Link: http://support.microsoft.com/kb/2973501

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2973501: Update to support RDP restricted administration for Windows 8 and Windows Server 2012 - Windows 8 Gold (Japanese)
Severity: N/A
Fixlet ID: 297350103
Fixlet Link: http://support.microsoft.com/kb/2973501

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2973501: Update to support RDP restricted administration for Windows 8 and Windows Server 2012 - Windows 8 Gold (x64) (Japanese)
Severity: N/A
Fixlet ID: 297350105
Fixlet Link: http://support.microsoft.com/kb/2973501

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2977292: Security advisory: Update for Microsoft EAP implementation that enables the use of TLS - Windows Server 2012 R2 Gold (x64) (Japanese)
Severity: N/A
Fixlet ID: 297729203
Fixlet Link: http://support.microsoft.com/kb/2977292

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2977292: Security advisory: Update for Microsoft EAP implementation that enables the use of TLS - Windows 8.1 Gold (x64) (Japanese)
Severity: N/A
Fixlet ID: 297729207
Fixlet Link: http://support.microsoft.com/kb/2977292

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2977292: Security advisory: Update for Microsoft EAP implementation that enables the use of TLS - Windows 7 SP1 (Japanese)
Severity: N/A
Fixlet ID: 297729209
Fixlet Link: http://support.microsoft.com/kb/2977292

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2977292: Security advisory: Update for Microsoft EAP implementation that enables the use of TLS - Windows 7 SP1 (x64) (Japanese)
Severity: N/A
Fixlet ID: 297729211
Fixlet Link: http://support.microsoft.com/kb/2977292

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2977292: Security advisory: Update for Microsoft EAP implementation that enables the use of TLS - Windows Server 2008 R2 SP1 (x64) (Japanese)
Severity: N/A
Fixlet ID: 297729213
Fixlet Link: http://support.microsoft.com/kb/2977292

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2977292: Security advisory: Update for Microsoft EAP implementation that enables the use of TLS - Windows Server 2012 Gold (x64) (Japanese)
Severity: N/A
Fixlet ID: 297729215
Fixlet Link: http://support.microsoft.com/kb/2977292

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2977292: Security advisory: Update for Microsoft EAP implementation that enables the use of TLS - Windows 8 Gold (Japanese)
Severity: N/A
Fixlet ID: 297729217
Fixlet Link: http://support.microsoft.com/kb/2977292

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2977292: Security advisory: Update for Microsoft EAP implementation that enables the use of TLS - Windows 8.1 Gold (Japanese)
Severity: N/A
Fixlet ID: 297729219
Fixlet Link: http://support.microsoft.com/kb/2977292

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2977292: Security advisory: Update for Microsoft EAP implementation that enables the use of TLS - Windows 8 Gold (x64) (Japanese)
Severity: N/A
Fixlet ID: 297729221
Fixlet Link: http://support.microsoft.com/kb/2977292

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2984972: Update for RDC 7.1 to support restricted administration logons on Windows 7 and Windows Server 2008 R2 - Windows 7 SP1 (x64) (Japanese)
Severity: N/A
Fixlet ID: 298497203
Fixlet Link: http://support.microsoft.com/kb/2984972

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2984972: Update for RDC 7.1 to support restricted administration logons on Windows 7 and Windows Server 2008 R2 - Windows Server 2008 R2 SP1 (x64) (Japanese)
Severity: N/A
Fixlet ID: 298497207
Fixlet Link: http://support.microsoft.com/kb/2984972

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2984972: Update for RDC 7.1 to support restricted administration logons on Windows 7 and Windows Server 2008 R2 - Windows 7 SP1 (Japanese)
Severity: N/A
Fixlet ID: 298497211
Fixlet Link: http://support.microsoft.com/kb/2984972

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2984976: RDP 8.0 update for restricted administration on Windows 7 or Windows Server 2008 R2 - Windows Server 2008 R2 SP1 (x64) (Japanese)
Severity: N/A
Fixlet ID: 298497601
Fixlet Link: http://support.microsoft.com/kb/2984976

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2984976: RDP 8.0 update for restricted administration on Windows 7 or Windows Server 2008 R2 - Windows 7 SP1 (Japanese)
Severity: N/A
Fixlet ID: 298497603
Fixlet Link: http://support.microsoft.com/kb/2984976

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2984976: RDP 8.0 update for restricted administration on Windows 7 or Windows Server 2008 R2 - Windows 7 SP1 (x64) (Japanese)
Severity: N/A
Fixlet ID: 298497605
Fixlet Link: http://support.microsoft.com/kb/2984976

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2984981: RDC 8.1 update for restricted administration in Windows 7 or Windows Server 2008 R2 - Windows 7 SP1 (x64) (Japanese)
Severity: N/A
Fixlet ID: 298498101
Fixlet Link: http://support.microsoft.com/kb/2984981

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2984981: RDC 8.1 update for restricted administration in Windows 7 or Windows Server 2008 R2 - Windows 7 SP1 (Japanese)
Severity: N/A
Fixlet ID: 298498103
Fixlet Link: http://support.microsoft.com/kb/2984981

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2984981: RDC 8.1 update for restricted administration in Windows 7 or Windows Server 2008 R2 - Windows Server 2008 R2 SP1 (x64) (Japanese)
Severity: N/A
Fixlet ID: 298498105
Fixlet Link: http://support.microsoft.com/kb/2984981

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3001237: Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8 Gold (x64) (Japanese)
Severity: N/A
Fixlet ID: 300123701
Fixlet Link: http://support.microsoft.com/kb/3001237

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: 3001237: Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows Server 2012 Gold (x64) (Japanese)
Severity: N/A
Fixlet ID: 300123703
Fixlet Link: http://support.microsoft.com/kb/3001237

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: 3001237: Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows Server 2012 R2 Gold (x64) (Japanese)
Severity: N/A
Fixlet ID: 300123705
Fixlet Link: http://support.microsoft.com/kb/3001237

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: 3001237: Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8.1 Gold (x64) (Japanese)
Severity: N/A
Fixlet ID: 300123707
Fixlet Link: http://support.microsoft.com/kb/3001237

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: 3001237: Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8.1 Gold (Japanese)
Severity: N/A
Fixlet ID: 300123709
Fixlet Link: http://support.microsoft.com/kb/3001237

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: 3001237: Security Advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8 Gold (Japanese)
Severity: N/A
Fixlet ID: 300123711
Fixlet Link: http://support.microsoft.com/kb/3001237

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.



More information about the BigFix-Announcements-Japan mailing list