From autonotify at us.ibm.com Thu Aug 13 02:33:37 2015 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Thu, 13 Aug 2015 02:33:37 -0700 Subject: [BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)' Message-ID: Fixlet Site - 'Patches for Windows (Japanese)' Current Version: 671 Published: Thu, 13 Aug 2015 07:09:03 GMT New Fixlets: ============ *************************************************************** Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows 8 Gold - IE 10 - KB3078071 (x64) (Japanese) Severity: Critical Fixlet ID: 1507901 Fixlet Link: http://technet.microsoft.com/library/security/MS15-079 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 9 - KB3078071 (x64) (Japanese) Severity: Critical Fixlet ID: 1507903 Fixlet Link: http://technet.microsoft.com/library/security/MS15-079 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 9 - KB3078071 (x64) (Japanese) Severity: Moderate Fixlet ID: 1507905 Fixlet Link: http://technet.microsoft.com/library/security/MS15-079 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Server 2012 R2 Gold - IE 11 - KB3078071 (x64) (Japanese) Severity: Moderate Fixlet ID: 1507907 Fixlet Link: http://technet.microsoft.com/library/security/MS15-079 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 11 - KB3078071 (x64) (Japanese) Severity: Moderate Fixlet ID: 1507909 Fixlet Link: http://technet.microsoft.com/library/security/MS15-079 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 10 - KB3078071 (x64) (Japanese) Severity: Critical Fixlet ID: 1507911 Fixlet Link: http://technet.microsoft.com/library/security/MS15-079 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 9 - KB3078071 (Japanese) Severity: Moderate Fixlet ID: 1507913 Fixlet Link: http://technet.microsoft.com/library/security/MS15-079 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 8 - KB3078071 (x64) (Japanese) Severity: Moderate Fixlet ID: 1507915 Fixlet Link: http://technet.microsoft.com/library/security/MS15-079 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 7 - KB3078071 (Japanese) Severity: Moderate Fixlet ID: 1507917 Fixlet Link: http://technet.microsoft.com/library/security/MS15-079 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 8 - KB3078071 (x64) (Japanese) Severity: Critical Fixlet ID: 1507919 Fixlet Link: http://technet.microsoft.com/library/security/MS15-079 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 8 - KB3078071 (Japanese) Severity: Critical Fixlet ID: 1507921 Fixlet Link: http://technet.microsoft.com/library/security/MS15-079 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 7 - KB3078071 (x64) (Japanese) Severity: Moderate Fixlet ID: 1507923 Fixlet Link: http://technet.microsoft.com/library/security/MS15-079 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 7 - KB3078071 (Japanese) Severity: Critical Fixlet ID: 1507925 Fixlet Link: http://technet.microsoft.com/library/security/MS15-079 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 8 - KB3078071 (Japanese) Severity: Critical Fixlet ID: 1507927 Fixlet Link: http://technet.microsoft.com/library/security/MS15-079 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 8 - KB3078071 (Japanese) Severity: Moderate Fixlet ID: 1507929 Fixlet Link: http://technet.microsoft.com/library/security/MS15-079 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 8 - KB3078071 (x64) (Japanese) Severity: Critical Fixlet ID: 1507931 Fixlet Link: http://technet.microsoft.com/library/security/MS15-079 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 10 - KB3078071 (Japanese) Severity: Critical Fixlet ID: 1507933 Fixlet Link: http://technet.microsoft.com/library/security/MS15-079 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 9 - KB3078071 (x64) (Japanese) Severity: Moderate Fixlet ID: 1507935 Fixlet Link: http://technet.microsoft.com/library/security/MS15-079 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows 8 Gold - IE 10 - KB3078071 (Japanese) Severity: Critical Fixlet ID: 1507937 Fixlet Link: http://technet.microsoft.com/library/security/MS15-079 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 11 - KB3078071 (Japanese) Severity: Critical Fixlet ID: 1507939 Fixlet Link: http://technet.microsoft.com/library/security/MS15-079 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 11 - KB3078071 (x64) (Japanese) Severity: Critical Fixlet ID: 1507941 Fixlet Link: http://technet.microsoft.com/library/security/MS15-079 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 9 - KB3078071 (Japanese) Severity: Critical Fixlet ID: 1507943 Fixlet Link: http://technet.microsoft.com/library/security/MS15-079 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 8 - KB3078071 (x64) (Japanese) Severity: Moderate Fixlet ID: 1507945 Fixlet Link: http://technet.microsoft.com/library/security/MS15-079 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 9 - KB3078071 (x64) (Japanese) Severity: Critical Fixlet ID: 1507947 Fixlet Link: http://technet.microsoft.com/library/security/MS15-079 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 9 - KB3078071 (Japanese) Severity: Critical Fixlet ID: 1507949 Fixlet Link: http://technet.microsoft.com/library/security/MS15-079 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows 8.1 Gold - IE 11 - KB3078071 (Japanese) Severity: Critical Fixlet ID: 1507951 Fixlet Link: http://technet.microsoft.com/library/security/MS15-079 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows 8.1 Gold - IE 11 - KB3078071 (x64) (Japanese) Severity: Critical Fixlet ID: 1507953 Fixlet Link: http://technet.microsoft.com/library/security/MS15-079 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Server 2012 Gold - IE 10 - KB3078071 (x64) (Japanese) Severity: Moderate Fixlet ID: 1507955 Fixlet Link: http://technet.microsoft.com/library/security/MS15-079 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 10 - KB3078071 (x64) (Japanese) Severity: Moderate Fixlet ID: 1507957 Fixlet Link: http://technet.microsoft.com/library/security/MS15-079 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 7 - KB3078071 (x64) (Japanese) Severity: Critical Fixlet ID: 1507959 Fixlet Link: http://technet.microsoft.com/library/security/MS15-079 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows 8.1 Gold - KB3078601 (x64) (Japanese) Severity: Critical Fixlet ID: 1508001 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows 7 SP1 - .NET Framework 3.5.1 - KB3072305 (Japanese) Severity: Critical Fixlet ID: 1508003 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows 8 Gold - KB3078601 (Japanese) Severity: Critical Fixlet ID: 1508005 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Server 2012 Gold - KB3078601 (x64) (Japanese) Severity: Critical Fixlet ID: 1508007 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Lync 2010 Attendee (user level install) - KB3075592 (Japanese) Severity: Critical Fixlet ID: 1508009 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. Important Note: Due to the complexity of the installation, this update must be completed manually.Note: Affected computers may report back as 'Pending Restart' once the update has run successfully, but will not report back their final status until the computer has been restarted. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Office 2010 SP2 - KB3054846 (x64) (Japanese) Severity: Important Fixlet ID: 1508011 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Lync 2010 Attendee (admin level install) - KB3075590 (Japanese) Severity: Critical Fixlet ID: 1508013 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Lync Basic 2013 SP1 / Lync 2013 SP1 - KB3055014 (x64) (Japanese) Severity: Critical Fixlet ID: 1508015 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Lync 2010 - KB3075593 (x64) (Japanese) Severity: Critical Fixlet ID: 1508017 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows 7 SP1 - KB3078601 (Japanese) Severity: Critical Fixlet ID: 1508019 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Silverlight 5 - KB3080333 (Japanese) Severity: Critical Fixlet ID: 1508021 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows 7 SP1 - KB3078601 (x64) (Japanese) Severity: Critical Fixlet ID: 1508023 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4 - KB3072309 (Japanese) Severity: Critical Fixlet ID: 1508025 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 3.0 SP2 - KB3072303 (Japanese) Severity: Critical Fixlet ID: 1508027 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows 8 Gold - .NET Framework 3.5 - KB3072306 (Japanese) Severity: Critical Fixlet ID: 1508029 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Server 2012 R2 Gold - KB3078601 (x64) (Japanese) Severity: Critical Fixlet ID: 1508031 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Server 2012 Gold / Windows 8 Gold - .NET Framework 3.5 - KB3072306 (x64) (Japanese) Severity: Critical Fixlet ID: 1508033 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Office 2010 SP2 - KB3054846 (Japanese) Severity: Important Fixlet ID: 1508035 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Lync Basic 2013 SP1 / Lync 2013 SP1 - KB3055014 (Japanese) Severity: Critical Fixlet ID: 1508037 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.6 - KB3072311 (x64) (Japanese) Severity: Critical Fixlet ID: 1508039 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.6 - KB3072311 (Japanese) Severity: Critical Fixlet ID: 1508041 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows 8.1 Gold - .NET Framework 3.5 - KB3072307 (Japanese) Severity: Critical Fixlet ID: 1508043 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows 8.1 Gold - KB3078601 (Japanese) Severity: Critical Fixlet ID: 1508045 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows 8 Gold - KB3078601 (x64) (Japanese) Severity: Critical Fixlet ID: 1508047 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4 - KB3072309 (x64) (Japanese) Severity: Critical Fixlet ID: 1508049 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB3078601 (x64) (Japanese) Severity: Critical Fixlet ID: 1508051 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1/4.5.2 - KB3072310 (Japanese) Severity: Critical Fixlet ID: 1508053 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3078601 (Japanese) Severity: Critical Fixlet ID: 1508055 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Vista SP2 - KB3078601 (x64) (Japanese) Severity: Critical Fixlet ID: 1508057 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 / Windows 7 SP1 - .NET Framework 3.5.1 - KB3072305 (x64) (Japanese) Severity: Critical Fixlet ID: 1508059 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Server 2012 R2 Gold / Windows 8.1 Gold - .NET Framework 3.5 - KB3072307 (x64) (Japanese) Severity: Critical Fixlet ID: 1508061 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Lync 2010 - KB3075593 (Japanese) Severity: Critical Fixlet ID: 1508063 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1/4.5.2 - KB3072310 (x64) (Japanese) Severity: Critical Fixlet ID: 1508065 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Vista SP2 - KB3078601 (Japanese) Severity: Critical Fixlet ID: 1508067 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 3.0 SP2 - KB3072303 (x64) (Japanese) Severity: Critical Fixlet ID: 1508069 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3078601 (x64) (Japanese) Severity: Critical Fixlet ID: 1508071 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Silverlight 5 Developer Runtime - KB3080333 (Japanese) Severity: Critical Fixlet ID: 1508073 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Silverlight 5 Developer Runtime - KB3080333 (x64) (Japanese) Severity: Critical Fixlet ID: 1508075 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Silverlight 5 - KB3080333 (x64) (Japanese) Severity: Critical Fixlet ID: 1508077 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Office 2007 SP3 - KB3054890 (Japanese) Severity: Important Fixlet ID: 1508079 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Live Meeting 2007 Console - KB3075591 (Japanese) Severity: Critical Fixlet ID: 1508081 Fixlet Link: http://technet.microsoft.com/library/security/MS15-080 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Excel 2010 SP2 - KB3055044 (x64) (Japanese) Severity: Important Fixlet ID: 1508101 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Word Automation Services on SharePoint Server 2013 SP1 - KB3054858 (x64) (Japanese) Severity: Important Fixlet ID: 1508103 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2013 SP1 - KB3039734 (x64) (Japanese) Severity: Important Fixlet ID: 1508105 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - KB3055037 (Japanese) Severity: Important Fixlet ID: 1508107 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - PowerPoint 2007 SP3 - KB3055051 (Japanese) Severity: Important Fixlet ID: 1508109 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Word Automation Services on SharePoint Server 2010 SP2 - KB3054960 (x64) (Japanese) Severity: Important Fixlet ID: 1508111 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Excel 2013 SP1 - KB3054991 (x64) (Japanese) Severity: Important Fixlet ID: 1508113 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - KB2965310 (x64) (Japanese) Severity: Important Fixlet ID: 1508115 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - KB2598244 (x64) (Japanese) Severity: Important Fixlet ID: 1508117 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2013 SP1 - KB3054816 (x64) (Japanese) Severity: Important Fixlet ID: 1508119 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - KB2553313 (Japanese) Severity: Critical Fixlet ID: 1508121 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - PowerPoint 2013 SP1 - KB3055029 (Japanese) Severity: Important Fixlet ID: 1508123 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Word 2013 SP1 - KB3055030 (x64) (Japanese) Severity: Important Fixlet ID: 1508125 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Word Viewer - KB3055053 (Japanese) Severity: Important Fixlet ID: 1508127 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Visio 2010 SP2 - KB3054876 (x64) (Japanese) Severity: Important Fixlet ID: 1508129 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Word 2010 SP2 - KB3055039 (x64) (Japanese) Severity: Important Fixlet ID: 1508131 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - PowerPoint 2010 SP2 - KB3055033 (x64) (Japanese) Severity: Important Fixlet ID: 1508133 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - PowerPoint 2013 SP1 - KB3055029 (x64) (Japanese) Severity: Important Fixlet ID: 1508135 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2007 SP3 - KB2837610 (Japanese) Severity: Important Fixlet ID: 1508137 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2013 SP1 - KB3039798 (x64) (Japanese) Severity: Critical Fixlet ID: 1508139 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2013 SP1 - KB3039798 (Japanese) Severity: Critical Fixlet ID: 1508141 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Visio 2007 SP3 - KB2965280 (Japanese) Severity: Important Fixlet ID: 1508143 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office Compatibility Pack SP3 - KB2986254 (Japanese) Severity: Important Fixlet ID: 1508145 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - PowerPoint 2010 SP2 - KB3055033 (Japanese) Severity: Important Fixlet ID: 1508147 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2007 SP3 - KB2596650 (Japanese) Severity: Critical Fixlet ID: 1508149 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Word Web Apps 2010 SP2 - KB3054974 (x64) (Japanese) Severity: Important Fixlet ID: 1508151 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Word 2010 SP2 - KB3055039 (Japanese) Severity: Important Fixlet ID: 1508153 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Visio 2013 SP1 - KB3054929 (Japanese) Severity: Important Fixlet ID: 1508155 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - KB2598244 (Japanese) Severity: Important Fixlet ID: 1508157 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office Web Apps Server 2013 SP1 - KB3055003 (x64) (Japanese) Severity: Important Fixlet ID: 1508159 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Excel 2010 SP2 - KB3055044 (Japanese) Severity: Important Fixlet ID: 1508161 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Word Viewer - KB3055054 (Japanese) Severity: Important Fixlet ID: 1508163 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2007 SP3 - KB3054888 (Japanese) Severity: Critical Fixlet ID: 1508165 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Excel 2013 SP1 - KB3054991 (Japanese) Severity: Important Fixlet ID: 1508167 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Excel 2007 SP3 - KB3054992 (Japanese) Severity: Important Fixlet ID: 1508169 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2013 SP1 - KB3054816 (Japanese) Severity: Important Fixlet ID: 1508171 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Word 2013 SP1 - KB3055030 (Japanese) Severity: Important Fixlet ID: 1508173 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - KB2553313 (x64) (Japanese) Severity: Critical Fixlet ID: 1508175 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Visio 2013 SP1 - KB3054929 (x64) (Japanese) Severity: Important Fixlet ID: 1508177 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - KB2965310 (Japanese) Severity: Important Fixlet ID: 1508179 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2007 SP3 - KB2687409 (Japanese) Severity: Important Fixlet ID: 1508181 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Word 2007 SP3 - KB3055052 (Japanese) Severity: Important Fixlet ID: 1508183 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2013 SP1 - KB3039734 (Japanese) Severity: Important Fixlet ID: 1508185 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Visio 2010 SP2 - KB3054876 (Japanese) Severity: Important Fixlet ID: 1508187 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - KB3055037 (x64) (Japanese) Severity: Important Fixlet ID: 1508189 Fixlet Link: http://technet.microsoft.com/library/security/MS15-081 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB3075226 (x64) (Japanese) Severity: Important Fixlet ID: 1508201 Fixlet Link: http://technet.microsoft.com/library/security/MS15-082 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows 7 SP1 - KB3075222 (x64) (Japanese) Severity: Important Fixlet ID: 1508203 Fixlet Link: http://technet.microsoft.com/library/security/MS15-082 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows 7 SP1 - KB3075222 (Japanese) Severity: Important Fixlet ID: 1508205 Fixlet Link: http://technet.microsoft.com/library/security/MS15-082 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB3075220 (x64) (Japanese) Severity: Important Fixlet ID: 1508207 Fixlet Link: http://technet.microsoft.com/library/security/MS15-082 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows 7 SP1 - KB3075220 (x64) (Japanese) Severity: Important Fixlet ID: 1508209 Fixlet Link: http://technet.microsoft.com/library/security/MS15-082 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows Server 2012 R2 Gold - KB3075220 (x64) (Japanese) Severity: Important Fixlet ID: 1508211 Fixlet Link: http://technet.microsoft.com/library/security/MS15-082 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows 8.1 Gold - KB3075220 (x64) (Japanese) Severity: Important Fixlet ID: 1508213 Fixlet Link: http://technet.microsoft.com/library/security/MS15-082 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows 8 Gold - KB3075220 (Japanese) Severity: Important Fixlet ID: 1508215 Fixlet Link: http://technet.microsoft.com/library/security/MS15-082 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows Vista SP2 - KB3075221 (Japanese) Severity: Important Fixlet ID: 1508217 Fixlet Link: http://technet.microsoft.com/library/security/MS15-082 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3075220 (x64) (Japanese) Severity: Important Fixlet ID: 1508219 Fixlet Link: http://technet.microsoft.com/library/security/MS15-082 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows Server 2012 Gold - KB3075220 (x64) (Japanese) Severity: Important Fixlet ID: 1508221 Fixlet Link: http://technet.microsoft.com/library/security/MS15-082 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows 7 SP1 - KB3075220 (Japanese) Severity: Important Fixlet ID: 1508223 Fixlet Link: http://technet.microsoft.com/library/security/MS15-082 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows 7 SP1 - KB3075226 (x64) (Japanese) Severity: Important Fixlet ID: 1508225 Fixlet Link: http://technet.microsoft.com/library/security/MS15-082 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows Vista SP2 - KB3075221 (x64) (Japanese) Severity: Important Fixlet ID: 1508227 Fixlet Link: http://technet.microsoft.com/library/security/MS15-082 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB3075222 (x64) (Japanese) Severity: Important Fixlet ID: 1508229 Fixlet Link: http://technet.microsoft.com/library/security/MS15-082 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows Vista SP2 - KB3075220 (Japanese) Severity: Important Fixlet ID: 1508231 Fixlet Link: http://technet.microsoft.com/library/security/MS15-082 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows 7 SP1 - KB3075226 (Japanese) Severity: Important Fixlet ID: 1508233 Fixlet Link: http://technet.microsoft.com/library/security/MS15-082 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3075220 (Japanese) Severity: Important Fixlet ID: 1508235 Fixlet Link: http://technet.microsoft.com/library/security/MS15-082 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows Vista SP2 - KB3075220 (x64) (Japanese) Severity: Important Fixlet ID: 1508237 Fixlet Link: http://technet.microsoft.com/library/security/MS15-082 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows 8.1 Gold - KB3075220 (Japanese) Severity: Important Fixlet ID: 1508239 Fixlet Link: http://technet.microsoft.com/library/security/MS15-082 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows 8 Gold - KB3075220 (x64) (Japanese) Severity: Important Fixlet ID: 1508241 Fixlet Link: http://technet.microsoft.com/library/security/MS15-082 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-083: Vulnerability in Server Message Block Could Allow Remote Code Execution - Windows Vista SP2 - KB3073921 (x64) (Japanese) Severity: Important Fixlet ID: 1508301 Fixlet Link: http://technet.microsoft.com/library/security/MS15-083 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sends a specially crafted string to the SMB server error logging. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-083: Vulnerability in Server Message Block Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3073921 (x64) (Japanese) Severity: Important Fixlet ID: 1508303 Fixlet Link: http://technet.microsoft.com/library/security/MS15-083 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sends a specially crafted string to the SMB server error logging. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-083: Vulnerability in Server Message Block Could Allow Remote Code Execution - Windows Vista SP2 - KB3073921 (Japanese) Severity: Important Fixlet ID: 1508305 Fixlet Link: http://technet.microsoft.com/library/security/MS15-083 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sends a specially crafted string to the SMB server error logging. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-083: Vulnerability in Server Message Block Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3073921 (Japanese) Severity: Important Fixlet ID: 1508307 Fixlet Link: http://technet.microsoft.com/library/security/MS15-083 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sends a specially crafted string to the SMB server error logging. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-084: Vulnerabilities in XML Core Services Could Allow Information Disclosure - Windows Server 2012 Gold - KB3076895 (x64) (Japanese) Severity: Important Fixlet ID: 1508401 Fixlet Link: http://technet.microsoft.com/library/security/MS15-084 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows and Microsoft Office. The vulnerabilities could allow information disclosure by either exposing memory addresses if a user clicks a specially crafted link or by explicitly allowing the use of Secure Sockets Layer (SSL) 2.0. However, in all cases an attacker would have no way to force users to click a specially crafted link. An attacker would have to convince users to click the link, typically by way of an enticement in an email or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-084: Vulnerabilities in XML Core Services Could Allow Information Disclosure - Windows 7 SP1 - KB3076895 (Japanese) Severity: Important Fixlet ID: 1508403 Fixlet Link: http://technet.microsoft.com/library/security/MS15-084 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows and Microsoft Office. The vulnerabilities could allow information disclosure by either exposing memory addresses if a user clicks a specially crafted link or by explicitly allowing the use of Secure Sockets Layer (SSL) 2.0. However, in all cases an attacker would have no way to force users to click a specially crafted link. An attacker would have to convince users to click the link, typically by way of an enticement in an email or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-084: Vulnerabilities in XML Core Services Could Allow Information Disclosure - Windows Server 2008 SP2 - KB3076895 (Japanese) Severity: Important Fixlet ID: 1508405 Fixlet Link: http://technet.microsoft.com/library/security/MS15-084 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows and Microsoft Office. The vulnerabilities could allow information disclosure by either exposing memory addresses if a user clicks a specially crafted link or by explicitly allowing the use of Secure Sockets Layer (SSL) 2.0. However, in all cases an attacker would have no way to force users to click a specially crafted link. An attacker would have to convince users to click the link, typically by way of an enticement in an email or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-084: Vulnerabilities in XML Core Services Could Allow Information Disclosure - Windows 8 Gold - KB3076895 (x64) (Japanese) Severity: Important Fixlet ID: 1508407 Fixlet Link: http://technet.microsoft.com/library/security/MS15-084 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows and Microsoft Office. The vulnerabilities could allow information disclosure by either exposing memory addresses if a user clicks a specially crafted link or by explicitly allowing the use of Secure Sockets Layer (SSL) 2.0. However, in all cases an attacker would have no way to force users to click a specially crafted link. An attacker would have to convince users to click the link, typically by way of an enticement in an email or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-084: Vulnerabilities in XML Core Services Could Allow Information Disclosure - Windows 8.1 Gold - KB3076895 (Japanese) Severity: Important Fixlet ID: 1508409 Fixlet Link: http://technet.microsoft.com/library/security/MS15-084 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows and Microsoft Office. The vulnerabilities could allow information disclosure by either exposing memory addresses if a user clicks a specially crafted link or by explicitly allowing the use of Secure Sockets Layer (SSL) 2.0. However, in all cases an attacker would have no way to force users to click a specially crafted link. An attacker would have to convince users to click the link, typically by way of an enticement in an email or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-084: Vulnerabilities in XML Core Services Could Allow Information Disclosure - Windows 7 SP1 - KB3076895 (x64) (Japanese) Severity: Important Fixlet ID: 1508411 Fixlet Link: http://technet.microsoft.com/library/security/MS15-084 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows and Microsoft Office. The vulnerabilities could allow information disclosure by either exposing memory addresses if a user clicks a specially crafted link or by explicitly allowing the use of Secure Sockets Layer (SSL) 2.0. However, in all cases an attacker would have no way to force users to click a specially crafted link. An attacker would have to convince users to click the link, typically by way of an enticement in an email or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-084: Vulnerabilities in XML Core Services Could Allow Information Disclosure - Windows Vista SP2 - KB3076895 (x64) (Japanese) Severity: Important Fixlet ID: 1508413 Fixlet Link: http://technet.microsoft.com/library/security/MS15-084 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows and Microsoft Office. The vulnerabilities could allow information disclosure by either exposing memory addresses if a user clicks a specially crafted link or by explicitly allowing the use of Secure Sockets Layer (SSL) 2.0. However, in all cases an attacker would have no way to force users to click a specially crafted link. An attacker would have to convince users to click the link, typically by way of an enticement in an email or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-084: Vulnerabilities in XML Core Services Could Allow Information Disclosure - Windows Server 2012 R2 Gold - KB3076895 (x64) (Japanese) Severity: Important Fixlet ID: 1508415 Fixlet Link: http://technet.microsoft.com/library/security/MS15-084 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows and Microsoft Office. The vulnerabilities could allow information disclosure by either exposing memory addresses if a user clicks a specially crafted link or by explicitly allowing the use of Secure Sockets Layer (SSL) 2.0. However, in all cases an attacker would have no way to force users to click a specially crafted link. An attacker would have to convince users to click the link, typically by way of an enticement in an email or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-084: Vulnerabilities in XML Core Services Could Allow Information Disclosure - Windows 8.1 Gold - KB3076895 (x64) (Japanese) Severity: Important Fixlet ID: 1508417 Fixlet Link: http://technet.microsoft.com/library/security/MS15-084 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows and Microsoft Office. The vulnerabilities could allow information disclosure by either exposing memory addresses if a user clicks a specially crafted link or by explicitly allowing the use of Secure Sockets Layer (SSL) 2.0. However, in all cases an attacker would have no way to force users to click a specially crafted link. An attacker would have to convince users to click the link, typically by way of an enticement in an email or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-084: Vulnerabilities in XML Core Services Could Allow Information Disclosure - Windows Server 2008 R2 SP1 - KB3076895 (x64) (Japanese) Severity: Important Fixlet ID: 1508419 Fixlet Link: http://technet.microsoft.com/library/security/MS15-084 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows and Microsoft Office. The vulnerabilities could allow information disclosure by either exposing memory addresses if a user clicks a specially crafted link or by explicitly allowing the use of Secure Sockets Layer (SSL) 2.0. However, in all cases an attacker would have no way to force users to click a specially crafted link. An attacker would have to convince users to click the link, typically by way of an enticement in an email or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-084: Vulnerabilities in XML Core Services Could Allow Information Disclosure - Windows 8 Gold - KB3076895 (Japanese) Severity: Important Fixlet ID: 1508421 Fixlet Link: http://technet.microsoft.com/library/security/MS15-084 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows and Microsoft Office. The vulnerabilities could allow information disclosure by either exposing memory addresses if a user clicks a specially crafted link or by explicitly allowing the use of Secure Sockets Layer (SSL) 2.0. However, in all cases an attacker would have no way to force users to click a specially crafted link. An attacker would have to convince users to click the link, typically by way of an enticement in an email or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-084: Vulnerabilities in XML Core Services Could Allow Information Disclosure - InfoPath 2007 SP3 / Office 2007 SP3 - KB2825645 (Japanese) Severity: Important Fixlet ID: 1508423 Fixlet Link: http://technet.microsoft.com/library/security/MS15-084 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows and Microsoft Office. The vulnerabilities could allow information disclosure by either exposing memory addresses if a user clicks a specially crafted link or by explicitly allowing the use of Secure Sockets Layer (SSL) 2.0. However, in all cases an attacker would have no way to force users to click a specially crafted link. An attacker would have to convince users to click the link, typically by way of an enticement in an email or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-084: Vulnerabilities in XML Core Services Could Allow Information Disclosure - Windows Vista SP2 - KB3076895 (Japanese) Severity: Important Fixlet ID: 1508425 Fixlet Link: http://technet.microsoft.com/library/security/MS15-084 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows and Microsoft Office. The vulnerabilities could allow information disclosure by either exposing memory addresses if a user clicks a specially crafted link or by explicitly allowing the use of Secure Sockets Layer (SSL) 2.0. However, in all cases an attacker would have no way to force users to click a specially crafted link. An attacker would have to convince users to click the link, typically by way of an enticement in an email or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-084: Vulnerabilities in XML Core Services Could Allow Information Disclosure - Windows Server 2008 SP2 - KB3076895 (x64) (Japanese) Severity: Important Fixlet ID: 1508427 Fixlet Link: http://technet.microsoft.com/library/security/MS15-084 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows and Microsoft Office. The vulnerabilities could allow information disclosure by either exposing memory addresses if a user clicks a specially crafted link or by explicitly allowing the use of Secure Sockets Layer (SSL) 2.0. However, in all cases an attacker would have no way to force users to click a specially crafted link. An attacker would have to convince users to click the link, typically by way of an enticement in an email or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-085: Vulnerability in Mount Manager Could Allow Elevation of Privilege - Windows 8.1 Gold - KB3071756 (x64) (Japanese) Severity: Important Fixlet ID: 1508501 Fixlet Link: http://technet.microsoft.com/library/security/MS15-085 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker inserts a malicious USB device into a target system. An attacker could then write a malicious binary to disk and execute it. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-085: Vulnerability in Mount Manager Could Allow Elevation of Privilege - Windows 7 SP1 - KB3071756 (x64) (Japanese) Severity: Important Fixlet ID: 1508503 Fixlet Link: http://technet.microsoft.com/library/security/MS15-085 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker inserts a malicious USB device into a target system. An attacker could then write a malicious binary to disk and execute it. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-085: Vulnerability in Mount Manager Could Allow Elevation of Privilege - Windows 7 SP1 - KB3071756 (Japanese) Severity: Important Fixlet ID: 1508505 Fixlet Link: http://technet.microsoft.com/library/security/MS15-085 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker inserts a malicious USB device into a target system. An attacker could then write a malicious binary to disk and execute it. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-085: Vulnerability in Mount Manager Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3071756 (Japanese) Severity: Important Fixlet ID: 1508507 Fixlet Link: http://technet.microsoft.com/library/security/MS15-085 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker inserts a malicious USB device into a target system. An attacker could then write a malicious binary to disk and execute it. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-085: Vulnerability in Mount Manager Could Allow Elevation of Privilege - Windows 8 Gold - KB3071756 (x64) (Japanese) Severity: Important Fixlet ID: 1508509 Fixlet Link: http://technet.microsoft.com/library/security/MS15-085 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker inserts a malicious USB device into a target system. An attacker could then write a malicious binary to disk and execute it. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-085: Vulnerability in Mount Manager Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 - KB3071756 (x64) (Japanese) Severity: Important Fixlet ID: 1508511 Fixlet Link: http://technet.microsoft.com/library/security/MS15-085 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker inserts a malicious USB device into a target system. An attacker could then write a malicious binary to disk and execute it. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-085: Vulnerability in Mount Manager Could Allow Elevation of Privilege - Windows Server 2012 R2 Gold - KB3071756 (x64) (Japanese) Severity: Important Fixlet ID: 1508513 Fixlet Link: http://technet.microsoft.com/library/security/MS15-085 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker inserts a malicious USB device into a target system. An attacker could then write a malicious binary to disk and execute it. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-085: Vulnerability in Mount Manager Could Allow Elevation of Privilege - Windows Vista SP2 - KB3071756 (Japanese) Severity: Important Fixlet ID: 1508515 Fixlet Link: http://technet.microsoft.com/library/security/MS15-085 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker inserts a malicious USB device into a target system. An attacker could then write a malicious binary to disk and execute it. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-085: Vulnerability in Mount Manager Could Allow Elevation of Privilege - Windows 8 Gold - KB3071756 (Japanese) Severity: Important Fixlet ID: 1508517 Fixlet Link: http://technet.microsoft.com/library/security/MS15-085 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker inserts a malicious USB device into a target system. An attacker could then write a malicious binary to disk and execute it. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-085: Vulnerability in Mount Manager Could Allow Elevation of Privilege - Windows Server 2012 Gold - KB3071756 (x64) (Japanese) Severity: Important Fixlet ID: 1508519 Fixlet Link: http://technet.microsoft.com/library/security/MS15-085 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker inserts a malicious USB device into a target system. An attacker could then write a malicious binary to disk and execute it. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-085: Vulnerability in Mount Manager Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3071756 (x64) (Japanese) Severity: Important Fixlet ID: 1508521 Fixlet Link: http://technet.microsoft.com/library/security/MS15-085 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker inserts a malicious USB device into a target system. An attacker could then write a malicious binary to disk and execute it. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-085: Vulnerability in Mount Manager Could Allow Elevation of Privilege - Windows 8.1 Gold - KB3071756 (Japanese) Severity: Important Fixlet ID: 1508523 Fixlet Link: http://technet.microsoft.com/library/security/MS15-085 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker inserts a malicious USB device into a target system. An attacker could then write a malicious binary to disk and execute it. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-085: Vulnerability in Mount Manager Could Allow Elevation of Privilege - Windows Vista SP2 - KB3071756 (x64) (Japanese) Severity: Important Fixlet ID: 1508525 Fixlet Link: http://technet.microsoft.com/library/security/MS15-085 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker inserts a malicious USB device into a target system. An attacker could then write a malicious binary to disk and execute it. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-086: Security update for Update Rollup 10 for System Center 2012 Operations Manager Service Pack 1 - System Center 2012 Operations Manager SP1 - KB3071088 (Japanese) Severity: Important Fixlet ID: 1508601 Fixlet Link: http://support.microsoft.com/kb/3071088 Fixlet Description: A security vulnerability exists in Microsoft System Center 2012 SP1- Operations Manager Web Console that could allow Elevation of Privilege if a user visits an affected website by way of a specially crafted URL. This update resolves that vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-086: Security update for Update Rollup 8 for System Center 2012 Operations Manager - System Center 2012 Operations Manager - KB3071089 (Japanese) Severity: Important Fixlet ID: 1508607 Fixlet Link: http://support.microsoft.com/kb/3071089 Fixlet Description: A security vulnerability exists in Microsoft System Center 2012 RTM - Operations Manager Web Console that could allow Elevation of Privilege if a user visits an affected website by way of a specially crafted URL. This update resolves that vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-087: Vulnerability in UDDI Services Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3073893 (Japanese) Severity: Important Fixlet ID: 1508703 Fixlet Link: http://technet.microsoft.com/library/security/MS15-087 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker engineered a cross-site scripting (XSS) scenario by inserting a malicious script into a webpage search parameter. A user would have to visit a specially crafted webpage where the malicious script would then be executed. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-087: Vulnerability in UDDI Services Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3073893 (x64) (Japanese) Severity: Important Fixlet ID: 1508705 Fixlet Link: http://technet.microsoft.com/library/security/MS15-087 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker engineered a cross-site scripting (XSS) scenario by inserting a malicious script into a webpage search parameter. A user would have to visit a specially crafted webpage where the malicious script would then be executed. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows 7 SP1 - KB3079757 (x64) (Japanese) Severity: Important Fixlet ID: 1508801 Fixlet Link: http://technet.microsoft.com/library/security/MS15-088 Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows Server 2008 SP2 - KB3079757 (x64) (Japanese) Severity: Important Fixlet ID: 1508803 Fixlet Link: http://technet.microsoft.com/library/security/MS15-088 Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows Server 2008 SP2 - KB3046017 (x64) (Japanese) Severity: Important Fixlet ID: 1508805 Fixlet Link: http://technet.microsoft.com/library/security/MS15-088 Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows 8 Gold - KB3046017 (x64) (Japanese) Severity: Important Fixlet ID: 1508807 Fixlet Link: http://technet.microsoft.com/library/security/MS15-088 Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows 7 SP1 - KB3046017 (Japanese) Severity: Important Fixlet ID: 1508809 Fixlet Link: http://technet.microsoft.com/library/security/MS15-088 Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows Server 2008 R2 SP1 - KB3079757 (x64) (Japanese) Severity: Important Fixlet ID: 1508811 Fixlet Link: http://technet.microsoft.com/library/security/MS15-088 Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows Server 2008 R2 SP1 - KB3046017 (x64) (Japanese) Severity: Important Fixlet ID: 1508813 Fixlet Link: http://technet.microsoft.com/library/security/MS15-088 Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows 7 SP1 - KB3079757 (Japanese) Severity: Important Fixlet ID: 1508815 Fixlet Link: http://technet.microsoft.com/library/security/MS15-088 Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows Server 2012 Gold - KB3046017 (x64) (Japanese) Severity: Important Fixlet ID: 1508817 Fixlet Link: http://technet.microsoft.com/library/security/MS15-088 Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows 8.1 Gold - KB3046017 (x64) (Japanese) Severity: Important Fixlet ID: 1508819 Fixlet Link: http://technet.microsoft.com/library/security/MS15-088 Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows Vista SP2 - KB3079757 (Japanese) Severity: Important Fixlet ID: 1508821 Fixlet Link: http://technet.microsoft.com/library/security/MS15-088 Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows 8 Gold - KB3046017 (Japanese) Severity: Important Fixlet ID: 1508823 Fixlet Link: http://technet.microsoft.com/library/security/MS15-088 Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows Vista SP2 - KB3046017 (x64) (Japanese) Severity: Important Fixlet ID: 1508825 Fixlet Link: http://technet.microsoft.com/library/security/MS15-088 Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows Vista SP2 - KB3046017 (Japanese) Severity: Important Fixlet ID: 1508827 Fixlet Link: http://technet.microsoft.com/library/security/MS15-088 Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows 7 SP1 - KB3046017 (x64) (Japanese) Severity: Important Fixlet ID: 1508829 Fixlet Link: http://technet.microsoft.com/library/security/MS15-088 Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows Server 2012 R2 Gold - KB3046017 (x64) (Japanese) Severity: Important Fixlet ID: 1508831 Fixlet Link: http://technet.microsoft.com/library/security/MS15-088 Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows 8.1 Gold - KB3046017 (Japanese) Severity: Important Fixlet ID: 1508833 Fixlet Link: http://technet.microsoft.com/library/security/MS15-088 Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows Vista SP2 - KB3079757 (x64) (Japanese) Severity: Important Fixlet ID: 1508835 Fixlet Link: http://technet.microsoft.com/library/security/MS15-088 Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows Server 2008 SP2 - KB3079757 (Japanese) Severity: Important Fixlet ID: 1508837 Fixlet Link: http://technet.microsoft.com/library/security/MS15-088 Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows Server 2008 SP2 - KB3046017 (Japanese) Severity: Important Fixlet ID: 1508839 Fixlet Link: http://technet.microsoft.com/library/security/MS15-088 Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-089: Vulnerability in WebDAV Could Allow Information Disclosure - Windows Vista SP2 - KB3076949 (x64) (Japanese) Severity: Important Fixlet ID: 1508901 Fixlet Link: http://technet.microsoft.com/library/security/MS15-089 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker forces an encrypted Secure Socket Layer (SSL) 2.0 session with a WebDAV server that has SSL 2.0 enabled and uses a man-in-the-middle (MiTM) attack to decrypt portions of the encrypted traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-089: Vulnerability in WebDAV Could Allow Information Disclosure - Windows 8 Gold - KB3076949 (Japanese) Severity: Important Fixlet ID: 1508903 Fixlet Link: http://technet.microsoft.com/library/security/MS15-089 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker forces an encrypted Secure Socket Layer (SSL) 2.0 session with a WebDAV server that has SSL 2.0 enabled and uses a man-in-the-middle (MiTM) attack to decrypt portions of the encrypted traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-089: Vulnerability in WebDAV Could Allow Information Disclosure - Windows Server 2008 SP2 - KB3076949 (Japanese) Severity: Important Fixlet ID: 1508905 Fixlet Link: http://technet.microsoft.com/library/security/MS15-089 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker forces an encrypted Secure Socket Layer (SSL) 2.0 session with a WebDAV server that has SSL 2.0 enabled and uses a man-in-the-middle (MiTM) attack to decrypt portions of the encrypted traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-089: Vulnerability in WebDAV Could Allow Information Disclosure - Windows 8.1 Gold - KB3076949 (Japanese) Severity: Important Fixlet ID: 1508907 Fixlet Link: http://technet.microsoft.com/library/security/MS15-089 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker forces an encrypted Secure Socket Layer (SSL) 2.0 session with a WebDAV server that has SSL 2.0 enabled and uses a man-in-the-middle (MiTM) attack to decrypt portions of the encrypted traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-089: Vulnerability in WebDAV Could Allow Information Disclosure - Windows Vista SP2 - KB3076949 (Japanese) Severity: Important Fixlet ID: 1508909 Fixlet Link: http://technet.microsoft.com/library/security/MS15-089 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker forces an encrypted Secure Socket Layer (SSL) 2.0 session with a WebDAV server that has SSL 2.0 enabled and uses a man-in-the-middle (MiTM) attack to decrypt portions of the encrypted traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-089: Vulnerability in WebDAV Could Allow Information Disclosure - Windows 8 Gold - KB3076949 (x64) (Japanese) Severity: Important Fixlet ID: 1508911 Fixlet Link: http://technet.microsoft.com/library/security/MS15-089 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker forces an encrypted Secure Socket Layer (SSL) 2.0 session with a WebDAV server that has SSL 2.0 enabled and uses a man-in-the-middle (MiTM) attack to decrypt portions of the encrypted traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-089: Vulnerability in WebDAV Could Allow Information Disclosure - Windows 8.1 Gold - KB3076949 (x64) (Japanese) Severity: Important Fixlet ID: 1508913 Fixlet Link: http://technet.microsoft.com/library/security/MS15-089 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker forces an encrypted Secure Socket Layer (SSL) 2.0 session with a WebDAV server that has SSL 2.0 enabled and uses a man-in-the-middle (MiTM) attack to decrypt portions of the encrypted traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-089: Vulnerability in WebDAV Could Allow Information Disclosure - Windows 7 SP1 - KB3076949 (Japanese) Severity: Important Fixlet ID: 1508915 Fixlet Link: http://technet.microsoft.com/library/security/MS15-089 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker forces an encrypted Secure Socket Layer (SSL) 2.0 session with a WebDAV server that has SSL 2.0 enabled and uses a man-in-the-middle (MiTM) attack to decrypt portions of the encrypted traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-089: Vulnerability in WebDAV Could Allow Information Disclosure - Windows Server 2012 Gold - KB3076949 (x64) (Japanese) Severity: Important Fixlet ID: 1508917 Fixlet Link: http://technet.microsoft.com/library/security/MS15-089 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker forces an encrypted Secure Socket Layer (SSL) 2.0 session with a WebDAV server that has SSL 2.0 enabled and uses a man-in-the-middle (MiTM) attack to decrypt portions of the encrypted traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-089: Vulnerability in WebDAV Could Allow Information Disclosure - Windows 7 SP1 - KB3076949 (x64) (Japanese) Severity: Important Fixlet ID: 1508919 Fixlet Link: http://technet.microsoft.com/library/security/MS15-089 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker forces an encrypted Secure Socket Layer (SSL) 2.0 session with a WebDAV server that has SSL 2.0 enabled and uses a man-in-the-middle (MiTM) attack to decrypt portions of the encrypted traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-089: Vulnerability in WebDAV Could Allow Information Disclosure - Windows Server 2012 R2 Gold - KB3076949 (x64) (Japanese) Severity: Important Fixlet ID: 1508921 Fixlet Link: http://technet.microsoft.com/library/security/MS15-089 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker forces an encrypted Secure Socket Layer (SSL) 2.0 session with a WebDAV server that has SSL 2.0 enabled and uses a man-in-the-middle (MiTM) attack to decrypt portions of the encrypted traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-089: Vulnerability in WebDAV Could Allow Information Disclosure - Windows Server 2008 R2 SP1 - KB3076949 (x64) (Japanese) Severity: Important Fixlet ID: 1508923 Fixlet Link: http://technet.microsoft.com/library/security/MS15-089 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker forces an encrypted Secure Socket Layer (SSL) 2.0 session with a WebDAV server that has SSL 2.0 enabled and uses a man-in-the-middle (MiTM) attack to decrypt portions of the encrypted traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-089: Vulnerability in WebDAV Could Allow Information Disclosure - Windows Server 2008 SP2 - KB3076949 (x64) (Japanese) Severity: Important Fixlet ID: 1508925 Fixlet Link: http://technet.microsoft.com/library/security/MS15-089 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker forces an encrypted Secure Socket Layer (SSL) 2.0 session with a WebDAV server that has SSL 2.0 enabled and uses a man-in-the-middle (MiTM) attack to decrypt portions of the encrypted traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-090: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege - Windows Server 2012 Gold - KB3060716 (x64) (Japanese) Severity: Important Fixlet ID: 1509001 Fixlet Link: http://technet.microsoft.com/library/security/MS15-090 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application or convinces a user to open a specially crafted file that invokes a vulnerable sandboxed application, allowing an attacker to escape the sandbox. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-090: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege - Windows 8.1 Gold - KB3060716 (x64) (Japanese) Severity: Important Fixlet ID: 1509003 Fixlet Link: http://technet.microsoft.com/library/security/MS15-090 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application or convinces a user to open a specially crafted file that invokes a vulnerable sandboxed application, allowing an attacker to escape the sandbox. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-090: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege - Windows 7 SP1 - KB3060716 (x64) (Japanese) Severity: Important Fixlet ID: 1509005 Fixlet Link: http://technet.microsoft.com/library/security/MS15-090 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application or convinces a user to open a specially crafted file that invokes a vulnerable sandboxed application, allowing an attacker to escape the sandbox. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-090: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege - Windows 8 Gold - KB3060716 (x64) (Japanese) Severity: Important Fixlet ID: 1509007 Fixlet Link: http://technet.microsoft.com/library/security/MS15-090 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application or convinces a user to open a specially crafted file that invokes a vulnerable sandboxed application, allowing an attacker to escape the sandbox. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-090: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege - Windows 7 SP1 - KB3060716 (Japanese) Severity: Important Fixlet ID: 1509009 Fixlet Link: http://technet.microsoft.com/library/security/MS15-090 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application or convinces a user to open a specially crafted file that invokes a vulnerable sandboxed application, allowing an attacker to escape the sandbox. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-090: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege - Windows 8.1 Gold - KB3060716 (Japanese) Severity: Important Fixlet ID: 1509011 Fixlet Link: http://technet.microsoft.com/library/security/MS15-090 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application or convinces a user to open a specially crafted file that invokes a vulnerable sandboxed application, allowing an attacker to escape the sandbox. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-090: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3060716 (x64) (Japanese) Severity: Important Fixlet ID: 1509013 Fixlet Link: http://technet.microsoft.com/library/security/MS15-090 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application or convinces a user to open a specially crafted file that invokes a vulnerable sandboxed application, allowing an attacker to escape the sandbox. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-090: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege - Windows Vista SP2 - KB3060716 (Japanese) Severity: Important Fixlet ID: 1509015 Fixlet Link: http://technet.microsoft.com/library/security/MS15-090 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application or convinces a user to open a specially crafted file that invokes a vulnerable sandboxed application, allowing an attacker to escape the sandbox. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-090: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege - Windows 8 Gold - KB3060716 (Japanese) Severity: Important Fixlet ID: 1509017 Fixlet Link: http://technet.microsoft.com/library/security/MS15-090 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application or convinces a user to open a specially crafted file that invokes a vulnerable sandboxed application, allowing an attacker to escape the sandbox. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-090: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 - KB3060716 (x64) (Japanese) Severity: Important Fixlet ID: 1509019 Fixlet Link: http://technet.microsoft.com/library/security/MS15-090 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application or convinces a user to open a specially crafted file that invokes a vulnerable sandboxed application, allowing an attacker to escape the sandbox. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-090: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege - Windows Vista SP2 - KB3060716 (x64) (Japanese) Severity: Important Fixlet ID: 1509021 Fixlet Link: http://technet.microsoft.com/library/security/MS15-090 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application or convinces a user to open a specially crafted file that invokes a vulnerable sandboxed application, allowing an attacker to escape the sandbox. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-090: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege - Windows Server 2012 R2 Gold - KB3060716 (x64) (Japanese) Severity: Important Fixlet ID: 1509023 Fixlet Link: http://technet.microsoft.com/library/security/MS15-090 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application or convinces a user to open a specially crafted file that invokes a vulnerable sandboxed application, allowing an attacker to escape the sandbox. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-090: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3060716 (Japanese) Severity: Important Fixlet ID: 1509025 Fixlet Link: http://technet.microsoft.com/library/security/MS15-090 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application or convinces a user to open a specially crafted file that invokes a vulnerable sandboxed application, allowing an attacker to escape the sandbox. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-092: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - Windows 8 Gold - .NET Framework 4.6 - KB3083184 (Japanese) Severity: Important Fixlet ID: 1509201 Fixlet Link: http://technet.microsoft.com/library/security/MS15-092 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft .NET Framework. The vulnerabilities could allow elevation of privilege if a user runs a specially crafted .NET application. However, in all cases, an attacker would have no way to force users to run the application; an attacker would have to convince users to do so. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-092: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.6 - KB3083186 (Japanese) Severity: Important Fixlet ID: 1509203 Fixlet Link: http://technet.microsoft.com/library/security/MS15-092 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft .NET Framework. The vulnerabilities could allow elevation of privilege if a user runs a specially crafted .NET application. However, in all cases, an attacker would have no way to force users to run the application; an attacker would have to convince users to do so. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-092: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - Windows Server 2012 R2 Gold / Windows 8.1 Gold - .NET Framework 4.6 - KB3083185 (x64) (Japanese) Severity: Important Fixlet ID: 1509205 Fixlet Link: http://technet.microsoft.com/library/security/MS15-092 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft .NET Framework. The vulnerabilities could allow elevation of privilege if a user runs a specially crafted .NET application. However, in all cases, an attacker would have no way to force users to run the application; an attacker would have to convince users to do so. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-092: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - Windows 8.1 Gold - .NET Framework 4.6 - KB3083185 (Japanese) Severity: Important Fixlet ID: 1509207 Fixlet Link: http://technet.microsoft.com/library/security/MS15-092 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft .NET Framework. The vulnerabilities could allow elevation of privilege if a user runs a specially crafted .NET application. However, in all cases, an attacker would have no way to force users to run the application; an attacker would have to convince users to do so. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-092: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 / Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.6 - KB3083186 (x64) (Japanese) Severity: Important Fixlet ID: 1509209 Fixlet Link: http://technet.microsoft.com/library/security/MS15-092 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft .NET Framework. The vulnerabilities could allow elevation of privilege if a user runs a specially crafted .NET application. However, in all cases, an attacker would have no way to force users to run the application; an attacker would have to convince users to do so. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-092: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - Windows Server 2012 Gold / Windows 8 Gold - .NET Framework 4.6 - KB3083184 (x64) (Japanese) Severity: Important Fixlet ID: 1509211 Fixlet Link: http://technet.microsoft.com/library/security/MS15-092 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft .NET Framework. The vulnerabilities could allow elevation of privilege if a user runs a specially crafted .NET application. However, in all cases, an attacker would have no way to force users to run the application; an attacker would have to convince users to do so. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: 2553347: Update for Office 2010 - KB2553347 - Office 2010 SP2 (Japanese) Severity: Unspecified Fixlet ID: 255334701 Fixlet Link: http://support.microsoft.com/kb/2553347 Fixlet Description: Microsoft has released an update for Microsoft Office 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2553347: Update for Office 2010 - KB2553347 - Office 2010 SP2 (x64) (Japanese) Severity: Unspecified Fixlet ID: 255334703 Fixlet Link: http://support.microsoft.com/kb/2553347 Fixlet Description: Microsoft has released an update for Microsoft Office 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2589282: Update for Office 2010 - KB2589282 - Office 2010 SP2 (x64) (Japanese) Severity: Unspecified Fixlet ID: 258928201 Fixlet Link: http://support.microsoft.com/kb/2589282 Fixlet Description: Microsoft has released an update for Microsoft Office 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2589282: Update for Office 2010 - KB2589282 - Office 2010 SP2 (Japanese) Severity: Unspecified Fixlet ID: 258928203 Fixlet Link: http://support.microsoft.com/kb/2589282 Fixlet Description: Microsoft has released an update for Microsoft Office 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2965286: Update for the 2007 Microsoft Office system - KB2965286 - Office 2007 (Japanese) Severity: Unspecified Fixlet ID: 296528601 Fixlet Link: http://support.microsoft.com/kb/2965286 Fixlet Description: Microsoft has released an update for Microsoft Office 2007 suites . This update provides the latest fixes to Microsoft Office 2007 suites . Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2965300: Update for Access 2010 - KB2965300 - Office 2010 SP2 (Japanese) Severity: Unspecified Fixlet ID: 296530001 Fixlet Link: http://support.microsoft.com/kb/2965300 Fixlet Description: Microsoft has released an update for Microsoft Access 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Access 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2965300: Update for Access 2010 - KB2965300 - Office 2010 SP2 (x64) (Japanese) Severity: Unspecified Fixlet ID: 296530003 Fixlet Link: http://support.microsoft.com/kb/2965300 Fixlet Description: Microsoft has released an update for Microsoft Access 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Access 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3023052: Update for Office 2013 - KB3023052 - Office 2013 SP1 (Japanese) Severity: Unspecified Fixlet ID: 302305201 Fixlet Link: http://support.microsoft.com/kb/3023052 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3023052: Update for Office 2013 - KB3023052 - Office 2013 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 302305203 Fixlet Link: http://support.microsoft.com/kb/3023052 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3023069: Update for Office 2013 - KB3023069 - Office 2013 SP1 (Japanese) Severity: Unspecified Fixlet ID: 302306901 Fixlet Link: http://support.microsoft.com/kb/3023069 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3023069: Update for Office 2013 - KB3023069 - Office 2013 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 302306903 Fixlet Link: http://support.microsoft.com/kb/3023069 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3039762: Update for Office 2013 - KB3039762 - Office 2013 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 303976201 Fixlet Link: http://support.microsoft.com/kb/3039762 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3039762: Update for Office 2013 - KB3039762 - Office 2013 SP1 (Japanese) Severity: Unspecified Fixlet ID: 303976203 Fixlet Link: http://support.microsoft.com/kb/3039762 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054828: Update for Visio Compatibility Pack - KB3054828 - Visio Compatibility Pack (Japanese) Severity: Unspecified Fixlet ID: 305482801 Fixlet Link: http://support.microsoft.com/kb/3054828 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054873: Update for Office 2010 - KB3054873 - Office 2010 SP2 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305487301 Fixlet Link: http://support.microsoft.com/kb/3054873 Fixlet Description: Microsoft has released an update for Microsoft Office 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054873: Update for Office 2010 - KB3054873 - Office 2010 SP2 (Japanese) Severity: Unspecified Fixlet ID: 305487303 Fixlet Link: http://support.microsoft.com/kb/3054873 Fixlet Description: Microsoft has released an update for Microsoft Office 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054925: Update for Office 2013 - KB3054925 - Office 2013 SP1 (Japanese) Severity: Unspecified Fixlet ID: 305492501 Fixlet Link: http://support.microsoft.com/kb/3054925 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054925: Update for Office 2013 - KB3054925 - Office 2013 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305492503 Fixlet Link: http://support.microsoft.com/kb/3054925 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054935: Update for Office 2013 - KB3054935 - Office 2013 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305493501 Fixlet Link: http://support.microsoft.com/kb/3054935 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054935: Update for Office 2013 - KB3054935 - Office 2013 SP1 (Japanese) Severity: Unspecified Fixlet ID: 305493503 Fixlet Link: http://support.microsoft.com/kb/3054935 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054936: Update for OneNote 2013 - KB3054936 - Office 2013 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305493601 Fixlet Link: http://support.microsoft.com/kb/3054936 Fixlet Description: Microsoft has released an update for Microsoft OneNote 2013 64-Bit Edition. This update provides the latest fixes to Microsoft OneNote 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054936: Update for OneNote 2013 - KB3054936 - Office 2013 SP1 (Japanese) Severity: Unspecified Fixlet ID: 305493603 Fixlet Link: http://support.microsoft.com/kb/3054936 Fixlet Description: Microsoft has released an update for Microsoft OneNote 2013 32-Bit Edition. This update provides the latest fixes to Microsoft OneNote 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054938: Update for Office 2013 - KB3054938 - Office 2013 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305493801 Fixlet Link: http://support.microsoft.com/kb/3054938 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054938: Update for Office 2013 - KB3054938 - Office 2013 SP1 (Japanese) Severity: Unspecified Fixlet ID: 305493803 Fixlet Link: http://support.microsoft.com/kb/3054938 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054939: Update for Office 2013 - KB3054939 - Office 2013 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305493901 Fixlet Link: http://support.microsoft.com/kb/3054939 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054939: Update for Office 2013 - KB3054939 - Office 2013 SP1 (Japanese) Severity: Unspecified Fixlet ID: 305493903 Fixlet Link: http://support.microsoft.com/kb/3054939 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054940: Update for Outlook 2013 - KB3054940 - Office 2013 SP1 (Japanese) Severity: Unspecified Fixlet ID: 305494001 Fixlet Link: http://support.microsoft.com/kb/3054940 Fixlet Description: Microsoft has released an update for Microsoft Outlook 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Outlook 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054940: Update for Outlook 2013 - KB3054940 - Office 2013 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305494003 Fixlet Link: http://support.microsoft.com/kb/3054940 Fixlet Description: Microsoft has released an update for Microsoft Outlook 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Outlook 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054944: Update for Outlook 2013 Junk Email Filter - KB3054944 - Office 2013 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305494401 Fixlet Link: http://support.microsoft.com/kb/3054944 Fixlet Description: This update provides the latest junk email and malicious links filter definitions for Microsoft Office 2013 64-Bit Edition. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054944: Update for Outlook 2013 Junk Email Filter - KB3054944 - Office 2013 SP1 (Japanese) Severity: Unspecified Fixlet ID: 305494403 Fixlet Link: http://support.microsoft.com/kb/3054944 Fixlet Description: This update provides the latest junk email and malicious links filter definitions for Microsoft Office 2013 32-Bit Edition. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054946: Update for Lync 2013 (Skype for Business) - KB3054946 - Lync 2013 (Japanese) Severity: Unspecified Fixlet ID: 305494601 Fixlet Link: http://support.microsoft.com/kb/3054946 Fixlet Description: Microsoft has released an update for Skype for Business 2015 32-Bit Edition. This update provides the latest fixes to Skype for Business 2015 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 3054946: Update for Lync 2013 (Skype for Business) - KB3054946 - Lync 2013 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305494609 Fixlet Link: http://support.microsoft.com/kb/3054946 Fixlet Description: Microsoft has released an update for Skype for Business 2015 64-Bit Edition. This update provides the latest fixes to Skype for Business 2015 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 3054950: Update for Access 2013 - KB3054950 - Office 2013 SP1 (Japanese) Severity: Unspecified Fixlet ID: 305495001 Fixlet Link: http://support.microsoft.com/kb/3054950 Fixlet Description: Microsoft has released an update for Microsoft Access 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Access 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054950: Update for Access 2013 - KB3054950 - Office 2013 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305495003 Fixlet Link: http://support.microsoft.com/kb/3054950 Fixlet Description: Microsoft has released an update for Microsoft Access 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Access 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054951: Update for Office 2013 - KB3054951 - Office 2013 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305495101 Fixlet Link: http://support.microsoft.com/kb/3054951 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054951: Update for Office 2013 - KB3054951 - Office 2013 SP1 (Japanese) Severity: Unspecified Fixlet ID: 305495103 Fixlet Link: http://support.microsoft.com/kb/3054951 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054954: Update for OneDrive for Business - KB3054954 - Office 2013 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305495401 Fixlet Link: http://support.microsoft.com/kb/3054954 Fixlet Description: Microsoft has released an update for Microsoft OneDrive for Business 64-Bit Edition. This update provides the latest fixes to Microsoft OneDrive for Business 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054954: Update for OneDrive for Business - KB3054954 - Office 2013 SP1 (Japanese) Severity: Unspecified Fixlet ID: 305495403 Fixlet Link: http://support.microsoft.com/kb/3054954 Fixlet Description: Microsoft has released an update for Microsoft OneDrive for Business 32-Bit Edition. This update provides the latest fixes to Microsoft OneDrive for Business 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054956: Update for Project 2013 - KB3054956 - Project 2013 SP1 (Japanese) Severity: Unspecified Fixlet ID: 305495601 Fixlet Link: http://support.microsoft.com/kb/3054956 Fixlet Description: Microsoft has released an update for Microsoft Project 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Project 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054956: Update for Project 2013 - KB3054956 - Project 2013 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305495603 Fixlet Link: http://support.microsoft.com/kb/3054956 Fixlet Description: Microsoft has released an update for Microsoft Project 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Project 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054964: Update for Office 2010 - KB3054964 - Office 2010 SP2 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305496401 Fixlet Link: http://support.microsoft.com/kb/3054964 Fixlet Description: Microsoft has released an update for Microsoft Office 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054964: Update for Office 2010 - KB3054964 - Office 2010 SP2 (Japanese) Severity: Unspecified Fixlet ID: 305496403 Fixlet Link: http://support.microsoft.com/kb/3054964 Fixlet Description: Microsoft has released an update for Microsoft Office 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054976: Update for Outlook 2010 - KB3054976 - Office 2010 SP2 (Japanese) Severity: Unspecified Fixlet ID: 305497601 Fixlet Link: http://support.microsoft.com/kb/3054976 Fixlet Description: Microsoft has released an update for Microsoft Outlook 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Outlook 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054976: Update for Outlook 2010 - KB3054976 - Office 2010 SP2 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305497603 Fixlet Link: http://support.microsoft.com/kb/3054976 Fixlet Description: Microsoft has released an update for Microsoft Outlook 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Outlook 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054977: Update for Office 2010 - KB3054977 - Office 2010 SP2 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305497701 Fixlet Link: http://support.microsoft.com/kb/3054977 Fixlet Description: Microsoft has released an update for Microsoft Office 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054977: Update for Office 2010 - KB3054977 - Office 2010 SP2 (Japanese) Severity: Unspecified Fixlet ID: 305497703 Fixlet Link: http://support.microsoft.com/kb/3054977 Fixlet Description: Microsoft has released an update for Microsoft Office 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054985: Update for Project 2010 - KB3054985 - Project 2010 SP2 (Japanese) Severity: Unspecified Fixlet ID: 305498501 Fixlet Link: http://support.microsoft.com/kb/3054985 Fixlet Description: Microsoft has released an update for Microsoft Project 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Project 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054985: Update for Project 2010 - KB3054985 - Project 2010 SP2 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305498503 Fixlet Link: http://support.microsoft.com/kb/3054985 Fixlet Description: Microsoft has released an update for Microsoft Project 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Project 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054986: Update for Outlook 2007 Junk Email Filter - KB3054986 - Outlook 2007 (Japanese) Severity: Unspecified Fixlet ID: 305498601 Fixlet Link: http://support.microsoft.com/kb/3054986 Fixlet Description: This update provides the Junk E-mail Filter in Microsoft Office Outlook 2007 Junk Email Filter with a more current definition of which e-mail messages should be considered junk e-mail. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3055343: Update for Windows Server 2012 R2 (KB3055343) - Windows Server 2012 R2 (x64) (V2.0) (Japanese) Severity: Unspecified Fixlet ID: 305534305 Fixlet Link: http://support.microsoft.com/kb/3055343 Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3055343: Update for Windows 8.1 (KB3055343) - Windows 8.1 (V2.0) (Japanese) Severity: Unspecified Fixlet ID: 305534307 Fixlet Link: http://support.microsoft.com/kb/3055343 Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3055343: Update for Windows 8.1 for x64-based Systems (KB3055343) - Windows 8.1 (x64) (V2.0) (Japanese) Severity: Unspecified Fixlet ID: 305534309 Fixlet Link: http://support.microsoft.com/kb/3055343 Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3061493: Update enables magstripe drivers to support new devices in Windows 8.1 or Windows RT 8.1 - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 306149301 Fixlet Link: http://support.microsoft.com/kb/3061493 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3061493: Update enables magstripe drivers to support new devices in Windows 8.1 or Windows RT 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 306149303 Fixlet Link: http://support.microsoft.com/kb/3061493 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3065013: "0x0000007F" and "0x0000009F" Stop errors in Windows 8.1 or Windows Server 2012 R2 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 306501301 Fixlet Link: http://support.microsoft.com/kb/3065013 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3065013: "0x0000007F" and "0x0000009F" Stop errors in Windows 8.1 or Windows Server 2012 R2 - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 306501303 Fixlet Link: http://support.microsoft.com/kb/3065013 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3065013: "0x0000007F" and "0x0000009F" Stop errors in Windows 8.1 or Windows Server 2012 R2 - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 306501305 Fixlet Link: http://support.microsoft.com/kb/3065013 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3065979: "GsDraw error (1): GenericError" error occurs and application crashes when you create text outline in Windows - Windows Server 2008 SP2 (x64) (Japanese) Severity: Unspecified Fixlet ID: 306597927 Fixlet Link: http://support.microsoft.com/kb/3065979 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3065979: "GsDraw error (1): GenericError" error occurs and application crashes when you create text outline in Windows - Windows Server 2008 SP2 (Japanese) Severity: Unspecified Fixlet ID: 306597933 Fixlet Link: http://support.microsoft.com/kb/3065979 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3065987: Windows Update Client for Windows 7 and Windows Server 2008 R2 - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 306598703 Fixlet Link: http://support.microsoft.com/kb/3065987 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3065987: Windows Update Client for Windows 7 and Windows Server 2008 R2 - Windows 7 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 306598707 Fixlet Link: http://support.microsoft.com/kb/3065987 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3065987: Windows Update Client for Windows 7 and Windows Server 2008 R2 - Windows 7 SP1 (Japanese) Severity: Unspecified Fixlet ID: 306598711 Fixlet Link: http://support.microsoft.com/kb/3065987 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3065988: Windows Update Client for Windows 8.1 and Windows Server 2012 R2 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 306598801 Fixlet Link: http://support.microsoft.com/kb/3065988 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3065988: Windows Update Client for Windows 8.1 and Windows Server 2012 R2 - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 306598803 Fixlet Link: http://support.microsoft.com/kb/3065988 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3065988: Windows Update Client for Windows 8.1 and Windows Server 2012 R2 - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 306598805 Fixlet Link: http://support.microsoft.com/kb/3065988 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3070071: Updated APN database entry for SoftBank Mobile Corp for Windows 8.1 and Windows 8 - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 307007101 Fixlet Link: http://support.microsoft.com/kb/3070071 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3070071: Updated APN database entry for SoftBank Mobile Corp for Windows 8.1 and Windows 8 - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 307007103 Fixlet Link: http://support.microsoft.com/kb/3070071 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3070071: Updated APN database entry for SoftBank Mobile Corp for Windows 8.1 and Windows 8 - Windows 8 Gold (Japanese) Severity: Unspecified Fixlet ID: 307007105 Fixlet Link: http://support.microsoft.com/kb/3070071 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3070071: Updated APN database entry for SoftBank Mobile Corp for Windows 8.1 and Windows 8 - Windows 8 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 307007107 Fixlet Link: http://support.microsoft.com/kb/3070071 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3071663: Microsoft applications might crash in Windows - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 307166301 Fixlet Link: http://support.microsoft.com/kb/3071663 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3071663: Microsoft applications might crash in Windows - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 307166303 Fixlet Link: http://support.microsoft.com/kb/3071663 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3071663: Microsoft applications might crash in Windows - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 307166305 Fixlet Link: http://support.microsoft.com/kb/3071663 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3072019: "Try again" error occurs and Bluetooth device cannot connect to computer in Windows 8.1 or Windows RT 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 307201901 Fixlet Link: http://support.microsoft.com/kb/3072019 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3072019: "Try again" error occurs and Bluetooth device cannot connect to computer in Windows 8.1 or Windows RT 8.1 - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 307201903 Fixlet Link: http://support.microsoft.com/kb/3072019 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3074683: Security Update for Windows 10 (KB3074683) - Windows 10 (Japanese) (Superseded) Severity: Critical Fixlet ID: 307468302 Fixlet Link: http://support.microsoft.com/kb/3074683 Fixlet Description: Note: This patch has been superseded by KB3081436. A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3074683: Security Update for Windows 10 for x64-based Systems (KB3074683) - Windows 10 (x64) (Japanese) (Superseded) Severity: Critical Fixlet ID: 307468304 Fixlet Link: http://support.microsoft.com/kb/3074683 Fixlet Description: Note: This patch has been superseded by KB3081436. A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3075851: Update for Windows 7 (KB3075851) - Windows 7 (Japanese) Severity: Unspecified Fixlet ID: 307585107 Fixlet Link: http://support.microsoft.com/kb/3075851 Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3075851: Update for Windows 7 for x64-based Systems (KB3075851) - Windows 7 (x64) (Japanese) Severity: Unspecified Fixlet ID: 307585109 Fixlet Link: http://support.microsoft.com/kb/3075851 Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3075851: Update for Windows Server 2008 R2 x64 Edition (KB3075851) - Windows Server 2008 R2 (x64) (Japanese) Severity: Unspecified Fixlet ID: 307585111 Fixlet Link: http://support.microsoft.com/kb/3075851 Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3075853: Update for Windows 8.1 (KB3075853) - Windows 8.1 (Japanese) Severity: Unspecified Fixlet ID: 307585301 Fixlet Link: http://support.microsoft.com/kb/3075853 Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3075853: Update for Windows Server 2012 R2 (KB3075853) - Windows Server 2012 R2 (x64) (Japanese) Severity: Unspecified Fixlet ID: 307585303 Fixlet Link: http://support.microsoft.com/kb/3075853 Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3075853: Update for Windows 8.1 for x64-based Systems (KB3075853) - Windows 8.1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 307585305 Fixlet Link: http://support.microsoft.com/kb/3075853 Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3081424: Cumulative Update for Windows 10 for x64-based Systems (KB3081424) - Windows 10 (x64) (Japanese) (Superseded) Severity: Unspecified Fixlet ID: 308142401 Fixlet Link: http://support.microsoft.com/kb/3081424 Fixlet Description: Note: This patch has been superseded by KB3081436. Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3081424: Cumulative Update for Windows 10 (KB3081424) - Windows 10 (Japanese) (Superseded) Severity: Unspecified Fixlet ID: 308142403 Fixlet Link: http://support.microsoft.com/kb/3081424 Fixlet Description: Note: This patch has been superseded by KB3081436.Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3081436: Cumulative Update for Windows 10 (KB3081436) - Windows 10 (Japanese) Severity: Critical Fixlet ID: 308143605 Fixlet Link: http://support.microsoft.com/kb/3081436 Fixlet Description: The security update for Windows 10 that is dated August 11, 2015, includes improvements to improve the functionality of Windows 10 and resolves the following vulnerabilities in Windows: 3086251 MS15-092: Vulnerabilities in the .NET Framework could allow elevation of privilege: August 11, 2015 3084525 MS15-091: Cumulative security update for Microsoft Edge: August 11, 2015 3082458 MS15-088: Unsafe command-line parameter passing could allow information disclosure: August 11, 2015 3082487 MS15-085: Vulnerability in Mount Manager could allow elevation of privilege: August 11, 2015 3078662 MS15-080: Vulnerabilities in Microsoft graphics component could allow remote code execution: August 11, 2015 3082442 MS15-079: Cumulative security update for Internet Explorer: August 11, 2015 Windows 10 updates are cumulative. Therefore, this package contains all previously released fixes.Note: Affected computers may report back as 'Pending Restart' once the update has run successfully, but will not report back their final status until the computer has been restarted. *************************************************************** Title: 3081436: Cumulative Update for Windows 10 for x64-based Systems (KB3081436) - Windows 10 (x64) (Japanese) Severity: Critical Fixlet ID: 308143607 Fixlet Link: http://support.microsoft.com/kb/3081436 Fixlet Description: The security update for Windows 10 that is dated August 11, 2015, includes improvements to improve the functionality of Windows 10 and resolves the following vulnerabilities in Windows: 3086251 MS15-092: Vulnerabilities in the .NET Framework could allow elevation of privilege: August 11, 2015 3084525 MS15-091: Cumulative security update for Microsoft Edge: August 11, 2015 3082458 MS15-088: Unsafe command-line parameter passing could allow information disclosure: August 11, 2015 3082487 MS15-085: Vulnerability in Mount Manager could allow elevation of privilege: August 11, 2015 3078662 MS15-080: Vulnerabilities in Microsoft graphics component could allow remote code execution: August 11, 2015 3082442 MS15-079: Cumulative security update for Internet Explorer: August 11, 2015 Windows 10 updates are cumulative. Therefore, this package contains all previously released fixes.Note: Affected computers may report back as 'Pending Restart' once the update has run successfully, but will not report back their final status until the computer has been restarted. *************************************************************** Title: 3087916: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Windows 10 (Japanese) Severity: Unspecified Fixlet ID: 308791601 Fixlet Link: http://support.microsoft.com/kb/3087916 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3087916: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Windows 10 (x64) (Japanese) Severity: Unspecified Fixlet ID: 308791605 Fixlet Link: http://support.microsoft.com/kb/3087916 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3087916: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 308791607 Fixlet Link: http://support.microsoft.com/kb/3087916 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3087916: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 308791609 Fixlet Link: http://support.microsoft.com/kb/3087916 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3087916: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Windows Server 2012 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 308791611 Fixlet Link: http://support.microsoft.com/kb/3087916 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3087916: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 308791613 Fixlet Link: http://support.microsoft.com/kb/3087916 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3087916: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Windows 8 Gold (Japanese) Severity: Unspecified Fixlet ID: 308791615 Fixlet Link: http://support.microsoft.com/kb/3087916 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3087916: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Windows 8 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 308791617 Fixlet Link: http://support.microsoft.com/kb/3087916 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. From autonotify at us.ibm.com Fri Aug 21 02:33:06 2015 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Fri, 21 Aug 2015 02:33:06 -0700 Subject: [BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)' Message-ID: Fixlet Site - 'Patches for Windows (Japanese)' Current Version: 672 Published: Thu, 20 Aug 2015 19:13:19 GMT New Fixlets: ============ *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows 7 SP1 - IE 10 - KB3078071 (x64) (Japanese) Severity: Critical Fixlet ID: 1509301 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 8 - KB3078071 (x64) (Japanese) Severity: Moderate Fixlet ID: 1509303 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Vista SP2 - IE 7 - KB3078071 (Japanese) Severity: Critical Fixlet ID: 1509305 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows 7 SP1 - IE 8 - KB3078071 (x64) (Japanese) Severity: Critical Fixlet ID: 1509307 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Server 2012 Gold - IE 10 - KB3078071 (x64) (Japanese) Severity: Moderate Fixlet ID: 1509309 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows 8.1 Gold - IE 11 - KB3078071 (x64) (Japanese) Severity: Critical Fixlet ID: 1509311 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 9 - KB3078071 (Japanese) Severity: Moderate Fixlet ID: 1509313 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows 8 Gold - IE 10 - KB3078071 (x64) (Japanese) Severity: Critical Fixlet ID: 1509315 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 10 - KB3078071 (x64) (Japanese) Severity: Moderate Fixlet ID: 1509317 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows 7 SP1 - IE 9 - KB3078071 (x64) (Japanese) Severity: Critical Fixlet ID: 1509319 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Vista SP2 - IE 8 - KB3078071 (x64) (Japanese) Severity: Critical Fixlet ID: 1509321 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Vista SP2 - IE 7 - KB3078071 (x64) (Japanese) Severity: Critical Fixlet ID: 1509323 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 8 - KB3078071 (Japanese) Severity: Moderate Fixlet ID: 1509325 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows 8 Gold - IE 10 - KB3078071 (Japanese) Severity: Critical Fixlet ID: 1509327 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 7 - KB3078071 (Japanese) Severity: Moderate Fixlet ID: 1509329 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows 7 SP1 - IE 11 - KB3078071 (Japanese) Severity: Critical Fixlet ID: 1509331 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows 7 SP1 - IE 10 - KB3078071 (Japanese) Severity: Critical Fixlet ID: 1509333 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Server 2012 R2 Gold - IE 11 - KB3078071 (x64) (Japanese) Severity: Moderate Fixlet ID: 1509335 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows 7 SP1 - IE 11 - KB3078071 (x64) (Japanese) Severity: Critical Fixlet ID: 1509337 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Vista SP2 - IE 8 - KB3078071 (Japanese) Severity: Critical Fixlet ID: 1509339 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Vista SP2 - IE 9 - KB3078071 (x64) (Japanese) Severity: Critical Fixlet ID: 1509341 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 9 - KB3078071 (x64) (Japanese) Severity: Moderate Fixlet ID: 1509343 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows 7 SP1 - IE 9 - KB3078071 (Japanese) Severity: Critical Fixlet ID: 1509345 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows 8.1 Gold - IE 11 - KB3078071 (Japanese) Severity: Critical Fixlet ID: 1509347 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 8 - KB3078071 (x64) (Japanese) Severity: Moderate Fixlet ID: 1509349 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows 7 SP1 - IE 8 - KB3078071 (Japanese) Severity: Critical Fixlet ID: 1509351 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 11 - KB3078071 (x64) (Japanese) Severity: Moderate Fixlet ID: 1509353 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Vista SP2 - IE 9 - KB3078071 (Japanese) Severity: Critical Fixlet ID: 1509355 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 7 - KB3078071 (x64) (Japanese) Severity: Moderate Fixlet ID: 1509357 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 9 - KB3078071 (x64) (Japanese) Severity: Moderate Fixlet ID: 1509359 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows 7 SP1 - IE 10 - KB3087985 (x64) (Japanese) Severity: Critical Fixlet ID: 1509361 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 8 - KB3087985 (x64) (Japanese) Severity: Moderate Fixlet ID: 1509363 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Vista SP2 - IE 7 - KB3087985 (Japanese) Severity: Critical Fixlet ID: 1509365 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows 7 SP1 - IE 8 - KB3087985 (x64) (Japanese) Severity: Critical Fixlet ID: 1509367 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Server 2012 Gold - IE 10 - KB3087985 (x64) (Japanese) Severity: Moderate Fixlet ID: 1509369 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows 8.1 Gold - IE 11 - KB3087985 (x64) (Japanese) Severity: Critical Fixlet ID: 1509371 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 9 - KB3087985 (Japanese) Severity: Moderate Fixlet ID: 1509373 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows 8 Gold - IE 10 - KB3087985 (x64) (Japanese) Severity: Critical Fixlet ID: 1509375 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 10 - KB3087985 (x64) (Japanese) Severity: Moderate Fixlet ID: 1509377 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows 7 SP1 - IE 9 - KB3087985 (x64) (Japanese) Severity: Critical Fixlet ID: 1509379 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Vista SP2 - IE 8 - KB3087985 (x64) (Japanese) Severity: Critical Fixlet ID: 1509381 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Vista SP2 - IE 7 - KB3087985 (x64) (Japanese) Severity: Critical Fixlet ID: 1509383 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 8 - KB3087985 (Japanese) Severity: Moderate Fixlet ID: 1509385 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows 8 Gold - IE 10 - KB3087985 (Japanese) Severity: Critical Fixlet ID: 1509387 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 7 - KB3087985 (Japanese) Severity: Moderate Fixlet ID: 1509389 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows 7 SP1 - IE 11 - KB3087985 (Japanese) Severity: Critical Fixlet ID: 1509391 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows 7 SP1 - IE 10 - KB3087985 (Japanese) Severity: Critical Fixlet ID: 1509393 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Server 2012 R2 Gold - IE 11 - KB3087985 (x64) (Japanese) Severity: Moderate Fixlet ID: 1509395 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows 7 SP1 - IE 11 - KB3087985 (x64) (Japanese) Severity: Critical Fixlet ID: 1509397 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Vista SP2 - IE 8 - KB3087985 (Japanese) Severity: Critical Fixlet ID: 1509399 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Vista SP2 - IE 9 - KB3087985 (x64) (Japanese) Severity: Critical Fixlet ID: 15093101 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 9 - KB3087985 (x64) (Japanese) Severity: Moderate Fixlet ID: 15093103 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows 7 SP1 - IE 9 - KB3087985 (Japanese) Severity: Critical Fixlet ID: 15093105 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows 8.1 Gold - IE 11 - KB3087985 (Japanese) Severity: Critical Fixlet ID: 15093107 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 8 - KB3087985 (x64) (Japanese) Severity: Moderate Fixlet ID: 15093109 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows 7 SP1 - IE 8 - KB3087985 (Japanese) Severity: Critical Fixlet ID: 15093111 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 11 - KB3087985 (x64) (Japanese) Severity: Moderate Fixlet ID: 15093113 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Vista SP2 - IE 9 - KB3087985 (Japanese) Severity: Critical Fixlet ID: 15093115 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 7 - KB3087985 (x64) (Japanese) Severity: Moderate Fixlet ID: 15093117 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 9 - KB3087985 (x64) (Japanese) Severity: Moderate Fixlet ID: 15093119 Fixlet Link: http://technet.microsoft.com/library/security/MS15-093 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2589318: Update for Office 2010 - KB2589318 - Office 2010 SP2 (x64) (Japanese) Severity: Unspecified Fixlet ID: 258931801 Fixlet Link: http://support.microsoft.com/kb/2589318 Fixlet Description: Microsoft has released an update for Microsoft Office 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2589318: Update for Office 2010 - KB2589318 - Office 2010 SP2 (Japanese) Severity: Unspecified Fixlet ID: 258931803 Fixlet Link: http://support.microsoft.com/kb/2589318 Fixlet Description: Microsoft has released an update for Microsoft Office 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2597011: Description of the Outlook 2010 hotfix package - KB2597011 - Office 2010 Gold/SP1 (Japanese) Severity: Unspecified Fixlet ID: 259701101 Fixlet Link: http://support.microsoft.com/kb/2597011 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: Hotfixes have no default action. *************************************************************** Title: 2597011: Description of the Outlook 2010 hotfix package - KB2597011 - Office 2010 Gold/SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 259701103 Fixlet Link: http://support.microsoft.com/kb/2597011 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: Hotfixes have no default action. *************************************************************** Title: 3038936: Anti-malware platform update for Windows Defender in Windows 8.1 and Windows 8 - Windows 8 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 303893601 Fixlet Link: http://support.microsoft.com/kb/3038936 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3038936: Anti-malware platform update for Windows Defender in Windows 8.1 and Windows 8 - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 303893603 Fixlet Link: http://support.microsoft.com/kb/3038936 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3038936: Anti-malware platform update for Windows Defender in Windows 8.1 and Windows 8 - Windows 8 Gold (Japanese) Severity: Unspecified Fixlet ID: 303893605 Fixlet Link: http://support.microsoft.com/kb/3038936 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3038936: Anti-malware platform update for Windows Defender in Windows 8.1 and Windows 8 - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 303893607 Fixlet Link: http://support.microsoft.com/kb/3038936 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3039718: Update for Office 2013 - KB3039718 - Office 2013 SP1 (Japanese) Severity: Unspecified Fixlet ID: 303971801 Fixlet Link: http://support.microsoft.com/kb/3039718 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3039718: Update for Office 2013 - KB3039718 - Office 2013 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 303971803 Fixlet Link: http://support.microsoft.com/kb/3039718 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3039732: Update for SharePoint Designer 2013 - KB3039732 - SharePoint Designer 2013 SP1 (Japanese) Severity: Unspecified Fixlet ID: 303973201 Fixlet Link: http://support.microsoft.com/kb/3039732 Fixlet Description: Microsoft has released an update for Microsoft SharePoint Designer 2013 32-Bit Edition. This update provides the latest fixes to Microsoft SharePoint Designer 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3039732: Update for SharePoint Designer 2013 - KB3039732 - SharePoint Designer 2013 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 303973203 Fixlet Link: http://support.microsoft.com/kb/3039732 Fixlet Description: Microsoft has released an update for Microsoft SharePoint Designer 2013 64-Bit Edition. This update provides the latest fixes to Microsoft SharePoint Designer 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3039792: Update for Office 2013 - KB3039792 - Office 2013 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 303979201 Fixlet Link: http://support.microsoft.com/kb/3039792 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3039792: Update for Office 2013 - KB3039792 - Office 2013 SP1 (Japanese) Severity: Unspecified Fixlet ID: 303979203 Fixlet Link: http://support.microsoft.com/kb/3039792 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054807: Update for Office 2013 - KB3054807 - Office 2013 SP1 (Japanese) Severity: Unspecified Fixlet ID: 305480701 Fixlet Link: http://support.microsoft.com/kb/3054807 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054807: Update for Office 2013 - KB3054807 - Office 2013 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305480703 Fixlet Link: http://support.microsoft.com/kb/3054807 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054962: Update for Office 2010 - KB3054962 - Office 2010 SP2 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305496201 Fixlet Link: http://support.microsoft.com/kb/3054962 Fixlet Description: Microsoft has released an update for Microsoft Office 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054962: Update for Office 2010 - KB3054962 - Office 2010 SP2 (Japanese) Severity: Unspecified Fixlet ID: 305496203 Fixlet Link: http://support.microsoft.com/kb/3054962 Fixlet Description: Microsoft has released an update for Microsoft Office 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054979: Update for Outlook 2010 Junk Email Filter - KB3054979 - Office 2010 SP2 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305497901 Fixlet Link: http://support.microsoft.com/kb/3054979 Fixlet Description: This update provides the latest junk email and malicious links filter definitions for Microsoft Office 2010 64-Bit Edition. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 3054979: Update for Outlook 2010 Junk Email Filter - KB3054979 - Office 2010 SP2 (Japanese) Severity: Unspecified Fixlet ID: 305497903 Fixlet Link: http://support.microsoft.com/kb/3054979 Fixlet Description: This update provides the latest junk email and malicious links filter definitions for Microsoft Office 2010 32-Bit Edition. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 3055000: Update for Office 2013 - KB3055000 - Office 2013 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305500001 Fixlet Link: http://support.microsoft.com/kb/3055000 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3055000: Update for Office 2013 - KB3055000 - Office 2013 SP1 (Japanese) Severity: Unspecified Fixlet ID: 305500003 Fixlet Link: http://support.microsoft.com/kb/3055000 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3055001: Update for Office 2013 - KB3055001 - Office 2013 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305500101 Fixlet Link: http://support.microsoft.com/kb/3055001 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3055001: Update for Office 2013 - KB3055001 - Office 2013 SP1 (Japanese) Severity: Unspecified Fixlet ID: 305500103 Fixlet Link: http://support.microsoft.com/kb/3055001 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3055008: Update for OneNote 2013 - KB3055008 - Office 2013 SP1 (Japanese) Severity: Unspecified Fixlet ID: 305500801 Fixlet Link: http://support.microsoft.com/kb/3055008 Fixlet Description: Microsoft has released an update for Microsoft OneNote 2013 32-Bit Edition. This update provides the latest fixes to Microsoft OneNote 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3055008: Update for OneNote 2013 - KB3055008 - Office 2013 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305500803 Fixlet Link: http://support.microsoft.com/kb/3055008 Fixlet Description: Microsoft has released an update for Microsoft OneNote 2013 64-Bit Edition. This update provides the latest fixes to Microsoft OneNote 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3055012: Update for Outlook 2013 - KB3055012 - Office 2013 SP1 (Japanese) Severity: Unspecified Fixlet ID: 305501201 Fixlet Link: http://support.microsoft.com/kb/3055012 Fixlet Description: Microsoft has released an update for Microsoft Outlook 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Outlook 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3055012: Update for Outlook 2013 - KB3055012 - Office 2013 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305501203 Fixlet Link: http://support.microsoft.com/kb/3055012 Fixlet Description: Microsoft has released an update for Microsoft Outlook 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Outlook 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3055013: Update for Outlook 2013 Junk Email Filter - KB3055013 - Office 2013 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305501301 Fixlet Link: http://support.microsoft.com/kb/3055013 Fixlet Description: This update provides the latest junk email and malicious links filter definitions for Microsoft Office 2013 64-Bit Edition. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3055013: Update for Outlook 2013 Junk Email Filter - KB3055013 - Office 2013 SP1 (Japanese) Severity: Unspecified Fixlet ID: 305501303 Fixlet Link: http://support.microsoft.com/kb/3055013 Fixlet Description: This update provides the latest junk email and malicious links filter definitions for Microsoft Office 2013 32-Bit Edition. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3055016: Update for Access 2013 - KB3055016 - Office 2013 SP1 (Japanese) Severity: Unspecified Fixlet ID: 305501601 Fixlet Link: http://support.microsoft.com/kb/3055016 Fixlet Description: Microsoft has released an update for Microsoft Access 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Access 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3055016: Update for Access 2013 - KB3055016 - Office 2013 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305501603 Fixlet Link: http://support.microsoft.com/kb/3055016 Fixlet Description: Microsoft has released an update for Microsoft Access 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Access 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3055017: Update for Office 2013 - KB3055017 - Office 2013 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305501701 Fixlet Link: http://support.microsoft.com/kb/3055017 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3055017: Update for Office 2013 - KB3055017 - Office 2013 SP1 (Japanese) Severity: Unspecified Fixlet ID: 305501703 Fixlet Link: http://support.microsoft.com/kb/3055017 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3055020: Update for OneDrive for Business - KB3055020 - Office 2013 SP1 (Japanese) Severity: Unspecified Fixlet ID: 305502001 Fixlet Link: http://support.microsoft.com/kb/3055020 Fixlet Description: Microsoft has released an update for Microsoft OneDrive for Business 32-Bit Edition. This update provides the latest fixes to Microsoft OneDrive for Business 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3055020: Update for OneDrive for Business - KB3055020 - Office 2013 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305502003 Fixlet Link: http://support.microsoft.com/kb/3055020 Fixlet Description: Microsoft has released an update for Microsoft OneDrive for Business 64-Bit Edition. This update provides the latest fixes to Microsoft OneDrive for Business 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3055022: Update for Project 2013 - KB3055022 - Project 2013 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305502201 Fixlet Link: http://support.microsoft.com/kb/3055022 Fixlet Description: Microsoft has released an update for Microsoft Project 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Project 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3055022: Update for Project 2013 - KB3055022 - Project 2013 SP1 (Japanese) Severity: Unspecified Fixlet ID: 305502203 Fixlet Link: http://support.microsoft.com/kb/3055022 Fixlet Description: Microsoft has released an update for Microsoft Project 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Project 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3055023: Update for Outlook 2007 Junk Email Filter - KB3055023 - Outlook 2007 (Japanese) Severity: Unspecified Fixlet ID: 305502301 Fixlet Link: http://support.microsoft.com/kb/3055023 Fixlet Description: This update provides the Junk E-mail Filter in Microsoft Office Outlook 2007 Junk Email Filter with a more current definition of which e-mail messages should be considered junk e-mail. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3055041: Update for Outlook 2010 - KB3055041 - Office 2010 SP2 (Japanese) Severity: Unspecified Fixlet ID: 305504101 Fixlet Link: http://support.microsoft.com/kb/3055041 Fixlet Description: Microsoft has released an update for Microsoft Outlook 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Outlook 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3055041: Update for Outlook 2010 - KB3055041 - Office 2010 SP2 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305504103 Fixlet Link: http://support.microsoft.com/kb/3055041 Fixlet Description: Microsoft has released an update for Microsoft Outlook 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Outlook 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3055050: Update for Project 2010 - KB3055050 - Project 2010 SP2 (Japanese) Severity: Unspecified Fixlet ID: 305505001 Fixlet Link: http://support.microsoft.com/kb/3055050 Fixlet Description: Microsoft has released an update for Microsoft Project 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Project 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3055050: Update for Project 2010 - KB3055050 - Project 2010 SP2 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305505003 Fixlet Link: http://support.microsoft.com/kb/3055050 Fixlet Description: Microsoft has released an update for Microsoft Project 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Project 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3081438: Cumulative Update for Windows 10 (KB3081438) - Windows 10 (Japanese) (Superseded) Severity: Unspecified Fixlet ID: 308143801 Fixlet Link: http://support.microsoft.com/kb/3081438 Fixlet Description: Note: This patch has been superseded by KB3081444. Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3081438: Cumulative Update for Windows 10 (KB3081438) - Windows 10 (x64) (Japanese) (Superseded) Severity: Unspecified Fixlet ID: 308143803 Fixlet Link: http://support.microsoft.com/kb/3081438 Fixlet Description: Note: This patch has been superseded by KB3081444. Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Cumulative Update for Windows 10 (KB3081444) - Windows 10 (Japanese) Severity: Critical Fixlet ID: 308144401 Fixlet Link: http://support.microsoft.com/kb/3081444 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-093: Cumulative Update for Windows 10 for x64-based Systems (KB3081444) - Windows 10 (x64) (Japanese) Severity: Critical Fixlet ID: 308144403 Fixlet Link: http://support.microsoft.com/kb/3081444 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.