[BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)'

autonotify at us.ibm.com autonotify at us.ibm.com
Thu Aug 13 02:33:37 PDT 2015


Fixlet Site - 'Patches for Windows (Japanese)'
Current Version: 671	Published: Thu, 13 Aug 2015 07:09:03  GMT

New Fixlets:
============

***************************************************************
Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows 8 Gold - IE 10 - KB3078071 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1507901
Fixlet Link: http://technet.microsoft.com/library/security/MS15-079

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 9 - KB3078071 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1507903
Fixlet Link: http://technet.microsoft.com/library/security/MS15-079

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 9 - KB3078071 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1507905
Fixlet Link: http://technet.microsoft.com/library/security/MS15-079

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Server 2012 R2 Gold - IE 11 - KB3078071 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1507907
Fixlet Link: http://technet.microsoft.com/library/security/MS15-079

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 11 - KB3078071 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1507909
Fixlet Link: http://technet.microsoft.com/library/security/MS15-079

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 10 - KB3078071 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1507911
Fixlet Link: http://technet.microsoft.com/library/security/MS15-079

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 9 - KB3078071 (Japanese)
Severity: Moderate
Fixlet ID: 1507913
Fixlet Link: http://technet.microsoft.com/library/security/MS15-079

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 8 - KB3078071 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1507915
Fixlet Link: http://technet.microsoft.com/library/security/MS15-079

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 7 - KB3078071 (Japanese)
Severity: Moderate
Fixlet ID: 1507917
Fixlet Link: http://technet.microsoft.com/library/security/MS15-079

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 8 - KB3078071 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1507919
Fixlet Link: http://technet.microsoft.com/library/security/MS15-079

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 8 - KB3078071 (Japanese)
Severity: Critical
Fixlet ID: 1507921
Fixlet Link: http://technet.microsoft.com/library/security/MS15-079

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 7 - KB3078071 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1507923
Fixlet Link: http://technet.microsoft.com/library/security/MS15-079

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 7 - KB3078071 (Japanese)
Severity: Critical
Fixlet ID: 1507925
Fixlet Link: http://technet.microsoft.com/library/security/MS15-079

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 8 - KB3078071 (Japanese)
Severity: Critical
Fixlet ID: 1507927
Fixlet Link: http://technet.microsoft.com/library/security/MS15-079

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 8 - KB3078071 (Japanese)
Severity: Moderate
Fixlet ID: 1507929
Fixlet Link: http://technet.microsoft.com/library/security/MS15-079

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 8 - KB3078071 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1507931
Fixlet Link: http://technet.microsoft.com/library/security/MS15-079

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 10 - KB3078071 (Japanese)
Severity: Critical
Fixlet ID: 1507933
Fixlet Link: http://technet.microsoft.com/library/security/MS15-079

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 9 - KB3078071 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1507935
Fixlet Link: http://technet.microsoft.com/library/security/MS15-079

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows 8 Gold - IE 10 - KB3078071 (Japanese)
Severity: Critical
Fixlet ID: 1507937
Fixlet Link: http://technet.microsoft.com/library/security/MS15-079

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 11 - KB3078071 (Japanese)
Severity: Critical
Fixlet ID: 1507939
Fixlet Link: http://technet.microsoft.com/library/security/MS15-079

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 11 - KB3078071 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1507941
Fixlet Link: http://technet.microsoft.com/library/security/MS15-079

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 9 - KB3078071 (Japanese)
Severity: Critical
Fixlet ID: 1507943
Fixlet Link: http://technet.microsoft.com/library/security/MS15-079

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 8 - KB3078071 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1507945
Fixlet Link: http://technet.microsoft.com/library/security/MS15-079

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 9 - KB3078071 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1507947
Fixlet Link: http://technet.microsoft.com/library/security/MS15-079

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 9 - KB3078071 (Japanese)
Severity: Critical
Fixlet ID: 1507949
Fixlet Link: http://technet.microsoft.com/library/security/MS15-079

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows 8.1 Gold - IE 11 - KB3078071 (Japanese)
Severity: Critical
Fixlet ID: 1507951
Fixlet Link: http://technet.microsoft.com/library/security/MS15-079

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows 8.1 Gold - IE 11 - KB3078071 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1507953
Fixlet Link: http://technet.microsoft.com/library/security/MS15-079

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Server 2012 Gold - IE 10 - KB3078071 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1507955
Fixlet Link: http://technet.microsoft.com/library/security/MS15-079

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 10 - KB3078071 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1507957
Fixlet Link: http://technet.microsoft.com/library/security/MS15-079

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-079: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 7 - KB3078071 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1507959
Fixlet Link: http://technet.microsoft.com/library/security/MS15-079

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows 8.1 Gold - KB3078601 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1508001
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows 7 SP1 - .NET Framework 3.5.1 - KB3072305 (Japanese)
Severity: Critical
Fixlet ID: 1508003
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows 8 Gold - KB3078601 (Japanese)
Severity: Critical
Fixlet ID: 1508005
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Server 2012 Gold - KB3078601 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1508007
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Lync 2010 Attendee (user level install) - KB3075592 (Japanese)
Severity: Critical
Fixlet ID: 1508009
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

Important Note: Due to the complexity of the installation, this update must be completed manually.Note: Affected computers may report back as 'Pending Restart' once the update has run successfully, but will not report back their final status until the computer has been restarted.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Office 2010 SP2 - KB3054846 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508011
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Lync 2010 Attendee (admin level install) - KB3075590 (Japanese)
Severity: Critical
Fixlet ID: 1508013
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Lync Basic 2013 SP1 / Lync 2013 SP1 - KB3055014 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1508015
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Lync 2010 - KB3075593 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1508017
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows 7 SP1 - KB3078601 (Japanese)
Severity: Critical
Fixlet ID: 1508019
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Silverlight 5 - KB3080333 (Japanese)
Severity: Critical
Fixlet ID: 1508021
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows 7 SP1 - KB3078601 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1508023
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4 - KB3072309 (Japanese)
Severity: Critical
Fixlet ID: 1508025
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 3.0 SP2 - KB3072303 (Japanese)
Severity: Critical
Fixlet ID: 1508027
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows 8 Gold - .NET Framework 3.5 - KB3072306 (Japanese)
Severity: Critical
Fixlet ID: 1508029
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Server 2012 R2 Gold - KB3078601 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1508031
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Server 2012 Gold / Windows 8 Gold - .NET Framework 3.5 - KB3072306 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1508033
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Office 2010 SP2 - KB3054846 (Japanese)
Severity: Important
Fixlet ID: 1508035
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Lync Basic 2013 SP1 / Lync 2013 SP1 - KB3055014 (Japanese)
Severity: Critical
Fixlet ID: 1508037
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.6 - KB3072311 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1508039
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.6 - KB3072311 (Japanese)
Severity: Critical
Fixlet ID: 1508041
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows 8.1 Gold - .NET Framework 3.5 - KB3072307 (Japanese)
Severity: Critical
Fixlet ID: 1508043
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows 8.1 Gold - KB3078601 (Japanese)
Severity: Critical
Fixlet ID: 1508045
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows 8 Gold - KB3078601 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1508047
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4 - KB3072309 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1508049
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB3078601 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1508051
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1/4.5.2 - KB3072310 (Japanese)
Severity: Critical
Fixlet ID: 1508053
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3078601 (Japanese)
Severity: Critical
Fixlet ID: 1508055
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Vista SP2 - KB3078601 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1508057
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 / Windows 7 SP1 - .NET Framework 3.5.1 - KB3072305 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1508059
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Server 2012 R2 Gold / Windows 8.1 Gold - .NET Framework 3.5 - KB3072307 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1508061
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Lync 2010 - KB3075593 (Japanese)
Severity: Critical
Fixlet ID: 1508063
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1/4.5.2 - KB3072310 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1508065
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Vista SP2 - KB3078601 (Japanese)
Severity: Critical
Fixlet ID: 1508067
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 3.0 SP2 - KB3072303 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1508069
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3078601 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1508071
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Silverlight 5 Developer Runtime - KB3080333 (Japanese)
Severity: Critical
Fixlet ID: 1508073
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Silverlight 5 Developer Runtime - KB3080333 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1508075
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Silverlight 5 - KB3080333 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1508077
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Office 2007 SP3 - KB3054890 (Japanese)
Severity: Important
Fixlet ID: 1508079
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType or OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-080: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution - Live Meeting 2007 Console - KB3075591 (Japanese)
Severity: Critical
Fixlet ID: 1508081
Fixlet Link: http://technet.microsoft.com/library/security/MS15-080

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType fonts. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Excel 2010 SP2 - KB3055044 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508101
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Word Automation Services on  SharePoint Server 2013 SP1 - KB3054858 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508103
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2013 SP1 - KB3039734 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508105
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - KB3055037 (Japanese)
Severity: Important
Fixlet ID: 1508107
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - PowerPoint 2007 SP3 - KB3055051 (Japanese)
Severity: Important
Fixlet ID: 1508109
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Word Automation Services on  SharePoint Server 2010 SP2 - KB3054960 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508111
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Excel 2013 SP1 - KB3054991 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508113
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - KB2965310 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508115
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - KB2598244 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508117
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2013 SP1 - KB3054816 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508119
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - KB2553313 (Japanese)
Severity: Critical
Fixlet ID: 1508121
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - PowerPoint 2013 SP1 - KB3055029 (Japanese)
Severity: Important
Fixlet ID: 1508123
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Word 2013 SP1 - KB3055030 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508125
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Word Viewer - KB3055053 (Japanese)
Severity: Important
Fixlet ID: 1508127
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Visio 2010 SP2 - KB3054876 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508129
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Word 2010 SP2 - KB3055039 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508131
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - PowerPoint 2010 SP2 - KB3055033 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508133
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - PowerPoint 2013 SP1 - KB3055029 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508135
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2007 SP3 - KB2837610 (Japanese)
Severity: Important
Fixlet ID: 1508137
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2013 SP1 - KB3039798 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1508139
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2013 SP1 - KB3039798 (Japanese)
Severity: Critical
Fixlet ID: 1508141
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Visio 2007 SP3 - KB2965280 (Japanese)
Severity: Important
Fixlet ID: 1508143
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office Compatibility Pack SP3 - KB2986254 (Japanese)
Severity: Important
Fixlet ID: 1508145
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - PowerPoint 2010 SP2 - KB3055033 (Japanese)
Severity: Important
Fixlet ID: 1508147
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2007 SP3 - KB2596650 (Japanese)
Severity: Critical
Fixlet ID: 1508149
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Word Web Apps 2010 SP2 - KB3054974 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508151
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Word 2010 SP2 - KB3055039 (Japanese)
Severity: Important
Fixlet ID: 1508153
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Visio 2013 SP1 - KB3054929 (Japanese)
Severity: Important
Fixlet ID: 1508155
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - KB2598244 (Japanese)
Severity: Important
Fixlet ID: 1508157
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office Web Apps Server 2013 SP1 - KB3055003 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508159
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Excel 2010 SP2 - KB3055044 (Japanese)
Severity: Important
Fixlet ID: 1508161
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Word Viewer - KB3055054 (Japanese)
Severity: Important
Fixlet ID: 1508163
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2007 SP3 - KB3054888 (Japanese)
Severity: Critical
Fixlet ID: 1508165
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Excel 2013 SP1 - KB3054991 (Japanese)
Severity: Important
Fixlet ID: 1508167
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Excel 2007 SP3 - KB3054992 (Japanese)
Severity: Important
Fixlet ID: 1508169
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2013 SP1 - KB3054816 (Japanese)
Severity: Important
Fixlet ID: 1508171
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Word 2013 SP1 - KB3055030 (Japanese)
Severity: Important
Fixlet ID: 1508173
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - KB2553313 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1508175
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Visio 2013 SP1 - KB3054929 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508177
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - KB2965310 (Japanese)
Severity: Important
Fixlet ID: 1508179
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2007 SP3 - KB2687409 (Japanese)
Severity: Important
Fixlet ID: 1508181
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Word 2007 SP3 - KB3055052 (Japanese)
Severity: Important
Fixlet ID: 1508183
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2013 SP1 - KB3039734 (Japanese)
Severity: Important
Fixlet ID: 1508185
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Visio 2010 SP2 - KB3054876 (Japanese)
Severity: Important
Fixlet ID: 1508187
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - KB3055037 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508189
Fixlet Link: http://technet.microsoft.com/library/security/MS15-081

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB3075226 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508201
Fixlet Link: http://technet.microsoft.com/library/security/MS15-082

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user’s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker’s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows 7 SP1 - KB3075222 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508203
Fixlet Link: http://technet.microsoft.com/library/security/MS15-082

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user’s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker’s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows 7 SP1 - KB3075222 (Japanese)
Severity: Important
Fixlet ID: 1508205
Fixlet Link: http://technet.microsoft.com/library/security/MS15-082

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user’s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker’s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB3075220 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508207
Fixlet Link: http://technet.microsoft.com/library/security/MS15-082

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user’s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker’s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows 7 SP1 - KB3075220 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508209
Fixlet Link: http://technet.microsoft.com/library/security/MS15-082

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user’s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker’s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows Server 2012 R2 Gold - KB3075220 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508211
Fixlet Link: http://technet.microsoft.com/library/security/MS15-082

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user’s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker’s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows 8.1 Gold - KB3075220 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508213
Fixlet Link: http://technet.microsoft.com/library/security/MS15-082

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user’s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker’s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows 8 Gold - KB3075220 (Japanese)
Severity: Important
Fixlet ID: 1508215
Fixlet Link: http://technet.microsoft.com/library/security/MS15-082

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user’s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker’s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows Vista SP2 - KB3075221 (Japanese)
Severity: Important
Fixlet ID: 1508217
Fixlet Link: http://technet.microsoft.com/library/security/MS15-082

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user’s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker’s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3075220 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508219
Fixlet Link: http://technet.microsoft.com/library/security/MS15-082

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user’s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker’s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows Server 2012 Gold - KB3075220 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508221
Fixlet Link: http://technet.microsoft.com/library/security/MS15-082

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user’s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker’s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows 7 SP1 - KB3075220 (Japanese)
Severity: Important
Fixlet ID: 1508223
Fixlet Link: http://technet.microsoft.com/library/security/MS15-082

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user’s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker’s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows 7 SP1 - KB3075226 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508225
Fixlet Link: http://technet.microsoft.com/library/security/MS15-082

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user’s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker’s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows Vista SP2 - KB3075221 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508227
Fixlet Link: http://technet.microsoft.com/library/security/MS15-082

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user’s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker’s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB3075222 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508229
Fixlet Link: http://technet.microsoft.com/library/security/MS15-082

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user’s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker’s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows Vista SP2 - KB3075220 (Japanese)
Severity: Important
Fixlet ID: 1508231
Fixlet Link: http://technet.microsoft.com/library/security/MS15-082

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user’s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker’s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows 7 SP1 - KB3075226 (Japanese)
Severity: Important
Fixlet ID: 1508233
Fixlet Link: http://technet.microsoft.com/library/security/MS15-082

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user’s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker’s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3075220 (Japanese)
Severity: Important
Fixlet ID: 1508235
Fixlet Link: http://technet.microsoft.com/library/security/MS15-082

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user’s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker’s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows Vista SP2 - KB3075220 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508237
Fixlet Link: http://technet.microsoft.com/library/security/MS15-082

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user’s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker’s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows 8.1 Gold - KB3075220 (Japanese)
Severity: Important
Fixlet ID: 1508239
Fixlet Link: http://technet.microsoft.com/library/security/MS15-082

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user’s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker’s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-082: Vulnerabilities in RDP Could Allow Remote Code Execution - Windows 8 Gold - KB3075220 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508241
Fixlet Link: http://technet.microsoft.com/library/security/MS15-082

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user’s current working directory and then convinces the user to open a Remote Desktop Protocol (RDP) file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker’s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-083: Vulnerability in Server Message Block Could Allow Remote Code Execution - Windows Vista SP2 - KB3073921 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508301
Fixlet Link: http://technet.microsoft.com/library/security/MS15-083

Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sends a specially crafted string to the SMB server error logging. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-083: Vulnerability in Server Message Block Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3073921 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508303
Fixlet Link: http://technet.microsoft.com/library/security/MS15-083

Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sends a specially crafted string to the SMB server error logging. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-083: Vulnerability in Server Message Block Could Allow Remote Code Execution - Windows Vista SP2 - KB3073921 (Japanese)
Severity: Important
Fixlet ID: 1508305
Fixlet Link: http://technet.microsoft.com/library/security/MS15-083

Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sends a specially crafted string to the SMB server error logging. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-083: Vulnerability in Server Message Block Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3073921 (Japanese)
Severity: Important
Fixlet ID: 1508307
Fixlet Link: http://technet.microsoft.com/library/security/MS15-083

Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sends a specially crafted string to the SMB server error logging. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-084: Vulnerabilities in XML Core Services Could Allow Information Disclosure - Windows Server 2012 Gold - KB3076895 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508401
Fixlet Link: http://technet.microsoft.com/library/security/MS15-084

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows and Microsoft Office. The vulnerabilities could allow information disclosure by either exposing memory addresses if a user clicks a specially crafted link or by explicitly allowing the use of Secure Sockets Layer (SSL) 2.0. However, in all cases an attacker would have no way to force users to click a specially crafted link. An attacker would have to convince users to click the link, typically by way of an enticement in an email or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-084: Vulnerabilities in XML Core Services Could Allow Information Disclosure - Windows 7 SP1 - KB3076895 (Japanese)
Severity: Important
Fixlet ID: 1508403
Fixlet Link: http://technet.microsoft.com/library/security/MS15-084

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows and Microsoft Office. The vulnerabilities could allow information disclosure by either exposing memory addresses if a user clicks a specially crafted link or by explicitly allowing the use of Secure Sockets Layer (SSL) 2.0. However, in all cases an attacker would have no way to force users to click a specially crafted link. An attacker would have to convince users to click the link, typically by way of an enticement in an email or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-084: Vulnerabilities in XML Core Services Could Allow Information Disclosure - Windows Server 2008 SP2 - KB3076895 (Japanese)
Severity: Important
Fixlet ID: 1508405
Fixlet Link: http://technet.microsoft.com/library/security/MS15-084

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows and Microsoft Office. The vulnerabilities could allow information disclosure by either exposing memory addresses if a user clicks a specially crafted link or by explicitly allowing the use of Secure Sockets Layer (SSL) 2.0. However, in all cases an attacker would have no way to force users to click a specially crafted link. An attacker would have to convince users to click the link, typically by way of an enticement in an email or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-084: Vulnerabilities in XML Core Services Could Allow Information Disclosure - Windows 8 Gold - KB3076895 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508407
Fixlet Link: http://technet.microsoft.com/library/security/MS15-084

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows and Microsoft Office. The vulnerabilities could allow information disclosure by either exposing memory addresses if a user clicks a specially crafted link or by explicitly allowing the use of Secure Sockets Layer (SSL) 2.0. However, in all cases an attacker would have no way to force users to click a specially crafted link. An attacker would have to convince users to click the link, typically by way of an enticement in an email or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-084: Vulnerabilities in XML Core Services Could Allow Information Disclosure - Windows 8.1 Gold - KB3076895 (Japanese)
Severity: Important
Fixlet ID: 1508409
Fixlet Link: http://technet.microsoft.com/library/security/MS15-084

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows and Microsoft Office. The vulnerabilities could allow information disclosure by either exposing memory addresses if a user clicks a specially crafted link or by explicitly allowing the use of Secure Sockets Layer (SSL) 2.0. However, in all cases an attacker would have no way to force users to click a specially crafted link. An attacker would have to convince users to click the link, typically by way of an enticement in an email or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-084: Vulnerabilities in XML Core Services Could Allow Information Disclosure - Windows 7 SP1 - KB3076895 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508411
Fixlet Link: http://technet.microsoft.com/library/security/MS15-084

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows and Microsoft Office. The vulnerabilities could allow information disclosure by either exposing memory addresses if a user clicks a specially crafted link or by explicitly allowing the use of Secure Sockets Layer (SSL) 2.0. However, in all cases an attacker would have no way to force users to click a specially crafted link. An attacker would have to convince users to click the link, typically by way of an enticement in an email or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-084: Vulnerabilities in XML Core Services Could Allow Information Disclosure - Windows Vista SP2 - KB3076895 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508413
Fixlet Link: http://technet.microsoft.com/library/security/MS15-084

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows and Microsoft Office. The vulnerabilities could allow information disclosure by either exposing memory addresses if a user clicks a specially crafted link or by explicitly allowing the use of Secure Sockets Layer (SSL) 2.0. However, in all cases an attacker would have no way to force users to click a specially crafted link. An attacker would have to convince users to click the link, typically by way of an enticement in an email or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-084: Vulnerabilities in XML Core Services Could Allow Information Disclosure - Windows Server 2012 R2 Gold - KB3076895 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508415
Fixlet Link: http://technet.microsoft.com/library/security/MS15-084

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows and Microsoft Office. The vulnerabilities could allow information disclosure by either exposing memory addresses if a user clicks a specially crafted link or by explicitly allowing the use of Secure Sockets Layer (SSL) 2.0. However, in all cases an attacker would have no way to force users to click a specially crafted link. An attacker would have to convince users to click the link, typically by way of an enticement in an email or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-084: Vulnerabilities in XML Core Services Could Allow Information Disclosure - Windows 8.1 Gold - KB3076895 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508417
Fixlet Link: http://technet.microsoft.com/library/security/MS15-084

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows and Microsoft Office. The vulnerabilities could allow information disclosure by either exposing memory addresses if a user clicks a specially crafted link or by explicitly allowing the use of Secure Sockets Layer (SSL) 2.0. However, in all cases an attacker would have no way to force users to click a specially crafted link. An attacker would have to convince users to click the link, typically by way of an enticement in an email or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-084: Vulnerabilities in XML Core Services Could Allow Information Disclosure - Windows Server 2008 R2 SP1 - KB3076895 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508419
Fixlet Link: http://technet.microsoft.com/library/security/MS15-084

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows and Microsoft Office. The vulnerabilities could allow information disclosure by either exposing memory addresses if a user clicks a specially crafted link or by explicitly allowing the use of Secure Sockets Layer (SSL) 2.0. However, in all cases an attacker would have no way to force users to click a specially crafted link. An attacker would have to convince users to click the link, typically by way of an enticement in an email or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-084: Vulnerabilities in XML Core Services Could Allow Information Disclosure - Windows 8 Gold - KB3076895 (Japanese)
Severity: Important
Fixlet ID: 1508421
Fixlet Link: http://technet.microsoft.com/library/security/MS15-084

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows and Microsoft Office. The vulnerabilities could allow information disclosure by either exposing memory addresses if a user clicks a specially crafted link or by explicitly allowing the use of Secure Sockets Layer (SSL) 2.0. However, in all cases an attacker would have no way to force users to click a specially crafted link. An attacker would have to convince users to click the link, typically by way of an enticement in an email or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-084: Vulnerabilities in XML Core Services Could Allow Information Disclosure - InfoPath 2007 SP3 / Office 2007 SP3 - KB2825645 (Japanese)
Severity: Important
Fixlet ID: 1508423
Fixlet Link: http://technet.microsoft.com/library/security/MS15-084

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows and Microsoft Office. The vulnerabilities could allow information disclosure by either exposing memory addresses if a user clicks a specially crafted link or by explicitly allowing the use of Secure Sockets Layer (SSL) 2.0. However, in all cases an attacker would have no way to force users to click a specially crafted link. An attacker would have to convince users to click the link, typically by way of an enticement in an email or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-084: Vulnerabilities in XML Core Services Could Allow Information Disclosure - Windows Vista SP2 - KB3076895 (Japanese)
Severity: Important
Fixlet ID: 1508425
Fixlet Link: http://technet.microsoft.com/library/security/MS15-084

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows and Microsoft Office. The vulnerabilities could allow information disclosure by either exposing memory addresses if a user clicks a specially crafted link or by explicitly allowing the use of Secure Sockets Layer (SSL) 2.0. However, in all cases an attacker would have no way to force users to click a specially crafted link. An attacker would have to convince users to click the link, typically by way of an enticement in an email or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-084: Vulnerabilities in XML Core Services Could Allow Information Disclosure - Windows Server 2008 SP2 - KB3076895 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508427
Fixlet Link: http://technet.microsoft.com/library/security/MS15-084

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows and Microsoft Office. The vulnerabilities could allow information disclosure by either exposing memory addresses if a user clicks a specially crafted link or by explicitly allowing the use of Secure Sockets Layer (SSL) 2.0. However, in all cases an attacker would have no way to force users to click a specially crafted link. An attacker would have to convince users to click the link, typically by way of an enticement in an email or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-085: Vulnerability in Mount Manager Could Allow Elevation of Privilege - Windows 8.1 Gold - KB3071756 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508501
Fixlet Link: http://technet.microsoft.com/library/security/MS15-085

Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker inserts a malicious USB device into a target system. An attacker could then write a malicious binary to disk and execute it. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-085: Vulnerability in Mount Manager Could Allow Elevation of Privilege - Windows 7 SP1 - KB3071756 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508503
Fixlet Link: http://technet.microsoft.com/library/security/MS15-085

Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker inserts a malicious USB device into a target system. An attacker could then write a malicious binary to disk and execute it. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-085: Vulnerability in Mount Manager Could Allow Elevation of Privilege - Windows 7 SP1 - KB3071756 (Japanese)
Severity: Important
Fixlet ID: 1508505
Fixlet Link: http://technet.microsoft.com/library/security/MS15-085

Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker inserts a malicious USB device into a target system. An attacker could then write a malicious binary to disk and execute it. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-085: Vulnerability in Mount Manager Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3071756 (Japanese)
Severity: Important
Fixlet ID: 1508507
Fixlet Link: http://technet.microsoft.com/library/security/MS15-085

Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker inserts a malicious USB device into a target system. An attacker could then write a malicious binary to disk and execute it. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-085: Vulnerability in Mount Manager Could Allow Elevation of Privilege - Windows 8 Gold - KB3071756 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508509
Fixlet Link: http://technet.microsoft.com/library/security/MS15-085

Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker inserts a malicious USB device into a target system. An attacker could then write a malicious binary to disk and execute it. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-085: Vulnerability in Mount Manager Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 - KB3071756 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508511
Fixlet Link: http://technet.microsoft.com/library/security/MS15-085

Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker inserts a malicious USB device into a target system. An attacker could then write a malicious binary to disk and execute it. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-085: Vulnerability in Mount Manager Could Allow Elevation of Privilege - Windows Server 2012 R2 Gold - KB3071756 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508513
Fixlet Link: http://technet.microsoft.com/library/security/MS15-085

Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker inserts a malicious USB device into a target system. An attacker could then write a malicious binary to disk and execute it. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-085: Vulnerability in Mount Manager Could Allow Elevation of Privilege - Windows Vista SP2 - KB3071756 (Japanese)
Severity: Important
Fixlet ID: 1508515
Fixlet Link: http://technet.microsoft.com/library/security/MS15-085

Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker inserts a malicious USB device into a target system. An attacker could then write a malicious binary to disk and execute it. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-085: Vulnerability in Mount Manager Could Allow Elevation of Privilege - Windows 8 Gold - KB3071756 (Japanese)
Severity: Important
Fixlet ID: 1508517
Fixlet Link: http://technet.microsoft.com/library/security/MS15-085

Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker inserts a malicious USB device into a target system. An attacker could then write a malicious binary to disk and execute it. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-085: Vulnerability in Mount Manager Could Allow Elevation of Privilege - Windows Server 2012 Gold - KB3071756 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508519
Fixlet Link: http://technet.microsoft.com/library/security/MS15-085

Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker inserts a malicious USB device into a target system. An attacker could then write a malicious binary to disk and execute it. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-085: Vulnerability in Mount Manager Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3071756 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508521
Fixlet Link: http://technet.microsoft.com/library/security/MS15-085

Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker inserts a malicious USB device into a target system. An attacker could then write a malicious binary to disk and execute it. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-085: Vulnerability in Mount Manager Could Allow Elevation of Privilege - Windows 8.1 Gold - KB3071756 (Japanese)
Severity: Important
Fixlet ID: 1508523
Fixlet Link: http://technet.microsoft.com/library/security/MS15-085

Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker inserts a malicious USB device into a target system. An attacker could then write a malicious binary to disk and execute it. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-085: Vulnerability in Mount Manager Could Allow Elevation of Privilege - Windows Vista SP2 - KB3071756 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508525
Fixlet Link: http://technet.microsoft.com/library/security/MS15-085

Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker inserts a malicious USB device into a target system. An attacker could then write a malicious binary to disk and execute it. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-086: Security update for Update Rollup 10 for System Center 2012 Operations Manager Service Pack 1 - System Center 2012 Operations Manager SP1 - KB3071088 (Japanese)
Severity: Important
Fixlet ID: 1508601
Fixlet Link: http://support.microsoft.com/kb/3071088

Fixlet Description: A security vulnerability exists in Microsoft System Center 2012 SP1- Operations Manager Web Console that could allow Elevation of Privilege if a user visits an affected website by way of a specially crafted URL. This update resolves that vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-086: Security update for Update Rollup 8 for System Center 2012 Operations Manager - System Center 2012 Operations Manager - KB3071089 (Japanese)
Severity: Important
Fixlet ID: 1508607
Fixlet Link: http://support.microsoft.com/kb/3071089

Fixlet Description: A security vulnerability exists in Microsoft System Center 2012 RTM - Operations Manager Web Console that could allow Elevation of Privilege if a user visits an affected website by way of a specially crafted URL. This update resolves that vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-087: Vulnerability in UDDI Services Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3073893 (Japanese)
Severity: Important
Fixlet ID: 1508703
Fixlet Link: http://technet.microsoft.com/library/security/MS15-087

Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker engineered a cross-site scripting (XSS) scenario by inserting a malicious script into a webpage search parameter. A user would have to visit a specially crafted webpage where the malicious script would then be executed. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-087: Vulnerability in UDDI Services Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3073893 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508705
Fixlet Link: http://technet.microsoft.com/library/security/MS15-087

Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker engineered a cross-site scripting (XSS) scenario by inserting a malicious script into a webpage search parameter. A user would have to visit a specially crafted webpage where the malicious script would then be executed. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows 7 SP1 - KB3079757 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508801
Fixlet Link: http://technet.microsoft.com/library/security/MS15-088

Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows Server 2008 SP2 - KB3079757 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508803
Fixlet Link: http://technet.microsoft.com/library/security/MS15-088

Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows Server 2008 SP2 - KB3046017 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508805
Fixlet Link: http://technet.microsoft.com/library/security/MS15-088

Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows 8 Gold - KB3046017 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508807
Fixlet Link: http://technet.microsoft.com/library/security/MS15-088

Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows 7 SP1 - KB3046017 (Japanese)
Severity: Important
Fixlet ID: 1508809
Fixlet Link: http://technet.microsoft.com/library/security/MS15-088

Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows Server 2008 R2 SP1 - KB3079757 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508811
Fixlet Link: http://technet.microsoft.com/library/security/MS15-088

Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows Server 2008 R2 SP1 - KB3046017 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508813
Fixlet Link: http://technet.microsoft.com/library/security/MS15-088

Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows 7 SP1 - KB3079757 (Japanese)
Severity: Important
Fixlet ID: 1508815
Fixlet Link: http://technet.microsoft.com/library/security/MS15-088

Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows Server 2012 Gold - KB3046017 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508817
Fixlet Link: http://technet.microsoft.com/library/security/MS15-088

Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows 8.1 Gold - KB3046017 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508819
Fixlet Link: http://technet.microsoft.com/library/security/MS15-088

Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows Vista SP2 - KB3079757 (Japanese)
Severity: Important
Fixlet ID: 1508821
Fixlet Link: http://technet.microsoft.com/library/security/MS15-088

Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows 8 Gold - KB3046017 (Japanese)
Severity: Important
Fixlet ID: 1508823
Fixlet Link: http://technet.microsoft.com/library/security/MS15-088

Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows Vista SP2 - KB3046017 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508825
Fixlet Link: http://technet.microsoft.com/library/security/MS15-088

Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows Vista SP2 - KB3046017 (Japanese)
Severity: Important
Fixlet ID: 1508827
Fixlet Link: http://technet.microsoft.com/library/security/MS15-088

Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows 7 SP1 - KB3046017 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508829
Fixlet Link: http://technet.microsoft.com/library/security/MS15-088

Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows Server 2012 R2 Gold - KB3046017 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508831
Fixlet Link: http://technet.microsoft.com/library/security/MS15-088

Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows 8.1 Gold - KB3046017 (Japanese)
Severity: Important
Fixlet ID: 1508833
Fixlet Link: http://technet.microsoft.com/library/security/MS15-088

Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows Vista SP2 - KB3079757 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508835
Fixlet Link: http://technet.microsoft.com/library/security/MS15-088

Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows Server 2008 SP2 - KB3079757 (Japanese)
Severity: Important
Fixlet ID: 1508837
Fixlet Link: http://technet.microsoft.com/library/security/MS15-088

Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure - Windows Server 2008 SP2 - KB3046017 (Japanese)
Severity: Important
Fixlet ID: 1508839
Fixlet Link: http://technet.microsoft.com/library/security/MS15-088

Fixlet Description: Microsoft has released a security update that helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to use another vulnerability in Internet Explorer to execute code in the sandboxed process. The attacker could then execute Notepad, Visio, PowerPoint, Excel, or Word with an unsafe command line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates provided in this bulletin, as well as the update for Internet Explorer provided in MS15-079. Likewise, customers running an affected Microsoft Office product must also install the applicable updates provided in MS15-081. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-089: Vulnerability in WebDAV Could Allow Information Disclosure - Windows Vista SP2 - KB3076949 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508901
Fixlet Link: http://technet.microsoft.com/library/security/MS15-089

Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker forces an encrypted Secure Socket Layer (SSL) 2.0 session with a WebDAV server that has SSL 2.0 enabled and uses a man-in-the-middle (MiTM) attack to decrypt portions of the encrypted traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-089: Vulnerability in WebDAV Could Allow Information Disclosure - Windows 8 Gold - KB3076949 (Japanese)
Severity: Important
Fixlet ID: 1508903
Fixlet Link: http://technet.microsoft.com/library/security/MS15-089

Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker forces an encrypted Secure Socket Layer (SSL) 2.0 session with a WebDAV server that has SSL 2.0 enabled and uses a man-in-the-middle (MiTM) attack to decrypt portions of the encrypted traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-089: Vulnerability in WebDAV Could Allow Information Disclosure - Windows Server 2008 SP2 - KB3076949 (Japanese)
Severity: Important
Fixlet ID: 1508905
Fixlet Link: http://technet.microsoft.com/library/security/MS15-089

Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker forces an encrypted Secure Socket Layer (SSL) 2.0 session with a WebDAV server that has SSL 2.0 enabled and uses a man-in-the-middle (MiTM) attack to decrypt portions of the encrypted traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-089: Vulnerability in WebDAV Could Allow Information Disclosure - Windows 8.1 Gold - KB3076949 (Japanese)
Severity: Important
Fixlet ID: 1508907
Fixlet Link: http://technet.microsoft.com/library/security/MS15-089

Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker forces an encrypted Secure Socket Layer (SSL) 2.0 session with a WebDAV server that has SSL 2.0 enabled and uses a man-in-the-middle (MiTM) attack to decrypt portions of the encrypted traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-089: Vulnerability in WebDAV Could Allow Information Disclosure - Windows Vista SP2 - KB3076949 (Japanese)
Severity: Important
Fixlet ID: 1508909
Fixlet Link: http://technet.microsoft.com/library/security/MS15-089

Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker forces an encrypted Secure Socket Layer (SSL) 2.0 session with a WebDAV server that has SSL 2.0 enabled and uses a man-in-the-middle (MiTM) attack to decrypt portions of the encrypted traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-089: Vulnerability in WebDAV Could Allow Information Disclosure - Windows 8 Gold - KB3076949 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508911
Fixlet Link: http://technet.microsoft.com/library/security/MS15-089

Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker forces an encrypted Secure Socket Layer (SSL) 2.0 session with a WebDAV server that has SSL 2.0 enabled and uses a man-in-the-middle (MiTM) attack to decrypt portions of the encrypted traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-089: Vulnerability in WebDAV Could Allow Information Disclosure - Windows 8.1 Gold - KB3076949 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508913
Fixlet Link: http://technet.microsoft.com/library/security/MS15-089

Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker forces an encrypted Secure Socket Layer (SSL) 2.0 session with a WebDAV server that has SSL 2.0 enabled and uses a man-in-the-middle (MiTM) attack to decrypt portions of the encrypted traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-089: Vulnerability in WebDAV Could Allow Information Disclosure - Windows 7 SP1 - KB3076949 (Japanese)
Severity: Important
Fixlet ID: 1508915
Fixlet Link: http://technet.microsoft.com/library/security/MS15-089

Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker forces an encrypted Secure Socket Layer (SSL) 2.0 session with a WebDAV server that has SSL 2.0 enabled and uses a man-in-the-middle (MiTM) attack to decrypt portions of the encrypted traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-089: Vulnerability in WebDAV Could Allow Information Disclosure - Windows Server 2012 Gold - KB3076949 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508917
Fixlet Link: http://technet.microsoft.com/library/security/MS15-089

Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker forces an encrypted Secure Socket Layer (SSL) 2.0 session with a WebDAV server that has SSL 2.0 enabled and uses a man-in-the-middle (MiTM) attack to decrypt portions of the encrypted traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-089: Vulnerability in WebDAV Could Allow Information Disclosure - Windows 7 SP1 - KB3076949 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508919
Fixlet Link: http://technet.microsoft.com/library/security/MS15-089

Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker forces an encrypted Secure Socket Layer (SSL) 2.0 session with a WebDAV server that has SSL 2.0 enabled and uses a man-in-the-middle (MiTM) attack to decrypt portions of the encrypted traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-089: Vulnerability in WebDAV Could Allow Information Disclosure - Windows Server 2012 R2 Gold - KB3076949 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508921
Fixlet Link: http://technet.microsoft.com/library/security/MS15-089

Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker forces an encrypted Secure Socket Layer (SSL) 2.0 session with a WebDAV server that has SSL 2.0 enabled and uses a man-in-the-middle (MiTM) attack to decrypt portions of the encrypted traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-089: Vulnerability in WebDAV Could Allow Information Disclosure - Windows Server 2008 R2 SP1 - KB3076949 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508923
Fixlet Link: http://technet.microsoft.com/library/security/MS15-089

Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker forces an encrypted Secure Socket Layer (SSL) 2.0 session with a WebDAV server that has SSL 2.0 enabled and uses a man-in-the-middle (MiTM) attack to decrypt portions of the encrypted traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-089: Vulnerability in WebDAV Could Allow Information Disclosure - Windows Server 2008 SP2 - KB3076949 (x64) (Japanese)
Severity: Important
Fixlet ID: 1508925
Fixlet Link: http://technet.microsoft.com/library/security/MS15-089

Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker forces an encrypted Secure Socket Layer (SSL) 2.0 session with a WebDAV server that has SSL 2.0 enabled and uses a man-in-the-middle (MiTM) attack to decrypt portions of the encrypted traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS15-090: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege - Windows Server 2012 Gold - KB3060716 (x64) (Japanese)
Severity: Important
Fixlet ID: 1509001
Fixlet Link: http://technet.microsoft.com/library/security/MS15-090

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application or convinces a user to open a specially crafted file that invokes a vulnerable sandboxed application, allowing an attacker to escape the sandbox. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-090: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege - Windows 8.1 Gold - KB3060716 (x64) (Japanese)
Severity: Important
Fixlet ID: 1509003
Fixlet Link: http://technet.microsoft.com/library/security/MS15-090

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application or convinces a user to open a specially crafted file that invokes a vulnerable sandboxed application, allowing an attacker to escape the sandbox. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-090: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege - Windows 7 SP1 - KB3060716 (x64) (Japanese)
Severity: Important
Fixlet ID: 1509005
Fixlet Link: http://technet.microsoft.com/library/security/MS15-090

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application or convinces a user to open a specially crafted file that invokes a vulnerable sandboxed application, allowing an attacker to escape the sandbox. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-090: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege - Windows 8 Gold - KB3060716 (x64) (Japanese)
Severity: Important
Fixlet ID: 1509007
Fixlet Link: http://technet.microsoft.com/library/security/MS15-090

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application or convinces a user to open a specially crafted file that invokes a vulnerable sandboxed application, allowing an attacker to escape the sandbox. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-090: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege - Windows 7 SP1 - KB3060716 (Japanese)
Severity: Important
Fixlet ID: 1509009
Fixlet Link: http://technet.microsoft.com/library/security/MS15-090

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application or convinces a user to open a specially crafted file that invokes a vulnerable sandboxed application, allowing an attacker to escape the sandbox. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-090: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege - Windows 8.1 Gold - KB3060716 (Japanese)
Severity: Important
Fixlet ID: 1509011
Fixlet Link: http://technet.microsoft.com/library/security/MS15-090

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application or convinces a user to open a specially crafted file that invokes a vulnerable sandboxed application, allowing an attacker to escape the sandbox. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-090: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3060716 (x64) (Japanese)
Severity: Important
Fixlet ID: 1509013
Fixlet Link: http://technet.microsoft.com/library/security/MS15-090

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application or convinces a user to open a specially crafted file that invokes a vulnerable sandboxed application, allowing an attacker to escape the sandbox. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-090: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege - Windows Vista SP2 - KB3060716 (Japanese)
Severity: Important
Fixlet ID: 1509015
Fixlet Link: http://technet.microsoft.com/library/security/MS15-090

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application or convinces a user to open a specially crafted file that invokes a vulnerable sandboxed application, allowing an attacker to escape the sandbox. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-090: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege - Windows 8 Gold - KB3060716 (Japanese)
Severity: Important
Fixlet ID: 1509017
Fixlet Link: http://technet.microsoft.com/library/security/MS15-090

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application or convinces a user to open a specially crafted file that invokes a vulnerable sandboxed application, allowing an attacker to escape the sandbox. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-090: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 - KB3060716 (x64) (Japanese)
Severity: Important
Fixlet ID: 1509019
Fixlet Link: http://technet.microsoft.com/library/security/MS15-090

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application or convinces a user to open a specially crafted file that invokes a vulnerable sandboxed application, allowing an attacker to escape the sandbox. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-090: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege - Windows Vista SP2 - KB3060716 (x64) (Japanese)
Severity: Important
Fixlet ID: 1509021
Fixlet Link: http://technet.microsoft.com/library/security/MS15-090

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application or convinces a user to open a specially crafted file that invokes a vulnerable sandboxed application, allowing an attacker to escape the sandbox. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-090: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege - Windows Server 2012 R2 Gold - KB3060716 (x64) (Japanese)
Severity: Important
Fixlet ID: 1509023
Fixlet Link: http://technet.microsoft.com/library/security/MS15-090

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application or convinces a user to open a specially crafted file that invokes a vulnerable sandboxed application, allowing an attacker to escape the sandbox. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-090: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3060716 (Japanese)
Severity: Important
Fixlet ID: 1509025
Fixlet Link: http://technet.microsoft.com/library/security/MS15-090

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application or convinces a user to open a specially crafted file that invokes a vulnerable sandboxed application, allowing an attacker to escape the sandbox. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-092: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - Windows 8 Gold - .NET Framework 4.6 - KB3083184 (Japanese)
Severity: Important
Fixlet ID: 1509201
Fixlet Link: http://technet.microsoft.com/library/security/MS15-092

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft .NET Framework. The vulnerabilities could allow elevation of privilege if a user runs a specially crafted .NET application. However, in all cases, an attacker would have no way to force users to run the application; an attacker would have to convince users to do so. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-092: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.6 - KB3083186 (Japanese)
Severity: Important
Fixlet ID: 1509203
Fixlet Link: http://technet.microsoft.com/library/security/MS15-092

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft .NET Framework. The vulnerabilities could allow elevation of privilege if a user runs a specially crafted .NET application. However, in all cases, an attacker would have no way to force users to run the application; an attacker would have to convince users to do so. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-092: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - Windows Server 2012 R2 Gold / Windows 8.1 Gold - .NET Framework 4.6 - KB3083185 (x64) (Japanese)
Severity: Important
Fixlet ID: 1509205
Fixlet Link: http://technet.microsoft.com/library/security/MS15-092

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft .NET Framework. The vulnerabilities could allow elevation of privilege if a user runs a specially crafted .NET application. However, in all cases, an attacker would have no way to force users to run the application; an attacker would have to convince users to do so. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-092: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - Windows 8.1 Gold - .NET Framework 4.6 - KB3083185 (Japanese)
Severity: Important
Fixlet ID: 1509207
Fixlet Link: http://technet.microsoft.com/library/security/MS15-092

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft .NET Framework. The vulnerabilities could allow elevation of privilege if a user runs a specially crafted .NET application. However, in all cases, an attacker would have no way to force users to run the application; an attacker would have to convince users to do so. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-092: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 / Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.6 - KB3083186 (x64) (Japanese)
Severity: Important
Fixlet ID: 1509209
Fixlet Link: http://technet.microsoft.com/library/security/MS15-092

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft .NET Framework. The vulnerabilities could allow elevation of privilege if a user runs a specially crafted .NET application. However, in all cases, an attacker would have no way to force users to run the application; an attacker would have to convince users to do so. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS15-092: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - Windows Server 2012 Gold / Windows 8 Gold - .NET Framework 4.6 - KB3083184 (x64) (Japanese)
Severity: Important
Fixlet ID: 1509211
Fixlet Link: http://technet.microsoft.com/library/security/MS15-092

Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft .NET Framework. The vulnerabilities could allow elevation of privilege if a user runs a specially crafted .NET application. However, in all cases, an attacker would have no way to force users to run the application; an attacker would have to convince users to do so. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: 2553347: Update for Office 2010 - KB2553347 - Office 2010 SP2 (Japanese)
Severity: Unspecified
Fixlet ID: 255334701
Fixlet Link: http://support.microsoft.com/kb/2553347

Fixlet Description: Microsoft has released an update for Microsoft Office 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2553347: Update for Office 2010 - KB2553347 - Office 2010 SP2 (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 255334703
Fixlet Link: http://support.microsoft.com/kb/2553347

Fixlet Description: Microsoft has released an update for Microsoft Office 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2589282: Update for Office 2010 - KB2589282 - Office 2010 SP2 (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 258928201
Fixlet Link: http://support.microsoft.com/kb/2589282

Fixlet Description: Microsoft has released an update for Microsoft Office 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2589282: Update for Office 2010 - KB2589282 - Office 2010 SP2 (Japanese)
Severity: Unspecified
Fixlet ID: 258928203
Fixlet Link: http://support.microsoft.com/kb/2589282

Fixlet Description: Microsoft has released an update for Microsoft Office 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2965286: Update for the 2007 Microsoft Office system - KB2965286 - Office 2007 (Japanese)
Severity: Unspecified
Fixlet ID: 296528601
Fixlet Link: http://support.microsoft.com/kb/2965286

Fixlet Description: Microsoft has released an update for Microsoft Office 2007 suites . This update provides the latest fixes to Microsoft Office 2007 suites . Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2965300: Update for Access 2010 - KB2965300 - Office 2010 SP2 (Japanese)
Severity: Unspecified
Fixlet ID: 296530001
Fixlet Link: http://support.microsoft.com/kb/2965300

Fixlet Description: Microsoft has released an update for Microsoft Access 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Access 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2965300: Update for Access 2010 - KB2965300 - Office 2010 SP2 (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 296530003
Fixlet Link: http://support.microsoft.com/kb/2965300

Fixlet Description: Microsoft has released an update for Microsoft Access 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Access 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3023052: Update for Office 2013 - KB3023052 - Office 2013 SP1 (Japanese)
Severity: Unspecified
Fixlet ID: 302305201
Fixlet Link: http://support.microsoft.com/kb/3023052

Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3023052: Update for Office 2013 - KB3023052 - Office 2013 SP1 (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 302305203
Fixlet Link: http://support.microsoft.com/kb/3023052

Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3023069: Update for Office 2013 - KB3023069 - Office 2013 SP1 (Japanese)
Severity: Unspecified
Fixlet ID: 302306901
Fixlet Link: http://support.microsoft.com/kb/3023069

Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3023069: Update for Office 2013 - KB3023069 - Office 2013 SP1 (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 302306903
Fixlet Link: http://support.microsoft.com/kb/3023069

Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3039762: Update for Office 2013 - KB3039762 - Office 2013 SP1 (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 303976201
Fixlet Link: http://support.microsoft.com/kb/3039762

Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3039762: Update for Office 2013 - KB3039762 - Office 2013 SP1 (Japanese)
Severity: Unspecified
Fixlet ID: 303976203
Fixlet Link: http://support.microsoft.com/kb/3039762

Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054828: Update for Visio Compatibility Pack - KB3054828 - Visio Compatibility Pack (Japanese)
Severity: Unspecified
Fixlet ID: 305482801
Fixlet Link: http://support.microsoft.com/kb/3054828

Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054873: Update for Office 2010 - KB3054873 - Office 2010 SP2 (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 305487301
Fixlet Link: http://support.microsoft.com/kb/3054873

Fixlet Description: Microsoft has released an update for Microsoft Office 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054873: Update for Office 2010 - KB3054873 - Office 2010 SP2 (Japanese)
Severity: Unspecified
Fixlet ID: 305487303
Fixlet Link: http://support.microsoft.com/kb/3054873

Fixlet Description: Microsoft has released an update for Microsoft Office 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054925: Update for Office 2013 - KB3054925 - Office 2013 SP1 (Japanese)
Severity: Unspecified
Fixlet ID: 305492501
Fixlet Link: http://support.microsoft.com/kb/3054925

Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054925: Update for Office 2013 - KB3054925 - Office 2013 SP1 (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 305492503
Fixlet Link: http://support.microsoft.com/kb/3054925

Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054935: Update for Office 2013 - KB3054935 - Office 2013 SP1 (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 305493501
Fixlet Link: http://support.microsoft.com/kb/3054935

Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054935: Update for Office 2013 - KB3054935 - Office 2013 SP1 (Japanese)
Severity: Unspecified
Fixlet ID: 305493503
Fixlet Link: http://support.microsoft.com/kb/3054935

Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054936: Update for OneNote 2013 - KB3054936 - Office 2013 SP1 (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 305493601
Fixlet Link: http://support.microsoft.com/kb/3054936

Fixlet Description: Microsoft has released an update for Microsoft OneNote 2013 64-Bit Edition. This update provides the latest fixes to Microsoft OneNote 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054936: Update for OneNote 2013 - KB3054936 - Office 2013 SP1 (Japanese)
Severity: Unspecified
Fixlet ID: 305493603
Fixlet Link: http://support.microsoft.com/kb/3054936

Fixlet Description: Microsoft has released an update for Microsoft OneNote 2013 32-Bit Edition. This update provides the latest fixes to Microsoft OneNote 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054938: Update for Office 2013 - KB3054938 - Office 2013 SP1 (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 305493801
Fixlet Link: http://support.microsoft.com/kb/3054938

Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054938: Update for Office 2013 - KB3054938 - Office 2013 SP1 (Japanese)
Severity: Unspecified
Fixlet ID: 305493803
Fixlet Link: http://support.microsoft.com/kb/3054938

Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054939: Update for Office 2013 - KB3054939 - Office 2013 SP1 (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 305493901
Fixlet Link: http://support.microsoft.com/kb/3054939

Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054939: Update for Office 2013 - KB3054939 - Office 2013 SP1 (Japanese)
Severity: Unspecified
Fixlet ID: 305493903
Fixlet Link: http://support.microsoft.com/kb/3054939

Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054940: Update for Outlook 2013 - KB3054940 - Office 2013 SP1 (Japanese)
Severity: Unspecified
Fixlet ID: 305494001
Fixlet Link: http://support.microsoft.com/kb/3054940

Fixlet Description: Microsoft has released an update for Microsoft Outlook 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Outlook 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054940: Update for Outlook 2013 - KB3054940 - Office 2013 SP1 (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 305494003
Fixlet Link: http://support.microsoft.com/kb/3054940

Fixlet Description: Microsoft has released an update for Microsoft Outlook 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Outlook 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054944: Update for Outlook 2013 Junk Email Filter - KB3054944 - Office 2013 SP1 (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 305494401
Fixlet Link: http://support.microsoft.com/kb/3054944

Fixlet Description: This update provides the latest junk email and malicious links filter definitions for Microsoft Office 2013 64-Bit Edition. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054944: Update for Outlook 2013 Junk Email Filter - KB3054944 - Office 2013 SP1 (Japanese)
Severity: Unspecified
Fixlet ID: 305494403
Fixlet Link: http://support.microsoft.com/kb/3054944

Fixlet Description: This update provides the latest junk email and malicious links filter definitions for Microsoft Office 2013 32-Bit Edition. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054946: Update for Lync 2013 (Skype for Business) - KB3054946 - Lync 2013 (Japanese)
Severity: Unspecified
Fixlet ID: 305494601
Fixlet Link: http://support.microsoft.com/kb/3054946

Fixlet Description: Microsoft has released an update for Skype for Business 2015 32-Bit Edition. This update provides the latest fixes to Skype for Business 2015 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: 3054946: Update for Lync 2013 (Skype for Business) - KB3054946 - Lync 2013 (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 305494609
Fixlet Link: http://support.microsoft.com/kb/3054946

Fixlet Description: Microsoft has released an update for Skype for Business 2015 64-Bit Edition. This update provides the latest fixes to Skype for Business 2015 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: 3054950: Update for Access 2013 - KB3054950 - Office 2013 SP1 (Japanese)
Severity: Unspecified
Fixlet ID: 305495001
Fixlet Link: http://support.microsoft.com/kb/3054950

Fixlet Description: Microsoft has released an update for Microsoft Access 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Access 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054950: Update for Access 2013 - KB3054950 - Office 2013 SP1 (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 305495003
Fixlet Link: http://support.microsoft.com/kb/3054950

Fixlet Description: Microsoft has released an update for Microsoft Access 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Access 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054951: Update for Office 2013 - KB3054951 - Office 2013 SP1 (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 305495101
Fixlet Link: http://support.microsoft.com/kb/3054951

Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054951: Update for Office 2013 - KB3054951 - Office 2013 SP1 (Japanese)
Severity: Unspecified
Fixlet ID: 305495103
Fixlet Link: http://support.microsoft.com/kb/3054951

Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054954: Update for OneDrive for Business - KB3054954 - Office 2013 SP1 (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 305495401
Fixlet Link: http://support.microsoft.com/kb/3054954

Fixlet Description: Microsoft has released an update for Microsoft OneDrive for Business 64-Bit Edition. This update provides the latest fixes to Microsoft OneDrive for Business 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054954: Update for OneDrive for Business - KB3054954 - Office 2013 SP1 (Japanese)
Severity: Unspecified
Fixlet ID: 305495403
Fixlet Link: http://support.microsoft.com/kb/3054954

Fixlet Description: Microsoft has released an update for Microsoft OneDrive for Business 32-Bit Edition. This update provides the latest fixes to Microsoft OneDrive for Business 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054956: Update for Project 2013 - KB3054956 - Project 2013 SP1 (Japanese)
Severity: Unspecified
Fixlet ID: 305495601
Fixlet Link: http://support.microsoft.com/kb/3054956

Fixlet Description: Microsoft has released an update for Microsoft Project 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Project 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054956: Update for Project 2013 - KB3054956 - Project 2013 SP1 (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 305495603
Fixlet Link: http://support.microsoft.com/kb/3054956

Fixlet Description: Microsoft has released an update for Microsoft Project 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Project 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054964: Update for Office 2010 - KB3054964 - Office 2010 SP2 (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 305496401
Fixlet Link: http://support.microsoft.com/kb/3054964

Fixlet Description: Microsoft has released an update for Microsoft Office 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054964: Update for Office 2010 - KB3054964 - Office 2010 SP2 (Japanese)
Severity: Unspecified
Fixlet ID: 305496403
Fixlet Link: http://support.microsoft.com/kb/3054964

Fixlet Description: Microsoft has released an update for Microsoft Office 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054976: Update for Outlook 2010 - KB3054976 - Office 2010 SP2 (Japanese)
Severity: Unspecified
Fixlet ID: 305497601
Fixlet Link: http://support.microsoft.com/kb/3054976

Fixlet Description: Microsoft has released an update for Microsoft Outlook 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Outlook 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054976: Update for Outlook 2010 - KB3054976 - Office 2010 SP2 (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 305497603
Fixlet Link: http://support.microsoft.com/kb/3054976

Fixlet Description: Microsoft has released an update for Microsoft Outlook 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Outlook 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054977: Update for Office 2010 - KB3054977 - Office 2010 SP2 (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 305497701
Fixlet Link: http://support.microsoft.com/kb/3054977

Fixlet Description: Microsoft has released an update for Microsoft Office 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054977: Update for Office 2010 - KB3054977 - Office 2010 SP2 (Japanese)
Severity: Unspecified
Fixlet ID: 305497703
Fixlet Link: http://support.microsoft.com/kb/3054977

Fixlet Description: Microsoft has released an update for Microsoft Office 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054985: Update for Project 2010 - KB3054985 - Project 2010 SP2 (Japanese)
Severity: Unspecified
Fixlet ID: 305498501
Fixlet Link: http://support.microsoft.com/kb/3054985

Fixlet Description: Microsoft has released an update for Microsoft Project 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Project 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054985: Update for Project 2010 - KB3054985 - Project 2010 SP2 (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 305498503
Fixlet Link: http://support.microsoft.com/kb/3054985

Fixlet Description: Microsoft has released an update for Microsoft Project 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Project 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3054986: Update for Outlook 2007 Junk Email Filter - KB3054986 - Outlook 2007 (Japanese)
Severity: Unspecified
Fixlet ID: 305498601
Fixlet Link: http://support.microsoft.com/kb/3054986

Fixlet Description: This update provides the Junk E-mail Filter in Microsoft Office Outlook 2007 Junk Email Filter with a more current definition of which e-mail messages should be considered junk e-mail. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3055343: Update for Windows Server 2012 R2 (KB3055343) - Windows Server 2012 R2 (x64) (V2.0) (Japanese)
Severity: Unspecified
Fixlet ID: 305534305
Fixlet Link: http://support.microsoft.com/kb/3055343

Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3055343: Update for Windows 8.1 (KB3055343) - Windows 8.1 (V2.0) (Japanese)
Severity: Unspecified
Fixlet ID: 305534307
Fixlet Link: http://support.microsoft.com/kb/3055343

Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3055343: Update for Windows 8.1 for x64-based Systems (KB3055343) - Windows 8.1 (x64) (V2.0) (Japanese)
Severity: Unspecified
Fixlet ID: 305534309
Fixlet Link: http://support.microsoft.com/kb/3055343

Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3061493: Update enables magstripe drivers to support new devices in Windows 8.1 or Windows RT 8.1 - Windows 8.1 Gold (Japanese)
Severity: Unspecified
Fixlet ID: 306149301
Fixlet Link: http://support.microsoft.com/kb/3061493

Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3061493: Update enables magstripe drivers to support new devices in Windows 8.1 or Windows RT 8.1 - Windows 8.1 Gold (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 306149303
Fixlet Link: http://support.microsoft.com/kb/3061493

Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3065013: "0x0000007F" and "0x0000009F" Stop errors in Windows 8.1 or Windows Server 2012 R2 - Windows Server 2012 R2 Gold (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 306501301
Fixlet Link: http://support.microsoft.com/kb/3065013

Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3065013: "0x0000007F" and "0x0000009F" Stop errors in Windows 8.1 or Windows Server 2012 R2 - Windows 8.1 Gold (Japanese)
Severity: Unspecified
Fixlet ID: 306501303
Fixlet Link: http://support.microsoft.com/kb/3065013

Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3065013: "0x0000007F" and "0x0000009F" Stop errors in Windows 8.1 or Windows Server 2012 R2 - Windows 8.1 Gold (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 306501305
Fixlet Link: http://support.microsoft.com/kb/3065013

Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3065979: "GsDraw error (1): GenericError" error occurs and application crashes when you create text outline in Windows - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 306597927
Fixlet Link: http://support.microsoft.com/kb/3065979

Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3065979: "GsDraw error (1): GenericError" error occurs and application crashes when you create text outline in Windows - Windows Server 2008 SP2 (Japanese)
Severity: Unspecified
Fixlet ID: 306597933
Fixlet Link: http://support.microsoft.com/kb/3065979

Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3065987: Windows Update Client for Windows 7 and Windows Server 2008 R2 - Windows Server 2008 R2 SP1 (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 306598703
Fixlet Link: http://support.microsoft.com/kb/3065987

Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3065987: Windows Update Client for Windows 7 and Windows Server 2008 R2 - Windows 7 SP1 (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 306598707
Fixlet Link: http://support.microsoft.com/kb/3065987

Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3065987: Windows Update Client for Windows 7 and Windows Server 2008 R2 - Windows 7 SP1 (Japanese)
Severity: Unspecified
Fixlet ID: 306598711
Fixlet Link: http://support.microsoft.com/kb/3065987

Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3065988: Windows Update Client for Windows 8.1 and Windows Server 2012 R2 - Windows Server 2012 R2 Gold (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 306598801
Fixlet Link: http://support.microsoft.com/kb/3065988

Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3065988: Windows Update Client for Windows 8.1 and Windows Server 2012 R2 - Windows 8.1 Gold (Japanese)
Severity: Unspecified
Fixlet ID: 306598803
Fixlet Link: http://support.microsoft.com/kb/3065988

Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3065988: Windows Update Client for Windows 8.1 and Windows Server 2012 R2 - Windows 8.1 Gold (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 306598805
Fixlet Link: http://support.microsoft.com/kb/3065988

Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3070071: Updated APN database entry for SoftBank Mobile Corp for Windows 8.1 and Windows 8 - Windows 8.1 Gold (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 307007101
Fixlet Link: http://support.microsoft.com/kb/3070071

Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3070071: Updated APN database entry for SoftBank Mobile Corp for Windows 8.1 and Windows 8 - Windows 8.1 Gold (Japanese)
Severity: Unspecified
Fixlet ID: 307007103
Fixlet Link: http://support.microsoft.com/kb/3070071

Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3070071: Updated APN database entry for SoftBank Mobile Corp for Windows 8.1 and Windows 8 - Windows 8 Gold (Japanese)
Severity: Unspecified
Fixlet ID: 307007105
Fixlet Link: http://support.microsoft.com/kb/3070071

Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3070071: Updated APN database entry for SoftBank Mobile Corp for Windows 8.1 and Windows 8 - Windows 8 Gold (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 307007107
Fixlet Link: http://support.microsoft.com/kb/3070071

Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3071663: Microsoft applications might crash in Windows - Windows 8.1 Gold (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 307166301
Fixlet Link: http://support.microsoft.com/kb/3071663

Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3071663: Microsoft applications might crash in Windows - Windows Server 2012 R2 Gold (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 307166303
Fixlet Link: http://support.microsoft.com/kb/3071663

Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3071663: Microsoft applications might crash in Windows - Windows 8.1 Gold (Japanese)
Severity: Unspecified
Fixlet ID: 307166305
Fixlet Link: http://support.microsoft.com/kb/3071663

Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3072019: "Try again" error occurs and Bluetooth device cannot connect to computer in Windows 8.1 or Windows RT 8.1 - Windows 8.1 Gold (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 307201901
Fixlet Link: http://support.microsoft.com/kb/3072019

Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3072019: "Try again" error occurs and Bluetooth device cannot connect to computer in Windows 8.1 or Windows RT 8.1 - Windows 8.1 Gold (Japanese)
Severity: Unspecified
Fixlet ID: 307201903
Fixlet Link: http://support.microsoft.com/kb/3072019

Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3074683: Security Update for Windows 10 (KB3074683) - Windows 10 (Japanese) (Superseded)
Severity: Critical
Fixlet ID: 307468302
Fixlet Link: http://support.microsoft.com/kb/3074683

Fixlet Description: Note: This patch has been superseded by KB3081436. A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3074683: Security Update for Windows 10 for x64-based Systems (KB3074683) - Windows 10 (x64) (Japanese) (Superseded)
Severity: Critical
Fixlet ID: 307468304
Fixlet Link: http://support.microsoft.com/kb/3074683

Fixlet Description: Note: This patch has been superseded by KB3081436. A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3075851: Update for Windows 7 (KB3075851) - Windows 7 (Japanese)
Severity: Unspecified
Fixlet ID: 307585107
Fixlet Link: http://support.microsoft.com/kb/3075851

Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3075851: Update for Windows 7 for x64-based Systems (KB3075851) - Windows 7 (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 307585109
Fixlet Link: http://support.microsoft.com/kb/3075851

Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3075851: Update for Windows Server 2008 R2 x64 Edition (KB3075851) - Windows Server 2008 R2 (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 307585111
Fixlet Link: http://support.microsoft.com/kb/3075851

Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3075853: Update for Windows 8.1 (KB3075853) - Windows 8.1 (Japanese)
Severity: Unspecified
Fixlet ID: 307585301
Fixlet Link: http://support.microsoft.com/kb/3075853

Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3075853: Update for Windows Server 2012 R2 (KB3075853) - Windows Server 2012 R2 (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 307585303
Fixlet Link: http://support.microsoft.com/kb/3075853

Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3075853: Update for Windows 8.1 for x64-based Systems (KB3075853) - Windows 8.1 (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 307585305
Fixlet Link: http://support.microsoft.com/kb/3075853

Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3081424: Cumulative Update for Windows 10 for x64-based Systems (KB3081424) - Windows 10 (x64) (Japanese) (Superseded)
Severity: Unspecified
Fixlet ID: 308142401
Fixlet Link: http://support.microsoft.com/kb/3081424

Fixlet Description: Note: This patch has been superseded by KB3081436. Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3081424: Cumulative Update for Windows 10 (KB3081424) - Windows 10 (Japanese) (Superseded)
Severity: Unspecified
Fixlet ID: 308142403
Fixlet Link: http://support.microsoft.com/kb/3081424

Fixlet Description: Note: This patch has been superseded by KB3081436.Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3081436: Cumulative Update for Windows 10 (KB3081436) - Windows 10 (Japanese)
Severity: Critical
Fixlet ID: 308143605
Fixlet Link: http://support.microsoft.com/kb/3081436

Fixlet Description: The security update for Windows 10 that is dated August 11, 2015, includes improvements to improve the functionality of Windows 10 and resolves the following vulnerabilities in Windows:  3086251 MS15-092: Vulnerabilities in the .NET Framework could allow elevation of privilege: August 11, 2015 3084525 MS15-091: Cumulative security update for Microsoft Edge: August 11, 2015 3082458 MS15-088: Unsafe command-line parameter passing could allow information disclosure: August 11, 2015 3082487 MS15-085: Vulnerability in Mount Manager could allow elevation of privilege: August 11, 2015 3078662 MS15-080: Vulnerabilities in Microsoft graphics component could allow remote code execution: August 11, 2015 3082442 MS15-079: Cumulative security update for Internet Explorer: August 11, 2015 Windows 10 updates are cumulative. Therefore, this package contains all previously released fixes.Note: Affected computers may report back as 'Pending Restart' once the update has run successfully, but will not report back their final status until the computer has been restarted.

***************************************************************
Title: 3081436: Cumulative Update for Windows 10 for x64-based Systems (KB3081436) - Windows 10 (x64) (Japanese)
Severity: Critical
Fixlet ID: 308143607
Fixlet Link: http://support.microsoft.com/kb/3081436

Fixlet Description: The security update for Windows 10 that is dated August 11, 2015, includes improvements to improve the functionality of Windows 10 and resolves the following vulnerabilities in Windows:  3086251 MS15-092: Vulnerabilities in the .NET Framework could allow elevation of privilege: August 11, 2015 3084525 MS15-091: Cumulative security update for Microsoft Edge: August 11, 2015 3082458 MS15-088: Unsafe command-line parameter passing could allow information disclosure: August 11, 2015 3082487 MS15-085: Vulnerability in Mount Manager could allow elevation of privilege: August 11, 2015 3078662 MS15-080: Vulnerabilities in Microsoft graphics component could allow remote code execution: August 11, 2015 3082442 MS15-079: Cumulative security update for Internet Explorer: August 11, 2015 Windows 10 updates are cumulative. Therefore, this package contains all previously released fixes.Note: Affected computers may report back as 'Pending Restart' once the update has run successfully, but will not report back their final status until the computer has been restarted.

***************************************************************
Title: 3087916: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Windows 10 (Japanese)
Severity: Unspecified
Fixlet ID: 308791601
Fixlet Link: http://support.microsoft.com/kb/3087916

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3087916: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Windows 10 (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 308791605
Fixlet Link: http://support.microsoft.com/kb/3087916

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3087916: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Windows 8.1 Gold (Japanese)
Severity: Unspecified
Fixlet ID: 308791607
Fixlet Link: http://support.microsoft.com/kb/3087916

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3087916: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Windows 8.1 Gold (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 308791609
Fixlet Link: http://support.microsoft.com/kb/3087916

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3087916: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Windows Server 2012 Gold (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 308791611
Fixlet Link: http://support.microsoft.com/kb/3087916

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3087916: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Windows Server 2012 R2 Gold (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 308791613
Fixlet Link: http://support.microsoft.com/kb/3087916

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3087916: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Windows 8 Gold (Japanese)
Severity: Unspecified
Fixlet ID: 308791615
Fixlet Link: http://support.microsoft.com/kb/3087916

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 3087916: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Windows 8 Gold (x64) (Japanese)
Severity: Unspecified
Fixlet ID: 308791617
Fixlet Link: http://support.microsoft.com/kb/3087916

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.



More information about the BigFix-Announcements-Japan mailing list