From autonotify at us.ibm.com Sat Jul 4 02:35:04 2015 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Sat, 4 Jul 2015 02:35:04 -0700 Subject: [BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)' Message-ID: <201507040935.t649Z5ib015422@d03av05.boulder.ibm.com> Fixlet Site - 'Patches for Windows (Japanese)' Current Version: 665 Published: Sat, 04 Jul 2015 08:14:15 GMT New Fixlets: ============ *************************************************************** Title: 938397: Applications that use the Cryptography API cannot validate an X.509 certificate in Windows Server 2003 - Windows 2003 SP2 (x64) (Japanese) Severity: Unspecified Fixlet ID: 93839701 Fixlet Link: https://support.microsoft.com/kb/938397 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: Hotfixes have no default action. *************************************************************** Title: 938397: Applications that use the Cryptography API cannot validate an X.509 certificate in Windows Server 2003 - Windows 2003 SP2 (Japanese) Severity: Unspecified Fixlet ID: 93839703 Fixlet Link: https://support.microsoft.com/kb/938397 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: Hotfixes have no default action. *************************************************************** Title: 2998097: "Specified account does not exist" error message when domain users try to change their password in UPN format in a different domain - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 299809701 Fixlet Link: http://support.microsoft.com/kb/2998097 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3006137: Update changes the currency symbol of Lithuania from the Lithuanian litas (Lt) to the euro in Windows - Windows Server 2008 SP2 (Japanese) Severity: Unspecified Fixlet ID: 300613701 Fixlet Link: http://support.microsoft.com/kb/3006137 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3006137: Update changes the currency symbol of Lithuania from the Lithuanian litas (Lt) to the euro in Windows - Windows 8 Gold (Japanese) Severity: Unspecified Fixlet ID: 300613703 Fixlet Link: http://support.microsoft.com/kb/3006137 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3006137: Update changes the currency symbol of Lithuania from the Lithuanian litas (Lt) to the euro in Windows - Windows 7 SP1 (Japanese) Severity: Unspecified Fixlet ID: 300613705 Fixlet Link: http://support.microsoft.com/kb/3006137 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3006137: Update changes the currency symbol of Lithuania from the Lithuanian litas (Lt) to the euro in Windows - Windows 8 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 300613707 Fixlet Link: http://support.microsoft.com/kb/3006137 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3006137: Update changes the currency symbol of Lithuania from the Lithuanian litas (Lt) to the euro in Windows - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 300613709 Fixlet Link: http://support.microsoft.com/kb/3006137 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3006137: Update changes the currency symbol of Lithuania from the Lithuanian litas (Lt) to the euro in Windows - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 300613711 Fixlet Link: http://support.microsoft.com/kb/3006137 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3006137: Update changes the currency symbol of Lithuania from the Lithuanian litas (Lt) to the euro in Windows - Windows Server 2012 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 300613713 Fixlet Link: http://support.microsoft.com/kb/3006137 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3006137: Update changes the currency symbol of Lithuania from the Lithuanian litas (Lt) to the euro in Windows - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 300613715 Fixlet Link: http://support.microsoft.com/kb/3006137 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3006137: Update changes the currency symbol of Lithuania from the Lithuanian litas (Lt) to the euro in Windows - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 300613717 Fixlet Link: http://support.microsoft.com/kb/3006137 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3006137: Update changes the currency symbol of Lithuania from the Lithuanian litas (Lt) to the euro in Windows - Windows 7 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 300613719 Fixlet Link: http://support.microsoft.com/kb/3006137 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3006137: Update changes the currency symbol of Lithuania from the Lithuanian litas (Lt) to the euro in Windows - Windows Server 2008 SP2 (x64) (Japanese) Severity: Unspecified Fixlet ID: 300613721 Fixlet Link: http://support.microsoft.com/kb/3006137 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3013531: Update to support copying .mkv files to Windows Phone from a computer that is running Windows - Windows 7 SP1 (Japanese) Severity: Unspecified Fixlet ID: 301353101 Fixlet Link: http://support.microsoft.com/kb/3013531 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3013531: Update to support copying .mkv files to Windows Phone from a computer that is running Windows - Windows 8 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 301353103 Fixlet Link: http://support.microsoft.com/kb/3013531 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3013531: Update to support copying .mkv files to Windows Phone from a computer that is running Windows - Windows 7 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 301353105 Fixlet Link: http://support.microsoft.com/kb/3013531 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3013531: Update to support copying .mkv files to Windows Phone from a computer that is running Windows - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 301353107 Fixlet Link: http://support.microsoft.com/kb/3013531 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3013531: Update to support copying .mkv files to Windows Phone from a computer that is running Windows - Windows 8 Gold (Japanese) Severity: Unspecified Fixlet ID: 301353109 Fixlet Link: http://support.microsoft.com/kb/3013531 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3013531: Update to support copying .mkv files to Windows Phone from a computer that is running Windows - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 301353111 Fixlet Link: http://support.microsoft.com/kb/3013531 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3013531: Update to support copying .mkv files to Windows Phone from a computer that is running Windows - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 301353113 Fixlet Link: http://support.microsoft.com/kb/3013531 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3013531: Update to support copying .mkv files to Windows Phone from a computer that is running Windows - Windows Server 2012 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 301353115 Fixlet Link: http://support.microsoft.com/kb/3013531 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3013531: Update to support copying .mkv files to Windows Phone from a computer that is running Windows - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 301353117 Fixlet Link: http://support.microsoft.com/kb/3013531 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3013538: Automatic brightness option is disabled unexpectedly after you switch between PC settings pages in Windows - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 301353801 Fixlet Link: http://support.microsoft.com/kb/3013538 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3013538: Automatic brightness option is disabled unexpectedly after you switch between PC settings pages in Windows - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 301353803 Fixlet Link: http://support.microsoft.com/kb/3013538 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3013538: Automatic brightness option is disabled unexpectedly after you switch between PC settings pages in Windows - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 301353805 Fixlet Link: http://support.microsoft.com/kb/3013538 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3013791: "0x00000133" Stop error when there's faulty hardware in Windows 8.1 or Windows Server 2012 R2 - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 301379101 Fixlet Link: http://support.microsoft.com/kb/3013791 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3013791: "0x00000133" Stop error when there's faulty hardware in Windows 8.1 or Windows Server 2012 R2 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 301379103 Fixlet Link: http://support.microsoft.com/kb/3013791 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3013791: "0x00000133" Stop error when there's faulty hardware in Windows 8.1 or Windows Server 2012 R2 - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 301379105 Fixlet Link: http://support.microsoft.com/kb/3013791 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3015696: The InputPersonalization.exe process crashes in Windows - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 301569601 Fixlet Link: http://support.microsoft.com/kb/3015696 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3015696: The InputPersonalization.exe process crashes in Windows - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 301569603 Fixlet Link: http://support.microsoft.com/kb/3015696 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3015696: The InputPersonalization.exe process crashes in Windows - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 301569605 Fixlet Link: http://support.microsoft.com/kb/3015696 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3018467: Items in the navigation pane of File Explorer may disappear in Windows - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 301846701 Fixlet Link: http://support.microsoft.com/kb/3018467 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3018467: Items in the navigation pane of File Explorer may disappear in Windows - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 301846703 Fixlet Link: http://support.microsoft.com/kb/3018467 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3018467: Items in the navigation pane of File Explorer may disappear in Windows - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 301846705 Fixlet Link: http://support.microsoft.com/kb/3018467 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3019270: Update to remove duplicate descriptions for Office 365 integration in Windows Server 2012 R2 Essentials - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 301927001 Fixlet Link: http://support.microsoft.com/kb/3019270 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3020370: Update the copy of the Cmitrust.dll file in Windows - Windows 7 SP1 (Japanese) Severity: Unspecified Fixlet ID: 302037001 Fixlet Link: http://support.microsoft.com/kb/3020370 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3020370: Update the copy of the Cmitrust.dll file in Windows - Windows 8 Gold (Japanese) Severity: Unspecified Fixlet ID: 302037003 Fixlet Link: http://support.microsoft.com/kb/3020370 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3020370: Update the copy of the Cmitrust.dll file in Windows - Windows 8 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 302037005 Fixlet Link: http://support.microsoft.com/kb/3020370 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3020370: Update the copy of the Cmitrust.dll file in Windows - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 302037007 Fixlet Link: http://support.microsoft.com/kb/3020370 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3020370: Update the copy of the Cmitrust.dll file in Windows - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 302037011 Fixlet Link: http://support.microsoft.com/kb/3020370 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3020370: Update the copy of the Cmitrust.dll file in Windows - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 302037013 Fixlet Link: http://support.microsoft.com/kb/3020370 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3020370: Update the copy of the Cmitrust.dll file in Windows - Windows 7 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 302037015 Fixlet Link: http://support.microsoft.com/kb/3020370 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3029438: Can't open Windows Store applications in Windows 8.1 or Windows Server 2012 R2 - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 302943801 Fixlet Link: http://support.microsoft.com/kb/3029438 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3029438: Can't open Windows Store applications in Windows 8.1 or Windows Server 2012 R2 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 302943803 Fixlet Link: http://support.microsoft.com/kb/3029438 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3029438: Can't open Windows Store applications in Windows 8.1 or Windows Server 2012 R2 - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 302943805 Fixlet Link: http://support.microsoft.com/kb/3029438 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3037313: Old files are not removed after a migration of virtual machine storage in Windows 8.1 or Windows Server 2012 R2 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 303731301 Fixlet Link: http://support.microsoft.com/kb/3037313 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3037313: Old files are not removed after a migration of virtual machine storage in Windows 8.1 or Windows Server 2012 R2 - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 303731303 Fixlet Link: http://support.microsoft.com/kb/3037313 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3037924: You cannot do System Image Backup to Blu-ray media in Windows - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 303792401 Fixlet Link: http://support.microsoft.com/kb/3037924 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3037924: You cannot do System Image Backup to Blu-ray media in Windows - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 303792403 Fixlet Link: http://support.microsoft.com/kb/3037924 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3037924: You cannot do System Image Backup to Blu-ray media in Windows - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 303792405 Fixlet Link: http://support.microsoft.com/kb/3037924 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3040272: Start time increases after another language pack is added to Windows - Windows 8 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304027201 Fixlet Link: http://support.microsoft.com/kb/3040272 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3040272: Start time increases after another language pack is added to Windows - Windows 8 Gold (Japanese) Severity: Unspecified Fixlet ID: 304027203 Fixlet Link: http://support.microsoft.com/kb/3040272 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3040272: Start time increases after another language pack is added to Windows - Windows 7 SP1 (Japanese) Severity: Unspecified Fixlet ID: 304027205 Fixlet Link: http://support.microsoft.com/kb/3040272 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3040272: Start time increases after another language pack is added to Windows - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 304027207 Fixlet Link: http://support.microsoft.com/kb/3040272 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3040272: Start time increases after another language pack is added to Windows - Windows Server 2012 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304027209 Fixlet Link: http://support.microsoft.com/kb/3040272 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3040272: Start time increases after another language pack is added to Windows - Windows 7 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 304027211 Fixlet Link: http://support.microsoft.com/kb/3040272 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3045645: Update to force a UAC prompt when a customized .sdb file is created in Windows - Windows Server 2012 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304564501 Fixlet Link: http://support.microsoft.com/kb/3045645 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3045645: Update to force a UAC prompt when a customized .sdb file is created in Windows - Windows 7 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 304564503 Fixlet Link: http://support.microsoft.com/kb/3045645 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3045645: Update to force a UAC prompt when a customized .sdb file is created in Windows - Windows 8 Gold (Japanese) Severity: Unspecified Fixlet ID: 304564505 Fixlet Link: http://support.microsoft.com/kb/3045645 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3045645: Update to force a UAC prompt when a customized .sdb file is created in Windows - Windows 8 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304564507 Fixlet Link: http://support.microsoft.com/kb/3045645 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3045645: Update to force a UAC prompt when a customized .sdb file is created in Windows - Windows 7 SP1 (Japanese) Severity: Unspecified Fixlet ID: 304564509 Fixlet Link: http://support.microsoft.com/kb/3045645 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3045645: Update to force a UAC prompt when a customized .sdb file is created in Windows - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 304564511 Fixlet Link: http://support.microsoft.com/kb/3045645 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3045719: Microsoft Project Siena crashes when you use galleries in the application in Windows - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 304571901 Fixlet Link: http://support.microsoft.com/kb/3045719 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3045719: Microsoft Project Siena crashes when you use galleries in the application in Windows - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304571903 Fixlet Link: http://support.microsoft.com/kb/3045719 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3045719: Microsoft Project Siena crashes when you use galleries in the application in Windows - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304571905 Fixlet Link: http://support.microsoft.com/kb/3045719 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3045992: "Description cannot be found" error in event logs in Event Viewer in Windows Server 2012 R2 or Windows Server 2012 - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304599201 Fixlet Link: http://support.microsoft.com/kb/3045992 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3045992: "Description cannot be found" error in event logs in Event Viewer in Windows Server 2012 R2 or Windows Server 2012 - Windows Server 2012 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304599203 Fixlet Link: http://support.microsoft.com/kb/3045992 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3045992: "Description cannot be found" error in event logs in Event Viewer in Windows Server 2012 R2 or Windows Server 2012 - Windows 8 Gold (Japanese) Severity: Unspecified Fixlet ID: 304599205 Fixlet Link: http://support.microsoft.com/kb/3045992 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3045992: "Description cannot be found" error in event logs in Event Viewer in Windows Server 2012 R2 or Windows Server 2012 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304599207 Fixlet Link: http://support.microsoft.com/kb/3045992 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3045992: "Description cannot be found" error in event logs in Event Viewer in Windows Server 2012 R2 or Windows Server 2012 - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 304599209 Fixlet Link: http://support.microsoft.com/kb/3045992 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3045992: "Description cannot be found" error in event logs in Event Viewer in Windows Server 2012 R2 or Windows Server 2012 - Windows 8 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304599211 Fixlet Link: http://support.microsoft.com/kb/3045992 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3046480: Update helps to determine whether to migrate the .NET Framework 1.1 when you upgrade Windows 8.1 or Windows 7 - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304648001 Fixlet Link: http://support.microsoft.com/kb/3046480 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3046480: Update helps to determine whether to migrate the .NET Framework 1.1 when you upgrade Windows 8.1 or Windows 7 - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 304648003 Fixlet Link: http://support.microsoft.com/kb/3046480 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3046480: Update helps to determine whether to migrate the .NET Framework 1.1 when you upgrade Windows 8.1 or Windows 7 - Windows 7 Gold/SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 304648005 Fixlet Link: http://support.microsoft.com/kb/3046480 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3046480: Update helps to determine whether to migrate the .NET Framework 1.1 when you upgrade Windows 8.1 or Windows 7 - Windows 7 Gold/SP1 (Japanese) Severity: Unspecified Fixlet ID: 304648007 Fixlet Link: http://support.microsoft.com/kb/3046480 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3048043: Screen flickers or becomes blank when you drag tiles on the Start screen in Windows - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304804301 Fixlet Link: http://support.microsoft.com/kb/3048043 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3048043: Screen flickers or becomes blank when you drag tiles on the Start screen in Windows - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 304804303 Fixlet Link: http://support.microsoft.com/kb/3048043 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3048043: Screen flickers or becomes blank when you drag tiles on the Start screen in Windows - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304804305 Fixlet Link: http://support.microsoft.com/kb/3048043 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3048097: Compatibility update for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304809701 Fixlet Link: http://support.microsoft.com/kb/3048097 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3048097: Compatibility update for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 304809703 Fixlet Link: http://support.microsoft.com/kb/3048097 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3048097: Compatibility update for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304809705 Fixlet Link: http://support.microsoft.com/kb/3048097 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3048761: Information or messages are not updated automatically in an application in Windows 7 or Windows Server 2008 R2 - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 304876101 Fixlet Link: http://support.microsoft.com/kb/3048761 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3048761: Information or messages are not updated automatically in an application in Windows 7 or Windows Server 2008 R2 - Windows 7 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 304876105 Fixlet Link: http://support.microsoft.com/kb/3048761 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3048761: Information or messages are not updated automatically in an application in Windows 7 or Windows Server 2008 R2 - Windows 7 SP1 (Japanese) Severity: Unspecified Fixlet ID: 304876107 Fixlet Link: http://support.microsoft.com/kb/3048761 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3049849: Cumulative Update 9 for Exchange Server 2013 - KB3049849 - Exchange Server 2013 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 304984901 Fixlet Link: http://support.microsoft.com/kb/3049849 Fixlet Description: Cumulative Update 9 for Exchange Server 2013 (KB3049849) Important Note: Due to the complexity of the installation, this update must be completed manually. *************************************************************** Title: 3049853: Update Rollup 10 for Exchange Server 2010 - KB3049853 - Exchange Server 2010 SP3 (x64) (Japanese) Severity: Unspecified Fixlet ID: 304985301 Fixlet Link: http://support.microsoft.com/kb/3049853 Fixlet Description: Update Rollup 10 For Exchange 2010 SP3 (KB3049853) After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3053946: "0x00000113" Stop error when you wake a computer from sleep mode in Windows 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 305394601 Fixlet Link: http://support.microsoft.com/kb/3053946 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054169: Update to add more information to minidump files that helps OCA servers categorize failures correctly in Windows - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 305416901 Fixlet Link: http://support.microsoft.com/kb/3054169 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054169: Update to add more information to minidump files that helps OCA servers categorize failures correctly in Windows - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 305416903 Fixlet Link: http://support.microsoft.com/kb/3054169 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054169: Update to add more information to minidump files that helps OCA servers categorize failures correctly in Windows - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 305416905 Fixlet Link: http://support.microsoft.com/kb/3054169 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054203: Update for SIP to enable WinVerifyTrust function in Windows Server 2012 R2 to work with a later version of Windows - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 305420301 Fixlet Link: http://support.microsoft.com/kb/3054203 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054204: Update lets the WinVerifyTrust function in Windows Server 2012 work with a later version of Windows - Windows Server 2012 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 305420401 Fixlet Link: http://support.microsoft.com/kb/3054204 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054205: Update for SIP to enable WinVerifyTrust function in Windows Server 2008 R2 SP1 to work with a later version of Windows - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305420503 Fixlet Link: http://support.microsoft.com/kb/3054205 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054206: Update for SIP to enable WinVerifyTrust function in Windows Server 2008 SP2 to work with a later version of Windows - Windows Server 2008 SP2 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305420601 Fixlet Link: http://support.microsoft.com/kb/3054206 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054206: Update for SIP to enable WinVerifyTrust function in Windows Server 2008 SP2 to work with a later version of Windows - Windows Server 2008 SP2 (Japanese) Severity: Unspecified Fixlet ID: 305420605 Fixlet Link: http://support.microsoft.com/kb/3054206 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054256: Reliability improvements for Windows 8.1 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 305425601 Fixlet Link: http://support.microsoft.com/kb/3054256 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054256: Reliability improvements for Windows 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 305425603 Fixlet Link: http://support.microsoft.com/kb/3054256 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054256: Reliability improvements for Windows 8.1 - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 305425605 Fixlet Link: http://support.microsoft.com/kb/3054256 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054464: Applications that use the AddEntry method may crash in Windows - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 305446401 Fixlet Link: http://support.microsoft.com/kb/3054464 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054464: Applications that use the AddEntry method may crash in Windows - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 305446403 Fixlet Link: http://support.microsoft.com/kb/3054464 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054464: Applications that use the AddEntry method may crash in Windows - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 305446405 Fixlet Link: http://support.microsoft.com/kb/3054464 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054476: Update for stream.sys driver-based applications in Windows 7 or Windows Server 2008 R2 - Windows 7 SP1 (Japanese) Severity: Unspecified Fixlet ID: 305447601 Fixlet Link: http://support.microsoft.com/kb/3054476 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054476: Update for stream.sys driver-based applications in Windows 7 or Windows Server 2008 R2 - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305447603 Fixlet Link: http://support.microsoft.com/kb/3054476 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054476: Update for stream.sys driver-based applications in Windows 7 or Windows Server 2008 R2 - Windows 7 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305447605 Fixlet Link: http://support.microsoft.com/kb/3054476 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3055323: Update to enable a security feature in Windows 8.1 or Windows Server 2012 R2 - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 305532301 Fixlet Link: http://support.microsoft.com/kb/3055323 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3055323: Update to enable a security feature in Windows 8.1 or Windows Server 2012 R2 - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 305532303 Fixlet Link: http://support.microsoft.com/kb/3055323 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3055323: Update to enable a security feature in Windows 8.1 or Windows Server 2012 R2 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 305532305 Fixlet Link: http://support.microsoft.com/kb/3055323 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3055999: Update APN database entry for SaskTel (Canada) in Windows 8.1 and 8 - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 305599901 Fixlet Link: http://support.microsoft.com/kb/3055999 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3055999: Update APN database entry for SaskTel (Canada) in Windows 8.1 and 8 - Windows 8 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 305599903 Fixlet Link: http://support.microsoft.com/kb/3055999 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3055999: Update APN database entry for SaskTel (Canada) in Windows 8.1 and 8 - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 305599905 Fixlet Link: http://support.microsoft.com/kb/3055999 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3055999: Update APN database entry for SaskTel (Canada) in Windows 8.1 and 8 - Windows 8 Gold (Japanese) Severity: Unspecified Fixlet ID: 305599907 Fixlet Link: http://support.microsoft.com/kb/3055999 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3056347: Location feature is not turned off after you enable "Turn off location" policy setting in Windows RT 8.1 or Windows 8.1 - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 305634701 Fixlet Link: http://support.microsoft.com/kb/3056347 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3056347: Location feature is not turned off after you enable "Turn off location" policy setting in Windows RT 8.1 or Windows 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 305634703 Fixlet Link: http://support.microsoft.com/kb/3056347 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3056710: Update Rollup 17 for Exchange Server 2007 - KB3056710 - Exchange Server 2007 SP3 (Japanese) Severity: Unspecified Fixlet ID: 305671001 Fixlet Link: http://support.microsoft.com/kb/3056710 Fixlet Description: Update Rollup 17 for Exchange Server 2007 Service Pack 3 (KB3056710) After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3056710: Update Rollup 17 for Exchange Server 2007 - KB3056710 - Exchange Server 2007 SP3 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305671003 Fixlet Link: http://support.microsoft.com/kb/3056710 Fixlet Description: Update Rollup 17 for Exchange Server 2007 Service Pack 3 (KB3056710) After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3058163: Activation doesn't work if the sppsvc.exe process doesn't start automatically in Windows 8 or Windows Server 2012 - Windows 8 Gold (Japanese) Severity: Unspecified Fixlet ID: 305816301 Fixlet Link: http://support.microsoft.com/kb/3058163 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3058163: Activation doesn't work if the sppsvc.exe process doesn't start automatically in Windows 8 or Windows Server 2012 - Windows Server 2012 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 305816303 Fixlet Link: http://support.microsoft.com/kb/3058163 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3058163: Activation doesn't work if the sppsvc.exe process doesn't start automatically in Windows 8 or Windows Server 2012 - Windows 8 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 305816305 Fixlet Link: http://support.microsoft.com/kb/3058163 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3058168: Update that enables Windows 8.1 and Windows 8 KMS hosts to activate a later version of Windows - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 305816801 Fixlet Link: http://support.microsoft.com/kb/3058168 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3058168: Update that enables Windows 8.1 and Windows 8 KMS hosts to activate a later version of Windows - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 305816803 Fixlet Link: http://support.microsoft.com/kb/3058168 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3058168: Update that enables Windows 8.1 and Windows 8 KMS hosts to activate a later version of Windows - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 305816805 Fixlet Link: http://support.microsoft.com/kb/3058168 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3058168: Update that enables Windows 8.1 and Windows 8 KMS hosts to activate a later version of Windows - Windows 8 Gold (Japanese) Severity: Unspecified Fixlet ID: 305816807 Fixlet Link: http://support.microsoft.com/kb/3058168 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3058168: Update that enables Windows 8.1 and Windows 8 KMS hosts to activate a later version of Windows - Windows 8 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 305816809 Fixlet Link: http://support.microsoft.com/kb/3058168 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3058168: Update that enables Windows 8.1 and Windows 8 KMS hosts to activate a later version of Windows - Windows Server 2012 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 305816811 Fixlet Link: http://support.microsoft.com/kb/3058168 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3059316: You cannot move the scrollbar on Windows by dragging the mouse - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 305931601 Fixlet Link: http://support.microsoft.com/kb/3059316 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3059316: You cannot move the scrollbar on Windows by dragging the mouse - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 305931603 Fixlet Link: http://support.microsoft.com/kb/3059316 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3059316: You cannot move the scrollbar on Windows by dragging the mouse - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 305931605 Fixlet Link: http://support.microsoft.com/kb/3059316 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3060383: Decimal symbol and digit grouping symbol are incorrect for the Swiss language locale in Windows - Windows 8 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 306038301 Fixlet Link: http://support.microsoft.com/kb/3060383 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3060383: Decimal symbol and digit grouping symbol are incorrect for the Swiss language locale in Windows - Windows Server 2012 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 306038303 Fixlet Link: http://support.microsoft.com/kb/3060383 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3060383: Decimal symbol and digit grouping symbol are incorrect for the Swiss language locale in Windows - Windows 8 Gold (Japanese) Severity: Unspecified Fixlet ID: 306038305 Fixlet Link: http://support.microsoft.com/kb/3060383 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3060383: Decimal symbol and digit grouping symbol are incorrect for the Swiss language locale in Windows - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 306038307 Fixlet Link: http://support.microsoft.com/kb/3060383 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3060383: Decimal symbol and digit grouping symbol are incorrect for the Swiss language locale in Windows - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 306038309 Fixlet Link: http://support.microsoft.com/kb/3060383 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3060383: Decimal symbol and digit grouping symbol are incorrect for the Swiss language locale in Windows - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 306038311 Fixlet Link: http://support.microsoft.com/kb/3060383 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3060681: SIL hourly task fails to forward complete data over https in Windows Server 2012 R2 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 306068101 Fixlet Link: http://support.microsoft.com/kb/3060681 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3061421: Updated APN database entry for Northern Michigan University (NMU) for Windows 8.1 and 8 - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 306142101 Fixlet Link: http://support.microsoft.com/kb/3061421 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3061421: Updated APN database entry for Northern Michigan University (NMU) for Windows 8.1 and 8 - Windows 8 Gold (Japanese) Severity: Unspecified Fixlet ID: 306142103 Fixlet Link: http://support.microsoft.com/kb/3061421 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3061421: Updated APN database entry for Northern Michigan University (NMU) for Windows 8.1 and 8 - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 306142105 Fixlet Link: http://support.microsoft.com/kb/3061421 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3061421: Updated APN database entry for Northern Michigan University (NMU) for Windows 8.1 and 8 - Windows 8 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 306142107 Fixlet Link: http://support.microsoft.com/kb/3061421 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3061468: Compatibility update for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 306146801 Fixlet Link: http://support.microsoft.com/kb/3061468 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3061468: Compatibility update for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 306146803 Fixlet Link: http://support.microsoft.com/kb/3061468 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3061468: Compatibility update for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 306146805 Fixlet Link: http://support.microsoft.com/kb/3061468 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3063843: System takes too long time to log on to a computer because of large numbers of WNF state name registrations in Windows - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 306384301 Fixlet Link: http://support.microsoft.com/kb/3063843 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3063843: System takes too long time to log on to a computer because of large numbers of WNF state name registrations in Windows - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 306384303 Fixlet Link: http://support.microsoft.com/kb/3063843 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3063843: System takes too long time to log on to a computer because of large numbers of WNF state name registrations in Windows - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 306384305 Fixlet Link: http://support.microsoft.com/kb/3063843 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3064059: Explorer.exe process crashes after File History item in Control Panel is opened in Windows 8.1 - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 306405901 Fixlet Link: http://support.microsoft.com/kb/3064059 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3064059: Explorer.exe process crashes after File History item in Control Panel is opened in Windows 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 306405903 Fixlet Link: http://support.microsoft.com/kb/3064059 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3064209: Microcode update for Intel processors in Windows - Windows 8 Gold (Japanese) Severity: Unspecified Fixlet ID: 306420901 Fixlet Link: http://support.microsoft.com/kb/3064209 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3064209: Microcode update for Intel processors in Windows - Windows 7 SP1 (Japanese) Severity: Unspecified Fixlet ID: 306420903 Fixlet Link: http://support.microsoft.com/kb/3064209 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3064209: Microcode update for Intel processors in Windows - Windows 7 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 306420905 Fixlet Link: http://support.microsoft.com/kb/3064209 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3064209: Microcode update for Intel processors in Windows - Windows 8 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 306420907 Fixlet Link: http://support.microsoft.com/kb/3064209 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3064209: Microcode update for Intel processors in Windows - Windows Server 2012 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 306420909 Fixlet Link: http://support.microsoft.com/kb/3064209 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3064209: Microcode update for Intel processors in Windows - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 306420911 Fixlet Link: http://support.microsoft.com/kb/3064209 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3064209: Microcode update for Intel processors in Windows - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 306420913 Fixlet Link: http://support.microsoft.com/kb/3064209 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3064209: Microcode update for Intel processors in Windows - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 306420915 Fixlet Link: http://support.microsoft.com/kb/3064209 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3064209: Microcode update for Intel processors in Windows - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 306420917 Fixlet Link: http://support.microsoft.com/kb/3064209 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. From autonotify at us.ibm.com Fri Jul 10 02:34:48 2015 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Fri, 10 Jul 2015 02:34:48 -0700 Subject: [BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)' Message-ID: <201507100934.t6A9YmQv017487@d01av02.pok.ibm.com> Fixlet Site - 'Patches for Windows (Japanese)' Current Version: 666 Published: Thu, 09 Jul 2015 16:05:48 GMT New Fixlets: ============ *************************************************************** Title: 3029432: The logon process for new users takes significantly longer as the number of user profiles increases in Windows - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 302943201 Fixlet Link: http://support.microsoft.com/kb/3029432 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3029432: The logon process for new users takes significantly longer as the number of user profiles increases in Windows - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 302943203 Fixlet Link: http://support.microsoft.com/kb/3029432 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3029432: The logon process for new users takes significantly longer as the number of user profiles increases in Windows - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 302943205 Fixlet Link: http://support.microsoft.com/kb/3029432 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3029603: xHCI driver crashes after you resume computer from sleep mode in Windows 8.1 or Windows Server 2012 R2 - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 302960301 Fixlet Link: http://support.microsoft.com/kb/3029603 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3029603: xHCI driver crashes after you resume computer from sleep mode in Windows 8.1 or Windows Server 2012 R2 - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 302960303 Fixlet Link: http://support.microsoft.com/kb/3029603 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3029603: xHCI driver crashes after you resume computer from sleep mode in Windows 8.1 or Windows Server 2012 R2 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 302960305 Fixlet Link: http://support.microsoft.com/kb/3029603 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3030086: Update Rollup 16 for Exchange Server 2007 - KB3030086 - Exchange Server 2007 SP3 (Japanese) Severity: Unspecified Fixlet ID: 303008601 Fixlet Link: http://support.microsoft.com/kb/3030086 Fixlet Description: Update Rollup 16 for Exchange Server 2007 Service Pack 3 (KB3030086) After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3030086: Update Rollup 16 for Exchange Server 2007 - KB3030086 - Exchange Server 2007 SP3 (x64) (Japanese) Severity: Unspecified Fixlet ID: 303008603 Fixlet Link: http://support.microsoft.com/kb/3030086 Fixlet Description: Update Rollup 16 for Exchange Server 2007 Service Pack 3 (KB3030086) After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3033446: Wi-Fi connectivity issues or poor performance on CHT platform computers in Windows 8.1 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 303344601 Fixlet Link: http://support.microsoft.com/kb/3033446 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3033446: Wi-Fi connectivity issues or poor performance on CHT platform computers in Windows 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 303344603 Fixlet Link: http://support.microsoft.com/kb/3033446 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3033446: Wi-Fi connectivity issues or poor performance on CHT platform computers in Windows 8.1 - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 303344605 Fixlet Link: http://support.microsoft.com/kb/3033446 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3038002: UHS-3 cards cannot be detected in Windows on Surface devices - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 303800201 Fixlet Link: http://support.microsoft.com/kb/3038002 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3038002: UHS-3 cards cannot be detected in Windows on Surface devices - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 303800203 Fixlet Link: http://support.microsoft.com/kb/3038002 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3038002: UHS-3 cards cannot be detected in Windows on Surface devices - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 303800205 Fixlet Link: http://support.microsoft.com/kb/3038002 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3038562: Cannot access DPAPI data after an administrator resets your password on a Windows Server 2012 R2-based domain controller - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 303856201 Fixlet Link: http://support.microsoft.com/kb/3038562 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3038562: Cannot access DPAPI data after an administrator resets your password on a Windows Server 2012 R2-based domain controller - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 303856203 Fixlet Link: http://support.microsoft.com/kb/3038562 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3038562: Cannot access DPAPI data after an administrator resets your password on a Windows Server 2012 R2-based domain controller - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 303856205 Fixlet Link: http://support.microsoft.com/kb/3038562 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3038701: Custom Media Size entries are missing in the Print Capabilities document for version 4.0 printer drivers - Windows Server 2012 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 303870101 Fixlet Link: http://support.microsoft.com/kb/3038701 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3038701: Custom Media Size entries are missing in the Print Capabilities document for version 4.0 printer drivers - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 303870103 Fixlet Link: http://support.microsoft.com/kb/3038701 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3038701: Custom Media Size entries are missing in the Print Capabilities document for version 4.0 printer drivers - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 303870105 Fixlet Link: http://support.microsoft.com/kb/3038701 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3038701: Custom Media Size entries are missing in the Print Capabilities document for version 4.0 printer drivers - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 303870107 Fixlet Link: http://support.microsoft.com/kb/3038701 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3038701: Custom Media Size entries are missing in the Print Capabilities document for version 4.0 printer drivers - Windows 8 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 303870109 Fixlet Link: http://support.microsoft.com/kb/3038701 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3038701: Custom Media Size entries are missing in the Print Capabilities document for version 4.0 printer drivers - Windows 8 Gold (Japanese) Severity: Unspecified Fixlet ID: 303870111 Fixlet Link: http://support.microsoft.com/kb/3038701 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3041857: "Code 0x80070057 The parameter is incorrect" error when you try to display a user's "effective access" to a file - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304185701 Fixlet Link: http://support.microsoft.com/kb/3041857 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3041857: "Code 0x80070057 The parameter is incorrect" error when you try to display a user's "effective access" to a file - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304185703 Fixlet Link: http://support.microsoft.com/kb/3041857 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3041857: "Code 0x80070057 The parameter is incorrect" error when you try to display a user's "effective access" to a file - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 304185705 Fixlet Link: http://support.microsoft.com/kb/3041857 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3043812: Layout of Cambria font is different in Word documents when the text metric changes in Windows 8.1 or Windows 8 - Windows Server 2012 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304381201 Fixlet Link: http://support.microsoft.com/kb/3043812 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3043812: Layout of Cambria font is different in Word documents when the text metric changes in Windows 8.1 or Windows 8 - Windows 8 Gold (Japanese) Severity: Unspecified Fixlet ID: 304381203 Fixlet Link: http://support.microsoft.com/kb/3043812 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3043812: Layout of Cambria font is different in Word documents when the text metric changes in Windows 8.1 or Windows 8 - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 304381205 Fixlet Link: http://support.microsoft.com/kb/3043812 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3043812: Layout of Cambria font is different in Word documents when the text metric changes in Windows 8.1 or Windows 8 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304381207 Fixlet Link: http://support.microsoft.com/kb/3043812 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3043812: Layout of Cambria font is different in Word documents when the text metric changes in Windows 8.1 or Windows 8 - Windows 8 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304381209 Fixlet Link: http://support.microsoft.com/kb/3043812 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3043812: Layout of Cambria font is different in Word documents when the text metric changes in Windows 8.1 or Windows 8 - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304381211 Fixlet Link: http://support.microsoft.com/kb/3043812 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3044673: Photos taken by certain Android devices show blank value in Date taken field in Windows Explorer - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 304467301 Fixlet Link: http://support.microsoft.com/kb/3044673 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3044673: Photos taken by certain Android devices show blank value in Date taken field in Windows Explorer - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304467303 Fixlet Link: http://support.microsoft.com/kb/3044673 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3044673: Photos taken by certain Android devices show blank value in Date taken field in Windows Explorer - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304467305 Fixlet Link: http://support.microsoft.com/kb/3044673 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3044673: Photos taken by certain Android devices show blank value in Date taken field in Windows Explorer - Windows 8 Gold (Japanese) Severity: Unspecified Fixlet ID: 304467307 Fixlet Link: http://support.microsoft.com/kb/3044673 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3044673: Photos taken by certain Android devices show blank value in Date taken field in Windows Explorer - Windows Server 2012 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304467309 Fixlet Link: http://support.microsoft.com/kb/3044673 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3044673: Photos taken by certain Android devices show blank value in Date taken field in Windows Explorer - Windows 8 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304467311 Fixlet Link: http://support.microsoft.com/kb/3044673 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3045634: You cannot make a PPP connection after you reconnect a PLC device in Windows 8.1 or Windows 8 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304563401 Fixlet Link: http://support.microsoft.com/kb/3045634 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3045634: You cannot make a PPP connection after you reconnect a PLC device in Windows 8.1 or Windows 8 - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304563403 Fixlet Link: http://support.microsoft.com/kb/3045634 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3045634: You cannot make a PPP connection after you reconnect a PLC device in Windows 8.1 or Windows 8 - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 304563405 Fixlet Link: http://support.microsoft.com/kb/3045634 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3045717: Narrator does not stop reading when you press Ctrl key in Windows - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 304571701 Fixlet Link: http://support.microsoft.com/kb/3045717 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3045717: Narrator does not stop reading when you press Ctrl key in Windows - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304571703 Fixlet Link: http://support.microsoft.com/kb/3045717 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3045717: Narrator does not stop reading when you press Ctrl key in Windows - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304571705 Fixlet Link: http://support.microsoft.com/kb/3045717 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3045746: Single string is drawn by multiple fonts in the TextBox control of Windows Store application in Windows - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304574601 Fixlet Link: http://support.microsoft.com/kb/3045746 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3045746: Single string is drawn by multiple fonts in the TextBox control of Windows Store application in Windows - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304574603 Fixlet Link: http://support.microsoft.com/kb/3045746 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3045746: Single string is drawn by multiple fonts in the TextBox control of Windows Store application in Windows - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 304574605 Fixlet Link: http://support.microsoft.com/kb/3045746 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3047254: Stop error 0x0000009F when you use the Bluetooth Hands-Free Audio and Call Control HID Enumerator driver in Windows 8.1 - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 304725401 Fixlet Link: http://support.microsoft.com/kb/3047254 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3047254: Stop error 0x0000009F when you use the Bluetooth Hands-Free Audio and Call Control HID Enumerator driver in Windows 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304725403 Fixlet Link: http://support.microsoft.com/kb/3047254 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3047255: "0x0000009F" Stop error when a Windows-based computer has two USB devices connected - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 304725501 Fixlet Link: http://support.microsoft.com/kb/3047255 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3047255: "0x0000009F" Stop error when a Windows-based computer has two USB devices connected - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304725503 Fixlet Link: http://support.microsoft.com/kb/3047255 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3047255: "0x0000009F" Stop error when a Windows-based computer has two USB devices connected - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304725505 Fixlet Link: http://support.microsoft.com/kb/3047255 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3048778: Update 3033889 causes Windows Explorer to stop responding on systems that use the Japanese, Korean, or Chinese IME - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 304877801 Fixlet Link: http://support.microsoft.com/kb/3048778 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3048778: Update 3033889 causes Windows Explorer to stop responding on systems that use the Japanese, Korean, or Chinese IME - Windows Server 2012 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304877803 Fixlet Link: http://support.microsoft.com/kb/3048778 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3048778: Update 3033889 causes Windows Explorer to stop responding on systems that use the Japanese, Korean, or Chinese IME - Windows 8 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304877805 Fixlet Link: http://support.microsoft.com/kb/3048778 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3048778: Update 3033889 causes Windows Explorer to stop responding on systems that use the Japanese, Korean, or Chinese IME - Windows 8 Gold (Japanese) Severity: Unspecified Fixlet ID: 304877807 Fixlet Link: http://support.microsoft.com/kb/3048778 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3048778: Update 3033889 causes Windows Explorer to stop responding on systems that use the Japanese, Korean, or Chinese IME - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304877809 Fixlet Link: http://support.microsoft.com/kb/3048778 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3048778: Update 3033889 causes Windows Explorer to stop responding on systems that use the Japanese, Korean, or Chinese IME - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304877811 Fixlet Link: http://support.microsoft.com/kb/3048778 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3049989: HKSCS characters are displayed incorrectly by PDF APIs in Windows - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304998901 Fixlet Link: http://support.microsoft.com/kb/3049989 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3049989: HKSCS characters are displayed incorrectly by PDF APIs in Windows - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 304998903 Fixlet Link: http://support.microsoft.com/kb/3049989 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3049989: HKSCS characters are displayed incorrectly by PDF APIs in Windows - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 304998905 Fixlet Link: http://support.microsoft.com/kb/3049989 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3053863: Windows 8.1 can't discover Samsung TV as wireless display device - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 305386301 Fixlet Link: http://support.microsoft.com/kb/3053863 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3053863: Windows 8.1 can't discover Samsung TV as wireless display device - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 305386303 Fixlet Link: http://support.microsoft.com/kb/3053863 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3053863: Windows 8.1 can't discover Samsung TV as wireless display device - Windows 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 305386305 Fixlet Link: http://support.microsoft.com/kb/3053863 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054883: Update for Outlook 2010 Junk Email Filter - KB3054883 - Outlook 2010 (Japanese) Severity: Unspecified Fixlet ID: 305488301 Fixlet Link: http://support.microsoft.com/kb/305488 Fixlet Description: This update provides the latest junk email and malicious links filter definitions for Microsoft Office 2013 32-Bit Edition. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3054883: Update for Outlook 2010 Junk Email Filter - KB3054883 - Outlook 2010 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305488303 Fixlet Link: http://support.microsoft.com/kb/3054883 Fixlet Description: This update provides the latest junk email and malicious links filter definitions for Microsoft Office 2013 64-Bit Edition. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3060793: "0x0000001E" or "0x00000133" Stop error when you transfer data through a USB-based RNDIS device on Windows - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 306079301 Fixlet Link: http://support.microsoft.com/kb/3060793 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3060793: "0x0000001E" or "0x00000133" Stop error when you transfer data through a USB-based RNDIS device on Windows - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 306079303 Fixlet Link: http://support.microsoft.com/kb/3060793 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3060793: "0x0000001E" or "0x00000133" Stop error when you transfer data through a USB-based RNDIS device on Windows - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 306079305 Fixlet Link: http://support.microsoft.com/kb/3060793 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3065823: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 306582313 Fixlet Link: http://support.microsoft.com/kb/3065823 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3065823: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 306582315 Fixlet Link: http://support.microsoft.com/kb/3065823 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3065823: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 306582317 Fixlet Link: http://support.microsoft.com/kb/3065823 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3065823: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 306582319 Fixlet Link: http://support.microsoft.com/kb/3065823 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3065823: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8 Gold (Japanese) Severity: Unspecified Fixlet ID: 306582321 Fixlet Link: http://support.microsoft.com/kb/3065823 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3065823: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows Server 2012 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 306582323 Fixlet Link: http://support.microsoft.com/kb/3065823 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. From autonotify at us.ibm.com Thu Jul 16 02:35:25 2015 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Thu, 16 Jul 2015 02:35:25 -0700 Subject: [BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)' Message-ID: <201507160935.t6G9ZPXM008670@d01av04.pok.ibm.com> Fixlet Site - 'Patches for Windows (Japanese)' Current Version: 667 Published: Thu, 16 Jul 2015 08:29:50 GMT New Fixlets: ============ *************************************************************** Title: MS15-058: Vulnerabilities in SQL Server Could Allow Remote Code Execution - SQL Server 2012 SP2 - QFE Branch - KB3045319 (Japanese) Severity: Important Fixlet ID: 1505801 Fixlet Link: http://technet.microsoft.com/library/security/MS15-058 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially crafted query that is designed to execute a virtual function from a wrong address, leading to a function call to uninitialized memory. To exploit this vulnerability an attacker would need permissions to create or modify a database. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-058: Vulnerabilities in SQL Server Could Allow Remote Code Execution - SQL Server 2008 SP3 - QFE Branch - KB3045303 (Japanese) Severity: Important Fixlet ID: 1505803 Fixlet Link: http://technet.microsoft.com/library/security/MS15-058 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially crafted query that is designed to execute a virtual function from a wrong address, leading to a function call to uninitialized memory. To exploit this vulnerability an attacker would need permissions to create or modify a database. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-058: Vulnerabilities in SQL Server Could Allow Remote Code Execution - SQL Server 2014 - QFE Branch - KB3045323 (Japanese) Severity: Important Fixlet ID: 1505805 Fixlet Link: http://technet.microsoft.com/library/security/MS15-058 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially crafted query that is designed to execute a virtual function from a wrong address, leading to a function call to uninitialized memory. To exploit this vulnerability an attacker would need permissions to create or modify a database. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-058: Vulnerabilities in SQL Server Could Allow Remote Code Execution - SQL Server 2008 R2 SP3 - QFE Branch - KB3045314 (x64) (Japanese) Severity: Important Fixlet ID: 1505807 Fixlet Link: http://technet.microsoft.com/library/security/MS15-058 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially crafted query that is designed to execute a virtual function from a wrong address, leading to a function call to uninitialized memory. To exploit this vulnerability an attacker would need permissions to create or modify a database. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-058: Vulnerabilities in SQL Server Could Allow Remote Code Execution - SQL Server 2008 R2 SP2 - GDR Branch - KB3045313 (Japanese) Severity: Important Fixlet ID: 1505809 Fixlet Link: http://technet.microsoft.com/library/security/MS15-058 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially crafted query that is designed to execute a virtual function from a wrong address, leading to a function call to uninitialized memory. To exploit this vulnerability an attacker would need permissions to create or modify a database. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-058: Vulnerabilities in SQL Server Could Allow Remote Code Execution - SQL Server 2008 SP4 - QFE Branch - KB3045308 (x64) (Japanese) Severity: Important Fixlet ID: 1505811 Fixlet Link: http://technet.microsoft.com/library/security/MS15-058 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially crafted query that is designed to execute a virtual function from a wrong address, leading to a function call to uninitialized memory. To exploit this vulnerability an attacker would need permissions to create or modify a database. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-058: Vulnerabilities in SQL Server Could Allow Remote Code Execution - SQL Server 2012 SP1 - GDR Branch - KB3045318 (Japanese) Severity: Important Fixlet ID: 1505813 Fixlet Link: http://technet.microsoft.com/library/security/MS15-058 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially crafted query that is designed to execute a virtual function from a wrong address, leading to a function call to uninitialized memory. To exploit this vulnerability an attacker would need permissions to create or modify a database. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-058: Vulnerabilities in SQL Server Could Allow Remote Code Execution - SQL Server 2008 R2 SP3 - QFE Branch - KB3045314 (Japanese) Severity: Important Fixlet ID: 1505815 Fixlet Link: http://technet.microsoft.com/library/security/MS15-058 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially crafted query that is designed to execute a virtual function from a wrong address, leading to a function call to uninitialized memory. To exploit this vulnerability an attacker would need permissions to create or modify a database. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-058: Vulnerabilities in SQL Server Could Allow Remote Code Execution - SQL Server 2014 - GDR Branch - KB3045324 (x64) (Japanese) Severity: Important Fixlet ID: 1505817 Fixlet Link: http://technet.microsoft.com/library/security/MS15-058 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially crafted query that is designed to execute a virtual function from a wrong address, leading to a function call to uninitialized memory. To exploit this vulnerability an attacker would need permissions to create or modify a database. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-058: Vulnerabilities in SQL Server Could Allow Remote Code Execution - SQL Server 2014 - GDR Branch - KB3045324 (Japanese) Severity: Important Fixlet ID: 1505819 Fixlet Link: http://technet.microsoft.com/library/security/MS15-058 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially crafted query that is designed to execute a virtual function from a wrong address, leading to a function call to uninitialized memory. To exploit this vulnerability an attacker would need permissions to create or modify a database. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-058: Vulnerabilities in SQL Server Could Allow Remote Code Execution - SQL Server 2008 R2 SP2 - GDR Branch - KB3045313 (x64) (Japanese) Severity: Important Fixlet ID: 1505821 Fixlet Link: http://technet.microsoft.com/library/security/MS15-058 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially crafted query that is designed to execute a virtual function from a wrong address, leading to a function call to uninitialized memory. To exploit this vulnerability an attacker would need permissions to create or modify a database. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-058: Vulnerabilities in SQL Server Could Allow Remote Code Execution - SQL Server 2008 SP4 - GDR Branch - KB3045311 (Japanese) Severity: Important Fixlet ID: 1505823 Fixlet Link: http://technet.microsoft.com/library/security/MS15-058 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially crafted query that is designed to execute a virtual function from a wrong address, leading to a function call to uninitialized memory. To exploit this vulnerability an attacker would need permissions to create or modify a database. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-058: Vulnerabilities in SQL Server Could Allow Remote Code Execution - SQL Server 2008 SP3 - GDR Branch - KB3045305 (x64) (Japanese) Severity: Important Fixlet ID: 1505825 Fixlet Link: http://technet.microsoft.com/library/security/MS15-058 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially crafted query that is designed to execute a virtual function from a wrong address, leading to a function call to uninitialized memory. To exploit this vulnerability an attacker would need permissions to create or modify a database. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-058: Vulnerabilities in SQL Server Could Allow Remote Code Execution - SQL Server 2008 SP4 - QFE Branch - KB3045308 (Japanese) Severity: Important Fixlet ID: 1505827 Fixlet Link: http://technet.microsoft.com/library/security/MS15-058 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially crafted query that is designed to execute a virtual function from a wrong address, leading to a function call to uninitialized memory. To exploit this vulnerability an attacker would need permissions to create or modify a database. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-058: Vulnerabilities in SQL Server Could Allow Remote Code Execution - SQL Server 2008 SP3 - GDR Branch - KB3045305 (Japanese) Severity: Important Fixlet ID: 1505829 Fixlet Link: http://technet.microsoft.com/library/security/MS15-058 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially crafted query that is designed to execute a virtual function from a wrong address, leading to a function call to uninitialized memory. To exploit this vulnerability an attacker would need permissions to create or modify a database. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-058: Vulnerabilities in SQL Server Could Allow Remote Code Execution - SQL Server 2008 R2 SP2 - QFE Branch - KB3045312 (Japanese) Severity: Important Fixlet ID: 1505831 Fixlet Link: http://technet.microsoft.com/library/security/MS15-058 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially crafted query that is designed to execute a virtual function from a wrong address, leading to a function call to uninitialized memory. To exploit this vulnerability an attacker would need permissions to create or modify a database. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-058: Vulnerabilities in SQL Server Could Allow Remote Code Execution - SQL Server 2012 SP1 - GDR Branch - KB3045318 (x64) (Japanese) Severity: Important Fixlet ID: 1505833 Fixlet Link: http://technet.microsoft.com/library/security/MS15-058 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially crafted query that is designed to execute a virtual function from a wrong address, leading to a function call to uninitialized memory. To exploit this vulnerability an attacker would need permissions to create or modify a database. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-058: Vulnerabilities in SQL Server Could Allow Remote Code Execution - SQL Server 2008 SP3 - QFE Branch - KB3045303 (x64) (Japanese) Severity: Important Fixlet ID: 1505835 Fixlet Link: http://technet.microsoft.com/library/security/MS15-058 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially crafted query that is designed to execute a virtual function from a wrong address, leading to a function call to uninitialized memory. To exploit this vulnerability an attacker would need permissions to create or modify a database. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-058: Vulnerabilities in SQL Server Could Allow Remote Code Execution - SQL Server 2008 SP4 - GDR Branch - KB3045311 (x64) (Japanese) Severity: Important Fixlet ID: 1505837 Fixlet Link: http://technet.microsoft.com/library/security/MS15-058 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially crafted query that is designed to execute a virtual function from a wrong address, leading to a function call to uninitialized memory. To exploit this vulnerability an attacker would need permissions to create or modify a database. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-058: Vulnerabilities in SQL Server Could Allow Remote Code Execution - SQL Server 2008 R2 SP3 - GDR Branch - KB3045316 (x64) (Japanese) Severity: Important Fixlet ID: 1505839 Fixlet Link: http://technet.microsoft.com/library/security/MS15-058 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially crafted query that is designed to execute a virtual function from a wrong address, leading to a function call to uninitialized memory. To exploit this vulnerability an attacker would need permissions to create or modify a database. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-058: Vulnerabilities in SQL Server Could Allow Remote Code Execution - SQL Server 2012 SP2 - QFE Branch - KB3045319 (x64) (Japanese) Severity: Important Fixlet ID: 1505841 Fixlet Link: http://technet.microsoft.com/library/security/MS15-058 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially crafted query that is designed to execute a virtual function from a wrong address, leading to a function call to uninitialized memory. To exploit this vulnerability an attacker would need permissions to create or modify a database. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-058: Vulnerabilities in SQL Server Could Allow Remote Code Execution - SQL Server 2012 SP1 - QFE Branch - KB3045317 (Japanese) Severity: Important Fixlet ID: 1505843 Fixlet Link: http://technet.microsoft.com/library/security/MS15-058 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially crafted query that is designed to execute a virtual function from a wrong address, leading to a function call to uninitialized memory. To exploit this vulnerability an attacker would need permissions to create or modify a database. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-058: Vulnerabilities in SQL Server Could Allow Remote Code Execution - SQL Server 2014 - QFE Branch - KB3045323 (x64) (Japanese) Severity: Important Fixlet ID: 1505845 Fixlet Link: http://technet.microsoft.com/library/security/MS15-058 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially crafted query that is designed to execute a virtual function from a wrong address, leading to a function call to uninitialized memory. To exploit this vulnerability an attacker would need permissions to create or modify a database. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-058: Vulnerabilities in SQL Server Could Allow Remote Code Execution - SQL Server 2012 SP2 - GDR Branch - KB3045321 (x64) (Japanese) Severity: Important Fixlet ID: 1505847 Fixlet Link: http://technet.microsoft.com/library/security/MS15-058 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially crafted query that is designed to execute a virtual function from a wrong address, leading to a function call to uninitialized memory. To exploit this vulnerability an attacker would need permissions to create or modify a database. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-058: Vulnerabilities in SQL Server Could Allow Remote Code Execution - SQL Server 2008 R2 SP3 - GDR Branch - KB3045316 (Japanese) Severity: Important Fixlet ID: 1505849 Fixlet Link: http://technet.microsoft.com/library/security/MS15-058 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially crafted query that is designed to execute a virtual function from a wrong address, leading to a function call to uninitialized memory. To exploit this vulnerability an attacker would need permissions to create or modify a database. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-058: Vulnerabilities in SQL Server Could Allow Remote Code Execution - SQL Server 2012 SP1 - QFE Branch - KB3045317 (x64) (Japanese) Severity: Important Fixlet ID: 1505851 Fixlet Link: http://technet.microsoft.com/library/security/MS15-058 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially crafted query that is designed to execute a virtual function from a wrong address, leading to a function call to uninitialized memory. To exploit this vulnerability an attacker would need permissions to create or modify a database. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-058: Vulnerabilities in SQL Server Could Allow Remote Code Execution - SQL Server 2012 SP2 - GDR Branch - KB3045321 (Japanese) Severity: Important Fixlet ID: 1505853 Fixlet Link: http://technet.microsoft.com/library/security/MS15-058 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially crafted query that is designed to execute a virtual function from a wrong address, leading to a function call to uninitialized memory. To exploit this vulnerability an attacker would need permissions to create or modify a database. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-058: Vulnerabilities in SQL Server Could Allow Remote Code Execution - SQL Server 2008 R2 SP2 - QFE Branch - KB3045312 (x64) (Japanese) Severity: Important Fixlet ID: 1505855 Fixlet Link: http://technet.microsoft.com/library/security/MS15-058 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially crafted query that is designed to execute a virtual function from a wrong address, leading to a function call to uninitialized memory. To exploit this vulnerability an attacker would need permissions to create or modify a database. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows 7 SP1 - IE 11 - KB3065822 (x64) (Japanese) Severity: Critical Fixlet ID: 1506501 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Vista SP2 - IE 7 - KB3065822 (Japanese) Severity: Critical Fixlet ID: 1506503 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Vista SP2 - IE 9 - KB3065822 (Japanese) Severity: Critical Fixlet ID: 1506505 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows 8 Gold - IE 10 - KB3065822 (Japanese) Severity: Critical Fixlet ID: 1506507 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 8 - KB3065822 (x64) (Japanese) Severity: Moderate Fixlet ID: 1506509 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows 7 SP1 - IE 9 - KB3065822 (x64) (Japanese) Severity: Critical Fixlet ID: 1506511 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 6 - KB3065822 (x64) (Japanese) Severity: Moderate Fixlet ID: 1506513 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 6 - KB3065822 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1506514 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2012 R2 Gold - IE 11 - KB3065822 (x64) (Japanese) Severity: Moderate Fixlet ID: 1506515 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows 8 Gold - IE 10 - KB3065822 (x64) (Japanese) Severity: Critical Fixlet ID: 1506517 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 7 - KB3065822 (x64) (Japanese) Severity: Moderate Fixlet ID: 1506519 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 7 - KB3065822 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1506520 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows 7 SP1 - IE 8 - KB3065822 (x64) (Japanese) Severity: Critical Fixlet ID: 1506521 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Vista SP2 - IE 9 - KB3065822 (x64) (Japanese) Severity: Critical Fixlet ID: 1506523 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 7 - KB3065822 (x64) (Japanese) Severity: Moderate Fixlet ID: 1506525 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows 8.1 Gold - IE 11 - KB3065822 (x64) (Japanese) Severity: Critical Fixlet ID: 1506527 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 6 - KB3065822 (Japanese) Severity: Moderate Fixlet ID: 1506529 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 6 - KB3065822 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1506530 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2012 Gold - IE 10 - KB3065822 (x64) (Japanese) Severity: Moderate Fixlet ID: 1506531 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 8 - KB3065822 (x64) (Japanese) Severity: Moderate Fixlet ID: 1506533 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows 7 SP1 - IE 10 - KB3065822 (x64) (Japanese) Severity: Critical Fixlet ID: 1506535 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Vista SP2 - IE 7 - KB3065822 (x64) (Japanese) Severity: Critical Fixlet ID: 1506537 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 9 - KB3065822 (x64) (Japanese) Severity: Moderate Fixlet ID: 1506539 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows 7 SP1 - IE 9 - KB3065822 (Japanese) Severity: Critical Fixlet ID: 1506541 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Vista SP2 - IE 8 - KB3065822 (x64) (Japanese) Severity: Critical Fixlet ID: 1506543 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 8 - KB3065822 (Japanese) Severity: Moderate Fixlet ID: 1506545 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 8 - KB3065822 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1506546 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 7 - KB3065822 (Japanese) Severity: Moderate Fixlet ID: 1506547 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 7 - KB3065822 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1506548 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 7 - KB3065822 (Japanese) Severity: Moderate Fixlet ID: 1506549 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Vista SP2 - IE 8 - KB3065822 (Japanese) Severity: Critical Fixlet ID: 1506551 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows 7 SP1 - IE 11 - KB3065822 (Japanese) Severity: Critical Fixlet ID: 1506553 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows 8.1 Gold - IE 11 - KB3065822 (Japanese) Severity: Critical Fixlet ID: 1506555 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows 7 SP1 - IE 10 - KB3065822 (Japanese) Severity: Critical Fixlet ID: 1506557 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 8 - KB3065822 (Japanese) Severity: Moderate Fixlet ID: 1506559 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 8 - KB3065822 (x64) (Japanese) Severity: Moderate Fixlet ID: 1506561 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 8 - KB3065822 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1506562 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 9 - KB3065822 (x64) (Japanese) Severity: Moderate Fixlet ID: 1506563 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 9 - KB3065822 (Japanese) Severity: Moderate Fixlet ID: 1506565 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 10 - KB3065822 (x64) (Japanese) Severity: Moderate Fixlet ID: 1506567 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows 7 SP1 - IE 8 - KB3065822 (Japanese) Severity: Critical Fixlet ID: 1506569 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 11 - KB3065822 (x64) (Japanese) Severity: Moderate Fixlet ID: 1506571 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Vista SP2 - IE 7 - KB3074886 (Japanese) Severity: Critical Fixlet ID: 1506573 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Vista SP2 - IE 9 - KB3074886 (Japanese) Severity: Critical Fixlet ID: 1506575 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows 8 Gold - IE 10 - KB3074886 (Japanese) Severity: Critical Fixlet ID: 1506577 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows 8 Gold - IE 10 - KB3075516 (Japanese) Severity: Critical Fixlet ID: 1506579 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows 7 SP1 - IE 9 - KB3074886 (Japanese) Severity: Critical Fixlet ID: 1506581 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 8 - KB3074886 (Japanese) Severity: Moderate Fixlet ID: 1506583 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 8 - KB3074886 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1506584 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 7 - KB3074886 (Japanese) Severity: Moderate Fixlet ID: 1506585 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 7 - KB3074886 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1506586 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 7 - KB3074886 (Japanese) Severity: Moderate Fixlet ID: 1506587 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Vista SP2 - IE 8 - KB3074886 (Japanese) Severity: Critical Fixlet ID: 1506589 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows 7 SP1 - IE 11 - KB3074886 (Japanese) Severity: Critical Fixlet ID: 1506591 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows 7 SP1 - IE 11 - KB3075516 (Japanese) Severity: Critical Fixlet ID: 1506593 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows 8.1 Gold - IE 11 - KB3074886 (Japanese) Severity: Critical Fixlet ID: 1506595 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows 8.1 Gold - IE 11 - KB3075516 (Japanese) Severity: Critical Fixlet ID: 1506597 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows 7 SP1 - IE 10 - KB3074886 (Japanese) Severity: Critical Fixlet ID: 1506599 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-066: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - Windows Server 2003 SP2 - VBScript 5.6 - KB3068404 (x64) (Japanese) Severity: Critical Fixlet ID: 1506601 Fixlet Link: http://technet.microsoft.com/library/security/MS15-066 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visits a specially crafted website. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-066: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - Windows Server 2003 SP2 - VBScript 5.6 - KB3068404 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 1506602 Fixlet Link: http://technet.microsoft.com/library/security/MS15-066 *************************************************************** Title: MS15-066: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - Windows Vista SP2 - VBScript 5.7 - KB3068368 (x64) (Japanese) Severity: Critical Fixlet ID: 1506603 Fixlet Link: http://technet.microsoft.com/library/security/MS15-066 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visits a specially crafted website. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-066: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - Windows Server 2003 SP2 - VBScript 5.7 - KB3068368 (x64) (Japanese) Severity: Critical Fixlet ID: 1506605 Fixlet Link: http://technet.microsoft.com/library/security/MS15-066 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visits a specially crafted website. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-066: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - Windows Server 2003 SP2 - VBScript 5.7 - KB3068368 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 1506606 Fixlet Link: http://technet.microsoft.com/library/security/MS15-066 *************************************************************** Title: MS15-066: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - Windows Server 2008 SP2 - VBScript 5.7 - KB3068368 (Japanese) Severity: Critical Fixlet ID: 1506607 Fixlet Link: http://technet.microsoft.com/library/security/MS15-066 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visits a specially crafted website. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-066: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - Windows Server 2003 SP2 - VBScript 5.7 - KB3068368 (Japanese) Severity: Critical Fixlet ID: 1506609 Fixlet Link: http://technet.microsoft.com/library/security/MS15-066 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visits a specially crafted website. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-066: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - Windows Server 2003 SP2 - VBScript 5.7 - KB3068368 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 1506610 Fixlet Link: http://technet.microsoft.com/library/security/MS15-066 *************************************************************** Title: MS15-066: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - VBScript 5.8 - KB3068364 (x64) (Japanese) Severity: Unspecified Fixlet ID: 1506611 Fixlet Link: http://technet.microsoft.com/library/security/MS15-066 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visits a specially crafted website. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-066: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - Windows Server 2003 SP2 - VBScript 5.6 - KB3068404 (Japanese) Severity: Critical Fixlet ID: 1506613 Fixlet Link: http://technet.microsoft.com/library/security/MS15-066 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visits a specially crafted website. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-066: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - Windows Server 2003 SP2 - VBScript 5.6 - KB3068404 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 1506614 Fixlet Link: http://technet.microsoft.com/library/security/MS15-066 *************************************************************** Title: MS15-066: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - Windows Server 2008 SP2 - VBScript 5.7 - KB3068368 (x64) (Japanese) Severity: Critical Fixlet ID: 1506615 Fixlet Link: http://technet.microsoft.com/library/security/MS15-066 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visits a specially crafted website. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-066: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - Windows Vista SP2 - VBScript 5.7 - KB3068368 (Japanese) Severity: Critical Fixlet ID: 1506617 Fixlet Link: http://technet.microsoft.com/library/security/MS15-066 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visits a specially crafted website. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-067: Vulnerability in RDP Could Allow Remote Code Execution - Windows Server 2012 Gold - KB3067904 (x64) (Japanese) Severity: Critical Fixlet ID: 1506701 Fixlet Link: http://technet.microsoft.com/library/security/MS15-067 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sends a specially crafted sequence of packets to a targeted system with the Remote Desktop Protocol (RDP) server service enabled. By default, the RDP server service is not enabled on any Windows operating system. Systems that do not have the RDP server service enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-067: Vulnerability in RDP Could Allow Remote Code Execution - Windows 7 SP1 - KB3069762 (Japanese) Severity: Critical Fixlet ID: 1506703 Fixlet Link: http://technet.microsoft.com/library/security/MS15-067 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sends a specially crafted sequence of packets to a targeted system with the Remote Desktop Protocol (RDP) server service enabled. By default, the RDP server service is not enabled on any Windows operating system. Systems that do not have the RDP server service enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-067: Vulnerability in RDP Could Allow Remote Code Execution - Windows 8 Gold - KB3067904 (Japanese) Severity: Critical Fixlet ID: 1506705 Fixlet Link: http://technet.microsoft.com/library/security/MS15-067 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sends a specially crafted sequence of packets to a targeted system with the Remote Desktop Protocol (RDP) server service enabled. By default, the RDP server service is not enabled on any Windows operating system. Systems that do not have the RDP server service enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-067: Vulnerability in RDP Could Allow Remote Code Execution - Windows 7 SP1 - KB3067904 (x64) (Japanese) Severity: Critical Fixlet ID: 1506707 Fixlet Link: http://technet.microsoft.com/library/security/MS15-067 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sends a specially crafted sequence of packets to a targeted system with the Remote Desktop Protocol (RDP) server service enabled. By default, the RDP server service is not enabled on any Windows operating system. Systems that do not have the RDP server service enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-067: Vulnerability in RDP Could Allow Remote Code Execution - Windows 7 SP1 - KB3067904 (Japanese) Severity: Critical Fixlet ID: 1506709 Fixlet Link: http://technet.microsoft.com/library/security/MS15-067 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sends a specially crafted sequence of packets to a targeted system with the Remote Desktop Protocol (RDP) server service enabled. By default, the RDP server service is not enabled on any Windows operating system. Systems that do not have the RDP server service enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-067: Vulnerability in RDP Could Allow Remote Code Execution - Windows 8 Gold - KB3067904 (x64) (Japanese) Severity: Critical Fixlet ID: 1506711 Fixlet Link: http://technet.microsoft.com/library/security/MS15-067 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sends a specially crafted sequence of packets to a targeted system with the Remote Desktop Protocol (RDP) server service enabled. By default, the RDP server service is not enabled on any Windows operating system. Systems that do not have the RDP server service enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-067: Vulnerability in RDP Could Allow Remote Code Execution - Windows 7 SP1 - KB3069762 (x64) (Japanese) Severity: Critical Fixlet ID: 1506713 Fixlet Link: http://technet.microsoft.com/library/security/MS15-067 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sends a specially crafted sequence of packets to a targeted system with the Remote Desktop Protocol (RDP) server service enabled. By default, the RDP server service is not enabled on any Windows operating system. Systems that do not have the RDP server service enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-068: Vulnerabilities in Windows Hyper-V Could Allow Remote Code Execution - Windows Server 2012 Gold - KB3046339 (x64) (Japanese) Severity: Critical Fixlet ID: 1506801 Fixlet Link: http://technet.microsoft.com/library/security/MS15-068 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution in a host context if a specially crafted application is run by an authenticated and privileged user on a guest virtual machine hosted by Hyper-V. An attacker must have valid logon credentials for a guest virtual machine to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-068: Vulnerabilities in Windows Hyper-V Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3046339 (x64) (Japanese) Severity: Critical Fixlet ID: 1506803 Fixlet Link: http://technet.microsoft.com/library/security/MS15-068 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution in a host context if a specially crafted application is run by an authenticated and privileged user on a guest virtual machine hosted by Hyper-V. An attacker must have valid logon credentials for a guest virtual machine to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-068: Vulnerabilities in Windows Hyper-V Could Allow Remote Code Execution - Windows Server 2012 R2 Gold - KB3046339 (x64) (Japanese) Severity: Critical Fixlet ID: 1506805 Fixlet Link: http://technet.microsoft.com/library/security/MS15-068 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution in a host context if a specially crafted application is run by an authenticated and privileged user on a guest virtual machine hosted by Hyper-V. An attacker must have valid logon credentials for a guest virtual machine to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-068: Vulnerabilities in Windows Hyper-V Could Allow Remote Code Execution - Windows 8.1 Gold - KB3046339 (x64) (Japanese) Severity: Critical Fixlet ID: 1506807 Fixlet Link: http://technet.microsoft.com/library/security/MS15-068 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution in a host context if a specially crafted application is run by an authenticated and privileged user on a guest virtual machine hosted by Hyper-V. An attacker must have valid logon credentials for a guest virtual machine to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-068: Vulnerabilities in Windows Hyper-V Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB3046339 (x64) (Japanese) Severity: Critical Fixlet ID: 1506809 Fixlet Link: http://technet.microsoft.com/library/security/MS15-068 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution in a host context if a specially crafted application is run by an authenticated and privileged user on a guest virtual machine hosted by Hyper-V. An attacker must have valid logon credentials for a guest virtual machine to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-068: Vulnerabilities in Windows Hyper-V Could Allow Remote Code Execution - Windows 8 Gold - KB3046339 (x64) (Japanese) Severity: Critical Fixlet ID: 1506811 Fixlet Link: http://technet.microsoft.com/library/security/MS15-068 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution in a host context if a specially crafted application is run by an authenticated and privileged user on a guest virtual machine hosted by Hyper-V. An attacker must have valid logon credentials for a guest virtual machine to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-068: Vulnerabilities in Windows Hyper-V Could Allow Remote Code Execution - Windows 8.1 Gold - KB3046359 (x64) (Japanese) Severity: Critical Fixlet ID: 1506813 Fixlet Link: http://technet.microsoft.com/library/security/MS15-068 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution in a host context if a specially crafted application is run by an authenticated and privileged user on a guest virtual machine hosted by Hyper-V. An attacker must have valid logon credentials for a guest virtual machine to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-068: Vulnerabilities in Windows Hyper-V Could Allow Remote Code Execution - Windows Server 2012 R2 Gold - KB3046359 (x64) (Japanese) Severity: Critical Fixlet ID: 1506815 Fixlet Link: http://technet.microsoft.com/library/security/MS15-068 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution in a host context if a specially crafted application is run by an authenticated and privileged user on a guest virtual machine hosted by Hyper-V. An attacker must have valid logon credentials for a guest virtual machine to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-069: Vulnerabilities in Windows Could Allow Remote Code Execution - Windows 7 SP1 - KB3070738 (Japanese) Severity: Important Fixlet ID: 1506901 Fixlet Link: http://technet.microsoft.com/library/security/MS15-069 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow Remote Code Execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open an RTF file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-069: Vulnerabilities in Windows Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3067903 (Japanese) Severity: Important Fixlet ID: 1506903 Fixlet Link: http://technet.microsoft.com/library/security/MS15-069 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow Remote Code Execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open an RTF file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-069: Vulnerabilities in Windows Could Allow Remote Code Execution - Windows Server 2012 R2 Gold - KB3061512 (x64) (Japanese) Severity: Important Fixlet ID: 1506905 Fixlet Link: http://technet.microsoft.com/library/security/MS15-069 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow Remote Code Execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open an RTF file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-069: Vulnerabilities in Windows Could Allow Remote Code Execution - Windows 8.1 Gold - KB3061512 (x64) (Japanese) Severity: Important Fixlet ID: 1506907 Fixlet Link: http://technet.microsoft.com/library/security/MS15-069 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow Remote Code Execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open an RTF file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-069: Vulnerabilities in Windows Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB3070738 (x64) (Japanese) Severity: Important Fixlet ID: 1506909 Fixlet Link: http://technet.microsoft.com/library/security/MS15-069 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow Remote Code Execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open an RTF file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-069: Vulnerabilities in Windows Could Allow Remote Code Execution - Windows 7 SP1 - KB3067903 (Japanese) Severity: Important Fixlet ID: 1506911 Fixlet Link: http://technet.microsoft.com/library/security/MS15-069 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow Remote Code Execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open an RTF file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-069: Vulnerabilities in Windows Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3067903 (x64) (Japanese) Severity: Important Fixlet ID: 1506913 Fixlet Link: http://technet.microsoft.com/library/security/MS15-069 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow Remote Code Execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open an RTF file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-069: Vulnerabilities in Windows Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3067903 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1506914 Fixlet Link: http://technet.microsoft.com/library/security/MS15-069 *************************************************************** Title: MS15-069: Vulnerabilities in Windows Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB3067903 (x64) (Japanese) Severity: Important Fixlet ID: 1506915 Fixlet Link: http://technet.microsoft.com/library/security/MS15-069 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow Remote Code Execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open an RTF file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-069: Vulnerabilities in Windows Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3067903 (x64) (Japanese) Severity: Important Fixlet ID: 1506917 Fixlet Link: http://technet.microsoft.com/library/security/MS15-069 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow Remote Code Execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open an RTF file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-069: Vulnerabilities in Windows Could Allow Remote Code Execution - Windows 8.1 Gold - KB3061512 (Japanese) Severity: Important Fixlet ID: 1506919 Fixlet Link: http://technet.microsoft.com/library/security/MS15-069 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow Remote Code Execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open an RTF file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-069: Vulnerabilities in Windows Could Allow Remote Code Execution - Windows Vista SP2 - KB3067903 (x64) (Japanese) Severity: Important Fixlet ID: 1506921 Fixlet Link: http://technet.microsoft.com/library/security/MS15-069 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow Remote Code Execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open an RTF file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-069: Vulnerabilities in Windows Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3067903 (Japanese) Severity: Important Fixlet ID: 1506923 Fixlet Link: http://technet.microsoft.com/library/security/MS15-069 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow Remote Code Execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open an RTF file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-069: Vulnerabilities in Windows Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3067903 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1506924 Fixlet Link: http://technet.microsoft.com/library/security/MS15-069 *************************************************************** Title: MS15-069: Vulnerabilities in Windows Could Allow Remote Code Execution - Windows Vista SP2 - KB3067903 (Japanese) Severity: Important Fixlet ID: 1506925 Fixlet Link: http://technet.microsoft.com/library/security/MS15-069 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow Remote Code Execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open an RTF file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-069: Vulnerabilities in Windows Could Allow Remote Code Execution - Windows 7 SP1 - KB3070738 (x64) (Japanese) Severity: Important Fixlet ID: 1506927 Fixlet Link: http://technet.microsoft.com/library/security/MS15-069 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow Remote Code Execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open an RTF file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-069: Vulnerabilities in Windows Could Allow Remote Code Execution - Windows 7 SP1 - KB3067903 (x64) (Japanese) Severity: Important Fixlet ID: 1506929 Fixlet Link: http://technet.microsoft.com/library/security/MS15-069 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow Remote Code Execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user?s current working directory and then convinces the user to open an RTF file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker?s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-069: Vulnerabilities in Windows Could Allow Remote Code Execution - Windows Server 2003 SP2 - Windows Media Format SDK 11 - KB3067903 (Japanese) Severity: Important Fixlet ID: 1506931 Fixlet Link: http://support.microsoft.com/kb/3067903 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-069: Vulnerabilities in Windows Could Allow Remote Code Execution - Windows Server 2003 SP2 - Windows Media Format SDK 11 - KB3067903 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1506932 Fixlet Link: http://support.microsoft.com/kb/3067903 *************************************************************** Title: MS15-069: Vulnerabilities in Windows Could Allow Remote Code Execution - Windows Server 2003 SP2 - Windows Media Format SDK 11 - KB3067903 (x64) (Japanese) Severity: Important Fixlet ID: 1506933 Fixlet Link: http://support.microsoft.com/kb/3067903 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-069: Vulnerabilities in Windows Could Allow Remote Code Execution - Windows Server 2003 SP2 - Windows Media Format SDK 11 - KB3067903 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1506934 Fixlet Link: http://support.microsoft.com/kb/3067903 *************************************************************** Title: MS15-070: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - PowerPoint 2010 SP2 - KB3054963 (Japanese) Severity: Important Fixlet ID: 1507003 Fixlet Link: http://technet.microsoft.com/library/security/MS15-070 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-070: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2013 SP1 - Excel 2013 SP1 - KB3054949 (Japanese) Severity: Important Fixlet ID: 1507005 Fixlet Link: http://technet.microsoft.com/library/security/MS15-070 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-070: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - SharePoint Server 2010 SP2 - Excel Services - KB3054968 (x64) (Japanese) Severity: Important Fixlet ID: 1507007 Fixlet Link: http://technet.microsoft.com/library/security/MS15-070 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-070: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - Word 2010 SP2 - KB3054973 (x64) (Japanese) Severity: Important Fixlet ID: 1507009 Fixlet Link: http://technet.microsoft.com/library/security/MS15-070 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-070: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - SharePoint Server 2007 SP3 - Excel Services - KB2837612 (x64) (Japanese) Severity: Important Fixlet ID: 1507011 Fixlet Link: http://technet.microsoft.com/library/security/MS15-070 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-070: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2013 SP1 - PowerPoint 2013 SP1 - KB3054999 (x64) (Japanese) Severity: Important Fixlet ID: 1507013 Fixlet Link: http://technet.microsoft.com/library/security/MS15-070 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-070: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - SharePoint Server 2007 SP3 - Excel Services - KB2837612 (Japanese) Severity: Important Fixlet ID: 1507015 Fixlet Link: http://technet.microsoft.com/library/security/MS15-070 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-070: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Excel Viewer 2007 SP3 - KB2965209 (Japanese) Severity: Important Fixlet ID: 1507017 Fixlet Link: http://technet.microsoft.com/library/security/MS15-070 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-070: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office Compatibility Pack SP3 - Office Compatibility Pack SP3 - KB2965208 (Japanese) Severity: Important Fixlet ID: 1507019 Fixlet Link: http://technet.microsoft.com/library/security/MS15-070 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-070: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2007 SP3 - Excel 2007 SP3 - KB2965281 (Japanese) Severity: Important Fixlet ID: 1507021 Fixlet Link: http://technet.microsoft.com/library/security/MS15-070 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-070: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - Word 2010 SP2 - KB3054973 (Japanese) Severity: Important Fixlet ID: 1507023 Fixlet Link: http://technet.microsoft.com/library/security/MS15-070 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-070: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - SharePoint Server 2013 SP1 - Excel Services - KB3054861 (x64) (Japanese) Severity: Important Fixlet ID: 1507025 Fixlet Link: http://technet.microsoft.com/library/security/MS15-070 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-070: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2013 SP1 - PowerPoint 2013 SP1 - KB3054999 (Japanese) Severity: Important Fixlet ID: 1507027 Fixlet Link: http://technet.microsoft.com/library/security/MS15-070 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-070: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2007 SP3 - PowerPoint 2007 SP3 - KB2965283 (Japanese) Severity: Important Fixlet ID: 1507029 Fixlet Link: http://technet.microsoft.com/library/security/MS15-070 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-070: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - Excel 2010 SP2 - KB3054981 (Japanese) Severity: Important Fixlet ID: 1507031 Fixlet Link: http://technet.microsoft.com/library/security/MS15-070 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-070: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - KB3054971 (x64) (Japanese) Severity: Important Fixlet ID: 1507033 Fixlet Link: http://technet.microsoft.com/library/security/MS15-070 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-070: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - PowerPoint 2010 SP2 - KB3054963 (x64) (Japanese) Severity: Important Fixlet ID: 1507035 Fixlet Link: http://technet.microsoft.com/library/security/MS15-070 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-070: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - KB3054971 (Japanese) Severity: Important Fixlet ID: 1507037 Fixlet Link: http://technet.microsoft.com/library/security/MS15-070 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-070: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - Excel 2010 SP2 - KB3054981 (x64) (Japanese) Severity: Important Fixlet ID: 1507039 Fixlet Link: http://technet.microsoft.com/library/security/MS15-070 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-070: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2013 SP1 - Excel 2013 SP1 - KB3054949 (x64) (Japanese) Severity: Important Fixlet ID: 1507041 Fixlet Link: http://technet.microsoft.com/library/security/MS15-070 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-070: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Word Viewer - KB3054958 (Japanese) Severity: Important Fixlet ID: 1507043 Fixlet Link: http://technet.microsoft.com/library/security/MS15-070 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-070: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2013 SP1 - Word 2013 SP1 - KB3054990 (x64) (Japanese) Severity: Important Fixlet ID: 1507045 Fixlet Link: http://technet.microsoft.com/library/security/MS15-070 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-070: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2007 SP3 - Word 2007 SP3 - KB3054996 (Japanese) Severity: Important Fixlet ID: 1507047 Fixlet Link: http://technet.microsoft.com/library/security/MS15-070 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-070: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2013 SP1 - Word 2013 SP1 - KB3054990 (Japanese) Severity: Important Fixlet ID: 1507049 Fixlet Link: http://technet.microsoft.com/library/security/MS15-070 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-071: Vulnerability in Netlogon Could Allow Elevation of Privilege - Windows Server 2003 R2 SP2 / Windows Server 2003 SP2 - KB3068457 (x64) (Japanese) Severity: Important Fixlet ID: 1507101 Fixlet Link: http://technet.microsoft.com/library/security/MS15-071 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker with access to a primary domain controller (PDC) on a target network runs a specially crafted application to establish a secure channel to the PDC as a backup domain controller (BDC). After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-071: Vulnerability in Netlogon Could Allow Elevation of Privilege - Windows Server 2003 R2 SP2 / Windows Server 2003 SP2 - KB3068457 (Japanese) Severity: Important Fixlet ID: 1507103 Fixlet Link: http://technet.microsoft.com/library/security/MS15-071 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker with access to a primary domain controller (PDC) on a target network runs a specially crafted application to establish a secure channel to the PDC as a backup domain controller (BDC). After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-071: Vulnerability in Netlogon Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3068457 (x64) (Japanese) Severity: Important Fixlet ID: 1507105 Fixlet Link: http://technet.microsoft.com/library/security/MS15-071 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker with access to a primary domain controller (PDC) on a target network runs a specially crafted application to establish a secure channel to the PDC as a backup domain controller (BDC). After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-071: Vulnerability in Netlogon Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3068457 (Japanese) Severity: Important Fixlet ID: 1507107 Fixlet Link: http://technet.microsoft.com/library/security/MS15-071 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker with access to a primary domain controller (PDC) on a target network runs a specially crafted application to establish a secure channel to the PDC as a backup domain controller (BDC). After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-071: Vulnerability in Netlogon Could Allow Elevation of Privilege - Windows Server 2012 Gold - KB3068457 (x64) (Japanese) Severity: Important Fixlet ID: 1507109 Fixlet Link: http://technet.microsoft.com/library/security/MS15-071 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker with access to a primary domain controller (PDC) on a target network runs a specially crafted application to establish a secure channel to the PDC as a backup domain controller (BDC). After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-071: Vulnerability in Netlogon Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 - KB3068457 (x64) (Japanese) Severity: Important Fixlet ID: 1507111 Fixlet Link: http://technet.microsoft.com/library/security/MS15-071 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker with access to a primary domain controller (PDC) on a target network runs a specially crafted application to establish a secure channel to the PDC as a backup domain controller (BDC). After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-071: Vulnerability in Netlogon Could Allow Elevation of Privilege - Windows Server 2012 R2 Gold - KB3068457 (x64) (Japanese) Severity: Important Fixlet ID: 1507113 Fixlet Link: http://technet.microsoft.com/library/security/MS15-071 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker with access to a primary domain controller (PDC) on a target network runs a specially crafted application to establish a secure channel to the PDC as a backup domain controller (BDC). After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-072: Vulnerability in Windows Graphics Component Could Allow Elevation of Privilege - Windows 8.1 Gold - KB3069392 (Japanese) Severity: Important Fixlet ID: 1507201 Fixlet Link: http://technet.microsoft.com/library/security/MS15-072 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows graphics component fails to properly process bitmap conversions. An authenticated attacker who successfully exploited this vulnerability could elevate privileges on a targeted system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. An attacker must first log on to the system to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-072: Vulnerability in Windows Graphics Component Could Allow Elevation of Privilege - Windows 8 Gold - KB3069392 (x64) (Japanese) Severity: Important Fixlet ID: 1507203 Fixlet Link: http://technet.microsoft.com/library/security/MS15-072 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows graphics component fails to properly process bitmap conversions. An authenticated attacker who successfully exploited this vulnerability could elevate privileges on a targeted system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. An attacker must first log on to the system to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-072: Vulnerability in Windows Graphics Component Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3069392 (x64) (Japanese) Severity: Important Fixlet ID: 1507205 Fixlet Link: http://technet.microsoft.com/library/security/MS15-072 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows graphics component fails to properly process bitmap conversions. An authenticated attacker who successfully exploited this vulnerability could elevate privileges on a targeted system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. An attacker must first log on to the system to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-072: Vulnerability in Windows Graphics Component Could Allow Elevation of Privilege - Windows 8.1 Gold - KB3069392 (x64) (Japanese) Severity: Important Fixlet ID: 1507207 Fixlet Link: http://technet.microsoft.com/library/security/MS15-072 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows graphics component fails to properly process bitmap conversions. An authenticated attacker who successfully exploited this vulnerability could elevate privileges on a targeted system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. An attacker must first log on to the system to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-072: Vulnerability in Windows Graphics Component Could Allow Elevation of Privilege - Windows 8 Gold - KB3069392 (Japanese) Severity: Important Fixlet ID: 1507209 Fixlet Link: http://technet.microsoft.com/library/security/MS15-072 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows graphics component fails to properly process bitmap conversions. An authenticated attacker who successfully exploited this vulnerability could elevate privileges on a targeted system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. An attacker must first log on to the system to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-072: Vulnerability in Windows Graphics Component Could Allow Elevation of Privilege - Windows 7 SP1 - KB3069392 (x64) (Japanese) Severity: Important Fixlet ID: 1507211 Fixlet Link: http://technet.microsoft.com/library/security/MS15-072 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows graphics component fails to properly process bitmap conversions. An authenticated attacker who successfully exploited this vulnerability could elevate privileges on a targeted system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. An attacker must first log on to the system to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-072: Vulnerability in Windows Graphics Component Could Allow Elevation of Privilege - Windows Server 2003 R2 SP2 / Windows Server 2003 SP2 - KB3069392 (x64) (Japanese) Severity: Important Fixlet ID: 1507213 Fixlet Link: http://technet.microsoft.com/library/security/MS15-072 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows graphics component fails to properly process bitmap conversions. An authenticated attacker who successfully exploited this vulnerability could elevate privileges on a targeted system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. An attacker must first log on to the system to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-072: Vulnerability in Windows Graphics Component Could Allow Elevation of Privilege - Windows Server 2003 R2 SP2 / Windows Server 2003 SP2 - KB3069392 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1507214 Fixlet Link: http://technet.microsoft.com/library/security/MS15-072 *************************************************************** Title: MS15-072: Vulnerability in Windows Graphics Component Could Allow Elevation of Privilege - Windows Vista SP2 - KB3069392 (Japanese) Severity: Important Fixlet ID: 1507215 Fixlet Link: http://technet.microsoft.com/library/security/MS15-072 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows graphics component fails to properly process bitmap conversions. An authenticated attacker who successfully exploited this vulnerability could elevate privileges on a targeted system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. An attacker must first log on to the system to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-072: Vulnerability in Windows Graphics Component Could Allow Elevation of Privilege - Windows Vista SP2 - KB3069392 (x64) (Japanese) Severity: Important Fixlet ID: 1507217 Fixlet Link: http://technet.microsoft.com/library/security/MS15-072 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows graphics component fails to properly process bitmap conversions. An authenticated attacker who successfully exploited this vulnerability could elevate privileges on a targeted system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. An attacker must first log on to the system to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-072: Vulnerability in Windows Graphics Component Could Allow Elevation of Privilege - Windows Server 2012 Gold - KB3069392 (x64) (Japanese) Severity: Important Fixlet ID: 1507219 Fixlet Link: http://technet.microsoft.com/library/security/MS15-072 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows graphics component fails to properly process bitmap conversions. An authenticated attacker who successfully exploited this vulnerability could elevate privileges on a targeted system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. An attacker must first log on to the system to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-072: Vulnerability in Windows Graphics Component Could Allow Elevation of Privilege - Windows 7 SP1 - KB3069392 (Japanese) Severity: Important Fixlet ID: 1507221 Fixlet Link: http://technet.microsoft.com/library/security/MS15-072 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows graphics component fails to properly process bitmap conversions. An authenticated attacker who successfully exploited this vulnerability could elevate privileges on a targeted system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. An attacker must first log on to the system to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-072: Vulnerability in Windows Graphics Component Could Allow Elevation of Privilege - Windows Server 2003 R2 SP2 / Windows Server 2003 SP2 - KB3069392 (Japanese) Severity: Important Fixlet ID: 1507223 Fixlet Link: http://technet.microsoft.com/library/security/MS15-072 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows graphics component fails to properly process bitmap conversions. An authenticated attacker who successfully exploited this vulnerability could elevate privileges on a targeted system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. An attacker must first log on to the system to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-072: Vulnerability in Windows Graphics Component Could Allow Elevation of Privilege - Windows Server 2003 R2 SP2 / Windows Server 2003 SP2 - KB3069392 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1507224 Fixlet Link: http://technet.microsoft.com/library/security/MS15-072 *************************************************************** Title: MS15-072: Vulnerability in Windows Graphics Component Could Allow Elevation of Privilege - Windows Server 2012 R2 Gold - KB3069392 (x64) (Japanese) Severity: Important Fixlet ID: 1507225 Fixlet Link: http://technet.microsoft.com/library/security/MS15-072 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows graphics component fails to properly process bitmap conversions. An authenticated attacker who successfully exploited this vulnerability could elevate privileges on a targeted system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. An attacker must first log on to the system to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-072: Vulnerability in Windows Graphics Component Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 - KB3069392 (x64) (Japanese) Severity: Important Fixlet ID: 1507227 Fixlet Link: http://technet.microsoft.com/library/security/MS15-072 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows graphics component fails to properly process bitmap conversions. An authenticated attacker who successfully exploited this vulnerability could elevate privileges on a targeted system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. An attacker must first log on to the system to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-072: Vulnerability in Windows Graphics Component Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3069392 (Japanese) Severity: Important Fixlet ID: 1507229 Fixlet Link: http://technet.microsoft.com/library/security/MS15-072 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows graphics component fails to properly process bitmap conversions. An authenticated attacker who successfully exploited this vulnerability could elevate privileges on a targeted system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. An attacker must first log on to the system to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-073: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Vista SP2 - KB3070102 (Japanese) Severity: Important Fixlet ID: 1507301 Fixlet Link: http://technet.microsoft.com/library/security/MS15-073 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-073: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Server 2012 Gold - KB3070102 (x64) (Japanese) Severity: Important Fixlet ID: 1507303 Fixlet Link: http://technet.microsoft.com/library/security/MS15-073 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-073: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows 7 SP1 - KB3070102 (x64) (Japanese) Severity: Important Fixlet ID: 1507305 Fixlet Link: http://technet.microsoft.com/library/security/MS15-073 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-073: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows 8 Gold - KB3070102 (x64) (Japanese) Severity: Important Fixlet ID: 1507307 Fixlet Link: http://technet.microsoft.com/library/security/MS15-073 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-073: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3070102 (Japanese) Severity: Important Fixlet ID: 1507309 Fixlet Link: http://technet.microsoft.com/library/security/MS15-073 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-073: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows 7 SP1 - KB3070102 (Japanese) Severity: Important Fixlet ID: 1507311 Fixlet Link: http://technet.microsoft.com/library/security/MS15-073 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-073: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Server 2003 R2 SP2 / Windows Server 2003 SP2 - KB3070102 (Japanese) Severity: Important Fixlet ID: 1507313 Fixlet Link: http://technet.microsoft.com/library/security/MS15-073 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-073: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Server 2003 R2 SP2 / Windows Server 2003 SP2 - KB3070102 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1507314 Fixlet Link: http://technet.microsoft.com/library/security/MS15-073 *************************************************************** Title: MS15-073: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Vista SP2 - KB3070102 (x64) (Japanese) Severity: Important Fixlet ID: 1507315 Fixlet Link: http://technet.microsoft.com/library/security/MS15-073 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-073: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Server 2012 R2 Gold - KB3070102 (x64) (Japanese) Severity: Important Fixlet ID: 1507317 Fixlet Link: http://technet.microsoft.com/library/security/MS15-073 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-073: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows 8.1 Gold - KB3070102 (Japanese) Severity: Important Fixlet ID: 1507319 Fixlet Link: http://technet.microsoft.com/library/security/MS15-073 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-073: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Server 2003 R2 SP2 / Windows Server 2003 SP2 - KB3070102 (x64) (Japanese) Severity: Important Fixlet ID: 1507321 Fixlet Link: http://technet.microsoft.com/library/security/MS15-073 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-073: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Server 2003 R2 SP2 / Windows Server 2003 SP2 - KB3070102 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1507322 Fixlet Link: http://technet.microsoft.com/library/security/MS15-073 *************************************************************** Title: MS15-073: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows 8.1 Gold - KB3070102 (x64) (Japanese) Severity: Important Fixlet ID: 1507323 Fixlet Link: http://technet.microsoft.com/library/security/MS15-073 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-073: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows 8 Gold - KB3070102 (Japanese) Severity: Important Fixlet ID: 1507325 Fixlet Link: http://technet.microsoft.com/library/security/MS15-073 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-073: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3070102 (x64) (Japanese) Severity: Important Fixlet ID: 1507327 Fixlet Link: http://technet.microsoft.com/library/security/MS15-073 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-073: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 - KB3070102 (x64) (Japanese) Severity: Important Fixlet ID: 1507329 Fixlet Link: http://technet.microsoft.com/library/security/MS15-073 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-074: Vulnerability in Windows Installer Service Could Allow Elevation of Privilege - Windows 8.1 Gold - KB3072630 (x64) (Japanese) Severity: Important Fixlet ID: 1507401 Fixlet Link: http://technet.microsoft.com/library/security/MS15-074 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows Installer service improperly runs custom action scripts. An attacker must first compromise a user who is logged on to the target system to exploit the vulnerability. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-074: Vulnerability in Windows Installer Service Could Allow Elevation of Privilege - Windows 8 Gold - KB3072630 (Japanese) Severity: Important Fixlet ID: 1507403 Fixlet Link: http://technet.microsoft.com/library/security/MS15-074 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows Installer service improperly runs custom action scripts. An attacker must first compromise a user who is logged on to the target system to exploit the vulnerability. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-074: Vulnerability in Windows Installer Service Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3072630 (x64) (Japanese) Severity: Important Fixlet ID: 1507405 Fixlet Link: http://technet.microsoft.com/library/security/MS15-074 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows Installer service improperly runs custom action scripts. An attacker must first compromise a user who is logged on to the target system to exploit the vulnerability. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-074: Vulnerability in Windows Installer Service Could Allow Elevation of Privilege - Windows Server 2003 R2 SP2 / Windows Server 2003 SP2 - KB3072630 (x64) (Japanese) Severity: Important Fixlet ID: 1507407 Fixlet Link: http://technet.microsoft.com/library/security/MS15-074 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows Installer service improperly runs custom action scripts. An attacker must first compromise a user who is logged on to the target system to exploit the vulnerability. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-074: Vulnerability in Windows Installer Service Could Allow Elevation of Privilege - Windows Server 2003 R2 SP2 / Windows Server 2003 SP2 - KB3072630 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1507408 Fixlet Link: http://technet.microsoft.com/library/security/MS15-074 *************************************************************** Title: MS15-074: Vulnerability in Windows Installer Service Could Allow Elevation of Privilege - Windows Vista SP2 - KB3072630 (Japanese) Severity: Important Fixlet ID: 1507409 Fixlet Link: http://technet.microsoft.com/library/security/MS15-074 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows Installer service improperly runs custom action scripts. An attacker must first compromise a user who is logged on to the target system to exploit the vulnerability. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-074: Vulnerability in Windows Installer Service Could Allow Elevation of Privilege - Windows Server 2012 Gold - KB3072630 (x64) (Japanese) Severity: Important Fixlet ID: 1507411 Fixlet Link: http://technet.microsoft.com/library/security/MS15-074 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows Installer service improperly runs custom action scripts. An attacker must first compromise a user who is logged on to the target system to exploit the vulnerability. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-074: Vulnerability in Windows Installer Service Could Allow Elevation of Privilege - Windows 8 Gold - KB3072630 (x64) (Japanese) Severity: Important Fixlet ID: 1507413 Fixlet Link: http://technet.microsoft.com/library/security/MS15-074 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows Installer service improperly runs custom action scripts. An attacker must first compromise a user who is logged on to the target system to exploit the vulnerability. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-074: Vulnerability in Windows Installer Service Could Allow Elevation of Privilege - Windows Vista SP2 - KB3072630 (x64) (Japanese) Severity: Important Fixlet ID: 1507415 Fixlet Link: http://technet.microsoft.com/library/security/MS15-074 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows Installer service improperly runs custom action scripts. An attacker must first compromise a user who is logged on to the target system to exploit the vulnerability. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-074: Vulnerability in Windows Installer Service Could Allow Elevation of Privilege - Windows Server 2012 R2 Gold - KB3072630 (x64) (Japanese) Severity: Important Fixlet ID: 1507417 Fixlet Link: http://technet.microsoft.com/library/security/MS15-074 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows Installer service improperly runs custom action scripts. An attacker must first compromise a user who is logged on to the target system to exploit the vulnerability. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-074: Vulnerability in Windows Installer Service Could Allow Elevation of Privilege - Windows 8.1 Gold - KB3072630 (Japanese) Severity: Important Fixlet ID: 1507419 Fixlet Link: http://technet.microsoft.com/library/security/MS15-074 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows Installer service improperly runs custom action scripts. An attacker must first compromise a user who is logged on to the target system to exploit the vulnerability. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-074: Vulnerability in Windows Installer Service Could Allow Elevation of Privilege - Windows Server 2003 R2 SP2 / Windows Server 2003 SP2 - KB3072630 (Japanese) Severity: Important Fixlet ID: 1507421 Fixlet Link: http://technet.microsoft.com/library/security/MS15-074 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows Installer service improperly runs custom action scripts. An attacker must first compromise a user who is logged on to the target system to exploit the vulnerability. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-074: Vulnerability in Windows Installer Service Could Allow Elevation of Privilege - Windows Server 2003 R2 SP2 / Windows Server 2003 SP2 - KB3072630 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1507422 Fixlet Link: http://technet.microsoft.com/library/security/MS15-074 *************************************************************** Title: MS15-074: Vulnerability in Windows Installer Service Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 - KB3072630 (x64) (Japanese) Severity: Important Fixlet ID: 1507423 Fixlet Link: http://technet.microsoft.com/library/security/MS15-074 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows Installer service improperly runs custom action scripts. An attacker must first compromise a user who is logged on to the target system to exploit the vulnerability. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-074: Vulnerability in Windows Installer Service Could Allow Elevation of Privilege - Windows 7 SP1 - KB3072630 (x64) (Japanese) Severity: Important Fixlet ID: 1507425 Fixlet Link: http://technet.microsoft.com/library/security/MS15-074 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows Installer service improperly runs custom action scripts. An attacker must first compromise a user who is logged on to the target system to exploit the vulnerability. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-074: Vulnerability in Windows Installer Service Could Allow Elevation of Privilege - Windows 7 SP1 - KB3072630 (Japanese) Severity: Important Fixlet ID: 1507427 Fixlet Link: http://technet.microsoft.com/library/security/MS15-074 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows Installer service improperly runs custom action scripts. An attacker must first compromise a user who is logged on to the target system to exploit the vulnerability. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-074: Vulnerability in Windows Installer Service Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3072630 (Japanese) Severity: Important Fixlet ID: 1507429 Fixlet Link: http://technet.microsoft.com/library/security/MS15-074 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows Installer service improperly runs custom action scripts. An attacker must first compromise a user who is logged on to the target system to exploit the vulnerability. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-075: Vulnerabilities in OLE Could Allow Elevation of Privilege - Windows 8.1 Gold - KB3072633 (x64) (Japanese) Severity: Important Fixlet ID: 1507501 Fixlet Link: http://technet.microsoft.com/library/security/MS15-075 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if used in conjunction with another vulnerability that allows arbitrary code to be run through Internet Explorer. Once the other vulnerability has been exploited, an attacker could then exploit the vulnerabilities addressed in this bulletin to cause arbitrary code to run at a medium integrity level. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-075: Vulnerabilities in OLE Could Allow Elevation of Privilege - Windows 7 SP1 - KB3072633 (x64) (Japanese) Severity: Important Fixlet ID: 1507503 Fixlet Link: http://technet.microsoft.com/library/security/MS15-075 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if used in conjunction with another vulnerability that allows arbitrary code to be run through Internet Explorer. Once the other vulnerability has been exploited, an attacker could then exploit the vulnerabilities addressed in this bulletin to cause arbitrary code to run at a medium integrity level. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-075: Vulnerabilities in OLE Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB3072633 (x64) (Japanese) Severity: Important Fixlet ID: 1507505 Fixlet Link: http://technet.microsoft.com/library/security/MS15-075 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if used in conjunction with another vulnerability that allows arbitrary code to be run through Internet Explorer. Once the other vulnerability has been exploited, an attacker could then exploit the vulnerabilities addressed in this bulletin to cause arbitrary code to run at a medium integrity level. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-075: Vulnerabilities in OLE Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB3072633 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1507506 Fixlet Link: http://technet.microsoft.com/library/security/MS15-075 *************************************************************** Title: MS15-075: Vulnerabilities in OLE Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 - KB3072633 (x64) (Japanese) Severity: Important Fixlet ID: 1507507 Fixlet Link: http://technet.microsoft.com/library/security/MS15-075 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if used in conjunction with another vulnerability that allows arbitrary code to be run through Internet Explorer. Once the other vulnerability has been exploited, an attacker could then exploit the vulnerabilities addressed in this bulletin to cause arbitrary code to run at a medium integrity level. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-075: Vulnerabilities in OLE Could Allow Elevation of Privilege - Windows Vista SP2 - KB3072633 (Japanese) Severity: Important Fixlet ID: 1507509 Fixlet Link: http://technet.microsoft.com/library/security/MS15-075 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if used in conjunction with another vulnerability that allows arbitrary code to be run through Internet Explorer. Once the other vulnerability has been exploited, an attacker could then exploit the vulnerabilities addressed in this bulletin to cause arbitrary code to run at a medium integrity level. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-075: Vulnerabilities in OLE Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3072633 (x64) (Japanese) Severity: Important Fixlet ID: 1507511 Fixlet Link: http://technet.microsoft.com/library/security/MS15-075 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if used in conjunction with another vulnerability that allows arbitrary code to be run through Internet Explorer. Once the other vulnerability has been exploited, an attacker could then exploit the vulnerabilities addressed in this bulletin to cause arbitrary code to run at a medium integrity level. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-075: Vulnerabilities in OLE Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3072633 (Japanese) Severity: Important Fixlet ID: 1507513 Fixlet Link: http://technet.microsoft.com/library/security/MS15-075 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if used in conjunction with another vulnerability that allows arbitrary code to be run through Internet Explorer. Once the other vulnerability has been exploited, an attacker could then exploit the vulnerabilities addressed in this bulletin to cause arbitrary code to run at a medium integrity level. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-075: Vulnerabilities in OLE Could Allow Elevation of Privilege - Windows 8.1 Gold - KB3072633 (Japanese) Severity: Important Fixlet ID: 1507515 Fixlet Link: http://technet.microsoft.com/library/security/MS15-075 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if used in conjunction with another vulnerability that allows arbitrary code to be run through Internet Explorer. Once the other vulnerability has been exploited, an attacker could then exploit the vulnerabilities addressed in this bulletin to cause arbitrary code to run at a medium integrity level. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-075: Vulnerabilities in OLE Could Allow Elevation of Privilege - Windows 7 SP1 - KB3072633 (Japanese) Severity: Important Fixlet ID: 1507517 Fixlet Link: http://technet.microsoft.com/library/security/MS15-075 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if used in conjunction with another vulnerability that allows arbitrary code to be run through Internet Explorer. Once the other vulnerability has been exploited, an attacker could then exploit the vulnerabilities addressed in this bulletin to cause arbitrary code to run at a medium integrity level. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-075: Vulnerabilities in OLE Could Allow Elevation of Privilege - Windows 8 Gold - KB3072633 (Japanese) Severity: Important Fixlet ID: 1507519 Fixlet Link: http://technet.microsoft.com/library/security/MS15-075 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if used in conjunction with another vulnerability that allows arbitrary code to be run through Internet Explorer. Once the other vulnerability has been exploited, an attacker could then exploit the vulnerabilities addressed in this bulletin to cause arbitrary code to run at a medium integrity level. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-075: Vulnerabilities in OLE Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB3072633 (Japanese) Severity: Important Fixlet ID: 1507521 Fixlet Link: http://technet.microsoft.com/library/security/MS15-075 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if used in conjunction with another vulnerability that allows arbitrary code to be run through Internet Explorer. Once the other vulnerability has been exploited, an attacker could then exploit the vulnerabilities addressed in this bulletin to cause arbitrary code to run at a medium integrity level. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-075: Vulnerabilities in OLE Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB3072633 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1507522 Fixlet Link: http://technet.microsoft.com/library/security/MS15-075 *************************************************************** Title: MS15-075: Vulnerabilities in OLE Could Allow Elevation of Privilege - Windows 8 Gold - KB3072633 (x64) (Japanese) Severity: Important Fixlet ID: 1507523 Fixlet Link: http://technet.microsoft.com/library/security/MS15-075 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if used in conjunction with another vulnerability that allows arbitrary code to be run through Internet Explorer. Once the other vulnerability has been exploited, an attacker could then exploit the vulnerabilities addressed in this bulletin to cause arbitrary code to run at a medium integrity level. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-075: Vulnerabilities in OLE Could Allow Elevation of Privilege - Windows Server 2012 Gold - KB3072633 (x64) (Japanese) Severity: Important Fixlet ID: 1507525 Fixlet Link: http://technet.microsoft.com/library/security/MS15-075 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if used in conjunction with another vulnerability that allows arbitrary code to be run through Internet Explorer. Once the other vulnerability has been exploited, an attacker could then exploit the vulnerabilities addressed in this bulletin to cause arbitrary code to run at a medium integrity level. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-075: Vulnerabilities in OLE Could Allow Elevation of Privilege - Windows Vista SP2 - KB3072633 (x64) (Japanese) Severity: Important Fixlet ID: 1507527 Fixlet Link: http://technet.microsoft.com/library/security/MS15-075 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if used in conjunction with another vulnerability that allows arbitrary code to be run through Internet Explorer. Once the other vulnerability has been exploited, an attacker could then exploit the vulnerabilities addressed in this bulletin to cause arbitrary code to run at a medium integrity level. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-075: Vulnerabilities in OLE Could Allow Elevation of Privilege - Windows Server 2012 R2 Gold - KB3072633 (x64) (Japanese) Severity: Important Fixlet ID: 1507529 Fixlet Link: http://technet.microsoft.com/library/security/MS15-075 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if used in conjunction with another vulnerability that allows arbitrary code to be run through Internet Explorer. Once the other vulnerability has been exploited, an attacker could then exploit the vulnerabilities addressed in this bulletin to cause arbitrary code to run at a medium integrity level. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-076: Vulnerability in Windows Remote Procedure Call Could Allow Elevation of Privilege - Windows Server 2003 R2 SP2 / Windows Server 2003 SP2 - KB3067505 (Japanese) Severity: Important Fixlet ID: 1507601 Fixlet Link: http://technet.microsoft.com/library/security/MS15-076 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability, which exists in Windows Remote Procedure Call (RPC) authentication, could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-076: Vulnerability in Windows Remote Procedure Call Could Allow Elevation of Privilege - Windows Server 2003 R2 SP2 / Windows Server 2003 SP2 - KB3067505 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1507602 Fixlet Link: http://technet.microsoft.com/library/security/MS15-076 *************************************************************** Title: MS15-076: Vulnerability in Windows Remote Procedure Call Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 - KB3067505 (x64) (Japanese) Severity: Important Fixlet ID: 1507603 Fixlet Link: http://technet.microsoft.com/library/security/MS15-076 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability, which exists in Windows Remote Procedure Call (RPC) authentication, could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-076: Vulnerability in Windows Remote Procedure Call Could Allow Elevation of Privilege - Windows 8 Gold - KB3067505 (x64) (Japanese) Severity: Important Fixlet ID: 1507605 Fixlet Link: http://technet.microsoft.com/library/security/MS15-076 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability, which exists in Windows Remote Procedure Call (RPC) authentication, could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-076: Vulnerability in Windows Remote Procedure Call Could Allow Elevation of Privilege - Windows Vista SP2 - KB3067505 (Japanese) Severity: Important Fixlet ID: 1507607 Fixlet Link: http://technet.microsoft.com/library/security/MS15-076 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability, which exists in Windows Remote Procedure Call (RPC) authentication, could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-076: Vulnerability in Windows Remote Procedure Call Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3067505 (Japanese) Severity: Important Fixlet ID: 1507609 Fixlet Link: http://technet.microsoft.com/library/security/MS15-076 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability, which exists in Windows Remote Procedure Call (RPC) authentication, could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-076: Vulnerability in Windows Remote Procedure Call Could Allow Elevation of Privilege - Windows Vista SP2 - KB3067505 (x64) (Japanese) Severity: Important Fixlet ID: 1507611 Fixlet Link: http://technet.microsoft.com/library/security/MS15-076 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability, which exists in Windows Remote Procedure Call (RPC) authentication, could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-076: Vulnerability in Windows Remote Procedure Call Could Allow Elevation of Privilege - Windows 7 SP1 - KB3067505 (Japanese) Severity: Important Fixlet ID: 1507613 Fixlet Link: http://technet.microsoft.com/library/security/MS15-076 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability, which exists in Windows Remote Procedure Call (RPC) authentication, could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-076: Vulnerability in Windows Remote Procedure Call Could Allow Elevation of Privilege - Windows 7 SP1 - KB3067505 (x64) (Japanese) Severity: Important Fixlet ID: 1507615 Fixlet Link: http://technet.microsoft.com/library/security/MS15-076 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability, which exists in Windows Remote Procedure Call (RPC) authentication, could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-076: Vulnerability in Windows Remote Procedure Call Could Allow Elevation of Privilege - Windows 8.1 Gold - KB3067505 (Japanese) Severity: Important Fixlet ID: 1507617 Fixlet Link: http://technet.microsoft.com/library/security/MS15-076 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability, which exists in Windows Remote Procedure Call (RPC) authentication, could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-076: Vulnerability in Windows Remote Procedure Call Could Allow Elevation of Privilege - Windows Server 2012 Gold - KB3067505 (x64) (Japanese) Severity: Important Fixlet ID: 1507619 Fixlet Link: http://technet.microsoft.com/library/security/MS15-076 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability, which exists in Windows Remote Procedure Call (RPC) authentication, could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-076: Vulnerability in Windows Remote Procedure Call Could Allow Elevation of Privilege - Windows Server 2012 R2 Gold - KB3067505 (x64) (Japanese) Severity: Important Fixlet ID: 1507621 Fixlet Link: http://technet.microsoft.com/library/security/MS15-076 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability, which exists in Windows Remote Procedure Call (RPC) authentication, could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-076: Vulnerability in Windows Remote Procedure Call Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3067505 (x64) (Japanese) Severity: Important Fixlet ID: 1507623 Fixlet Link: http://technet.microsoft.com/library/security/MS15-076 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability, which exists in Windows Remote Procedure Call (RPC) authentication, could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-076: Vulnerability in Windows Remote Procedure Call Could Allow Elevation of Privilege - Windows 8 Gold - KB3067505 (Japanese) Severity: Important Fixlet ID: 1507625 Fixlet Link: http://technet.microsoft.com/library/security/MS15-076 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability, which exists in Windows Remote Procedure Call (RPC) authentication, could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-076: Vulnerability in Windows Remote Procedure Call Could Allow Elevation of Privilege - Windows 8.1 Gold - KB3067505 (x64) (Japanese) Severity: Important Fixlet ID: 1507627 Fixlet Link: http://technet.microsoft.com/library/security/MS15-076 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability, which exists in Windows Remote Procedure Call (RPC) authentication, could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-076: Vulnerability in Windows Remote Procedure Call Could Allow Elevation of Privilege - Windows Server 2003 R2 SP2 / Windows Server 2003 SP2 - KB3067505 (x64) (Japanese) Severity: Important Fixlet ID: 1507629 Fixlet Link: http://technet.microsoft.com/library/security/MS15-076 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability, which exists in Windows Remote Procedure Call (RPC) authentication, could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-076: Vulnerability in Windows Remote Procedure Call Could Allow Elevation of Privilege - Windows Server 2003 R2 SP2 / Windows Server 2003 SP2 - KB3067505 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1507630 Fixlet Link: http://technet.microsoft.com/library/security/MS15-076 *************************************************************** Title: MS15-077: Vulnerability in ATM Font Driver Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3077657 (x64) (Japanese) Severity: Important Fixlet ID: 1507701 Fixlet Link: http://technet.microsoft.com/library/security/MS15-077 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to a target system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-077: Vulnerability in ATM Font Driver Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3077657 (Japanese) Severity: Important Fixlet ID: 1507703 Fixlet Link: http://technet.microsoft.com/library/security/MS15-077 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to a target system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-077: Vulnerability in ATM Font Driver Could Allow Elevation of Privilege - Windows Server 2012 Gold - KB3077657 (x64) (Japanese) Severity: Important Fixlet ID: 1507705 Fixlet Link: http://technet.microsoft.com/library/security/MS15-077 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to a target system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-077: Vulnerability in ATM Font Driver Could Allow Elevation of Privilege - Windows Vista SP2 - KB3077657 (x64) (Japanese) Severity: Important Fixlet ID: 1507707 Fixlet Link: http://technet.microsoft.com/library/security/MS15-077 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to a target system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-077: Vulnerability in ATM Font Driver Could Allow Elevation of Privilege - Windows 8.1 Gold - KB3077657 (x64) (Japanese) Severity: Important Fixlet ID: 1507709 Fixlet Link: http://technet.microsoft.com/library/security/MS15-077 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to a target system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-077: Vulnerability in ATM Font Driver Could Allow Elevation of Privilege - Windows 7 SP1 - KB3077657 (Japanese) Severity: Important Fixlet ID: 1507711 Fixlet Link: http://technet.microsoft.com/library/security/MS15-077 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to a target system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-077: Vulnerability in ATM Font Driver Could Allow Elevation of Privilege - Windows 7 SP1 - KB3077657 (x64) (Japanese) Severity: Important Fixlet ID: 1507713 Fixlet Link: http://technet.microsoft.com/library/security/MS15-077 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to a target system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-077: Vulnerability in ATM Font Driver Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 - KB3077657 (x64) (Japanese) Severity: Important Fixlet ID: 1507715 Fixlet Link: http://technet.microsoft.com/library/security/MS15-077 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to a target system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-077: Vulnerability in ATM Font Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB3077657 (Japanese) Severity: Important Fixlet ID: 1507717 Fixlet Link: http://technet.microsoft.com/library/security/MS15-077 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to a target system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-077: Vulnerability in ATM Font Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB3077657 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1507718 Fixlet Link: http://technet.microsoft.com/library/security/MS15-077 *************************************************************** Title: MS15-077: Vulnerability in ATM Font Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB3077657 (x64) (Japanese) Severity: Important Fixlet ID: 1507719 Fixlet Link: http://technet.microsoft.com/library/security/MS15-077 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to a target system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-077: Vulnerability in ATM Font Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB3077657 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1507720 Fixlet Link: http://technet.microsoft.com/library/security/MS15-077 *************************************************************** Title: MS15-077: Vulnerability in ATM Font Driver Could Allow Elevation of Privilege - Windows Vista SP2 - KB3077657 (Japanese) Severity: Important Fixlet ID: 1507721 Fixlet Link: http://technet.microsoft.com/library/security/MS15-077 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to a target system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-077: Vulnerability in ATM Font Driver Could Allow Elevation of Privilege - Windows 8 Gold - KB3077657 (x64) (Japanese) Severity: Important Fixlet ID: 1507723 Fixlet Link: http://technet.microsoft.com/library/security/MS15-077 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to a target system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-077: Vulnerability in ATM Font Driver Could Allow Elevation of Privilege - Windows Server 2012 R2 Gold - KB3077657 (x64) (Japanese) Severity: Important Fixlet ID: 1507725 Fixlet Link: http://technet.microsoft.com/library/security/MS15-077 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to a target system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-077: Vulnerability in ATM Font Driver Could Allow Elevation of Privilege - Windows 8 Gold - KB3077657 (Japanese) Severity: Important Fixlet ID: 1507727 Fixlet Link: http://technet.microsoft.com/library/security/MS15-077 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to a target system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-077: Vulnerability in ATM Font Driver Could Allow Elevation of Privilege - Windows 8.1 Gold - KB3077657 (Japanese) Severity: Important Fixlet ID: 1507729 Fixlet Link: http://technet.microsoft.com/library/security/MS15-077 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to a target system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows 7 SP1 - IE 10 - KB3075516 (Japanese) Severity: Critical Fixlet ID: 15065101 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 8 - KB3074886 (Japanese) Severity: Moderate Fixlet ID: 15065103 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 9 - KB3074886 (Japanese) Severity: Moderate Fixlet ID: 15065105 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows 7 SP1 - IE 8 - KB3074886 (Japanese) Severity: Critical Fixlet ID: 15065107 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 7 - KB3074886 (x64) (Japanese) Severity: Moderate Fixlet ID: 15065109 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 7 - KB3074886 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 15065110 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Vista SP2 - IE 7 - KB3074886 (x64) (Japanese) Severity: Critical Fixlet ID: 15065111 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 8 - KB3074886 (x64) (Japanese) Severity: Moderate Fixlet ID: 15065113 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 8 - KB3074886 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 15065114 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Vista SP2 - IE 8 - KB3074886 (x64) (Japanese) Severity: Critical Fixlet ID: 15065115 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 8 - KB3074886 (x64) (Japanese) Severity: Moderate Fixlet ID: 15065117 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows 7 SP1 - IE 8 - KB3074886 (x64) (Japanese) Severity: Critical Fixlet ID: 15065119 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 8 - KB3074886 (x64) (Japanese) Severity: Moderate Fixlet ID: 15065121 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Vista SP2 - IE 9 - KB3074886 (x64) (Japanese) Severity: Critical Fixlet ID: 15065123 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 9 - KB3074886 (x64) (Japanese) Severity: Moderate Fixlet ID: 15065125 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows 7 SP1 - IE 9 - KB3074886 (x64) (Japanese) Severity: Critical Fixlet ID: 15065127 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 9 - KB3074886 (x64) (Japanese) Severity: Moderate Fixlet ID: 15065129 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows 7 SP1 - IE 10 - KB3074886 (x64) (Japanese) Severity: Critical Fixlet ID: 15065131 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows 7 SP1 - IE 10 - KB3075516 (x64) (Japanese) Severity: Critical Fixlet ID: 15065133 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 10 - KB3074886 (x64) (Japanese) Severity: Moderate Fixlet ID: 15065135 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 10 - KB3075516 (x64) (Japanese) Severity: Moderate Fixlet ID: 15065137 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows 8 Gold - IE 10 - KB3074886 (x64) (Japanese) Severity: Critical Fixlet ID: 15065139 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows 8 Gold - IE 10 - KB3075516 (x64) (Japanese) Severity: Critical Fixlet ID: 15065141 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2012 Gold - IE 10 - KB3074886 (x64) (Japanese) Severity: Moderate Fixlet ID: 15065143 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2012 Gold - IE 10 - KB3075516 (x64) (Japanese) Severity: Moderate Fixlet ID: 15065145 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows 7 SP1 - IE 11 - KB3075516 (x64) (Japanese) Severity: Critical Fixlet ID: 15065147 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 11 - KB3074886 (x64) (Japanese) Severity: Moderate Fixlet ID: 15065149 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 11 - KB3075516 (x64) (Japanese) Severity: Moderate Fixlet ID: 15065151 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows 8.1 Gold - IE 11 - KB3074886 (x64) (Japanese) Severity: Critical Fixlet ID: 15065153 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows 8.1 Gold - IE 11 - KB3075516 (x64) (Japanese) Severity: Critical Fixlet ID: 15065155 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2012 R2 Gold - IE 11 - KB3074886 (x64) (Japanese) Severity: Moderate Fixlet ID: 15065157 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2012 R2 Gold - IE 11 - KB3075516 (x64) (Japanese) Severity: Moderate Fixlet ID: 15065159 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 7 - KB3074886 (x64) (Japanese) Severity: Moderate Fixlet ID: 15065161 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-065: Security Update for Internet Explorer - Windows 7 SP1 - IE 11 - KB3074886 (x64) (Japanese) Severity: Critical Fixlet ID: 15065163 Fixlet Link: http://technet.microsoft.com/library/security/MS15-065 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: 3057154: Security advisory: Update to harden use of DES encryption - Windows Server 2012 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 305715401 Fixlet Link: http://support.microsoft.com/kb/3057154 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3057154: Security advisory: Update to harden use of DES encryption - Windows Server 2008 SP2 (Japanese) Severity: Unspecified Fixlet ID: 305715403 Fixlet Link: http://support.microsoft.com/kb/3057154 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3057154: Security advisory: Update to harden use of DES encryption - Windows 8 Gold (Japanese) Severity: Unspecified Fixlet ID: 305715407 Fixlet Link: http://support.microsoft.com/kb/3057154 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3057154: Security advisory: Update to harden use of DES encryption - Windows 7 SP1 (Japanese) Severity: Unspecified Fixlet ID: 305715409 Fixlet Link: http://support.microsoft.com/kb/3057154 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3057154: Security advisory: Update to harden use of DES encryption - Windows 7 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305715411 Fixlet Link: http://support.microsoft.com/kb/3057154 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3057154: Security advisory: Update to harden use of DES encryption - Windows Vista SP2 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305715413 Fixlet Link: http://support.microsoft.com/kb/3057154 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3057154: Security advisory: Update to harden use of DES encryption - Windows 8 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 305715415 Fixlet Link: http://support.microsoft.com/kb/3057154 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3057154: Security advisory: Update to harden use of DES encryption - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305715417 Fixlet Link: http://support.microsoft.com/kb/3057154 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3057154: Security advisory: Update to harden use of DES encryption - Windows Server 2008 SP2 (x64) (Japanese) Severity: Unspecified Fixlet ID: 305715425 Fixlet Link: http://support.microsoft.com/kb/3057154 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3057154: Security advisory: Update to harden use of DES encryption - Windows Vista SP2 (Japanese) Severity: Unspecified Fixlet ID: 305715427 Fixlet Link: http://support.microsoft.com/kb/3057154 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3079777: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 307977701 Fixlet Link: http://support.microsoft.com/kb/3079777 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3079777: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8 Gold (Japanese) Severity: Unspecified Fixlet ID: 307977703 Fixlet Link: http://support.microsoft.com/kb/3079777 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3079777: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8.1 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 307977705 Fixlet Link: http://support.microsoft.com/kb/3079777 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3079777: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8.1 Gold (Japanese) Severity: Unspecified Fixlet ID: 307977707 Fixlet Link: http://support.microsoft.com/kb/3079777 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3079777: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 307977709 Fixlet Link: http://support.microsoft.com/kb/3079777 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3079777: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows Server 2012 Gold (x64) (Japanese) Severity: Unspecified Fixlet ID: 307977711 Fixlet Link: http://support.microsoft.com/kb/3079777 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. From autonotify at us.ibm.com Tue Jul 21 02:35:15 2015 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Tue, 21 Jul 2015 02:35:15 -0700 Subject: [BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)' Message-ID: <201507210935.t6L9ZFpt018583@d03av05.boulder.ibm.com> Fixlet Site - 'Patches for Windows (Japanese)' Current Version: 668 Published: Tue, 21 Jul 2015 05:04:13 GMT New Fixlets: ============ *************************************************************** Title: MS15-078: Vulnerability in Microsoft Font Driver Could Allow Remote Code Execution - Windows Vista SP2 - KB3079904 (Japanese) Severity: Critical Fixlet ID: 1507801 Fixlet Link: http://technet.microsoft.com/library/security/MS15-078 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-078: Vulnerability in Microsoft Font Driver Could Allow Remote Code Execution - Windows 8.1 Gold - KB3079904 (x64) (Japanese) Severity: Critical Fixlet ID: 1507803 Fixlet Link: http://technet.microsoft.com/library/security/MS15-078 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-078: Vulnerability in Microsoft Font Driver Could Allow Remote Code Execution - Windows 8.1 Gold - KB3079904 (Japanese) Severity: Critical Fixlet ID: 1507805 Fixlet Link: http://technet.microsoft.com/library/security/MS15-078 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-078: Vulnerability in Microsoft Font Driver Could Allow Remote Code Execution - Windows 8 Gold - KB3079904 (Japanese) Severity: Critical Fixlet ID: 1507807 Fixlet Link: http://technet.microsoft.com/library/security/MS15-078 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-078: Vulnerability in Microsoft Font Driver Could Allow Remote Code Execution - Windows 7 SP1 - KB3079904 (Japanese) Severity: Critical Fixlet ID: 1507809 Fixlet Link: http://technet.microsoft.com/library/security/MS15-078 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-078: Vulnerability in Microsoft Font Driver Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3079904 (x64) (Japanese) Severity: Critical Fixlet ID: 1507811 Fixlet Link: http://technet.microsoft.com/library/security/MS15-078 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-078: Vulnerability in Microsoft Font Driver Could Allow Remote Code Execution - Windows Server 2012 R2 Gold - KB3079904 (x64) (Japanese) Severity: Critical Fixlet ID: 1507813 Fixlet Link: http://technet.microsoft.com/library/security/MS15-078 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-078: Vulnerability in Microsoft Font Driver Could Allow Remote Code Execution - Windows Server 2012 Gold - KB3079904 (x64) (Japanese) Severity: Critical Fixlet ID: 1507815 Fixlet Link: http://technet.microsoft.com/library/security/MS15-078 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-078: Vulnerability in Microsoft Font Driver Could Allow Remote Code Execution - Windows 8 Gold - KB3079904 (x64) (Japanese) Severity: Critical Fixlet ID: 1507817 Fixlet Link: http://technet.microsoft.com/library/security/MS15-078 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-078: Vulnerability in Microsoft Font Driver Could Allow Remote Code Execution - Windows 7 SP1 - KB3079904 (x64) (Japanese) Severity: Critical Fixlet ID: 1507819 Fixlet Link: http://technet.microsoft.com/library/security/MS15-078 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-078: Vulnerability in Microsoft Font Driver Could Allow Remote Code Execution - Windows Vista SP2 - KB3079904 (x64) (Japanese) Severity: Critical Fixlet ID: 1507821 Fixlet Link: http://technet.microsoft.com/library/security/MS15-078 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-078: Vulnerability in Microsoft Font Driver Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB3079904 (x64) (Japanese) Severity: Critical Fixlet ID: 1507823 Fixlet Link: http://technet.microsoft.com/library/security/MS15-078 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-078: Vulnerability in Microsoft Font Driver Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3079904 (Japanese) Severity: Critical Fixlet ID: 1507825 Fixlet Link: http://technet.microsoft.com/library/security/MS15-078 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded OpenType fonts. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.