From autonotify at us.ibm.com Thu Mar 5 02:34:36 2015 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Thu, 5 Mar 2015 02:34:36 -0800 Subject: [BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)' Message-ID: <201503051034.t25AYZKd001151@d01av02.pok.ibm.com> Fixlet Site - 'Patches for Windows (Japanese)' Current Version: 638 Published: Thu, 05 Mar 2015 08:09:13 GMT New Fixlets: ============ *************************************************************** Title: MS14-083: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Excel Viewer - KB2920791 (Japanese) Severity: Important Fixlet ID: 1408313 Fixlet Link: http://technet.microsoft.com/library/security/MS14-083 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: 2831206: DFS network path goes offline in Windows 7 or Windows Server 2008 R2 when Transparent Caching Group Policy setting is enabled - Windows 7 SP1 / Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 283120601 Fixlet Link: https://support.microsoft.com/kb/2831206 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2831206: DFS network path goes offline in Windows 7 or Windows Server 2008 R2 when Transparent Caching Group Policy setting is enabled - Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 283120603 Fixlet Link: https://support.microsoft.com/kb/2893634 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2880996: Update for Project Server 2013 - KB2880996 - Office 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 288099601 Fixlet Link: https://support.microsoft.com/kb/2880996 Fixlet Description: Microsoft has released an update for Microsoft Project Server 2013 . This update provides the latest fixes to Microsoft Project Server 2013 . Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2893634: Performance of an application that calls the GetFileAttributesEx function degrades significantly in Windows 7 SP1 or Windows Server 2008 R2 SP1 - Windows 7 SP1 / Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 289363401 Fixlet Link: https://support.microsoft.com/kb/2893634 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2893634: Performance of an application that calls the GetFileAttributesEx function degrades significantly in Windows 7 SP1 or Windows Server 2008 R2 SP1 - Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 289363403 Fixlet Link: https://support.microsoft.com/kb/2893634 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2967567: Cannot access DFS root when the DFS path is offline and you log on to a Windows-based computer for the first time - Windows 7 SP1 / Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 296756701 Fixlet Link: https://support.microsoft.com/kb/2967567 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2967567: Cannot access DFS root when the DFS path is offline and you log on to a Windows-based computer for the first time - Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 296756703 Fixlet Link: https://support.microsoft.com/kb/2967567 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2995054: SMBv1 named pipe requests do not time out when the remote server hangs in Windows 7, Windows Server 2008, Windows 8.1, and Windows Server 2012 R2 - Windows 8.1 Gold (x64) / Windows Server 2012 R2 (x64) (Japanese) Severity: N/A Fixlet ID: 299505401 Fixlet Link: http://support.microsoft.com/kb/2995054 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2995054: SMBv1 named pipe requests do not time out when the remote server hangs in Windows 7, Windows Server 2008, Windows 8.1, and Windows Server 2012 R2 - Windows 7 SP1 / Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 299505405 Fixlet Link: https://support.microsoft.com/kb/2995054 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2995054: SMBv1 named pipe requests do not time out when the remote server hangs in Windows 7, Windows Server 2008, Windows 8.1, and Windows Server 2012 R2 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 299505407 Fixlet Link: http://support.microsoft.com/kb/2995054 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2995054: SMBv1 named pipe requests do not time out when the remote server hangs in Windows 7, Windows Server 2008, Windows 8.1, and Windows Server 2012 R2 - Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 299505409 Fixlet Link: https://support.microsoft.com/kb/2995054 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. From autonotify at us.ibm.com Sat Mar 7 02:34:37 2015 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Sat, 7 Mar 2015 02:34:37 -0800 Subject: [BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)' Message-ID: <201503071034.t27AYbD7000972@d01av04.pok.ibm.com> Fixlet Site - 'Patches for Windows (Japanese)' Current Version: 639 Published: Fri, 06 Mar 2015 19:42:52 GMT New Fixlets: ============ *************************************************************** Title: 3046015: Security Advisory: Vulnerability in Schannel Could Allow Security Feature Bypass - Enable Workaround (Japanese) Severity: N/A Fixlet ID: 304601501 Fixlet Link: https://technet.microsoft.com/library/security/3046015 Fixlet Description: Microsoft is aware of a security feature bypass vulnerability in Secure Channel (Schannel) that affects all supported releases of Microsoft Windows. Our investigation has verified that the vulnerability could allow an attacker to force the downgrading of the cipher suites used in an SSL/TLS connection on a Windows client system. The vulnerability facilitates exploitation of the publicly disclosed FREAK technique, which is an industry-wide issue that is not specific to Windows operating systems. When this security advisory was originally released, Microsoft had not received any information to indicate that this issue had been publicly used to attack customers. Upon completion of this investigation, Microsoft will take the appropriate action to help protect our customers. This may include providing a security update through our monthly release process or providing an out-of-cycle security update, depending on customer needs. *************************************************************** Title: 3046015: Security Advisory: Vulnerability in Schannel Could Allow Security Feature Bypass - Disable Workaround (Japanese) Severity: N/A Fixlet ID: 304601503 Fixlet Link: https://technet.microsoft.com/library/security/3046015 Fixlet Description: Microsoft is aware of a security feature bypass vulnerability in Secure Channel (Schannel) that affects all supported releases of Microsoft Windows. Our investigation has verified that the vulnerability could allow an attacker to force the downgrading of the cipher suites used in an SSL/TLS connection on a Windows client system. The vulnerability facilitates exploitation of the publicly disclosed FREAK technique, which is an industry-wide issue that is not specific to Windows operating systems. When this security advisory was originally released, Microsoft had not received any information to indicate that this issue had been publicly used to attack customers. Upon completion of this investigation, Microsoft will take the appropriate action to help protect our customers. This may include providing a security update through our monthly release process or providing an out-of-cycle security update, depending on customer needs. From autonotify at us.ibm.com Thu Mar 12 02:34:52 2015 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Thu, 12 Mar 2015 02:34:52 -0700 Subject: [BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)' Message-ID: <201503120934.t2C9YqaF006693@d01av02.pok.ibm.com> Fixlet Site - 'Patches for Windows (Japanese)' Current Version: 640 Published: Thu, 12 Mar 2015 08:00:19 GMT New Fixlets: ============ *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 8 - KB3032359 (x64) (Japanese) Severity: Moderate Fixlet ID: 1501801 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 11 - KB3032359 (x64) (Japanese) Severity: Critical Fixlet ID: 1501803 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 10 - KB3032359 (x64) (Japanese) Severity: Moderate Fixlet ID: 1501805 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 9 - KB3032359 (x64) (Japanese) Severity: Critical Fixlet ID: 1501807 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 9 - KB3032359 (Japanese) Severity: Critical Fixlet ID: 1501809 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 11 - KB3032359 (Japanese) Severity: Critical Fixlet ID: 1501811 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 7 - KB3032359 (x64) (Japanese) Severity: Moderate Fixlet ID: 1501813 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 7 - KB3032359 (x64) (Japanese) Severity: Moderate Fixlet ID: 1501815 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 7 - KB3032359 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1501816 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows 8.1 Gold - IE 11 - KB3032359 (x64) (Japanese) Severity: Critical Fixlet ID: 1501817 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows 8 Gold - IE 10 - KB3032359 (x64) (Japanese) Severity: Critical Fixlet ID: 1501819 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 8 - KB3032359 (Japanese) Severity: Moderate Fixlet ID: 1501821 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 8 - KB3032359 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1501822 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 8 - KB3032359 (x64) (Japanese) Severity: Critical Fixlet ID: 1501823 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 7 - KB3032359 (Japanese) Severity: Critical Fixlet ID: 1501825 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 9 - KB3032359 (x64) (Japanese) Severity: Moderate Fixlet ID: 1501827 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 7 - KB3032359 (Japanese) Severity: Moderate Fixlet ID: 1501829 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows 8.1 Gold - IE 11 - KB3032359 (Japanese) Severity: Critical Fixlet ID: 1501831 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 9 - KB3032359 (Japanese) Severity: Moderate Fixlet ID: 1501833 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 6 - KB3032359 (Japanese) Severity: Moderate Fixlet ID: 1501835 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 6 - KB3032359 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1501836 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 11 - KB3032359 (x64) (Japanese) Severity: Moderate Fixlet ID: 1501837 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 8 - KB3032359 (Japanese) Severity: Critical Fixlet ID: 1501839 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 8 - KB3032359 (x64) (Japanese) Severity: Moderate Fixlet ID: 1501841 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows Server 2012 R2 Gold - IE 11 - KB3032359 (x64) (Japanese) Severity: Moderate Fixlet ID: 1501843 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 6 - KB3032359 (x64) (Japanese) Severity: Moderate Fixlet ID: 1501845 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 6 - KB3032359 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1501846 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 8 - KB3032359 (x64) (Japanese) Severity: Moderate Fixlet ID: 1501847 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 8 - KB3032359 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1501848 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 9 - KB3032359 (x64) (Japanese) Severity: Moderate Fixlet ID: 1501849 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 10 - KB3032359 (Japanese) Severity: Critical Fixlet ID: 1501851 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 10 - KB3032359 (x64) (Japanese) Severity: Critical Fixlet ID: 1501853 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 9 - KB3032359 (Japanese) Severity: Critical Fixlet ID: 1501855 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 8 - KB3032359 (Japanese) Severity: Critical Fixlet ID: 1501857 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 8 - KB3032359 (x64) (Japanese) Severity: Critical Fixlet ID: 1501859 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 7 - KB3032359 (x64) (Japanese) Severity: Critical Fixlet ID: 1501861 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows 8 Gold - IE 10 - KB3032359 (Japanese) Severity: Critical Fixlet ID: 1501863 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows Server 2012 Gold - IE 10 - KB3032359 (x64) (Japanese) Severity: Moderate Fixlet ID: 1501865 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 8 - KB3032359 (Japanese) Severity: Moderate Fixlet ID: 1501867 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 7 - KB3032359 (Japanese) Severity: Moderate Fixlet ID: 1501869 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 7 - KB3032359 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1501870 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 9 - KB3032359 (x64) (Japanese) Severity: Critical Fixlet ID: 1501871 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 11 - KB3023607 (x64) (Japanese) Severity: Critical Fixlet ID: 1501873 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 11 - KB3023607 (Japanese) Severity: Critical Fixlet ID: 1501875 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows 8.1 Gold - IE 11 - KB3040335 (x64) (Japanese) Severity: Critical Fixlet ID: 1501877 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows 8.1 Gold - IE 11 - KB3040335 (Japanese) Severity: Critical Fixlet ID: 1501879 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 11 - KB3023607 (x64) (Japanese) Severity: Moderate Fixlet ID: 1501881 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-018: Cumulative Security Update for Internet Explorer - Windows Server 2012 R2 Gold - IE 11 - KB3040335 (x64) (Japanese) Severity: Moderate Fixlet ID: 1501883 Fixlet Link: http://technet.microsoft.com/library/security/MS15-018 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-019: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - Windows Vista SP2 - VBScript 5.7 - KB3030398 (Japanese) Severity: Critical Fixlet ID: 1501901 Fixlet Link: http://technet.microsoft.com/library/security/MS15-019 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visits a specially crafted website. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-019: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - Windows Server 2008 SP2 - VBScript 5.7 - KB3030398 (Japanese) Severity: Moderate Fixlet ID: 1501903 Fixlet Link: http://technet.microsoft.com/library/security/MS15-019 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visits a specially crafted website. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-019: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - Windows Server 2003 SP2 - VBScript 5.6 - KB3030403 (x64) (Japanese) Severity: Moderate Fixlet ID: 1501905 Fixlet Link: http://technet.microsoft.com/library/security/MS15-019 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visits a specially crafted website. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-019: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - Windows Server 2003 SP2 - VBScript 5.6 - KB3030403 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1501906 Fixlet Link: http://technet.microsoft.com/library/security/MS15-019 *************************************************************** Title: MS15-019: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - Windows Vista SP2 - VBScript 5.7 - KB3030398 (x64) (Japanese) Severity: Critical Fixlet ID: 1501907 Fixlet Link: http://technet.microsoft.com/library/security/MS15-019 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visits a specially crafted website. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-019: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - Windows Server 2003 SP2 - VBScript 5.7 - KB3030398 (x64) (Japanese) Severity: Moderate Fixlet ID: 1501909 Fixlet Link: http://technet.microsoft.com/library/security/MS15-019 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visits a specially crafted website. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-019: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - Windows Server 2003 SP2 - VBScript 5.7 - KB3030398 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1501910 Fixlet Link: http://technet.microsoft.com/library/security/MS15-019 *************************************************************** Title: MS15-019: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - Windows Server 2008 SP2 - VBScript 5.7 - KB3030398 (x64) (Japanese) Severity: Moderate Fixlet ID: 1501911 Fixlet Link: http://technet.microsoft.com/library/security/MS15-019 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visits a specially crafted website. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-019: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - Windows Server 2003 SP2 - VBScript 5.6 - KB3030403 (Japanese) Severity: Moderate Fixlet ID: 1501913 Fixlet Link: http://technet.microsoft.com/library/security/MS15-019 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visits a specially crafted website. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-019: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - Windows Server 2003 SP2 - VBScript 5.6 - KB3030403 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1501914 Fixlet Link: http://technet.microsoft.com/library/security/MS15-019 *************************************************************** Title: MS15-019: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - Windows Server 2003 SP2 - VBScript 5.7 - KB3030398 (Japanese) Severity: Moderate Fixlet ID: 1501915 Fixlet Link: http://technet.microsoft.com/library/security/MS15-019 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visits a specially crafted website. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-019: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - Windows Server 2003 SP2 - VBScript 5.7 - KB3030398 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 1501916 Fixlet Link: http://technet.microsoft.com/library/security/MS15-019 *************************************************************** Title: MS15-019: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - VBScript 5.8 - KB3030630 (x64) (Japanese) Severity: Moderate Fixlet ID: 1501917 Fixlet Link: http://technet.microsoft.com/library/security/MS15-019 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visits a specially crafted website. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows 8 Gold - KB3033889 (Japanese) Severity: Critical Fixlet ID: 1502001 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website, open a specially crafted file, or open a file in a working directory that contains a specially crafted DLL file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows 8 Gold - KB3039066 (x64) (Japanese) Severity: Critical Fixlet ID: 1502003 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website, open a specially crafted file, or open a file in a working directory that contains a specially crafted DLL file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2012 Gold - KB3033889 (x64) (Japanese) Severity: Critical Fixlet ID: 1502005 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website, open a specially crafted file, or open a file in a working directory that contains a specially crafted DLL file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows Vista SP2 - KB3033889 (Japanese) Severity: Critical Fixlet ID: 1502007 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website, open a specially crafted file, or open a file in a working directory that contains a specially crafted DLL file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3039066 (x64) (Japanese) Severity: Critical Fixlet ID: 1502009 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website, open a specially crafted file, or open a file in a working directory that contains a specially crafted DLL file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3039066 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 1502010 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3039066 (Japanese) Severity: Critical Fixlet ID: 1502011 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website, open a specially crafted file, or open a file in a working directory that contains a specially crafted DLL file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3039066 (Japanese) Severity: Critical Fixlet ID: 1502013 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website, open a specially crafted file, or open a file in a working directory that contains a specially crafted DLL file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3039066 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 1502014 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3033889 (x64) (Japanese) Severity: Critical Fixlet ID: 1502015 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website, open a specially crafted file, or open a file in a working directory that contains a specially crafted DLL file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3033889 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 1502016 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB3039066 (x64) (Japanese) Severity: Critical Fixlet ID: 1502017 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website, open a specially crafted file, or open a file in a working directory that contains a specially crafted DLL file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows 8 Gold - KB3033889 (x64) (Japanese) Severity: Critical Fixlet ID: 1502019 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website, open a specially crafted file, or open a file in a working directory that contains a specially crafted DLL file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB3033889 (x64) (Japanese) Severity: Critical Fixlet ID: 1502021 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website, open a specially crafted file, or open a file in a working directory that contains a specially crafted DLL file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows 7 SP1 - KB3033889 (Japanese) Severity: Critical Fixlet ID: 1502023 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website, open a specially crafted file, or open a file in a working directory that contains a specially crafted DLL file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3033889 (x64) (Japanese) Severity: Critical Fixlet ID: 1502025 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website, open a specially crafted file, or open a file in a working directory that contains a specially crafted DLL file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows Vista SP2 - KB3033889 (x64) (Japanese) Severity: Critical Fixlet ID: 1502027 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website, open a specially crafted file, or open a file in a working directory that contains a specially crafted DLL file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3033889 (Japanese) Severity: Critical Fixlet ID: 1502029 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website, open a specially crafted file, or open a file in a working directory that contains a specially crafted DLL file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2012 R2 Gold - KB3033889 (x64) (Japanese) Severity: Critical Fixlet ID: 1502031 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website, open a specially crafted file, or open a file in a working directory that contains a specially crafted DLL file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows 8.1 Gold - KB3033889 (Japanese) Severity: Critical Fixlet ID: 1502033 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website, open a specially crafted file, or open a file in a working directory that contains a specially crafted DLL file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3033889 (Japanese) Severity: Critical Fixlet ID: 1502035 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website, open a specially crafted file, or open a file in a working directory that contains a specially crafted DLL file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3033889 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 1502036 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows 7 SP1 - KB3039066 (x64) (Japanese) Severity: Critical Fixlet ID: 1502037 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website, open a specially crafted file, or open a file in a working directory that contains a specially crafted DLL file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows 8 Gold - KB3039066 (Japanese) Severity: Critical Fixlet ID: 1502039 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website, open a specially crafted file, or open a file in a working directory that contains a specially crafted DLL file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows 8.1 Gold - KB3033889 (x64) (Japanese) Severity: Critical Fixlet ID: 1502041 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website, open a specially crafted file, or open a file in a working directory that contains a specially crafted DLL file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows Vista SP2 - KB3039066 (Japanese) Severity: Critical Fixlet ID: 1502043 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website, open a specially crafted file, or open a file in a working directory that contains a specially crafted DLL file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows Vista SP2 - KB3039066 (x64) (Japanese) Severity: Critical Fixlet ID: 1502045 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website, open a specially crafted file, or open a file in a working directory that contains a specially crafted DLL file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3039066 (x64) (Japanese) Severity: Critical Fixlet ID: 1502047 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website, open a specially crafted file, or open a file in a working directory that contains a specially crafted DLL file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows 7 SP1 - KB3033889 (x64) (Japanese) Severity: Critical Fixlet ID: 1502049 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website, open a specially crafted file, or open a file in a working directory that contains a specially crafted DLL file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2012 Gold - KB3039066 (x64) (Japanese) Severity: Critical Fixlet ID: 1502051 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website, open a specially crafted file, or open a file in a working directory that contains a specially crafted DLL file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows 7 SP1 - KB3039066 (Japanese) Severity: Critical Fixlet ID: 1502053 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website, open a specially crafted file, or open a file in a working directory that contains a specially crafted DLL file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows 8.1 Gold - KB3039066 (Japanese) Severity: Critical Fixlet ID: 1502055 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website, open a specially crafted file, or open a file in a working directory that contains a specially crafted DLL file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows 8.1 Gold - KB3039066 (x64) (Japanese) Severity: Critical Fixlet ID: 1502057 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website, open a specially crafted file, or open a file in a working directory that contains a specially crafted DLL file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2012 R2 Gold - KB3039066 (x64) (Japanese) Severity: Critical Fixlet ID: 1502059 Fixlet Link: http://technet.microsoft.com/library/security/MS15-020 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website, open a specially crafted file, or open a file in a working directory that contains a specially crafted DLL file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-021: Vulnerabilities in Adobe Font Driver Could Allow Remote Code Execution - Windows Vista SP2 - KB3032323 (x64) (Japanese) Severity: Critical Fixlet ID: 1502101 Fixlet Link: http://technet.microsoft.com/library/security/MS15-021 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted file or website. An attacker who successfully exploited the vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-021: Vulnerabilities in Adobe Font Driver Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3032323 (x64) (Japanese) Severity: Critical Fixlet ID: 1502103 Fixlet Link: http://technet.microsoft.com/library/security/MS15-021 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted file or website. An attacker who successfully exploited the vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-021: Vulnerabilities in Adobe Font Driver Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3032323 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 1502104 Fixlet Link: http://technet.microsoft.com/library/security/MS15-021 *************************************************************** Title: MS15-021: Vulnerabilities in Adobe Font Driver Could Allow Remote Code Execution - Windows 8.1 Gold - KB3032323 (x64) (Japanese) Severity: Critical Fixlet ID: 1502105 Fixlet Link: http://technet.microsoft.com/library/security/MS15-021 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted file or website. An attacker who successfully exploited the vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-021: Vulnerabilities in Adobe Font Driver Could Allow Remote Code Execution - Windows 8 Gold - KB3032323 (x64) (Japanese) Severity: Critical Fixlet ID: 1502107 Fixlet Link: http://technet.microsoft.com/library/security/MS15-021 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted file or website. An attacker who successfully exploited the vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-021: Vulnerabilities in Adobe Font Driver Could Allow Remote Code Execution - Windows 7 SP1 - KB3032323 (Japanese) Severity: Critical Fixlet ID: 1502109 Fixlet Link: http://technet.microsoft.com/library/security/MS15-021 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted file or website. An attacker who successfully exploited the vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-021: Vulnerabilities in Adobe Font Driver Could Allow Remote Code Execution - Windows Server 2012 R2 Gold - KB3032323 (x64) (Japanese) Severity: Critical Fixlet ID: 1502111 Fixlet Link: http://technet.microsoft.com/library/security/MS15-021 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted file or website. An attacker who successfully exploited the vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-021: Vulnerabilities in Adobe Font Driver Could Allow Remote Code Execution - Windows 8.1 Gold - KB3032323 (Japanese) Severity: Critical Fixlet ID: 1502113 Fixlet Link: http://technet.microsoft.com/library/security/MS15-021 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted file or website. An attacker who successfully exploited the vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-021: Vulnerabilities in Adobe Font Driver Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3032323 (Japanese) Severity: Critical Fixlet ID: 1502115 Fixlet Link: http://technet.microsoft.com/library/security/MS15-021 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted file or website. An attacker who successfully exploited the vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-021: Vulnerabilities in Adobe Font Driver Could Allow Remote Code Execution - Windows 8 Gold - KB3032323 (Japanese) Severity: Critical Fixlet ID: 1502117 Fixlet Link: http://technet.microsoft.com/library/security/MS15-021 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted file or website. An attacker who successfully exploited the vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-021: Vulnerabilities in Adobe Font Driver Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3032323 (x64) (Japanese) Severity: Critical Fixlet ID: 1502119 Fixlet Link: http://technet.microsoft.com/library/security/MS15-021 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted file or website. An attacker who successfully exploited the vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-021: Vulnerabilities in Adobe Font Driver Could Allow Remote Code Execution - Windows Server 2012 Gold - KB3032323 (x64) (Japanese) Severity: Critical Fixlet ID: 1502121 Fixlet Link: http://technet.microsoft.com/library/security/MS15-021 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted file or website. An attacker who successfully exploited the vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-021: Vulnerabilities in Adobe Font Driver Could Allow Remote Code Execution - Windows 7 SP1 - KB3032323 (x64) (Japanese) Severity: Critical Fixlet ID: 1502123 Fixlet Link: http://technet.microsoft.com/library/security/MS15-021 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted file or website. An attacker who successfully exploited the vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-021: Vulnerabilities in Adobe Font Driver Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3032323 (Japanese) Severity: Critical Fixlet ID: 1502125 Fixlet Link: http://technet.microsoft.com/library/security/MS15-021 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted file or website. An attacker who successfully exploited the vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-021: Vulnerabilities in Adobe Font Driver Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3032323 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 1502126 Fixlet Link: http://technet.microsoft.com/library/security/MS15-021 *************************************************************** Title: MS15-021: Vulnerabilities in Adobe Font Driver Could Allow Remote Code Execution - Windows Vista SP2 - KB3032323 (Japanese) Severity: Critical Fixlet ID: 1502127 Fixlet Link: http://technet.microsoft.com/library/security/MS15-021 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted file or website. An attacker who successfully exploited the vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-021: Vulnerabilities in Adobe Font Driver Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB3032323 (x64) (Japanese) Severity: Critical Fixlet ID: 1502129 Fixlet Link: http://technet.microsoft.com/library/security/MS15-021 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted file or website. An attacker who successfully exploited the vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office Web Apps 2013 Gold/SP1 - KB2956158 (x64) (Japanese) Severity: Critical Fixlet ID: 1502203 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - KB2889839 (x64) (Japanese) Severity: Important Fixlet ID: 1502205 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - KB2883100 (Japanese) Severity: Important Fixlet ID: 1502207 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - Word 2010 SP2 - KB2956139 (x64) (Japanese) Severity: Critical Fixlet ID: 1502209 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - KB2883100 (x64) (Japanese) Severity: Important Fixlet ID: 1502211 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - SharePoint Server 2013 / SharePoint Foundation 2013 - KB2956183 (x64) (Japanese) Severity: Important Fixlet ID: 1502213 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - SharePoint Server 2010 SP2 - Word Automation Services - KB2956136 (x64) (Japanese) Severity: Critical Fixlet ID: 1502215 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - Excel 2010 SP2 - KB2956142 (Japanese) Severity: Important Fixlet ID: 1502217 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2007 SP3 - Excel 2007 SP3 - KB2956103 (Japanese) Severity: Important Fixlet ID: 1502219 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - SharePoint Server 2013 Gold/SP1 - KB2760554 (x64) (Japanese) Severity: Important Fixlet ID: 1502221 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - SharePoint Server 2010 SP2 / SharePoint Foundation 2010 SP2 - KB2956208 (x64) (Japanese) Severity: Important Fixlet ID: 1502223 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - Word 2010 SP2 - KB2956139 (Japanese) Severity: Critical Fixlet ID: 1502225 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - SharePoint Server 2013 Gold/SP1 / SharePoint Foundation 2013 Gold/SP1 - KB2956175 (x64) (Japanese) Severity: Important Fixlet ID: 1502227 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - KB2956076 (Japanese) Severity: Important Fixlet ID: 1502229 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2013 Gold/SP1 - Word 2013 Gold/SP1 - KB2956163 (x64) (Japanese) Severity: Critical Fixlet ID: 1502231 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - SharePoint Server 2013 Gold/SP1 - Word Automation Services - KB2920731 (x64) (Japanese) Severity: Critical Fixlet ID: 1502233 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - SharePoint Server 2013 Gold/SP1 - KB2760361 (X64) (Japanese) Severity: Important Fixlet ID: 1502235 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - SharePoint Server 2013 Gold/SP1 - KB2956181 (x64) (Japanese) Severity: Important Fixlet ID: 1502237 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - KB2956138 (Japanese) Severity: Critical Fixlet ID: 1502239 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - SharePoint Server 2013 Gold/SP1 - KB2880473 (x64) (Japanese) Severity: Important Fixlet ID: 1502241 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2013 Gold/SP1 - Word 2013 Gold/SP1 - KB2956163 (Japanese) Severity: Critical Fixlet ID: 1502243 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - SharePoint Server 2013 Gold/SP1 - KB2881078 (x64) (Japanese) Severity: Important Fixlet ID: 1502245 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office Web Apps 2010 SP2 - KB2956069 (x64) (Japanese) Severity: Critical Fixlet ID: 1502247 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2013 Gold/SP1 - KB2956151 (x64) (Japanese) Severity: Important Fixlet ID: 1502249 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - SharePoint Server 2013 Gold/SP1 - KB2956153 (x64) (Japanese) Severity: Important Fixlet ID: 1502251 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - Excel 2010 SP2 - KB2956142 (x64) (Japanese) Severity: Important Fixlet ID: 1502253 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - KB2956138 (x64) (Japanese) Severity: Critical Fixlet ID: 1502255 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office Compatibility Pack SP3 - KB2956107 (Japanese) Severity: Critical Fixlet ID: 1502257 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2007 SP3 - Word 2007 SP3 - KB2956109 (Japanese) Severity: Critical Fixlet ID: 1502259 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2007 SP3 - KB2984939 (Japanese) Severity: Important Fixlet ID: 1502261 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Excel Viewer - KB2956189 (Japanese) Severity: Important Fixlet ID: 1502263 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - KB2956076 (x64) (Japanese) Severity: Important Fixlet ID: 1502265 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - SharePoint Server 2013 Gold/SP1 - KB2737989 (x64) (Japanese) Severity: Important Fixlet ID: 1502267 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - PowerPoint 2010 SP2 - KB2920812 (Japanese) Severity: Important Fixlet ID: 1502269 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Windows SharePoint Services 3.0 SP3 / SharePoint Server 2007 SP3 - KB2881068 (Japanese) Severity: Important Fixlet ID: 1502271 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Word Viewer - KB2956188 (Japanese) Severity: Critical Fixlet ID: 1502273 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2013 Gold/SP1 - KB2956151 (Japanese) Severity: Important Fixlet ID: 1502275 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - PowerPoint 2010 SP2 - KB2920812 (x64) (Japanese) Severity: Important Fixlet ID: 1502277 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2007 SP3 - PowerPoint 2007 SP3 - KB2899580 (Japanese) Severity: Important Fixlet ID: 1502279 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office Compatibility Pack SP3 - KB2956106 (Japanese) Severity: Important Fixlet ID: 1502281 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Windows SharePoint Services 3.0 SP3 / SharePoint Server 2007 SP3 - KB2881068 (x64) (Japanese) Severity: Important Fixlet ID: 1502283 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2010 SP2 - KB2889839 (Japanese) Severity: Important Fixlet ID: 1502285 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - SharePoint Server 2013 Gold/SP1 - Excel Services - KB2956143 (Japanese) Severity: Important Fixlet ID: 1502287 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - SharePoint Server 2013 Gold/SP1 - KB2956180 (x64) (Japanese) Severity: Important Fixlet ID: 1502289 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-022: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - SharePoint Server 2013 Gold/SP1 / SharePoint Foundation 2013 Gold/SP1 - KB2760508 (Japanese) Severity: Important Fixlet ID: 1502291 Fixlet Link: http://technet.microsoft.com/library/security/MS15-022 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-023: Vulnerabilities in Kernel-Mode Driver Could Allow Elevation of Privilege - Windows 8 Gold - KB3034344 (x64) (Japanese) Severity: Important Fixlet ID: 1502301 Fixlet Link: http://technet.microsoft.com/library/security/MS15-023 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application designed to increase privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-023: Vulnerabilities in Kernel-Mode Driver Could Allow Elevation of Privilege - Windows 8.1 Gold - KB3034344 (x64) (Japanese) Severity: Important Fixlet ID: 1502303 Fixlet Link: http://technet.microsoft.com/library/security/MS15-023 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application designed to increase privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-023: Vulnerabilities in Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Vista SP2 - KB3034344 (x64) (Japanese) Severity: Important Fixlet ID: 1502305 Fixlet Link: http://technet.microsoft.com/library/security/MS15-023 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application designed to increase privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-023: Vulnerabilities in Kernel-Mode Driver Could Allow Elevation of Privilege - Windows 8 Gold - KB3034344 (Japanese) Severity: Important Fixlet ID: 1502307 Fixlet Link: http://technet.microsoft.com/library/security/MS15-023 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application designed to increase privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-023: Vulnerabilities in Kernel-Mode Driver Could Allow Elevation of Privilege - Windows 7 SP1 - KB3034344 (Japanese) Severity: Important Fixlet ID: 1502309 Fixlet Link: http://technet.microsoft.com/library/security/MS15-023 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application designed to increase privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-023: Vulnerabilities in Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Vista SP2 - KB3034344 (Japanese) Severity: Important Fixlet ID: 1502311 Fixlet Link: http://technet.microsoft.com/library/security/MS15-023 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application designed to increase privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-023: Vulnerabilities in Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Server 2012 Gold - KB3034344 (x64) (Japanese) Severity: Important Fixlet ID: 1502313 Fixlet Link: http://technet.microsoft.com/library/security/MS15-023 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application designed to increase privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-023: Vulnerabilities in Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB3034344 (Japanese) Severity: Important Fixlet ID: 1502315 Fixlet Link: http://technet.microsoft.com/library/security/MS15-023 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application designed to increase privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-023: Vulnerabilities in Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB3034344 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1502316 Fixlet Link: http://technet.microsoft.com/library/security/MS15-023 *************************************************************** Title: MS15-023: Vulnerabilities in Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3034344 (Japanese) Severity: Important Fixlet ID: 1502317 Fixlet Link: http://technet.microsoft.com/library/security/MS15-023 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application designed to increase privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-023: Vulnerabilities in Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Server 2012 R2 Gold - KB3034344 (x64) (Japanese) Severity: Important Fixlet ID: 1502319 Fixlet Link: http://technet.microsoft.com/library/security/MS15-023 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application designed to increase privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-023: Vulnerabilities in Kernel-Mode Driver Could Allow Elevation of Privilege - Windows 7 SP1 - KB3034344 (x64) (Japanese) Severity: Important Fixlet ID: 1502321 Fixlet Link: http://technet.microsoft.com/library/security/MS15-023 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application designed to increase privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-023: Vulnerabilities in Kernel-Mode Driver Could Allow Elevation of Privilege - Windows 8.1 Gold - KB3034344 (Japanese) Severity: Important Fixlet ID: 1502323 Fixlet Link: http://technet.microsoft.com/library/security/MS15-023 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application designed to increase privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-023: Vulnerabilities in Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 - KB3034344 (x64) (Japanese) Severity: Important Fixlet ID: 1502325 Fixlet Link: http://technet.microsoft.com/library/security/MS15-023 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application designed to increase privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-023: Vulnerabilities in Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3034344 (x64) (Japanese) Severity: Important Fixlet ID: 1502327 Fixlet Link: http://technet.microsoft.com/library/security/MS15-023 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application designed to increase privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-023: Vulnerabilities in Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB3034344 (x64) (Japanese) Severity: Important Fixlet ID: 1502329 Fixlet Link: http://technet.microsoft.com/library/security/MS15-023 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application designed to increase privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-023: Vulnerabilities in Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB3034344 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1502330 Fixlet Link: http://technet.microsoft.com/library/security/MS15-023 *************************************************************** Title: MS15-024: Vulnerability in PNG Processing Could Allow Information Disclosure - Windows 8.1 Gold - KB3035132 (x64) (Japanese) Severity: Important Fixlet ID: 1502401 Fixlet Link: http://technet.microsoft.com/library/security/MS15-024 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker convinces a user to visit a website that contains specially crafted PNG images. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-024: Vulnerability in PNG Processing Could Allow Information Disclosure - Windows 7 SP1 - KB3035132 (Japanese) Severity: Important Fixlet ID: 1502403 Fixlet Link: http://technet.microsoft.com/library/security/MS15-024 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker convinces a user to visit a website that contains specially crafted PNG images. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-024: Vulnerability in PNG Processing Could Allow Information Disclosure - Windows Server 2003 SP2 - KB3035132 (x64) (Japanese) Severity: Important Fixlet ID: 1502405 Fixlet Link: http://technet.microsoft.com/library/security/MS15-024 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker convinces a user to visit a website that contains specially crafted PNG images. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-024: Vulnerability in PNG Processing Could Allow Information Disclosure - Windows Server 2003 SP2 - KB3035132 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1502406 Fixlet Link: http://technet.microsoft.com/library/security/MS15-024 *************************************************************** Title: MS15-024: Vulnerability in PNG Processing Could Allow Information Disclosure - Windows 8.1 Gold - KB3035132 (Japanese) Severity: Important Fixlet ID: 1502407 Fixlet Link: http://technet.microsoft.com/library/security/MS15-024 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker convinces a user to visit a website that contains specially crafted PNG images. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-024: Vulnerability in PNG Processing Could Allow Information Disclosure - Windows 8 Gold - KB3035132 (Japanese) Severity: Important Fixlet ID: 1502409 Fixlet Link: http://technet.microsoft.com/library/security/MS15-024 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker convinces a user to visit a website that contains specially crafted PNG images. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-024: Vulnerability in PNG Processing Could Allow Information Disclosure - Windows Server 2012 R2 Gold - KB3035132 (x64) (Japanese) Severity: Important Fixlet ID: 1502411 Fixlet Link: http://technet.microsoft.com/library/security/MS15-024 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker convinces a user to visit a website that contains specially crafted PNG images. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-024: Vulnerability in PNG Processing Could Allow Information Disclosure - Windows Server 2008 SP2 - KB3035132 (x64) (Japanese) Severity: Important Fixlet ID: 1502413 Fixlet Link: http://technet.microsoft.com/library/security/MS15-024 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker convinces a user to visit a website that contains specially crafted PNG images. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-024: Vulnerability in PNG Processing Could Allow Information Disclosure - Windows 8 Gold - KB3035132 (x64) (Japanese) Severity: Important Fixlet ID: 1502415 Fixlet Link: http://technet.microsoft.com/library/security/MS15-024 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker convinces a user to visit a website that contains specially crafted PNG images. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-024: Vulnerability in PNG Processing Could Allow Information Disclosure - Windows Vista SP2 - KB3035132 (Japanese) Severity: Important Fixlet ID: 1502417 Fixlet Link: http://technet.microsoft.com/library/security/MS15-024 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker convinces a user to visit a website that contains specially crafted PNG images. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-024: Vulnerability in PNG Processing Could Allow Information Disclosure - Windows Server 2003 SP2 - KB3035132 (Japanese) Severity: Important Fixlet ID: 1502419 Fixlet Link: http://technet.microsoft.com/library/security/MS15-024 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker convinces a user to visit a website that contains specially crafted PNG images. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-024: Vulnerability in PNG Processing Could Allow Information Disclosure - Windows Server 2003 SP2 - KB3035132 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1502420 Fixlet Link: http://technet.microsoft.com/library/security/MS15-024 *************************************************************** Title: MS15-024: Vulnerability in PNG Processing Could Allow Information Disclosure - Windows Server 2008 R2 SP1 - KB3035132 (x64) (Japanese) Severity: Important Fixlet ID: 1502421 Fixlet Link: http://technet.microsoft.com/library/security/MS15-024 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker convinces a user to visit a website that contains specially crafted PNG images. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-024: Vulnerability in PNG Processing Could Allow Information Disclosure - Windows Server 2008 SP2 - KB3035132 (Japanese) Severity: Important Fixlet ID: 1502423 Fixlet Link: http://technet.microsoft.com/library/security/MS15-024 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker convinces a user to visit a website that contains specially crafted PNG images. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-024: Vulnerability in PNG Processing Could Allow Information Disclosure - Windows Server 2012 Gold - KB3035132 (x64) (Japanese) Severity: Important Fixlet ID: 1502425 Fixlet Link: http://technet.microsoft.com/library/security/MS15-024 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker convinces a user to visit a website that contains specially crafted PNG images. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-024: Vulnerability in PNG Processing Could Allow Information Disclosure - Windows 7 SP1 - KB3035132 (x64) (Japanese) Severity: Important Fixlet ID: 1502427 Fixlet Link: http://technet.microsoft.com/library/security/MS15-024 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker convinces a user to visit a website that contains specially crafted PNG images. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-024: Vulnerability in PNG Processing Could Allow Information Disclosure - Windows Vista SP2 - KB3035132 (x64) (Japanese) Severity: Important Fixlet ID: 1502429 Fixlet Link: http://technet.microsoft.com/library/security/MS15-024 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker convinces a user to visit a website that contains specially crafted PNG images. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2012 R2 Gold - KB3035131 (x64) (Japanese) Severity: Important Fixlet ID: 1502501 Fixlet Link: http://technet.microsoft.com/library/security/MS15-025 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited the vulnerability could run arbitrary code in the security context of the account of another user who is logged on to the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts potentially with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows 7 SP1 - KB3035131 (x64) (Japanese) Severity: Important Fixlet ID: 1502503 Fixlet Link: http://technet.microsoft.com/library/security/MS15-025 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited the vulnerability could run arbitrary code in the security context of the account of another user who is logged on to the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts potentially with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Vista SP2 - KB3035131 (x64) (Japanese) Severity: Important Fixlet ID: 1502505 Fixlet Link: http://technet.microsoft.com/library/security/MS15-025 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited the vulnerability could run arbitrary code in the security context of the account of another user who is logged on to the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts potentially with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows 8 Gold - KB3035131 (Japanese) Severity: Important Fixlet ID: 1502507 Fixlet Link: http://technet.microsoft.com/library/security/MS15-025 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited the vulnerability could run arbitrary code in the security context of the account of another user who is logged on to the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts potentially with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows 8.1 Gold - KB3035131 (Japanese) Severity: Important Fixlet ID: 1502509 Fixlet Link: http://technet.microsoft.com/library/security/MS15-025 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited the vulnerability could run arbitrary code in the security context of the account of another user who is logged on to the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts potentially with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 - KB3035131 (x64) (Japanese) Severity: Important Fixlet ID: 1502511 Fixlet Link: http://technet.microsoft.com/library/security/MS15-025 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited the vulnerability could run arbitrary code in the security context of the account of another user who is logged on to the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts potentially with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3035131 (Japanese) Severity: Important Fixlet ID: 1502513 Fixlet Link: http://technet.microsoft.com/library/security/MS15-025 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited the vulnerability could run arbitrary code in the security context of the account of another user who is logged on to the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts potentially with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2012 Gold - KB3035131 (x64) (Japanese) Severity: Important Fixlet ID: 1502515 Fixlet Link: http://technet.microsoft.com/library/security/MS15-025 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited the vulnerability could run arbitrary code in the security context of the account of another user who is logged on to the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts potentially with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB3033395 (Japanese) Severity: Important Fixlet ID: 1502517 Fixlet Link: http://technet.microsoft.com/library/security/MS15-025 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited the vulnerability could run arbitrary code in the security context of the account of another user who is logged on to the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts potentially with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB3033395 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1502518 Fixlet Link: http://technet.microsoft.com/library/security/MS15-025 *************************************************************** Title: MS15-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB3033395 (x64) (Japanese) Severity: Important Fixlet ID: 1502519 Fixlet Link: http://technet.microsoft.com/library/security/MS15-025 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited the vulnerability could run arbitrary code in the security context of the account of another user who is logged on to the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts potentially with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB3033395 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1502520 Fixlet Link: http://technet.microsoft.com/library/security/MS15-025 *************************************************************** Title: MS15-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Vista SP2 - KB3035131 (Japanese) Severity: Important Fixlet ID: 1502521 Fixlet Link: http://technet.microsoft.com/library/security/MS15-025 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited the vulnerability could run arbitrary code in the security context of the account of another user who is logged on to the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts potentially with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows 8.1 Gold - KB3035131 (x64) (Japanese) Severity: Important Fixlet ID: 1502523 Fixlet Link: http://technet.microsoft.com/library/security/MS15-025 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited the vulnerability could run arbitrary code in the security context of the account of another user who is logged on to the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts potentially with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows 7 SP1 - KB3035131 (Japanese) Severity: Important Fixlet ID: 1502525 Fixlet Link: http://technet.microsoft.com/library/security/MS15-025 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited the vulnerability could run arbitrary code in the security context of the account of another user who is logged on to the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts potentially with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows 8 Gold - KB3035131 (x64) (Japanese) Severity: Important Fixlet ID: 1502527 Fixlet Link: http://technet.microsoft.com/library/security/MS15-025 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited the vulnerability could run arbitrary code in the security context of the account of another user who is logged on to the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts potentially with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB3035131 (x64) (Japanese) Severity: Important Fixlet ID: 1502529 Fixlet Link: http://technet.microsoft.com/library/security/MS15-025 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited the vulnerability could run arbitrary code in the security context of the account of another user who is logged on to the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts potentially with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-026: Vulnerabilities in Microsoft Exchange Server Could Allow Elevation of Privilege - Exchange Server 2013 Cumulative Update 7 - KB3040856 (x64) (Japanese) Severity: Important Fixlet ID: 1502601 Fixlet Link: http://technet.microsoft.com/library/security/MS15-026 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Exchange Server. The most severe of the vulnerabilities could allow elevation of privilege if a user clicks a specially crafted URL that takes them to a targeted Outlook Web App site. An attacker would have no way to force users to visit a specially crafted website. Instead, an attacker would have to convince them to visit the website, typically by getting them to click a link in an instant messenger or email message that takes them to the attacker's website, and then convince them to click the specially crafted URL. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-026: Vulnerabilities in Microsoft Exchange Server Could Allow Elevation of Privilege - Exchange Server 2013 SP1 - KB3040856 (x64) (Japanese) Severity: Important Fixlet ID: 1502603 Fixlet Link: http://technet.microsoft.com/library/security/MS15-026 Fixlet Description: Microsoft has released a security update that resolves vulnerabilities in Microsoft Exchange Server. The most severe of the vulnerabilities could allow elevation of privilege if a user clicks a specially crafted URL that takes them to a targeted Outlook Web App site. An attacker would have no way to force users to visit a specially crafted website. Instead, an attacker would have to convince them to visit the website, typically by getting them to click a link in an instant messenger or email message that takes them to the attacker's website, and then convince them to click the specially crafted URL. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS15-027: Vulnerability in NETLOGON Could Allow Spoofing - Windows Server 2008 SP2 - KB3002657 (Japanese) Severity: Important Fixlet ID: 1502701 Fixlet Link: http://technet.microsoft.com/library/security/MS15-027 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow spoofing if an attacker who is logged on to a domain-joined system runs a specially crafted application that could establish a connection with other domain-joined systems as the impersonated user or system. The attacker must be logged on to a domain-joined system and be able to observe network traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-027: Vulnerability in NETLOGON Could Allow Spoofing - Windows Server 2003 SP2 - KB3002657 (x64) (Japanese) Severity: Important Fixlet ID: 1502703 Fixlet Link: http://technet.microsoft.com/library/security/MS15-027 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow spoofing if an attacker who is logged on to a domain-joined system runs a specially crafted application that could establish a connection with other domain-joined systems as the impersonated user or system. The attacker must be logged on to a domain-joined system and be able to observe network traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-027: Vulnerability in NETLOGON Could Allow Spoofing - Windows Server 2003 SP2 - KB3002657 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1502704 Fixlet Link: http://technet.microsoft.com/library/security/MS15-027 *************************************************************** Title: MS15-027: Vulnerability in NETLOGON Could Allow Spoofing - Windows Server 2008 SP2 - KB3002657 (x64) (Japanese) Severity: Important Fixlet ID: 1502705 Fixlet Link: http://technet.microsoft.com/library/security/MS15-027 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow spoofing if an attacker who is logged on to a domain-joined system runs a specially crafted application that could establish a connection with other domain-joined systems as the impersonated user or system. The attacker must be logged on to a domain-joined system and be able to observe network traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-027: Vulnerability in NETLOGON Could Allow Spoofing - Windows Server 2003 SP2 - KB3002657 (Japanese) Severity: Important Fixlet ID: 1502707 Fixlet Link: http://technet.microsoft.com/library/security/MS15-027 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow spoofing if an attacker who is logged on to a domain-joined system runs a specially crafted application that could establish a connection with other domain-joined systems as the impersonated user or system. The attacker must be logged on to a domain-joined system and be able to observe network traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-027: Vulnerability in NETLOGON Could Allow Spoofing - Windows Server 2003 SP2 - KB3002657 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1502708 Fixlet Link: http://technet.microsoft.com/library/security/MS15-027 *************************************************************** Title: MS15-027: Vulnerability in NETLOGON Could Allow Spoofing - Windows Server 2012 R2 Gold - KB3002657 (x64) (Japanese) Severity: Important Fixlet ID: 1502709 Fixlet Link: http://technet.microsoft.com/library/security/MS15-027 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow spoofing if an attacker who is logged on to a domain-joined system runs a specially crafted application that could establish a connection with other domain-joined systems as the impersonated user or system. The attacker must be logged on to a domain-joined system and be able to observe network traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-027: Vulnerability in NETLOGON Could Allow Spoofing - Windows Server 2012 Gold - KB3002657 (x64) (Japanese) Severity: Important Fixlet ID: 1502711 Fixlet Link: http://technet.microsoft.com/library/security/MS15-027 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow spoofing if an attacker who is logged on to a domain-joined system runs a specially crafted application that could establish a connection with other domain-joined systems as the impersonated user or system. The attacker must be logged on to a domain-joined system and be able to observe network traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-027: Vulnerability in NETLOGON Could Allow Spoofing - Windows Server 2008 R2 SP1 - KB3002657 (x64) (Japanese) Severity: Important Fixlet ID: 1502713 Fixlet Link: http://technet.microsoft.com/library/security/MS15-027 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow spoofing if an attacker who is logged on to a domain-joined system runs a specially crafted application that could establish a connection with other domain-joined systems as the impersonated user or system. The attacker must be logged on to a domain-joined system and be able to observe network traffic. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-028: Vulnerability in Windows Task Scheduler Could Allow Security Feature Bypass - Windows 7 SP1 - KB3030377 (x64) (Japanese) Severity: Important Fixlet ID: 1502801 Fixlet Link: http://technet.microsoft.com/library/security/MS15-028 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow a user with limited privileges on an affected system to leverage Task Scheduler to execute files that they do not have permissions to run. An attacker who successfully exploited this vulnerability could bypass access control list (ACL) checks and run privileged executables. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-028: Vulnerability in Windows Task Scheduler Could Allow Security Feature Bypass - Windows Server 2012 Gold - KB3030377 (x64) (Japanese) Severity: Important Fixlet ID: 1502803 Fixlet Link: http://technet.microsoft.com/library/security/MS15-028 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow a user with limited privileges on an affected system to leverage Task Scheduler to execute files that they do not have permissions to run. An attacker who successfully exploited this vulnerability could bypass access control list (ACL) checks and run privileged executables. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-028: Vulnerability in Windows Task Scheduler Could Allow Security Feature Bypass - Windows 8.1 Gold - KB3030377 (x64) (Japanese) Severity: Important Fixlet ID: 1502805 Fixlet Link: http://technet.microsoft.com/library/security/MS15-028 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow a user with limited privileges on an affected system to leverage Task Scheduler to execute files that they do not have permissions to run. An attacker who successfully exploited this vulnerability could bypass access control list (ACL) checks and run privileged executables. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-028: Vulnerability in Windows Task Scheduler Could Allow Security Feature Bypass - Windows 8 Gold - KB3030377 (Japanese) Severity: Important Fixlet ID: 1502807 Fixlet Link: http://technet.microsoft.com/library/security/MS15-028 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow a user with limited privileges on an affected system to leverage Task Scheduler to execute files that they do not have permissions to run. An attacker who successfully exploited this vulnerability could bypass access control list (ACL) checks and run privileged executables. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-028: Vulnerability in Windows Task Scheduler Could Allow Security Feature Bypass - Windows 8.1 Gold - KB3030377 (Japanese) Severity: Important Fixlet ID: 1502809 Fixlet Link: http://technet.microsoft.com/library/security/MS15-028 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow a user with limited privileges on an affected system to leverage Task Scheduler to execute files that they do not have permissions to run. An attacker who successfully exploited this vulnerability could bypass access control list (ACL) checks and run privileged executables. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-028: Vulnerability in Windows Task Scheduler Could Allow Security Feature Bypass - Windows 7 SP1 - KB3030377 (Japanese) Severity: Important Fixlet ID: 1502811 Fixlet Link: http://technet.microsoft.com/library/security/MS15-028 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow a user with limited privileges on an affected system to leverage Task Scheduler to execute files that they do not have permissions to run. An attacker who successfully exploited this vulnerability could bypass access control list (ACL) checks and run privileged executables. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-028: Vulnerability in Windows Task Scheduler Could Allow Security Feature Bypass - Windows 8 Gold - KB3030377 (x64) (Japanese) Severity: Important Fixlet ID: 1502813 Fixlet Link: http://technet.microsoft.com/library/security/MS15-028 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow a user with limited privileges on an affected system to leverage Task Scheduler to execute files that they do not have permissions to run. An attacker who successfully exploited this vulnerability could bypass access control list (ACL) checks and run privileged executables. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-028: Vulnerability in Windows Task Scheduler Could Allow Security Feature Bypass - Windows Server 2012 R2 Gold - KB3030377 (x64) (Japanese) Severity: Important Fixlet ID: 1502815 Fixlet Link: http://technet.microsoft.com/library/security/MS15-028 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow a user with limited privileges on an affected system to leverage Task Scheduler to execute files that they do not have permissions to run. An attacker who successfully exploited this vulnerability could bypass access control list (ACL) checks and run privileged executables. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-028: Vulnerability in Windows Task Scheduler Could Allow Security Feature Bypass - Windows Server 2008 R2 SP1 - KB3030377 (x64) (Japanese) Severity: Important Fixlet ID: 1502817 Fixlet Link: http://technet.microsoft.com/library/security/MS15-028 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow a user with limited privileges on an affected system to leverage Task Scheduler to execute files that they do not have permissions to run. An attacker who successfully exploited this vulnerability could bypass access control list (ACL) checks and run privileged executables. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-029: Vulnerability in Windows Photo Decoder Component Could Allow Information Disclosure - Windows Server 2008 SP2 - KB3035126 (x64) (Japanese) Severity: Important Fixlet ID: 1502901 Fixlet Link: http://technet.microsoft.com/library/security/MS15-029 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if a user browses to a website containing a specially crafted JPEG XR (.JXR) image. This vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-029: Vulnerability in Windows Photo Decoder Component Could Allow Information Disclosure - Windows Server 2012 R2 Gold - KB3035126 (x64) (Japanese) Severity: Important Fixlet ID: 1502903 Fixlet Link: http://technet.microsoft.com/library/security/MS15-029 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if a user browses to a website containing a specially crafted JPEG XR (.JXR) image. This vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-029: Vulnerability in Windows Photo Decoder Component Could Allow Information Disclosure - Windows 8.1 Gold - KB3035126 (x64) (Japanese) Severity: Important Fixlet ID: 1502905 Fixlet Link: http://technet.microsoft.com/library/security/MS15-029 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if a user browses to a website containing a specially crafted JPEG XR (.JXR) image. This vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-029: Vulnerability in Windows Photo Decoder Component Could Allow Information Disclosure - Windows Server 2008 R2 SP1 - KB3035126 (x64) (Japanese) Severity: Important Fixlet ID: 1502907 Fixlet Link: http://technet.microsoft.com/library/security/MS15-029 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if a user browses to a website containing a specially crafted JPEG XR (.JXR) image. This vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-029: Vulnerability in Windows Photo Decoder Component Could Allow Information Disclosure - Windows 7 SP1 - KB3035126 (Japanese) Severity: Important Fixlet ID: 1502909 Fixlet Link: http://technet.microsoft.com/library/security/MS15-029 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if a user browses to a website containing a specially crafted JPEG XR (.JXR) image. This vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-029: Vulnerability in Windows Photo Decoder Component Could Allow Information Disclosure - Windows 8.1 Gold - KB3035126 (Japanese) Severity: Important Fixlet ID: 1502911 Fixlet Link: http://technet.microsoft.com/library/security/MS15-029 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if a user browses to a website containing a specially crafted JPEG XR (.JXR) image. This vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-029: Vulnerability in Windows Photo Decoder Component Could Allow Information Disclosure - Windows 8 Gold - KB3035126 (x64) (Japanese) Severity: Important Fixlet ID: 1502913 Fixlet Link: http://technet.microsoft.com/library/security/MS15-029 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if a user browses to a website containing a specially crafted JPEG XR (.JXR) image. This vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-029: Vulnerability in Windows Photo Decoder Component Could Allow Information Disclosure - Windows 8 Gold - KB3035126 (Japanese) Severity: Important Fixlet ID: 1502915 Fixlet Link: http://technet.microsoft.com/library/security/MS15-029 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if a user browses to a website containing a specially crafted JPEG XR (.JXR) image. This vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-029: Vulnerability in Windows Photo Decoder Component Could Allow Information Disclosure - Windows Vista SP2 - KB3035126 (x64) (Japanese) Severity: Important Fixlet ID: 1502917 Fixlet Link: http://technet.microsoft.com/library/security/MS15-029 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if a user browses to a website containing a specially crafted JPEG XR (.JXR) image. This vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-029: Vulnerability in Windows Photo Decoder Component Could Allow Information Disclosure - Windows Vista SP2 - KB3035126 (Japanese) Severity: Important Fixlet ID: 1502919 Fixlet Link: http://technet.microsoft.com/library/security/MS15-029 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if a user browses to a website containing a specially crafted JPEG XR (.JXR) image. This vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-029: Vulnerability in Windows Photo Decoder Component Could Allow Information Disclosure - Windows Server 2012 Gold - KB3035126 (x64) (Japanese) Severity: Important Fixlet ID: 1502921 Fixlet Link: http://technet.microsoft.com/library/security/MS15-029 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if a user browses to a website containing a specially crafted JPEG XR (.JXR) image. This vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-029: Vulnerability in Windows Photo Decoder Component Could Allow Information Disclosure - Windows Server 2008 SP2 - KB3035126 (Japanese) Severity: Important Fixlet ID: 1502923 Fixlet Link: http://technet.microsoft.com/library/security/MS15-029 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if a user browses to a website containing a specially crafted JPEG XR (.JXR) image. This vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-029: Vulnerability in Windows Photo Decoder Component Could Allow Information Disclosure - Windows 7 SP1 - KB3035126 (x64) (Japanese) Severity: Important Fixlet ID: 1502925 Fixlet Link: http://technet.microsoft.com/library/security/MS15-029 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if a user browses to a website containing a specially crafted JPEG XR (.JXR) image. This vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-030: Vulnerability in Remote Desktop Protocol Could Allow Denial of Service - Windows 8.1 Gold - KB3035017 (x64) (Japanese) Severity: Important Fixlet ID: 1503001 Fixlet Link: http://technet.microsoft.com/library/security/MS15-030 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker creates multiple Remote Desktop Protocol (RDP) sessions that fail to properly free objects in memory. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-030: Vulnerability in Remote Desktop Protocol Could Allow Denial of Service - Windows 7 SP1 - KB3036493 (x64) (Japanese) Severity: Important Fixlet ID: 1503003 Fixlet Link: http://technet.microsoft.com/library/security/MS15-030 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker creates multiple Remote Desktop Protocol (RDP) sessions that fail to properly free objects in memory. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-030: Vulnerability in Remote Desktop Protocol Could Allow Denial of Service - Windows 7 SP1 - KB3035017 (Japanese) Severity: Important Fixlet ID: 1503005 Fixlet Link: http://technet.microsoft.com/library/security/MS15-030 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker creates multiple Remote Desktop Protocol (RDP) sessions that fail to properly free objects in memory. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-030: Vulnerability in Remote Desktop Protocol Could Allow Denial of Service - Windows 8 Gold - KB3035017 (x64) (Japanese) Severity: Important Fixlet ID: 1503007 Fixlet Link: http://technet.microsoft.com/library/security/MS15-030 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker creates multiple Remote Desktop Protocol (RDP) sessions that fail to properly free objects in memory. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-030: Vulnerability in Remote Desktop Protocol Could Allow Denial of Service - Windows Server 2012 Gold - KB3035017 (x64) (Japanese) Severity: Important Fixlet ID: 1503009 Fixlet Link: http://technet.microsoft.com/library/security/MS15-030 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker creates multiple Remote Desktop Protocol (RDP) sessions that fail to properly free objects in memory. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-030: Vulnerability in Remote Desktop Protocol Could Allow Denial of Service - Windows 8 Gold - KB3035017 (Japanese) Severity: Important Fixlet ID: 1503011 Fixlet Link: http://technet.microsoft.com/library/security/MS15-030 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker creates multiple Remote Desktop Protocol (RDP) sessions that fail to properly free objects in memory. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-030: Vulnerability in Remote Desktop Protocol Could Allow Denial of Service - Windows 8.1 Gold - KB3035017 (Japanese) Severity: Important Fixlet ID: 1503013 Fixlet Link: http://technet.microsoft.com/library/security/MS15-030 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker creates multiple Remote Desktop Protocol (RDP) sessions that fail to properly free objects in memory. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-030: Vulnerability in Remote Desktop Protocol Could Allow Denial of Service - Windows Server 2012 R2 Gold - KB3035017 (x64) (Japanese) Severity: Important Fixlet ID: 1503015 Fixlet Link: http://technet.microsoft.com/library/security/MS15-030 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker creates multiple Remote Desktop Protocol (RDP) sessions that fail to properly free objects in memory. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-030: Vulnerability in Remote Desktop Protocol Could Allow Denial of Service - Windows 7 SP1 - KB3036493 (Japanese) Severity: Important Fixlet ID: 1503017 Fixlet Link: http://technet.microsoft.com/library/security/MS15-030 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker creates multiple Remote Desktop Protocol (RDP) sessions that fail to properly free objects in memory. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-030: Vulnerability in Remote Desktop Protocol Could Allow Denial of Service - Windows 7 SP1 - KB3035017 (x64) (Japanese) Severity: Important Fixlet ID: 1503019 Fixlet Link: http://technet.microsoft.com/library/security/MS15-030 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker creates multiple Remote Desktop Protocol (RDP) sessions that fail to properly free objects in memory. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-031: Vulnerability in Schannel Could Allow Security Feature Bypass - Windows 8 Gold - KB3046049 (x64) (Japanese) Severity: Important Fixlet ID: 1503101 Fixlet Link: http://technet.microsoft.com/library/security/MS15-031 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows that facilitates exploitation of the publicly disclosed FREAK technique, an industry-wide issue that is not specific to Windows operating systems. The vulnerability could allow a man-in-the-middle (MiTM) attacker to force the downgrading of the key length of an RSA key to EXPORT-grade length in a TLS connection. Any Windows system using Schannel to connect to a remote TLS server with an insecure cipher suite is affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-031: Vulnerability in Schannel Could Allow Security Feature Bypass - Windows Server 2008 SP2 - KB3046049 (Japanese) Severity: Important Fixlet ID: 1503103 Fixlet Link: http://technet.microsoft.com/library/security/MS15-031 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows that facilitates exploitation of the publicly disclosed FREAK technique, an industry-wide issue that is not specific to Windows operating systems. The vulnerability could allow a man-in-the-middle (MiTM) attacker to force the downgrading of the key length of an RSA key to EXPORT-grade length in a TLS connection. Any Windows system using Schannel to connect to a remote TLS server with an insecure cipher suite is affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-031: Vulnerability in Schannel Could Allow Security Feature Bypass - Windows Server 2003 SP2 - KB3046049 (x64) (Japanese) Severity: Important Fixlet ID: 1503105 Fixlet Link: http://technet.microsoft.com/library/security/MS15-031 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows that facilitates exploitation of the publicly disclosed FREAK technique, an industry-wide issue that is not specific to Windows operating systems. The vulnerability could allow a man-in-the-middle (MiTM) attacker to force the downgrading of the key length of an RSA key to EXPORT-grade length in a TLS connection. Any Windows system using Schannel to connect to a remote TLS server with an insecure cipher suite is affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-031: Vulnerability in Schannel Could Allow Security Feature Bypass - Windows Server 2003 SP2 - KB3046049 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1503106 Fixlet Link: http://technet.microsoft.com/library/security/MS15-031 *************************************************************** Title: MS15-031: Vulnerability in Schannel Could Allow Security Feature Bypass - Windows 8 Gold - KB3046049 (Japanese) Severity: Important Fixlet ID: 1503107 Fixlet Link: http://technet.microsoft.com/library/security/MS15-031 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows that facilitates exploitation of the publicly disclosed FREAK technique, an industry-wide issue that is not specific to Windows operating systems. The vulnerability could allow a man-in-the-middle (MiTM) attacker to force the downgrading of the key length of an RSA key to EXPORT-grade length in a TLS connection. Any Windows system using Schannel to connect to a remote TLS server with an insecure cipher suite is affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-031: Vulnerability in Schannel Could Allow Security Feature Bypass - Windows Vista SP2 - KB3046049 (x64) (Japanese) Severity: Important Fixlet ID: 1503109 Fixlet Link: http://technet.microsoft.com/library/security/MS15-031 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows that facilitates exploitation of the publicly disclosed FREAK technique, an industry-wide issue that is not specific to Windows operating systems. The vulnerability could allow a man-in-the-middle (MiTM) attacker to force the downgrading of the key length of an RSA key to EXPORT-grade length in a TLS connection. Any Windows system using Schannel to connect to a remote TLS server with an insecure cipher suite is affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-031: Vulnerability in Schannel Could Allow Security Feature Bypass - Windows Server 2008 SP2 - KB3046049 (x64) (Japanese) Severity: Important Fixlet ID: 1503111 Fixlet Link: http://technet.microsoft.com/library/security/MS15-031 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows that facilitates exploitation of the publicly disclosed FREAK technique, an industry-wide issue that is not specific to Windows operating systems. The vulnerability could allow a man-in-the-middle (MiTM) attacker to force the downgrading of the key length of an RSA key to EXPORT-grade length in a TLS connection. Any Windows system using Schannel to connect to a remote TLS server with an insecure cipher suite is affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-031: Vulnerability in Schannel Could Allow Security Feature Bypass - Windows 7 SP1 - KB3046049 (Japanese) Severity: Important Fixlet ID: 1503113 Fixlet Link: http://technet.microsoft.com/library/security/MS15-031 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows that facilitates exploitation of the publicly disclosed FREAK technique, an industry-wide issue that is not specific to Windows operating systems. The vulnerability could allow a man-in-the-middle (MiTM) attacker to force the downgrading of the key length of an RSA key to EXPORT-grade length in a TLS connection. Any Windows system using Schannel to connect to a remote TLS server with an insecure cipher suite is affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-031: Vulnerability in Schannel Could Allow Security Feature Bypass - Windows Server 2003 SP2 - KB3046049 (Japanese) Severity: Important Fixlet ID: 1503115 Fixlet Link: http://technet.microsoft.com/library/security/MS15-031 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows that facilitates exploitation of the publicly disclosed FREAK technique, an industry-wide issue that is not specific to Windows operating systems. The vulnerability could allow a man-in-the-middle (MiTM) attacker to force the downgrading of the key length of an RSA key to EXPORT-grade length in a TLS connection. Any Windows system using Schannel to connect to a remote TLS server with an insecure cipher suite is affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-031: Vulnerability in Schannel Could Allow Security Feature Bypass - Windows Server 2003 SP2 - KB3046049 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 1503116 Fixlet Link: http://technet.microsoft.com/library/security/MS15-031 *************************************************************** Title: MS15-031: Vulnerability in Schannel Could Allow Security Feature Bypass - Windows Server 2008 R2 SP1 - KB3046049 (x64) (Japanese) Severity: Important Fixlet ID: 1503117 Fixlet Link: http://technet.microsoft.com/library/security/MS15-031 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows that facilitates exploitation of the publicly disclosed FREAK technique, an industry-wide issue that is not specific to Windows operating systems. The vulnerability could allow a man-in-the-middle (MiTM) attacker to force the downgrading of the key length of an RSA key to EXPORT-grade length in a TLS connection. Any Windows system using Schannel to connect to a remote TLS server with an insecure cipher suite is affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-031: Vulnerability in Schannel Could Allow Security Feature Bypass - Windows Server 2012 R2 Gold - KB3046049 (x64) (Japanese) Severity: Important Fixlet ID: 1503119 Fixlet Link: http://technet.microsoft.com/library/security/MS15-031 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows that facilitates exploitation of the publicly disclosed FREAK technique, an industry-wide issue that is not specific to Windows operating systems. The vulnerability could allow a man-in-the-middle (MiTM) attacker to force the downgrading of the key length of an RSA key to EXPORT-grade length in a TLS connection. Any Windows system using Schannel to connect to a remote TLS server with an insecure cipher suite is affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-031: Vulnerability in Schannel Could Allow Security Feature Bypass - Windows Vista SP2 - KB3046049 (Japanese) Severity: Important Fixlet ID: 1503121 Fixlet Link: http://technet.microsoft.com/library/security/MS15-031 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows that facilitates exploitation of the publicly disclosed FREAK technique, an industry-wide issue that is not specific to Windows operating systems. The vulnerability could allow a man-in-the-middle (MiTM) attacker to force the downgrading of the key length of an RSA key to EXPORT-grade length in a TLS connection. Any Windows system using Schannel to connect to a remote TLS server with an insecure cipher suite is affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-031: Vulnerability in Schannel Could Allow Security Feature Bypass - Windows 7 SP1 - KB3046049 (x64) (Japanese) Severity: Important Fixlet ID: 1503123 Fixlet Link: http://technet.microsoft.com/library/security/MS15-031 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows that facilitates exploitation of the publicly disclosed FREAK technique, an industry-wide issue that is not specific to Windows operating systems. The vulnerability could allow a man-in-the-middle (MiTM) attacker to force the downgrading of the key length of an RSA key to EXPORT-grade length in a TLS connection. Any Windows system using Schannel to connect to a remote TLS server with an insecure cipher suite is affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-031: Vulnerability in Schannel Could Allow Security Feature Bypass - Windows Server 2012 Gold - KB3046049 (x64) (Japanese) Severity: Important Fixlet ID: 1503125 Fixlet Link: http://technet.microsoft.com/library/security/MS15-031 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows that facilitates exploitation of the publicly disclosed FREAK technique, an industry-wide issue that is not specific to Windows operating systems. The vulnerability could allow a man-in-the-middle (MiTM) attacker to force the downgrading of the key length of an RSA key to EXPORT-grade length in a TLS connection. Any Windows system using Schannel to connect to a remote TLS server with an insecure cipher suite is affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-031: Vulnerability in Schannel Could Allow Security Feature Bypass - Windows 8.1 Gold - KB3046049 (x64) (Japanese) Severity: Important Fixlet ID: 1503127 Fixlet Link: http://technet.microsoft.com/library/security/MS15-031 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows that facilitates exploitation of the publicly disclosed FREAK technique, an industry-wide issue that is not specific to Windows operating systems. The vulnerability could allow a man-in-the-middle (MiTM) attacker to force the downgrading of the key length of an RSA key to EXPORT-grade length in a TLS connection. Any Windows system using Schannel to connect to a remote TLS server with an insecure cipher suite is affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS15-031: Vulnerability in Schannel Could Allow Security Feature Bypass - Windows 8.1 Gold - KB3046049 (Japanese) Severity: Important Fixlet ID: 1503129 Fixlet Link: http://technet.microsoft.com/library/security/MS15-031 Fixlet Description: Microsoft has released a security update that resolves a vulnerability in Microsoft Windows that facilitates exploitation of the publicly disclosed FREAK technique, an industry-wide issue that is not specific to Windows operating systems. The vulnerability could allow a man-in-the-middle (MiTM) attacker to force the downgrading of the key length of an RSA key to EXPORT-grade length in a TLS connection. Any Windows system using Schannel to connect to a remote TLS server with an insecure cipher suite is affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3033929: Security advisory: Availability of SHA-2 code signing support for Windows 7 and Windows Server 2008 R2 - Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 303392901 Fixlet Link: http://support.microsoft.com/kb/3033929 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3033929: Security advisory: Availability of SHA-2 code signing support for Windows 7 and Windows Server 2008 R2 - Windows 7 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 303392905 Fixlet Link: http://support.microsoft.com/kb/3033929 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3033929: Security advisory: Availability of SHA-2 code signing support for Windows 7 and Windows Server 2008 R2 - Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 303392909 Fixlet Link: http://support.microsoft.com/kb/3033929 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3044132: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 304413201 Fixlet Link: http://support.microsoft.com/kb/3044132 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 3044132: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows Server 2012 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 304413203 Fixlet Link: http://support.microsoft.com/kb/3044132 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 3044132: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 304413205 Fixlet Link: http://support.microsoft.com/kb/3044132 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 3044132: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 304413207 Fixlet Link: http://support.microsoft.com/kb/3044132 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 3044132: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 304413209 Fixlet Link: http://support.microsoft.com/kb/3044132 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 3044132: Security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 304413211 Fixlet Link: http://support.microsoft.com/kb/3044132 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. From autonotify at us.ibm.com Wed Mar 25 02:34:59 2015 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Wed, 25 Mar 2015 02:34:59 -0700 Subject: [BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)' Message-ID: <201503250934.t2P9YxCJ004751@d01av02.pok.ibm.com> Fixlet Site - 'Patches for Windows (Japanese)' Current Version: 642 Published: Tue, 24 Mar 2015 12:28:31 GMT New Fixlets: ============ *************************************************************** Title: 3000988: "The profile for the user is a temporary profile" error when you install a MSI package in Windows - Windows Server 2003 SP2 (x64) (Japanese) Severity: N/A Fixlet ID: 300098825 Fixlet Link: http://support.microsoft.com/kb/3000988 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3000988: "The profile for the user is a temporary profile" error when you install a MSI package in Windows - Windows Server 2003 SP2 (Japanese) Severity: N/A Fixlet ID: 300098829 Fixlet Link: http://support.microsoft.com/kb/3000988 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3008627: Unexpected UAC prompt after you install update 2918614 in Windows - Windows Vista SP2 (x64) (Japanese) Severity: N/A Fixlet ID: 300862729 Fixlet Link: http://support.microsoft.com/kb/3008627 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3008627: Unexpected UAC prompt after you install update 2918614 in Windows - Windows Vista SP2 (Japanese) Severity: N/A Fixlet ID: 300862731 Fixlet Link: http://support.microsoft.com/kb/3008627 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3008627: Unexpected UAC prompt after you install update 2918614 in Windows - Windows Server 2012 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 300862733 Fixlet Link: http://support.microsoft.com/kb/3008627 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3012235: The Print Pictures Wizard stops responding in Windows 8.1 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 301223501 Fixlet Link: http://support.microsoft.com/kb/3012235 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3012235: The Print Pictures Wizard stops responding in Windows 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 301223503 Fixlet Link: http://support.microsoft.com/kb/3012235 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3012235: The Print Pictures Wizard stops responding in Windows 8.1 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 301223505 Fixlet Link: http://support.microsoft.com/kb/3012235 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3012702: Some default program associations for a roamed user may be lost when you log on to an RDS server in Windows - Windows Server 2012 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 301270201 Fixlet Link: http://support.microsoft.com/kb/3012702 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3012702: Some default program associations for a roamed user may be lost when you log on to an RDS server in Windows - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 301270203 Fixlet Link: http://support.microsoft.com/kb/3012702 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3012702: Some default program associations for a roamed user may be lost when you log on to an RDS server in Windows - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 301270205 Fixlet Link: http://support.microsoft.com/kb/3012702 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3012702: Some default program associations for a roamed user may be lost when you log on to an RDS server in Windows - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 301270207 Fixlet Link: http://support.microsoft.com/kb/3012702 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3012702: Some default program associations for a roamed user may be lost when you log on to an RDS server in Windows - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 301270209 Fixlet Link: http://support.microsoft.com/kb/3012702 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3012702: Some default program associations for a roamed user may be lost when you log on to an RDS server in Windows - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 301270211 Fixlet Link: http://support.microsoft.com/kb/3012702 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3013172: Individual memory devices cannot be ejected through the Safely Remove Hardware UI in Windows 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 301317201 Fixlet Link: http://support.microsoft.com/kb/3013172 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3013172: Individual memory devices cannot be ejected through the Safely Remove Hardware UI in Windows 8.1 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 301317203 Fixlet Link: http://support.microsoft.com/kb/3013172 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3013172: Individual memory devices cannot be ejected through the Safely Remove Hardware UI in Windows 8.1 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 301317205 Fixlet Link: http://support.microsoft.com/kb/3013172 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3018133: Content on the lock screen is displayed inappropriately in Windows that has update 2919355 installed - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 301813301 Fixlet Link: http://support.microsoft.com/kb/3018133 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3018133: Content on the lock screen is displayed inappropriately in Windows that has update 2919355 installed - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 301813303 Fixlet Link: http://support.microsoft.com/kb/3018133 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3018133: Content on the lock screen is displayed inappropriately in Windows that has update 2919355 installed - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 301813305 Fixlet Link: http://support.microsoft.com/kb/3018133 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3022796: Update for RichTextBox controls and ALT codes in Windows 8.1 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 302279601 Fixlet Link: http://support.microsoft.com/kb/3022796 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3022796: Update for RichTextBox controls and ALT codes in Windows 8.1 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 302279603 Fixlet Link: http://support.microsoft.com/kb/3022796 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3022796: Update for RichTextBox controls and ALT codes in Windows 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 302279605 Fixlet Link: http://support.microsoft.com/kb/3022796 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3024751: The TAB key inserts a tab stop when you enter Wi-Fi credentials on a Surface Pro 3 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 302475101 Fixlet Link: http://support.microsoft.com/kb/3024751 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3024751: The TAB key inserts a tab stop when you enter Wi-Fi credentials on a Surface Pro 3 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 302475103 Fixlet Link: http://support.microsoft.com/kb/3024751 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3024751: The TAB key inserts a tab stop when you enter Wi-Fi credentials on a Surface Pro 3 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 302475105 Fixlet Link: http://support.microsoft.com/kb/3024751 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3024755: Multi-touch gesture does not work after you exit the Calculator in Windows - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 302475501 Fixlet Link: http://support.microsoft.com/kb/3024755 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3024755: Multi-touch gesture does not work after you exit the Calculator in Windows - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 302475503 Fixlet Link: http://support.microsoft.com/kb/3024755 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3024755: Multi-touch gesture does not work after you exit the Calculator in Windows - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 302475505 Fixlet Link: http://support.microsoft.com/kb/3024755 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3027209: Reliability improvements for Windows 8.1: March 2015 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 302720901 Fixlet Link: http://support.microsoft.com/kb/3027209 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3027209: Reliability improvements for Windows 8.1: March 2015 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 302720903 Fixlet Link: http://support.microsoft.com/kb/3027209 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3027209: Reliability improvements for Windows 8.1: March 2015 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 302720905 Fixlet Link: http://support.microsoft.com/kb/3027209 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3029803: STOP Error 0x0000009F in DRIVER_POWER_STATE_FAILURE on Windows 8.1 when your computer resumes from sleep mode - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 302980301 Fixlet Link: http://support.microsoft.com/kb/3029803 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3029803: STOP Error 0x0000009F in DRIVER_POWER_STATE_FAILURE on Windows 8.1 when your computer resumes from sleep mode - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 302980303 Fixlet Link: http://support.microsoft.com/kb/3029803 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3029803: STOP Error 0x0000009F in DRIVER_POWER_STATE_FAILURE on Windows 8.1 when your computer resumes from sleep mode - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 302980305 Fixlet Link: http://support.microsoft.com/kb/3029803 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3030947: Compatibility issues for applications that rely on a certain code layout for memory in Windows - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 303094701 Fixlet Link: http://support.microsoft.com/kb/3030947 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3030947: Compatibility issues for applications that rely on a certain code layout for memory in Windows - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 303094703 Fixlet Link: http://support.microsoft.com/kb/3030947 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3030947: Compatibility issues for applications that rely on a certain code layout for memory in Windows - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 303094705 Fixlet Link: http://support.microsoft.com/kb/3030947 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3032613: Text in Polish, Bulgarian, or Greek does not display completely on the Windows Store installation page in Windows - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 303261301 Fixlet Link: http://support.microsoft.com/kb/3032613 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3032613: Text in Polish, Bulgarian, or Greek does not display completely on the Windows Store installation page in Windows - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 303261303 Fixlet Link: http://support.microsoft.com/kb/3032613 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3032613: Text in Polish, Bulgarian, or Greek does not display completely on the Windows Store installation page in Windows - Windows Server 2012 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 303261305 Fixlet Link: http://support.microsoft.com/kb/3032613 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3034348: "Access denied" error when you use a Windows Store app to configure printer property settings in Windows - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 303434801 Fixlet Link: http://support.microsoft.com/kb/3034348 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3034348: "Access denied" error when you use a Windows Store app to configure printer property settings in Windows - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 303434803 Fixlet Link: http://support.microsoft.com/kb/3034348 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3034348: "Access denied" error when you use a Windows Store app to configure printer property settings in Windows - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 303434805 Fixlet Link: http://support.microsoft.com/kb/3034348 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3035527: Problems occur after you pin and unpin a Win32 app from the taskbar in Windows - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 303552701 Fixlet Link: http://support.microsoft.com/kb/3035527 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3035527: Problems occur after you pin and unpin a Win32 app from the taskbar in Windows - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 303552703 Fixlet Link: http://support.microsoft.com/kb/3035527 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3035527: Problems occur after you pin and unpin a Win32 app from the taskbar in Windows - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 303552705 Fixlet Link: http://support.microsoft.com/kb/3035527 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3035553: Black screen after quickly swiping up and down on the Windows 8.1 lock screen - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 303555301 Fixlet Link: http://support.microsoft.com/kb/3035553 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3035553: Black screen after quickly swiping up and down on the Windows 8.1 lock screen - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 303555303 Fixlet Link: http://support.microsoft.com/kb/3035553 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3035553: Black screen after quickly swiping up and down on the Windows 8.1 lock screen - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 303555305 Fixlet Link: http://support.microsoft.com/kb/3035553 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3036228: "0x00000119" Stop error when you play a video by using an application in Windows - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 303622801 Fixlet Link: http://support.microsoft.com/kb/3036228 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3036228: "0x00000119" Stop error when you play a video by using an application in Windows - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 303622803 Fixlet Link: http://support.microsoft.com/kb/3036228 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3036228: "0x00000119" Stop error when you play a video by using an application in Windows - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 303622805 Fixlet Link: http://support.microsoft.com/kb/3036228 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3036562: Updated APN database entries for Y!Mobile and Truphone in Windows 8.1 and Windows 8 - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 303656201 Fixlet Link: http://support.microsoft.com/kb/3036562 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3036562: Updated APN database entries for Y!Mobile and Truphone in Windows 8.1 and Windows 8 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 303656203 Fixlet Link: http://support.microsoft.com/kb/3036562 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3036562: Updated APN database entries for Y!Mobile and Truphone in Windows 8.1 and Windows 8 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 303656205 Fixlet Link: http://support.microsoft.com/kb/3036562 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3036562: Updated APN database entries for Y!Mobile and Truphone in Windows 8.1 and Windows 8 - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 303656207 Fixlet Link: http://support.microsoft.com/kb/3036562 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3036612: Windows Store apps may crash in Windows 8.1 or Windows RT 8.1 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 303661201 Fixlet Link: http://support.microsoft.com/kb/3036612 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3036612: Windows Store apps may crash in Windows 8.1 or Windows RT 8.1 - Windows Server 2012 R2 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 303661203 Fixlet Link: http://support.microsoft.com/kb/3036612 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3036612: Windows Store apps may crash in Windows 8.1 or Windows RT 8.1 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 303661205 Fixlet Link: http://support.microsoft.com/kb/3036612 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3046310: Security Advisory: Fraudulent digital certificates could allow spoofing - KB3048051 - Windows Server 2003 SP2 (Japanese) Severity: N/A Fixlet ID: 304631001 Fixlet Link: http://support.microsoft.com/kb/3046310 Fixlet Description: Install this update to resolve an issue which requires an update to the untrusted certificate store on Windows systems and to keep your systems up to date. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. From autonotify at us.ibm.com Fri Mar 27 02:35:02 2015 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Fri, 27 Mar 2015 02:35:02 -0700 Subject: [BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)' Message-ID: <201503270935.t2R9Z2xM007877@d01av04.pok.ibm.com> Fixlet Site - 'Patches for Windows (Japanese)' Current Version: 643 Published: Thu, 26 Mar 2015 13:40:00 GMT New Fixlets: ============ *************************************************************** Title: 2577795: Kernel sockets leak on a multiprocessor computer that is running Windows Server 2008 R2 or Windows 7 - Windows 7 Gold/SP1 / Windows Server 2008 R2 Gold/SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 257779501 Fixlet Link: https://support.microsoft.com/kb/2577795 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2577795: Kernel sockets leak on a multiprocessor computer that is running Windows Server 2008 R2 or Windows 7 - Windows 7 Gold/SP1 (Japanese) Severity: N/A Fixlet ID: 257779503 Fixlet Link: https://support.microsoft.com/kb/2577795 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2737996: Update for Outlook Social Connector 2013 - KB2737996 - Outlook 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 273799601 Fixlet Link: http://support.microsoft.com/kb/2737996 Fixlet Description: Microsoft has released an update for Microsoft Outlook Social Connector 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Outlook Social Connector 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2737996: Update for Outlook Social Connector 2013 - KB2737996 - Outlook 2013 (Japanese) Severity: N/A Fixlet ID: 273799603 Fixlet Link: http://support.microsoft.com/kb/2737996 Fixlet Description: Microsoft has released an update for Microsoft Outlook Social Connector 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Outlook Social Connector 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2752618: RDS client computer cannot connect to the RDS server by using a remote desktop connection in Windows - Windows Vista SP2 / Windows Server 2008 SP2 (x64) (Japanese) Severity: N/A Fixlet ID: 275261801 Fixlet Link: https://support.microsoft.com/kb/2752618 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2752618: RDS client computer cannot connect to the RDS server by using a remote desktop connection in Windows - Windows Vista SP2 / Windows Server 2008 SP2 (Japanese) Severity: N/A Fixlet ID: 275261803 Fixlet Link: https://support.microsoft.com/kb/2752618 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2752618: RDS client computer cannot connect to the RDS server by using a remote desktop connection in Windows - Windows 7 SP1 / Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 275261805 Fixlet Link: https://support.microsoft.com/kb/2752618 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2752618: RDS client computer cannot connect to the RDS server by using a remote desktop connection in Windows - Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 275261807 Fixlet Link: https://support.microsoft.com/kb/2752618 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2817561: Update for Visio 2007 - KB2817561 - Visio 2007 (Japanese) Severity: N/A Fixlet ID: 281756101 Fixlet Link: http://support.microsoft.com/kb/2817561 Fixlet Description: Microsoft has released an update for Microsoft Office Visio 2007 suites . This update provides the latest fixes to Microsoft Office Visio 2007 suites . Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2837601: Update for Access 2010 - KB2837601 - Access 2010 (x64) (Japanese) Severity: N/A Fixlet ID: 283760101 Fixlet Link: http://support.microsoft.com/kb/2837601 Fixlet Description: Microsoft has released an update for Microsoft Access 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Access 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2837601: Update for Access 2010 - KB2837601 - Access 2010 (Japanese) Severity: N/A Fixlet ID: 283760103 Fixlet Link: http://support.microsoft.com/kb/2837601 Fixlet Description: Microsoft has released an update for Microsoft Access 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Access 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2878283: Update for Visio 2010 - KB2878283 - Visio 2010 (Japanese) Severity: N/A Fixlet ID: 287828301 Fixlet Link: http://support.microsoft.com/kb/2878283 Fixlet Description: Microsoft has released an update for Microsoft Visio 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Visio 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2878283: Update for Visio 2010 - KB2878283 - Visio 2010 (x64) (Japanese) Severity: N/A Fixlet ID: 287828303 Fixlet Link: http://support.microsoft.com/kb/2878283 Fixlet Description: Microsoft has released an update for Microsoft Visio 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Visio 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2880993: Update for SharePoint Server 2013 Client Components SDK - KB2880993- Sharepointserver 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 288099301 Fixlet Link: http://support.microsoft.com/kb/2880993 Fixlet Description: Microsoft has released an update for Microsoft SharePoint Server 2013 Client Components SDK 64-Bit Edition. This update provides the latest fixes to Microsoft SharePoint Server 2013 Client Components SDK 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2880993: Update for SharePoint Server 2013 Client Components SDK - KB2880993- Sharepointserver 2013 (Japanese) Severity: N/A Fixlet ID: 288099303 Fixlet Link: http://support.microsoft.com/kb/2880993 Fixlet Description: Microsoft has released an update for Microsoft SharePoint Server 2013 Client Components SDK 32-Bit Edition. This update provides the latest fixes to Microsoft SharePoint Server 2013 Client Components SDK 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2905040: Update Rollup for Lync Server 2013 Core Components - Lync Server 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 290504001 Fixlet Link: http://support.microsoft.com/kb/2905040 Fixlet Description: The cumulative update improves the reliability, stability, and performance of Lync Server 2013, Core Components. Additionally, this update also resolves the issues that are previously listed in the following Microsoft Knowledge Base article: 2881682 Description of the cumulative update 5.0.8308.556 for Lync Server 2013, Core Components: October 2013 2835432 Description of the cumulative update 5.0.8308.420 for Lync Server 2013, Core Components: July 2013 2781550 Description of the cumulative update 5.0.8308.291 for Lync Server 2013, Core Components: February 2013 After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2905042: Update Rollup for Lync Server 2013 Web Components Server - Lync Server 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 290504201 Fixlet Link: http://support.microsoft.com/kb/2905042 Fixlet Description: The cumulative update resolves the following issue: 2912339 A user cannot sign in to a Lync mobile client when the "MaxEndPointsPerUser" parameter is "1" in a Lync Server 2013 environment This update also resolves the issues that are previously listed in the following Microsoft Knowledge Base articles: 2881688 Description of the cumulative update 5.0.8308.556 for Lync Server 2013, Web Components: October 2013 2835435 Description of the cumulative update 5.0.8308.420 for Lync Server 2013, Web Components: July 2013 2781564 Description of the cumulative update 5.0.8308.291 for Lync Server 2013, Web Components: February 2013 After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2905048: Update Rollup for Lync Server 2013 - Lync Server 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 290504801 Fixlet Link: http://support.microsoft.com/kb/2905048 Fixlet Description: The cumulative update resolves the following issues: 2912334 Event ID 57006 is logged when you cannot restart the Lync Server 2013 front-end service 2912338 Can't call Enterprise Voice-enabled users when the users have the same main telephone number in a Lync Server 2013 environment 2912340 An external call is routed based on Location-Based Routing that is configured for internal AD sites in a Lync Server 2013 environment 2912342 Lync Server 2013 supports TDE in SQL Server 2008 or a later version on a back-end server 2912343 Event ID 1001 is logged when the RTCSrv.exe progress crashes on a Lync Server 2013 Edge server This update also fixes the issues that are previously listed in the following Microsoft Knowledge Base article: 2881684 Description of the cumulative update 5.0.8308.556 for Lync Server 2013 (Front End Server and Edge Server) : October 2013 2819565 Description of the cumulative update 5.0.8308.420 for Lync Server 2013: July 2013 2781547 Description of the cumulative update 5.0.8308.291 for Lync Server 2013: February 2013 After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2910243: Update Rollup for Lync Server 2013 Backup Service - Lync Server 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 291024301 Fixlet Link: http://support.microsoft.com/kb/2910243 Fixlet Description: The cumulative update resolves the following issue: 2912334 Event ID 57006 is logged when you cannot restart the Lync Server 2013 front-end service After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2910244: Update Rollup for Lync Server 2013 Core Management Server - Lync Server 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 291024401 Fixlet Link: http://support.microsoft.com/kb/2910244 Fixlet Description: The cumulative update resolves the following issue: 2912334 Event ID 57006 is logged when you cannot restart the Lync Server 2013 front-end service After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2920754: Update for Office 2013 - KB2920754 - Office 2013 (Japanese) Severity: N/A Fixlet ID: 292075401 Fixlet Link: http://support.microsoft.com/kb/2920754 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2920754: Update for Office 2013 - KB2920754 - Office 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 292075403 Fixlet Link: http://support.microsoft.com/kb/2920754 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2920794: Update for Office 2007 - KB2920794 - Office 2007 (Japanese) Severity: N/A Fixlet ID: 292079401 Fixlet Link: http://support.microsoft.com/kb/2920794 Fixlet Description: Microsoft has released an update for Microsoft Office 2007 suites . This update provides the latest fixes to Microsoft Office 2007 suites . Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2920813: Update for Office 2010 - KB2920813 - Office 2010 (Japanese) Severity: N/A Fixlet ID: 292081301 Fixlet Link: http://support.microsoft.com/kb/2920813 Fixlet Description: Microsoft has released an update for Microsoft Office 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2920813: Update for Office 2010 - KB2920813 - Office 2010 (x64) (Japanese) Severity: N/A Fixlet ID: 292081303 Fixlet Link: http://support.microsoft.com/kb/2920813 Fixlet Description: Microsoft has released an update for Microsoft Office 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2937311: Update Rollup for Lync Server 2013 Unified Communications Managed API 4.0 Core Runtime x64 - Lync Server 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 293731101 Fixlet Link: http://support.microsoft.com/kb/2937311 Fixlet Description: This article describes the cumulative update that improves the reliability, stability, and performance of Microsoft Lync Server 2013, Unified Communications Managed API 4.0 Runtime. The version number of this update is 5.0.8308.738.After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2937314: Update Rollup for Lync Server 2013 Web Conferencing Server - Lync Server 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 293731401 Fixlet Link: http://support.microsoft.com/kb/2937314 Fixlet Description: This article describes the cumulative update that improves the reliability, stability, and performance of Microsoft Lync Server 2013, Web Conferencing Server. The version number of this update is 5.0.8308.738.After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2953588: Update Rollup for Lync Server 2010 Web Components Server - Lync Server 2010 (x64) (Japanese) Severity: N/A Fixlet ID: 295358801 Fixlet Link: http://support.microsoft.com/kb/2953588 Fixlet Description: This cumulative update resolves the following issues: 2954538 Application and desktop sharing features are missing when Lync Web App runs on Internet Explorer 11 or Firefox 2884800 Can?t join a meeting in Lync Web App when the Region and Language format is Turkish in a Lync Server 2010 environment Additionally, the cumulative update also includes the updates that are described in the following Microsoft Knowledge Base articles: 2884619 Description of the cumulative update for Lync Server 2010, Web Components Server: October 2013 2793338 Description of the cumulative update for Lync Server 2010, Web Components Server: March 2013 2737902 Description of the cumulative update for Lync Server 2010, Web Components Server: October 2012 2710559 Description of the cumulative update for Lync Server 2010, Web Components Server: June 2012 2670534 Description of the cumulative update for Lync Server 2010, Web Components Server: February 2012 2514979 Description of the cumulative update for Lync Server 2010, Web Components Server: November 2011 2571547 Description of the update package for Lync Server 2010, Web Components Server: July 2011 2500441 Description of the update package for Lync Server 2010, Web Components Server: April 2011 2449497 Description of the update package for Lync Server 2010, Web Components Server: January 2011 After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2953590: Update Rollup for Lync Server 2010 Core Components - Lync Server 2010 (x64) (Japanese) Severity: N/A Fixlet ID: 295359001 Fixlet Link: http://support.microsoft.com/kb/2953590 Fixlet Description: This cumulative update improves the reliability, stability, and performance of Lync Server 2010, Core Components. Additionally, the cumulative update also resolves the issues that are described in the following Microsoft Knowledge Base (KB) articles: 2884613 Description of the cumulative update for Lync Server 2010, Core Components: October 2013 2847898 Description of the cumulative update for Lync Server 2010, Core Components: July 2013 2793350 Description of the cumulative update for Lync Server 2010, Core Components: March 2013 2740403 Description of the cumulative update for Lync Server 2010, Core Components: October 2012 2701663 Description of the cumulative update for Lync Server 2010, Core Components: June 2012 2670334 Description of the cumulative update for Lync Server 2010, Core Components: February 2012 2514981 Description of the cumulative update for Lync Server 2010, Core Components: November 2011 2571545 Description of the cumulative update for Lync Server 2010, Core Components: July 2011 2500444 Description of the cumulative update for Lync Server 2010, Core Components: April 2011 2467775 Description of the cumulative update for Lync Server 2010, Core Components: January 2011 After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2954004: Update Rollup for Lync Server 2010 Conferencing Attendant - Lync Server 2010 (x64) (Japanese) Severity: N/A Fixlet ID: 295400401 Fixlet Link: http://support.microsoft.com/kb/2954004 Fixlet Description: This cumulative update resolves the following issue: 2954865 Conference Auto Attendant fails when users join PSTN conferences at the same time in Lync Server 2010 or Lync Server 2013 Additionally, this cumulative update also includes the updates that are described in the following Microsoft Knowledge Base article: 2701659 Description of the cumulative update for Lync Server 2010, Conferencing Attendant: June 2012 2670540 Description of the cumulative update for Lync Server 2010, Conferencing Attendant: February 2012 2575872 Description of the update package for Lync Server 2010, Conferencing Attendant: July 2011 After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2954867: Update Rollup for Lync Server 2013 Conferencing Attendant - Lync Server 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 295486701 Fixlet Link: http://support.microsoft.com/kb/2954867 Fixlet Description: The update resolves the following issue: 2954865 Conference Auto Attendant fails when users join PSTN conferences at the same time in a Lync Server 2013 environmentAfter downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956104: Update for Outlook 2007 Junk Email Filter - KB2956104 - Outlook 2007 (Japanese) Severity: N/A Fixlet ID: 295610401 Fixlet Link: http://support.microsoft.com/kb/2956104 Fixlet Description: This update provides the Junk E-mail Filter in Microsoft Office Outlook 2007 Junk Email Filter with a more current definition of which e-mail messages should be considered junk e-mail. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956141: Update for Office 2010 - KB2956141 - Office 2010 (x64) (Japanese) Severity: N/A Fixlet ID: 295614101 Fixlet Link: http://support.microsoft.com/kb/2956141 Fixlet Description: Microsoft has released an update for Microsoft Office 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956141: Update for Office 2010 - KB2956141 - Office 2010 (Japanese) Severity: N/A Fixlet ID: 295614103 Fixlet Link: http://support.microsoft.com/kb/2956141 Fixlet Description: Microsoft has released an update for Microsoft Office 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956145: Update for Excel 2013 - KB2956145 - Excel 2013 (Japanese) Severity: N/A Fixlet ID: 295614501 Fixlet Link: http://support.microsoft.com/kb/2956145 Fixlet Description: Microsoft has released an update for Microsoft Excel 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Excel 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956145: Update for Excel 2013 - KB2956145 - Excel 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 295614503 Fixlet Link: http://support.microsoft.com/kb/2956145 Fixlet Description: Microsoft has released an update for Microsoft Excel 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Excel 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956148: Update for Office 2013 - KB2956148 - Office 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 295614801 Fixlet Link: http://support.microsoft.com/kb/2956148 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956148: Update for Office 2013 - KB2956148 - Office 2013 (Japanese) Severity: N/A Fixlet ID: 295614803 Fixlet Link: http://support.microsoft.com/kb/2956148 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956154: Update for Office 2013 - KB2956154 - Office 2013 (Japanese) Severity: N/A Fixlet ID: 295615401 Fixlet Link: http://support.microsoft.com/kb/2956154 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956154: Update for Office 2013 - KB2956154 - Office 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 295615403 Fixlet Link: http://support.microsoft.com/kb/2956154 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956155: Update for Visio 2013 - KB2956155 - Visio 2013 (Japanese) Severity: N/A Fixlet ID: 295615501 Fixlet Link: http://support.microsoft.com/kb/2956155 Fixlet Description: Microsoft has released an update for Microsoft Visio 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Visio 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956155: Update for Visio 2013 - KB2956155 - Visio 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 295615503 Fixlet Link: http://support.microsoft.com/kb/2956155 Fixlet Description: Microsoft has released an update for Microsoft Visio 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Visio 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956160: Update for Office 2013 - KB2956160 - Office 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 295616001 Fixlet Link: http://support.microsoft.com/kb/2956160 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956160: Update for Office 2013 - KB2956160 - Office 2013 (Japanese) Severity: N/A Fixlet ID: 295616003 Fixlet Link: http://support.microsoft.com/kb/2956160 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956165: Update for OneNote 2013 - KB2956165 - OneNote 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 295616501 Fixlet Link: http://support.microsoft.com/kb/2956165 Fixlet Description: Microsoft has released an update for Microsoft OneNote 2013 64-Bit Edition. This update provides the latest fixes to Microsoft OneNote 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956165: Update for OneNote 2013 - KB2956165 - OneNote 2013 (Japanese) Severity: N/A Fixlet ID: 295616503 Fixlet Link: http://support.microsoft.com/kb/2956165 Fixlet Description: Microsoft has released an update for Microsoft OneNote 2013 32-Bit Edition. This update provides the latest fixes to Microsoft OneNote 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956167: Update for Office 2013 - KB2956167 - Office 2013 (Japanese) Severity: N/A Fixlet ID: 295616701 Fixlet Link: http://support.microsoft.com/kb/2956167 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956167: Update for Office 2013 - KB2956167 - Office 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 295616703 Fixlet Link: http://support.microsoft.com/kb/2956167 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956168: Update for Office 2013 - KB2956168 - Office 2013 (Japanese) Severity: N/A Fixlet ID: 295616801 Fixlet Link: http://support.microsoft.com/kb/2956168 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956168: Update for Office 2013 - KB2956168 - Office 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 295616803 Fixlet Link: http://support.microsoft.com/kb/2956168 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956169: Update for Office 2013 - KB2956169 - Office 2013 (Japanese) Severity: N/A Fixlet ID: 295616901 Fixlet Link: http://support.microsoft.com/kb/2956169 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956169: Update for Office 2013 - KB2956169 - Office 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 295616903 Fixlet Link: http://support.microsoft.com/kb/2956169 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956170: Update for Outlook 2013 - KB2956170 - Outlook 2013 (Japanese) Severity: N/A Fixlet ID: 295617001 Fixlet Link: http://support.microsoft.com/kb/2956170 Fixlet Description: Microsoft has released an update for Microsoft Outlook 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Outlook 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956170: Update for Outlook 2013 - KB2956170 - Outlook 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 295617003 Fixlet Link: http://support.microsoft.com/kb/2956170 Fixlet Description: Microsoft has released an update for Microsoft Outlook 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Outlook 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956171: Update for Office 2013 - KB2956171 - Office 2013 (Japanese) Severity: N/A Fixlet ID: 295617101 Fixlet Link: http://support.microsoft.com/kb/2956171 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956171: Update for Office 2013 - KB2956171 - Office 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 295617103 Fixlet Link: http://support.microsoft.com/kb/2956171 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956174: Update for Lync 2013 - KB2956174 -Lync 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 295617405 Fixlet Link: http://support.microsoft.com/kb/2956174 Fixlet Description: Microsoft has released an update for Microsoft Lync 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Lync 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2956174: Update for Lync 2013 - KB2956174 -Lync 2013 (Japanese) Severity: N/A Fixlet ID: 295617407 Fixlet Link: http://support.microsoft.com/kb/2956174 Fixlet Description: Microsoft has released an update for Microsoft Lync 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Lync 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 2956176: Update for Access 2013 - KB2956176 - Access 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 295617601 Fixlet Link: http://support.microsoft.com/kb/2956176 Fixlet Description: Microsoft has released an update for Microsoft Access 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Access 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956176: Update for Access 2013 - KB2956176 - Access 2013 (Japanese) Severity: N/A Fixlet ID: 295617603 Fixlet Link: http://support.microsoft.com/kb/2956176 Fixlet Description: Microsoft has released an update for Microsoft Access 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Access 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956177: Update for Office 2013 - KB2956177 - Office 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 295617701 Fixlet Link: http://support.microsoft.com/kb/2956177 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956177: Update for Office 2013 - KB2956177 - Office 2013 (Japanese) Severity: N/A Fixlet ID: 295617703 Fixlet Link: http://support.microsoft.com/kb/2956177 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956187: Update for Project 2013 - KB2956187 - Project 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 295618701 Fixlet Link: http://support.microsoft.com/kb/2956187 Fixlet Description: Microsoft has released an update for Microsoft Project 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Project 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956187: Update for Project 2013 - KB2956187 - Project 2013 (Japanese) Severity: N/A Fixlet ID: 295618703 Fixlet Link: http://support.microsoft.com/kb/2956187 Fixlet Description: Microsoft has released an update for Microsoft Project 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Project 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956203: Update for Outlook 2010 - KB2956203 - Outlook 2010 (Japanese) Severity: N/A Fixlet ID: 295620301 Fixlet Link: http://support.microsoft.com/kb/2956203 Fixlet Description: Microsoft has released an update for Microsoft Outlook 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Outlook 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956203: Update for Outlook 2010 - KB2956203 - Outlook 2010 (x64) (Japanese) Severity: N/A Fixlet ID: 295620303 Fixlet Link: http://support.microsoft.com/kb/2956203 Fixlet Description: Microsoft has released an update for Microsoft Outlook 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Outlook 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956205: Update for OneNote 2010 - KB2956205 - OneNote 2010 (Japanese) Severity: N/A Fixlet ID: 295620501 Fixlet Link: http://support.microsoft.com/kb/2956205 Fixlet Description: Microsoft has released an update for Microsoft OneNote 2010 32-Bit Edition. This update provides the latest fixes to Microsoft OneNote 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2956205: Update for OneNote 2010 - KB2956205 - OneNote 2010 (x64) (Japanese) Severity: N/A Fixlet ID: 295620503 Fixlet Link: http://support.microsoft.com/kb/2956205 Fixlet Description: Microsoft has released an update for Microsoft OneNote 2010 64-Bit Edition. This update provides the latest fixes to Microsoft OneNote 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2965206: Update for PowerPoint 2013 - KB2965206 - Powerpoint 2013 (Japanese) Severity: N/A Fixlet ID: 296520601 Fixlet Link: http://support.microsoft.com/kb/2965206 Fixlet Description: Microsoft has released an update for Microsoft PowerPoint 2013 32-Bit Edition. This update provides the latest fixes to Microsoft PowerPoint 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2965206: Update for PowerPoint 2013 - KB2965206 - Powerpoint 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 296520603 Fixlet Link: http://support.microsoft.com/kb/2965206 Fixlet Description: Microsoft has released an update for Microsoft PowerPoint 2013 64-Bit Edition. This update provides the latest fixes to Microsoft PowerPoint 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2967485: Update Rollup for Lync Server 2013 Administrative Tools - Lync Server 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 296748501 Fixlet Link: http://support.microsoft.com/kb/2967485 Fixlet Description: This article describes the cumulative update that improves the reliability, stability, and performance of Microsoft Lync Server 2013, Administrative Tools. The version number of this update is 5.0.8308.738.After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2967486: Update Rollup for Windows Fabric v1 CU3 - Lync Server 2013 (x64) (Japanese) Severity: N/A Fixlet ID: 296748601 Fixlet Link: http://support.microsoft.com/kb/2967486 Fixlet Description: The cumulative update resolves the following issue: 2983199 "Limited functionality is available due to outage" in Lync client when Lync Server 2013 replication queue is full After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2976536: Anti-malware platform update for Windows Defender in Windows 8.1 and Windows 8 - Windows 8.1 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 297653601 Fixlet Link: http://support.microsoft.com/kb/2976536 Fixlet Description: Install this update to improve protection functionality in Windows Defender. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2976536: Anti-malware platform update for Windows Defender in Windows 8.1 and Windows 8 - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 297653603 Fixlet Link: http://support.microsoft.com/kb/2976536 Fixlet Description: Install this update to improve protection functionality in Windows Defender. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2976536: Anti-malware platform update for Windows Defender in Windows 8.1 and Windows 8 - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 297653605 Fixlet Link: http://support.microsoft.com/kb/2976536 Fixlet Description: Install this update to improve protection functionality in Windows Defender. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 2976536: Anti-malware platform update for Windows Defender in Windows 8.1 and Windows 8 - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 297653607 Fixlet Link: http://support.microsoft.com/kb/2976536 Fixlet Description: Install this update to improve protection functionality in Windows Defender. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3011970: Update for Microsoft Silverlight - Silverlight 5 (Japanese) Severity: N/A Fixlet ID: 301197001 Fixlet Link: http://support.microsoft.com/kb/3011970 Fixlet Description: This is an update to Silverlight. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3011970: Update for Microsoft Silverlight - Silverlight 5 for Developers (Japanese) Severity: N/A Fixlet ID: 301197003 Fixlet Link: http://support.microsoft.com/kb/3011970 Fixlet Description: This is an update to Silverlight. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3011970: Update for Microsoft Silverlight - Silverlight 5 for Developers (x64) (Japanese) Severity: N/A Fixlet ID: 301197005 Fixlet Link: http://support.microsoft.com/kb/3011970 Fixlet Description: This is an update to Silverlight. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3011970: Update for Microsoft Silverlight - Silverlight 5 (x64) (Japanese) Severity: N/A Fixlet ID: 301197007 Fixlet Link: http://support.microsoft.com/kb/3011970 Fixlet Description: This is an update to Silverlight. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3030085: Update Rollup 9 for Exchange Server 2010 Service Pack 3 (x64) (Japanese) Severity: N/A Fixlet ID: 303008501 Fixlet Link: http://support.microsoft.com/kb/3030085 Fixlet Description: Update Rollup 9 For Exchange 2010 SP3 (KB3030085) After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. From autonotify at us.ibm.com Mon Mar 30 02:34:47 2015 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Mon, 30 Mar 2015 02:34:47 -0700 Subject: [BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)' Message-ID: <201503300934.t2U9Yk4v001829@d01av02.pok.ibm.com> Fixlet Site - 'Patches for Windows (Japanese)' Current Version: 644 Published: Sun, 29 Mar 2015 15:11:16 GMT New Fixlets: ============ *************************************************************** Title: 2796000: You cannot create a cluster file share on a third-party dynamic disk resource in Windows Server 2012 - Windows 2012 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 279600001 Fixlet Link: http://support.microsoft.com/kb/2796000 Fixlet Description: Microsoft has released a hotfix to resolve the issue that you cannot create a cluster file share on a third-party dynamic disk resource in Windows Server 2012. *************************************************************** Title: 2796000: You cannot create a cluster file share on a third-party dynamic disk resource in Windows Server 2012 - Windows 8 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 279600003 Fixlet Link: http://support.microsoft.com/kb/2796000 Fixlet Description: Microsoft has released a hotfix to resolve the issue that you cannot create a cluster file share on a third-party dynamic disk resource in Windows Server 2012. *************************************************************** Title: 2796000: You cannot create a cluster file share on a third-party dynamic disk resource in Windows Server 2012 - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 279600005 Fixlet Link: http://support.microsoft.com/kb/2796000 Fixlet Description: Microsoft has released a hotfix to resolve the issue that you cannot create a cluster file share on a third-party dynamic disk resource in Windows Server 2012. *************************************************************** Title: 3039024: Daylight saving time changes for Chile and Mexico in Windows - Windows 7 Gold/SP1 / Windows Server 2008 R2 SP1 (x64) (Japanese) Severity: N/A Fixlet ID: 303902401 Fixlet Link: https://support.microsoft.com/kb/3039024 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3039024: Daylight saving time changes for Chile and Mexico in Windows - Windows Vista SP2 / Windows Server 2008 SP2 (x64) (Japanese) Severity: N/A Fixlet ID: 303902403 Fixlet Link: https://support.microsoft.com/kb/3039024 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3039024: Daylight saving time changes for Chile and Mexico in Windows - Windows 8.1 Gold (x64) / Windows Server 2012 R2 (x64) (Japanese) Severity: N/A Fixlet ID: 303902405 Fixlet Link: https://support.microsoft.com/kb/3039024 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3039024: Daylight saving time changes for Chile and Mexico in Windows - Windows 8 Gold / Windows 2012 Gold (x64) (Japanese) Severity: N/A Fixlet ID: 303902407 Fixlet Link: https://support.microsoft.com/kb/3039024 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3039024: Daylight saving time changes for Chile and Mexico in Windows - Windows 2003 SP2 (x64) (Japanese) Severity: N/A Fixlet ID: 303902409 Fixlet Link: https://support.microsoft.com/kb/3039024 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3039024: Daylight saving time changes for Chile and Mexico in Windows - Windows 8.1 Gold (Japanese) Severity: N/A Fixlet ID: 303902411 Fixlet Link: https://support.microsoft.com/kb/3039024 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3039024: Daylight saving time changes for Chile and Mexico in Windows - Windows 8 Gold (Japanese) Severity: N/A Fixlet ID: 303902413 Fixlet Link: https://support.microsoft.com/kb/3039024 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3039024: Daylight saving time changes for Chile and Mexico in Windows - Windows Vista SP2 / Windows Server 2008 SP2 (Japanese) Severity: N/A Fixlet ID: 303902415 Fixlet Link: https://support.microsoft.com/kb/3039024 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3039024: Daylight saving time changes for Chile and Mexico in Windows - Windows 7 SP1 (Japanese) Severity: N/A Fixlet ID: 303902417 Fixlet Link: https://support.microsoft.com/kb/3039024 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3039024: Daylight saving time changes for Chile and Mexico in Windows - Windows 2003 SP2 (Japanese) Severity: N/A Fixlet ID: 303902419 Fixlet Link: https://support.microsoft.com/kb/3039024 Fixlet Description: Install this update to resolve issues in Windows. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 3050509: Improving cipher security - Windows Server 2003 SP2 - Add support for stronger AES cipher suites (KB948963) (Japanese) Severity: N/A Fixlet ID: 305050901 Fixlet Link: http://support.microsoft.com/kb/3050509 Fixlet Description: This update adds support for stronger Advanced Encryption Standard (AES) cipher suites in Windows Server 2003 Service Pack 2 (SP2) and disables weaker ciphers. *************************************************************** Title: 3050509: Improving cipher security - Windows Server 2003 SP2 - Add support for stronger AES cipher suites (KB948963) (x64) (Japanese) Severity: N/A Fixlet ID: 305050903 Fixlet Link: http://support.microsoft.com/kb/3050509 Fixlet Description: This update adds support for stronger Advanced Encryption Standard (AES) cipher suites in Windows Server 2003 Service Pack 2 (SP2) and disables weaker ciphers. *************************************************************** Title: 3050509: Improving cipher security - Windows Server 2003 SP2 - Disable weak ciphers (Japanese) Severity: N/A Fixlet ID: 305050905 Fixlet Link: http://support.microsoft.com/kb/3050509 Fixlet Description: This update adds support for stronger Advanced Encryption Standard (AES) cipher suites in Windows Server 2003 Service Pack 2 (SP2) and disables weaker ciphers. *************************************************************** Title: 3050509: Improving cipher security - Windows Server 2003 SP2 - Disable weak ciphers (x64) (Japanese) Severity: N/A Fixlet ID: 305050907 Fixlet Link: http://support.microsoft.com/kb/3050509 Fixlet Description: This update adds support for stronger Advanced Encryption Standard (AES) cipher suites in Windows Server 2003 Service Pack 2 (SP2) and disables weaker ciphers. *************************************************************** Title: 3050995: Security Advisory: Improperly issued digital certificates could allow spoofing - Windows Server 2003 SP2 (Japanese) Severity: N/A Fixlet ID: 305099501 Fixlet Link: http://support.microsoft.com/kb/3050995 Fixlet Description: Install this update to resolve an issue which requires an update to the untrusted certificate store on Windows systems and to keep your systems up to date. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.