From autonotify at us.ibm.com Tue May 1 02:08:03 2018 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Tue, 1 May 2018 02:08:03 -0700 Subject: [BigFix-Announcements] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows' Message-ID: Fixlet Site - 'Patches for Windows' Current Version: 2976 Published: Tue, 01 May 2018 08:30:58 GMT New Fixlets: ============ *************************************************************** Title: 4093117: Cumulative Update for Windows 10 Version 1703 - Windows 10 Version 1703 - KB4093117 (x64) Severity: Unspecified Fixlet ID: 409311701 Fixlet Link: https://support.microsoft.com/kb/4093117 Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. *************************************************************** Title: 4093117: Cumulative Update for Windows 10 Version 1703 - Windows 10 Version 1703 - KB4093117 Severity: Unspecified Fixlet ID: 409311703 Fixlet Link: https://support.microsoft.com/kb/4093117 Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. *************************************************************** Title: 4093120: Cumulative Update for Windows Server 2016 - Windows Server 2016 - KB4093120 (x64) Severity: Unspecified Fixlet ID: 409312001 Fixlet Link: https://support.microsoft.com/kb/4093120 Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 4093120: Cumulative Update for Windows 10 Version 1607 - Windows 10 Version 1607 - KB4093120 (x64) Severity: Unspecified Fixlet ID: 409312003 Fixlet Link: https://support.microsoft.com/kb/4093120 Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: 4093120: Cumulative Update for Windows 10 Version 1607 - Windows 10 Version 1607 - KB4093120 Severity: Unspecified Fixlet ID: 409312005 Fixlet Link: https://support.microsoft.com/kb/4093120 Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. From autonotify at us.ibm.com Thu May 10 02:04:09 2018 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Thu, 10 May 2018 02:04:09 -0700 Subject: [BigFix-Announcements] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows' Message-ID: Fixlet Site - 'Patches for Windows' Current Version: 2978 Published: Wed, 09 May 2018 15:44:45 GMT New Fixlets: ============ *************************************************************** Title: MS18-MAY: Security update for Office 2010 - Office 2010 SP2 - KB2899590 (x64) Severity: Important Fixlet ID: 289959001 Fixlet Link: https://support.microsoft.com/kb/2899590 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8147 Microsoft Common Vulnerabilities and Exposures CVE-2018-8148 Microsoft Common Vulnerabilities and Exposures CVE-2018-8157 Microsoft Common Vulnerabilities and Exposures CVE-2018-8158 Note To apply this security update, you must have the release version of Service Pack 2 for Office 2010 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2010. It doesn't apply to the Office 2010 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version). *************************************************************** Title: MS18-MAY: Security update for Office 2010 - Office 2010 SP2 - KB2899590 Severity: Important Fixlet ID: 289959003 Fixlet Link: https://support.microsoft.com/kb/2899590 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8147 Microsoft Common Vulnerabilities and Exposures CVE-2018-8148 Microsoft Common Vulnerabilities and Exposures CVE-2018-8157 Microsoft Common Vulnerabilities and Exposures CVE-2018-8158 Note To apply this security update, you must have the release version of Service Pack 2 for Office 2010 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2010. It doesn't apply to the Office 2010 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version). *************************************************************** Title: MS18-MAY: Security update for Project Server 2010 - Project Server 2010 SP2 - KB3114889 (x64) Severity: Important Fixlet ID: 311488901 Fixlet Link: https://support.microsoft.com/kb/3114889 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8156. Note To apply this security update, you must have the release version of Service Pack 2 for Microsoft Project Server 2010 installed on the computer. *************************************************************** Title: MS18-MAY: Security update for InfoPath 2013 - InfoPath 2013 SP1 - KB3162075 (x64) Severity: Important Fixlet ID: 316207501 Fixlet Link: https://support.microsoft.com/kb/3162075 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8173. Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft Office 2013 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2013. It doesn't apply to the Office 2013 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version). *************************************************************** Title: MS18-MAY: Security update for InfoPath 2013 - InfoPath 2013 SP1 - KB3162075 Severity: Important Fixlet ID: 316207503 Fixlet Link: https://support.microsoft.com/kb/3162075 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8173. Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft Office 2013 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2013. It doesn't apply to the Office 2013 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version). *************************************************************** Title: MS18-MAY: Security update for Office 2013 - Office 2013 SP1 - KB3172436 (x64) Severity: Important Fixlet ID: 317243601 Fixlet Link: https://support.microsoft.com/kb/3172436 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8147 Microsoft Common Vulnerabilities and Exposures CVE-2018-8148 Microsoft Common Vulnerabilities and Exposures CVE-2018-8157 Microsoft Common Vulnerabilities and Exposures CVE-2018-8158 Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft Office 2013 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2013. It doesn't apply to the Office 2013 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version). *************************************************************** Title: MS18-MAY: Security update for Office 2013 - Office 2013 SP1 - KB3172436 Severity: Important Fixlet ID: 317243603 Fixlet Link: https://support.microsoft.com/kb/3172436 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8147 Microsoft Common Vulnerabilities and Exposures CVE-2018-8148 Microsoft Common Vulnerabilities and Exposures CVE-2018-8157 Microsoft Common Vulnerabilities and Exposures CVE-2018-8158 Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft Office 2013 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2013. It doesn't apply to the Office 2013 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version). *************************************************************** Title: MS18-MAY: Security update for Microsoft Office Viewers and Office Compatibility Pack - Office Compatibility Pack SP3 - KB4018308 Severity: Important Fixlet ID: 401830801 Fixlet Link: https://support.microsoft.com/kb/4018308 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8160. Note To apply this security update, you must have the release version of Microsoft Office Compatibility Pack Service Pack 3, Excel Viewer, or PowerPoint Viewer installed on a computer that is running Windows Embedded POSReady 2009. *************************************************************** Title: MS18-MAY: Security update for Office 2016 - Office 2016 - KB4018327 (x64) Severity: Important Fixlet ID: 401832701 Fixlet Link: https://support.microsoft.com/kb/4018327 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8147 Microsoft Common Vulnerabilities and Exposures CVE-2018-8148 Microsoft Common Vulnerabilities and Exposures CVE-2018-8157 Microsoft Common Vulnerabilities and Exposures CVE-2018-8158 Note To apply this security update, you must have the release version of Office 2016 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2016. It doesn't apply to the Office 2016 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version). *************************************************************** Title: MS18-MAY: Security update for Office 2016 - Office 2016 - KB4018327 Severity: Important Fixlet ID: 401832703 Fixlet Link: https://support.microsoft.com/kb/4018327 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8147 Microsoft Common Vulnerabilities and Exposures CVE-2018-8148 Microsoft Common Vulnerabilities and Exposures CVE-2018-8157 Microsoft Common Vulnerabilities and Exposures CVE-2018-8158 Note To apply this security update, you must have the release version of Office 2016 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2016. It doesn't apply to the Office 2016 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version). *************************************************************** Title: MS18-MAY: Security update for SharePoint Enterprise Server 2016 - SharePoint Server 2016 - KB4018381 (x64) Severity: Important Fixlet ID: 401838101 Fixlet Link: https://support.microsoft.com/kb/4018381 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8149 Microsoft Common Vulnerabilities and Exposures CVE-2018-8155 Microsoft Common Vulnerabilities and Exposures CVE-2018-8156 Microsoft Common Vulnerabilities and Exposures CVE-2018-8161 Note To apply this security update, you must have the release version of Microsoft Office SharePoint Server 2016 installed on the computer. This public update delivers Feature Pack 2 for SharePoint Server 2016, which contains the following feature: SharePoint Framework (SPFx) This public update also delivers all the features that were included in Feature Pack 1 for SharePoint Server 2016, including: Administrative Actions Logging MinRole enhancements SharePoint Custom Tiles Hybrid Auditing (preview) Hybrid Taxonomy OneDrive API for SharePoint on-premises OneDrive for Business modern experience (available to Software Assurance customers) The OneDrive for Business modern user experience requires an active Software Assurance contract at the time that the experience is enabled, either by installation of the public update or by manual enablement. If you don't have an active Software Assurance contract at the time of enablement, you must turn off the OneDrive for Business modern user experience. For more information, see New features included in the November 2016 Public Update for SharePoint Server 2016 (Feature Pack 1) and New features included in the September 2017 Public Update for SharePoint Server 2016 (Feature Pack 2). *************************************************************** Title: MS18-MAY: Security update for Excel 2016 - Excel 2016 - KB4018382 (x64) Severity: Important Fixlet ID: 401838201 Fixlet Link: https://support.microsoft.com/kb/4018382 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8147 Microsoft Common Vulnerabilities and Exposures CVE-2018-8148 Microsoft Common Vulnerabilities and Exposures CVE-2018-8162 Microsoft Common Vulnerabilities and Exposures CVE-2018-8163 Note To apply this security update, you must have the release version of Excel 2016 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2016. It doesn't apply to the Office 2016 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version). *************************************************************** Title: MS18-MAY: Security update for Excel 2016 - Excel 2016 - KB4018382 Severity: Important Fixlet ID: 401838203 Fixlet Link: https://support.microsoft.com/kb/4018382 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8147 Microsoft Common Vulnerabilities and Exposures CVE-2018-8148 Microsoft Common Vulnerabilities and Exposures CVE-2018-8162 Microsoft Common Vulnerabilities and Exposures CVE-2018-8163 Note To apply this security update, you must have the release version of Excel 2016 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2016. It doesn't apply to the Office 2016 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version). *************************************************************** Title: MS18-MAY: Security update for Word 2016 - Word 2016 - KB4018383 (x64) Severity: Important Fixlet ID: 401838301 Fixlet Link: https://support.microsoft.com/kb/4018383 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8161. Note To apply this security update, you must have the release version of Word 2016 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2016. It doesn't apply to the Office 2016 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version). *************************************************************** Title: MS18-MAY: Security update for Word 2016 - Word 2016 - KB4018383 Severity: Important Fixlet ID: 401838303 Fixlet Link: https://support.microsoft.com/kb/4018383 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8161. Note To apply this security update, you must have the release version of Word 2016 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2016. It doesn't apply to the Office 2016 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version). *************************************************************** Title: MS18-MAY: Security update for SharePoint Enterprise Server 2013 - SharePoint Server 2013 SP1 - KB4018388 (x64) Severity: Important Fixlet ID: 401838801 Fixlet Link: https://support.microsoft.com/kb/4018388 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8161. Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft SharePoint Server 2013 installed on the computer. *************************************************************** Title: MS18-MAY: Security update for SharePoint Enterprise Server 2013 - SharePoint Server 2013 SP1 - KB4018390 (x64) Severity: Important Fixlet ID: 401839001 Fixlet Link: https://support.microsoft.com/kb/4018390 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8149 Microsoft Common Vulnerabilities and Exposures CVE-2018-8168 Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft SharePoint Server 2013 installed on the computer. *************************************************************** Title: MS18-MAY: Security update for Office Web Apps Server 2013 - Office Web Apps 2013 SP1 - KB4018393 (x64) Severity: Important Fixlet ID: 401839301 Fixlet Link: https://support.microsoft.com/kb/4018393 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8161. Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft Office Web Apps Server 2013 installed on the computer. *************************************************************** Title: MS18-MAY: Security update for Word 2013 - Word 2013 SP1 - KB4018396 (x64) Severity: Important Fixlet ID: 401839601 Fixlet Link: https://support.microsoft.com/kb/4018396 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8161. Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft Office 2013 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2013. It doesn't apply to the Office 2013 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version). *************************************************************** Title: MS18-MAY: Security update for Word 2013 - Word 2013 SP1 - KB4018396 Severity: Important Fixlet ID: 401839603 Fixlet Link: https://support.microsoft.com/kb/4018396 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8161. Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft Office 2013 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2013. It doesn't apply to the Office 2013 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version). *************************************************************** Title: MS18-MAY: Security update for SharePoint Foundation 2013 - SharePoint Foundation 2013 SP1 - KB4018398 (x64) Severity: Important Fixlet ID: 401839801 Fixlet Link: https://support.microsoft.com/kb/4018398 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8155. Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft SharePoint Foundation 2013 installed on the computer. *************************************************************** Title: MS18-MAY: Security update for Excel 2013 - Excel 2013 SP1 - KB4018399 (x64) Severity: Important Fixlet ID: 401839901 Fixlet Link: https://support.microsoft.com/kb/4018399 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8147 Microsoft Common Vulnerabilities and Exposures CVE-2018-8148 Microsoft Common Vulnerabilities and Exposures CVE-2018-8162 Microsoft Common Vulnerabilities and Exposures CVE-2018-8163 Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft Office 2013 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2013. It doesn't apply to the Office 2013 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version). *************************************************************** Title: MS18-MAY: Security update for Excel 2013 - Excel 2013 SP1 - KB4018399 Severity: Important Fixlet ID: 401839903 Fixlet Link: https://support.microsoft.com/kb/4018399 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8147 Microsoft Common Vulnerabilities and Exposures CVE-2018-8148 Microsoft Common Vulnerabilities and Exposures CVE-2018-8162 Microsoft Common Vulnerabilities and Exposures CVE-2018-8163 Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft Office 2013 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2013. It doesn't apply to the Office 2013 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version). *************************************************************** Title: MS18-MAY: Security update for Project Server 2013 - Project Server 2013 SP1 - KB4022130 (x64) Severity: Important Fixlet ID: 402213001 Fixlet Link: https://support.microsoft.com/kb/4022130 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8156. Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft Project Server 2013 installed on the computer. *************************************************************** Title: MS18-MAY: Security update for SharePoint Server 2010 - SharePoint Server 2010 SP2 - KB4022135 (x64) Severity: Important Fixlet ID: 402213501 Fixlet Link: https://support.microsoft.com/kb/4022135 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8160 Microsoft Common Vulnerabilities and Exposures CVE-2018-8161 Note To apply this security update, you must have the release version of Service Pack 2 for Microsoft SharePoint Server 2010 installed on the computer. *************************************************************** Title: MS18-MAY: Security update for Office 2010 - Office 2010 SP2 - KB4022137 (x64) Severity: Important Fixlet ID: 402213701 Fixlet Link: https://support.microsoft.com/kb/4022137 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8160. Note To apply this security update, you must have the release version of Service Pack 2 for Office 2010 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2010. It doesn't apply to the Office 2010 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version). *************************************************************** Title: MS18-MAY: Security update for Office 2010 - Office 2010 SP2 - KB4022137 Severity: Important Fixlet ID: 402213703 Fixlet Link: https://support.microsoft.com/kb/4022137 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8160. Note To apply this security update, you must have the release version of Service Pack 2 for Office 2010 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2010. It doesn't apply to the Office 2010 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version). *************************************************************** Title: MS18-MAY: Security update for Office 2010 - Office 2010 SP2 - KB4022139 (x64) Severity: Important Fixlet ID: 402213901 Fixlet Link: https://support.microsoft.com/kb/4022139 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8161. Note To apply this security update, you must have the release version of Service Pack 2 for Office 2010 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2010. It doesn't apply to the Office 2010 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version). *************************************************************** Title: MS18-MAY: Security update for Office 2010 - Office 2010 SP2 - KB4022139 Severity: Important Fixlet ID: 402213903 Fixlet Link: https://support.microsoft.com/kb/4022139 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8161. Note To apply this security update, you must have the release version of Service Pack 2 for Office 2010 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2010. It doesn't apply to the Office 2010 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version). *************************************************************** Title: MS18-MAY: Security update for Word 2010 - Word 2010 SP2 - KB4022141 (x64) Severity: Important Fixlet ID: 402214101 Fixlet Link: https://support.microsoft.com/kb/4022141 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8161. Note To apply this security update, you must have the release version of Service Pack 2 for Office 2010 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2010. It doesn't apply to the Office 2010 Click-to-Run editions, such as Microsoft Office 365 Home (seen Determining your Office version). *************************************************************** Title: MS18-MAY: Security update for Word 2010 - Word 2010 SP2 - KB4022141 Severity: Important Fixlet ID: 402214103 Fixlet Link: https://support.microsoft.com/kb/4022141 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8161. Note To apply this security update, you must have the release version of Service Pack 2 for Office 2010 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2010. It doesn't apply to the Office 2010 Click-to-Run editions, such as Microsoft Office 365 Home (seen Determining your Office version). *************************************************************** Title: MS18-MAY: Security update for SharePoint Server 2010 Office Web Apps - Office Web Apps 2010 SP2 - KB4022142 (x64) Severity: Important Fixlet ID: 402214201 Fixlet Link: https://support.microsoft.com/kb/4022142 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8160 Microsoft Common Vulnerabilities and Exposures CVE-2018-8161 Note To apply this security update, you must have the release version of Service Pack 2 for SharePoint Server 2010 Office Web Apps installed on the computer. *************************************************************** Title: MS18-MAY: Security update for SharePoint Server 2010 - SharePoint Server 2010 SP2 - KB4022145 (x64) Severity: Important Fixlet ID: 402214501 Fixlet Link: https://support.microsoft.com/kb/4022145 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8149 Microsoft Common Vulnerabilities and Exposures CVE-2018-8168 Note To apply this security update, you must have the release version of Service Pack 2 for Microsoft SharePoint Server 2010 installed on the computer. *************************************************************** Title: MS18-MAY: Security update for Excel 2010 - Excel 2010 SP2 - KB4022146 (x64) Severity: Important Fixlet ID: 402214601 Fixlet Link: https://support.microsoft.com/kb/4022146 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8147 Microsoft Common Vulnerabilities and Exposures CVE-2018-8148 Microsoft Common Vulnerabilities and Exposures CVE-2018-8162 Microsoft Common Vulnerabilities and Exposures CVE-2018-8163 Note To apply this security update, you must have the release version of Service Pack 2 for Office 2010 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2010. It doesn't apply to the Office 2010 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version). *************************************************************** Title: MS18-MAY: Security update for Excel 2010 - Excel 2010 SP2 - KB4022146 Severity: Important Fixlet ID: 402214603 Fixlet Link: https://support.microsoft.com/kb/4022146 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8147 Microsoft Common Vulnerabilities and Exposures CVE-2018-8148 Microsoft Common Vulnerabilities and Exposures CVE-2018-8162 Microsoft Common Vulnerabilities and Exposures CVE-2018-8163 Note To apply this security update, you must have the release version of Service Pack 2 for Office 2010 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2010. It doesn't apply to the Office 2010 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version). *************************************************************** Title: MS18-MAY: Security update for Microsoft Office Compatibility Pack Service Pack 3 - Office Compatibility Pack SP3 - KB4022150 Severity: Important Fixlet ID: 402215001 Fixlet Link: https://support.microsoft.com/kb/4022150 Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8147 Microsoft Common Vulnerabilities and Exposures CVE-2018-8148 Note To apply this security update, you must have the release version of Microsoft Office Compatibility Pack Service Pack 3 installed on a computer that is running Windows Embedded POSReady 2009. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Exchange Server 2010 SP3 SP3 - KB4091243 (x64) Severity: Critical Fixlet ID: 409124301 Fixlet Link: https://support.microsoft.com/kb/4091243 Fixlet Description: This update rollup is included in a security update. This security update resolves a vulnerability in Microsoft Exchange Outlook Web Access (OWA). The vulnerability could allow elevation of privilege or spoofing in Microsoft Exchange Server if an attacker sends an email message that has a specially crafted attachment to a vulnerable server that is running Exchange Server. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8151 Microsoft Common Vulnerabilities and Exposures CVE-2018-8154 Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: MS18-MAY: Security update for Microsoft Exchange Server 2013 and 2016 - Exchange Server 2013 CU20 SP1 - KB4092041 (x64) Severity: Critical Fixlet ID: 409204101 Fixlet Link: https://support.microsoft.com/kb/4092041 Fixlet Description: This security update resolves a vulnerability in Microsoft Exchange Outlook Web Access (OWA). The vulnerability could allow elevation of privilege or spoofing in Microsoft Exchange Server if an attacker sends an email message that has a specially crafted attachment to a vulnerable server that is running Exchange Server. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8151 Microsoft Common Vulnerabilities and Exposures CVE-2018-8154 Microsoft Common Vulnerabilities and Exposures CVE-2018-8159 Microsoft Common Vulnerabilities and Exposures CVE-2018-8153 Microsoft Common Vulnerabilities and Exposures CVE-2018-8152 Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: MS18-MAY: Security update for Microsoft Exchange Server 2013 and 2016 - Exchange Server 2013 CU19 SP1 - KB4092041 (x64) Severity: Critical Fixlet ID: 409204103 Fixlet Link: https://support.microsoft.com/kb/4092041 Fixlet Description: This security update resolves a vulnerability in Microsoft Exchange Outlook Web Access (OWA). The vulnerability could allow elevation of privilege or spoofing in Microsoft Exchange Server if an attacker sends an email message that has a specially crafted attachment to a vulnerable server that is running Exchange Server. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8151 Microsoft Common Vulnerabilities and Exposures CVE-2018-8154 Microsoft Common Vulnerabilities and Exposures CVE-2018-8159 Microsoft Common Vulnerabilities and Exposures CVE-2018-8153 Microsoft Common Vulnerabilities and Exposures CVE-2018-8152 Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: MS18-MAY: Security update for Microsoft Exchange Server 2013 and 2016 - Exchange Server 2013 SP1 - KB4092041 (x64) Severity: Critical Fixlet ID: 409204105 Fixlet Link: https://support.microsoft.com/kb/4092041 Fixlet Description: This security update resolves a vulnerability in Microsoft Exchange Outlook Web Access (OWA). The vulnerability could allow elevation of privilege or spoofing in Microsoft Exchange Server if an attacker sends an email message that has a specially crafted attachment to a vulnerable server that is running Exchange Server. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8151 Microsoft Common Vulnerabilities and Exposures CVE-2018-8154 Microsoft Common Vulnerabilities and Exposures CVE-2018-8159 Microsoft Common Vulnerabilities and Exposures CVE-2018-8153 Microsoft Common Vulnerabilities and Exposures CVE-2018-8152 Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: MS18-MAY: Security update for Microsoft Exchange Server 2013 and 2016 - Exchange Server 2016 CU9 - KB4092041 (x64) Severity: Critical Fixlet ID: 409204107 Fixlet Link: https://support.microsoft.com/kb/4092041 Fixlet Description: This security update resolves a vulnerability in Microsoft Exchange Outlook Web Access (OWA). The vulnerability could allow elevation of privilege or spoofing in Microsoft Exchange Server if an attacker sends an email message that has a specially crafted attachment to a vulnerable server that is running Exchange Server. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8151 Microsoft Common Vulnerabilities and Exposures CVE-2018-8154 Microsoft Common Vulnerabilities and Exposures CVE-2018-8159 Microsoft Common Vulnerabilities and Exposures CVE-2018-8153 Microsoft Common Vulnerabilities and Exposures CVE-2018-8152 Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: MS18-MAY: Security update for Microsoft Exchange Server 2013 and 2016 - Exchange Server 2016 CU8 - KB4092041 (x64) Severity: Critical Fixlet ID: 409204109 Fixlet Link: https://support.microsoft.com/kb/4092041 Fixlet Description: This security update resolves a vulnerability in Microsoft Exchange Outlook Web Access (OWA). The vulnerability could allow elevation of privilege or spoofing in Microsoft Exchange Server if an attacker sends an email message that has a specially crafted attachment to a vulnerable server that is running Exchange Server. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8151 Microsoft Common Vulnerabilities and Exposures CVE-2018-8154 Microsoft Common Vulnerabilities and Exposures CVE-2018-8159 Microsoft Common Vulnerabilities and Exposures CVE-2018-8153 Microsoft Common Vulnerabilities and Exposures CVE-2018-8152 Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: MS18-MAY: Security update for the Hyper-V remote code execution vulnerability in Windows Server 2008 - Windows Server 2008 SP2 - KB4094079 (x64) Severity: Critical Fixlet ID: 409407901 Fixlet Link: https://support.microsoft.com/kb/4094079 Fixlet Description: A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To learn more about the vulnerability, see CVE-2018-0959. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2012 - .NET Framework 3.5 SP1 - KB4095512 (x64) Severity: Important Fixlet ID: 409551201 Fixlet Link: https://support.microsoft.com/kb/4099638 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2008 SP2 - .NET Framework 2.0 SP2 - KB4095513 (x64) Severity: Important Fixlet ID: 409551301 Fixlet Link: https://support.microsoft.com/kb/4099640 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2008 SP2 - .NET Framework 2.0 SP2 - KB4095513 Severity: Important Fixlet ID: 409551303 Fixlet Link: https://support.microsoft.com/kb/4099640 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2008 R2 SP1 - .NET Framework 3.5.1 - KB4095514 (x64) Severity: Important Fixlet ID: 409551401 Fixlet Link: https://support.microsoft.com/kb/4099637 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows 7 SP1 - .NET Framework 3.5.1 - KB4095514 (x64) Severity: Important Fixlet ID: 409551403 Fixlet Link: https://support.microsoft.com/kb/4099637 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows 7 SP1 - .NET Framework 3.5.1 - KB4095514 Severity: Important Fixlet ID: 409551405 Fixlet Link: https://support.microsoft.com/kb/4099637 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows 8.1 - .NET Framework 3.5 SP1 - KB4095515 (x64) Severity: Important Fixlet ID: 409551501 Fixlet Link: https://support.microsoft.com/kb/4099639 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2012 R2 - .NET Framework 3.5 SP1 - KB4095515 (x64) Severity: Important Fixlet ID: 409551503 Fixlet Link: https://support.microsoft.com/kb/4099639 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows 8.1 - .NET Framework 3.5 SP1 - KB4095515 Severity: Important Fixlet ID: 409551505 Fixlet Link: https://support.microsoft.com/kb/4099639 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2012 R2 - .NET Framework 4.5.2 - KB4095517 (x64) Severity: Important Fixlet ID: 409551701 Fixlet Link: https://support.microsoft.com/kb/4099639 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows 8.1 - .NET Framework 4.5.2 - KB4095517 (x64) Severity: Important Fixlet ID: 409551703 Fixlet Link: https://support.microsoft.com/kb/4099639 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows 8.1 - .NET Framework 4.5.2 - KB4095517 Severity: Important Fixlet ID: 409551705 Fixlet Link: https://support.microsoft.com/kb/4099639 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2012 - .NET Framework 4.5.2 - KB4095518 (x64) Severity: Important Fixlet ID: 409551801 Fixlet Link: https://support.microsoft.com/kb/4099638 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows 7 SP1 - .NET Framework 4.5.2 - KB4095519 (x64) Severity: Important Fixlet ID: 409551901 Fixlet Link: https://support.microsoft.com/kb/4099637 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2008 R2 SP1 - .NET Framework 4.5.2 - KB4095519 (x64) Severity: Important Fixlet ID: 409551903 Fixlet Link: https://support.microsoft.com/kb/4099637 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows 7 SP1 - .NET Framework 4.5.2 - KB4095519 Severity: Important Fixlet ID: 409551905 Fixlet Link: https://support.microsoft.com/kb/4099637 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2008 SP2 - .NET Framework 4.5.2 - KB4095519 (x64) Severity: Important Fixlet ID: 409551907 Fixlet Link: https://support.microsoft.com/kb/4099640 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2008 SP2 - .NET Framework 4.5.2 - KB4095519 Severity: Important Fixlet ID: 409551909 Fixlet Link: https://support.microsoft.com/kb/4099640 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 - .NET Framework 3.5 SP1 - KB4095872 (x64) Severity: Important Fixlet ID: 409587201 Fixlet Link: https://support.microsoft.com/kb/4099634 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 SP2 - .NET Framework 2.0 SP2 - KB4095873 (x64) Severity: Important Fixlet ID: 409587301 Fixlet Link: https://support.microsoft.com/kb/4099636 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of serviceagainst a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 SP2 - .NET Framework 2.0 SP2 - KB4095873 Severity: Important Fixlet ID: 409587303 Fixlet Link: https://support.microsoft.com/kb/4099636 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of serviceagainst a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 R2 SP1 - .NET Framework 3.5.1 - KB4095874 (x64) Severity: Important Fixlet ID: 409587401 Fixlet Link: https://support.microsoft.com/kb/4099633 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows 7 SP1 - .NET Framework 3.5.1 - KB4095874 (x64) Severity: Important Fixlet ID: 409587403 Fixlet Link: https://support.microsoft.com/kb/4099633 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows 7 SP1 - .NET Framework 3.5.1 - KB4095874 Severity: Important Fixlet ID: 409587405 Fixlet Link: https://support.microsoft.com/kb/4099633 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows 8.1 - .NET Framework 3.5 SP1 - KB4095875 (x64) Severity: Important Fixlet ID: 409587501 Fixlet Link: https://support.microsoft.com/kb/4099635 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 R2 - .NET Framework 3.5 SP1 - KB4095875 (x64) Severity: Important Fixlet ID: 409587503 Fixlet Link: https://support.microsoft.com/kb/4099635 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows 8.1 - .NET Framework 3.5 SP1 - KB4095875 Severity: Important Fixlet ID: 409587505 Fixlet Link: https://support.microsoft.com/kb/4099635 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 R2 - .NET Framework 4.5.2 - KB4095876 (x64) Severity: Important Fixlet ID: 409587601 Fixlet Link: https://support.microsoft.com/kb/4099635 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows 8.1 - .NET Framework 4.5.2 - KB4095876 (x64) Severity: Important Fixlet ID: 409587603 Fixlet Link: https://support.microsoft.com/kb/4099635 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows 8.1 - .NET Framework 4.5.2 - KB4095876 Severity: Important Fixlet ID: 409587605 Fixlet Link: https://support.microsoft.com/kb/4099635 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2012 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096235 (x64) Severity: Important Fixlet ID: 409623501 Fixlet Link: https://support.microsoft.com/kb/4099638 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows 8.1 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096236 (x64) Severity: Important Fixlet ID: 409623601 Fixlet Link: https://support.microsoft.com/kb/4099639 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could allow a Denial of Service attack when .NET Framework and .NET core components process XML documents incorrectly. An attacker who successfully exploits this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2012 R2 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096236 (x64) Severity: Important Fixlet ID: 409623603 Fixlet Link: https://support.microsoft.com/kb/4099639 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could allow a Denial of Service attack when .NET Framework and .NET core components process XML documents incorrectly. An attacker who successfully exploits this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows 8.1 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096236 Severity: Important Fixlet ID: 409623605 Fixlet Link: https://support.microsoft.com/kb/4099639 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could allow a Denial of Service attack when .NET Framework and .NET core components process XML documents incorrectly. An attacker who successfully exploits this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows 7 SP1 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096237 (x64) Severity: Important Fixlet ID: 409623701 Fixlet Link: https://support.microsoft.com/kb/4099637 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2008 R2 SP1 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096237 (x64) Severity: Important Fixlet ID: 409623703 Fixlet Link: https://support.microsoft.com/kb/4099637 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows 7 SP1 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096237 Severity: Important Fixlet ID: 409623705 Fixlet Link: https://support.microsoft.com/kb/4099637 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2008 SP2 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096237 (x64) Severity: Important Fixlet ID: 409623707 Fixlet Link: https://support.microsoft.com/kb/4099640 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2008 SP2 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096237 Severity: Important Fixlet ID: 409623709 Fixlet Link: https://support.microsoft.com/kb/4099640 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096416 (x64) Severity: Important Fixlet ID: 409641601 Fixlet Link: https://support.microsoft.com/kb/4099634 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 R2 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096417 (x64) Severity: Important Fixlet ID: 409641701 Fixlet Link: https://support.microsoft.com/kb/4099635 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows 8.1 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096417 (x64) Severity: Important Fixlet ID: 409641703 Fixlet Link: https://support.microsoft.com/kb/4099635 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows 8.1 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096417 Severity: Important Fixlet ID: 409641705 Fixlet Link: https://support.microsoft.com/kb/4099635 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 SP2 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096418 (x64) Severity: Important Fixlet ID: 409641801 Fixlet Link: https://support.microsoft.com/kb/4099636 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 SP2 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096418 Severity: Important Fixlet ID: 409641803 Fixlet Link: https://support.microsoft.com/kb/4099636 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 R2 SP1 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096418 (x64) Severity: Important Fixlet ID: 409641805 Fixlet Link: https://support.microsoft.com/kb/4099633 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows 7 SP1 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096418 (x64) Severity: Important Fixlet ID: 409641807 Fixlet Link: https://support.microsoft.com/kb/4099633 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows 7 SP1 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096418 Severity: Important Fixlet ID: 409641809 Fixlet Link: https://support.microsoft.com/kb/4099633 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 - .NET Framework 4.5.2 - KB4096494 (x64) Severity: Important Fixlet ID: 409649401 Fixlet Link: https://support.microsoft.com/kb/4099634 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 SP2 - .NET Framework 4.5.2 - KB4096495 (x64) Severity: Important Fixlet ID: 409649501 Fixlet Link: https://support.microsoft.com/kb/4099636 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 SP2 - .NET Framework 4.5.2 - KB4096495 Severity: Important Fixlet ID: 409649503 Fixlet Link: https://support.microsoft.com/kb/4099636 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 R2 SP1 - .NET Framework 4.5.2 - KB4096495 (x64) Severity: Important Fixlet ID: 409649505 Fixlet Link: https://support.microsoft.com/kb/4099633 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows 7 SP1 - .NET Framework 4.5.2 - KB4096495 (x64) Severity: Important Fixlet ID: 409649507 Fixlet Link: https://support.microsoft.com/kb/4099633 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows 7 SP1 - .NET Framework 4.5.2 - KB4096495 Severity: Important Fixlet ID: 409649509 Fixlet Link: https://support.microsoft.com/kb/4099633 Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039. *************************************************************** Title: MS18-MAY: Security update for the Microsoft COM for Windows remote code execution vulnerability in Windows Server 2008, Windows Embedded POSReady 2009, and Windows Embedded Standard 2009 - Windows Server 2008 SP2 - KB4101477 (x64) Severity: Important Fixlet ID: 410147701 Fixlet Link: https://support.microsoft.com/kb/4101477 Fixlet Description: A remote code execution vulnerability exists in "Microsoft COM for Windows" when it fails to properly handle serialized objects. To learn more about the vulnerability, go to CVE-2018-0824. *************************************************************** Title: MS18-MAY: Security update for the Microsoft COM for Windows remote code execution vulnerability in Windows Server 2008, Windows Embedded POSReady 2009, and Windows Embedded Standard 2009 - Windows Server 2008 SP2 - KB4101477 Severity: Important Fixlet ID: 410147703 Fixlet Link: https://support.microsoft.com/kb/4101477 Fixlet Description: A remote code execution vulnerability exists in "Microsoft COM for Windows" when it fails to properly handle serialized objects. To learn more about the vulnerability, go to CVE-2018-0824. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2008 R2 SP1 - KB4103712 (x64) Severity: Critical Fixlet ID: 410371201 Fixlet Link: https://support.microsoft.com/kb/4103712 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows 7 SP1 - KB4103712 (x64) Severity: Critical Fixlet ID: 410371203 Fixlet Link: https://support.microsoft.com/kb/4103712 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows 7 SP1 - KB4103712 Severity: Critical Fixlet ID: 410371205 Fixlet Link: https://support.microsoft.com/kb/4103712 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2012 R2 - KB4103715 (x64) Severity: Critical Fixlet ID: 410371501 Fixlet Link: https://support.microsoft.com/kb/4103715 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows 8.1 - KB4103715 (x64) Severity: Critical Fixlet ID: 410371503 Fixlet Link: https://support.microsoft.com/kb/4103715 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows 8.1 - KB4103715 Severity: Critical Fixlet ID: 410371505 Fixlet Link: https://support.microsoft.com/kb/4103715 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. *************************************************************** Title: MS18-MAY: Cumulative Update for Windows 10 Version 1507 - Windows 10 Version 1507 LTSB - KB4103716 (x64) Severity: Critical Fixlet ID: 410371601 Fixlet Link: https://support.microsoft.com/kb/4103716 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. *************************************************************** Title: MS18-MAY: Cumulative Update for Windows 10 Version 1507 - Windows 10 Version 1507 LTSB - KB4103716 Severity: Critical Fixlet ID: 410371603 Fixlet Link: https://support.microsoft.com/kb/4103716 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 R2 SP1 - KB4103718 (x64) Severity: Critical Fixlet ID: 410371801 Fixlet Link: https://support.microsoft.com/kb/4103718 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows 7 SP1 - KB4103718 (x64) Severity: Critical Fixlet ID: 410371803 Fixlet Link: https://support.microsoft.com/kb/4103718 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows 7 SP1 - KB4103718 Severity: Critical Fixlet ID: 410371805 Fixlet Link: https://support.microsoft.com/kb/4103718 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: MS18-MAY: Cumulative Update for Windows Server 2016 - Windows Server 2016 - KB4103723 (x64) Severity: Critical Fixlet ID: 410372301 Fixlet Link: https://support.microsoft.com/kb/4103723 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: MS18-MAY: Cumulative Update for Windows 10 Version 1607 - Windows 10 Version 1607 - KB4103723 (x64) Severity: Critical Fixlet ID: 410372303 Fixlet Link: https://support.microsoft.com/kb/4103723 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: MS18-MAY: Delta Update for Windows 10 Version 1607 - Windows 10 Version 1607 - Delta Update - KB4103723 (x64) Severity: Critical Fixlet ID: 410372305 Fixlet Link: https://support.microsoft.com/kb/4103723 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: MS18-MAY: Delta Update for Windows Server 2016 - Windows Server 2016 - Delta Update - KB4103723 (x64) Severity: Critical Fixlet ID: 410372307 Fixlet Link: https://support.microsoft.com/kb/4103723 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: MS18-MAY: Cumulative Update for Windows 10 Version 1607 - Windows 10 Version 1607 - KB4103723 Severity: Critical Fixlet ID: 410372309 Fixlet Link: https://support.microsoft.com/kb/4103723 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: MS18-MAY: Delta Update for Windows 10 Version 1607 - Windows 10 Version 1607 - Delta Update - KB4103723 Severity: Critical Fixlet ID: 410372311 Fixlet Link: https://support.microsoft.com/kb/4103723 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 R2 - KB4103725 (x64) Severity: Critical Fixlet ID: 410372501 Fixlet Link: https://support.microsoft.com/kb/4103725 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows 8.1 - KB4103725 (x64) Severity: Critical Fixlet ID: 410372503 Fixlet Link: https://support.microsoft.com/kb/4103725 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows 8.1 - KB4103725 Severity: Critical Fixlet ID: 410372505 Fixlet Link: https://support.microsoft.com/kb/4103725 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. *************************************************************** Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2012 - KB4103726 (x64) Severity: Critical Fixlet ID: 410372601 Fixlet Link: https://support.microsoft.com/kb/4103726 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. *************************************************************** Title: MS18-MAY: Cumulative Update for Windows 10 Version 1709 - Windows 10 Version 1709 - KB4103727 (x64) Severity: Critical Fixlet ID: 410372701 Fixlet Link: https://support.microsoft.com/kb/4103727 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: MS18-MAY: Delta Update for Windows 10 Version 1709 - Windows 10 Version 1709 - Delta Update - KB4103727 (x64) Severity: Critical Fixlet ID: 410372703 Fixlet Link: https://support.microsoft.com/kb/4103727 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: MS18-MAY: Cumulative Update for Windows 10 Version 1709 - Windows 10 Version 1709 - KB4103727 Severity: Critical Fixlet ID: 410372705 Fixlet Link: https://support.microsoft.com/kb/4103727 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: MS18-MAY: Delta Update for Windows 10 Version 1709 - Windows 10 Version 1709 - Delta Update - KB4103727 Severity: Critical Fixlet ID: 410372707 Fixlet Link: https://support.microsoft.com/kb/4103727 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information. *************************************************************** Title: MS18-MAY: Security update for Adobe Flash Player - Windows Server 2012 - Adobe Flash Player - KB4103729 (x64) Severity: Critical Fixlet ID: 410372901 Fixlet Link: https://support.microsoft.com/kb/4103729 Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player that is installed on any supported edition of Windows Server version 1803, Windows 10 version 1803, Windows Server 2016 Version 1709, Windows 10 version 1709, Windows RT, Windows 10 Version 1703, Windows Server 2016, Windows 10 Version 1607, Windows 10 (RTM), Windows Server 2012 R2, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV180008. *************************************************************** Title: MS18-MAY: Security update for Adobe Flash Player - Windows 8.1 - Adobe Flash Player - KB4103729 (x64) Severity: Critical Fixlet ID: 410372903 Fixlet Link: https://support.microsoft.com/kb/4103729 Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player that is installed on any supported edition of Windows Server version 1803, Windows 10 version 1803, Windows Server 2016 Version 1709, Windows 10 version 1709, Windows RT, Windows 10 Version 1703, Windows Server 2016, Windows 10 Version 1607, Windows 10 (RTM), Windows Server 2012 R2, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV180008. *************************************************************** Title: MS18-MAY: Security update for Adobe Flash Player - Windows Server 2012 R2 - Adobe Flash Player - KB4103729 (x64) Severity: Critical Fixlet ID: 410372905 Fixlet Link: https://support.microsoft.com/kb/4103729 Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player that is installed on any supported edition of Windows Server version 1803, Windows 10 version 1803, Windows Server 2016 Version 1709, Windows 10 version 1709, Windows RT, Windows 10 Version 1703, Windows Server 2016, Windows 10 Version 1607, Windows 10 (RTM), Windows Server 2012 R2, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV180008. *************************************************************** Title: MS18-MAY: Security update for Adobe Flash Player - Windows 8.1 - Adobe Flash Player - KB4103729 Severity: Critical Fixlet ID: 410372907 Fixlet Link: https://support.microsoft.com/kb/4103729 Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player that is installed on any supported edition of Windows Server version 1803, Windows 10 version 1803, Windows Server 2016 Version 1709, Windows 10 version 1709, Windows RT, Windows 10 Version 1703, Windows Server 2016, Windows 10 Version 1607, Windows 10 (RTM), Windows Server 2012 R2, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV180008. *************************************************************** Title: MS18-MAY: Security Update for Adobe Flash Player for Windows 10 Version 1607 - Windows 10 Version 1607 - Adobe Flash Player - KB4103729 (x64) Severity: Critical Fixlet ID: 410372909 Fixlet Link: https://support.microsoft.com/kb/4103729 Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player that is installed on any supported edition of Windows Server version 1803, Windows 10 version 1803, Windows Server 2016 Version 1709, Windows 10 version 1709, Windows RT, Windows 10 Version 1703, Windows Server 2016, Windows 10 Version 1607, Windows 10 (RTM), Windows Server 2012 R2, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV180008. *************************************************************** Title: MS18-MAY: Security Update for Adobe Flash Player for Windows Server 2016 - Windows Server 2016 - Adobe Flash Player - KB4103729 (x64) Severity: Critical Fixlet ID: 410372911 Fixlet Link: https://support.microsoft.com/kb/4103729 Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player that is installed on any supported edition of Windows Server version 1803, Windows 10 version 1803, Windows Server 2016 Version 1709, Windows 10 version 1709, Windows RT, Windows 10 Version 1703, Windows Server 2016, Windows 10 Version 1607, Windows 10 (RTM), Windows Server 2012 R2, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV180008. *************************************************************** Title: MS18-MAY: Security Update for Adobe Flash Player for Windows 10 Version 1703 - Windows 10 Version 1703 - Adobe Flash Player - KB4103729 Severity: Critical Fixlet ID: 410372913 Fixlet Link: https://support.microsoft.com/kb/4103729 Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player that is installed on any supported edition of Windows Server version 1803, Windows 10 version 1803, Windows Server 2016 Version 1709, Windows 10 version 1709, Windows RT, Windows 10 Version 1703, Windows Server 2016, Windows 10 Version 1607, Windows 10 (RTM), Windows Server 2012 R2, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV180008. *************************************************************** Title: MS18-MAY: Security Update for Adobe Flash Player for Windows 10 Version 1709 - Windows 10 Version 1709 - Adobe Flash Player - KB4103729 Severity: Critical Fixlet ID: 410372917 Fixlet Link: https://support.microsoft.com/kb/4103729 Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player that is installed on any supported edition of Windows Server version 1803, Windows 10 version 1803, Windows Server 2016 Version 1709, Windows 10 version 1709, Windows RT, Windows 10 Version 1703, Windows Server 2016, Windows 10 Version 1607, Windows 10 (RTM), Windows Server 2012 R2, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV180008. *************************************************************** Title: MS18-MAY: Security Update for Adobe Flash Player for Windows 10 Version 1507 - Windows 10 Version 1507 LTSB - Adobe Flash Player - KB4103729 Severity: Critical Fixlet ID: 410372919 Fixlet Link: https://support.microsoft.com/kb/4103729 Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player that is installed on any supported edition of Windows Server version 1803, Windows 10 version 1803, Windows Server 2016 Version 1709, Windows 10 version 1709, Windows RT, Windows 10 Version 1703, Windows Server 2016, Windows 10 Version 1607, Windows 10 (RTM), Windows Server 2012 R2, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV180008. *************************************************************** Title: MS18-MAY: Security Update for Adobe Flash Player for Windows 10 Version 1607 - Windows 10 Version 1607 - Adobe Flash Player - KB4103729 Severity: Critical Fixlet ID: 410372921 Fixlet Link: https://support.microsoft.com/kb/4103729 Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player that is installed on any supported edition of Windows Server version 1803, Windows 10 version 1803, Windows Server 2016 Version 1709, Windows 10 version 1709, Windows RT, Windows 10 Version 1703, Windows Server 2016, Windows 10 Version 1607, Windows 10 (RTM), Windows Server 2012 R2, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV180008. *************************************************************** Title: MS18-MAY: Security Update for Adobe Flash Player for Windows 10 Version 1507 - Windows 10 Version 1507 LTSB - Adobe Flash Player - KB4103729 (x64) Severity: Critical Fixlet ID: 410372923 Fixlet Link: https://support.microsoft.com/kb/4103729 Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player that is installed on any supported edition of Windows Server version 1803, Windows 10 version 1803, Windows Server 2016 Version 1709, Windows 10 version 1709, Windows RT, Windows 10 Version 1703, Windows Server 2016, Windows 10 Version 1607, Windows 10 (RTM), Windows Server 2012 R2, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV180008. *************************************************************** Title: MS18-MAY: Security Update for Adobe Flash Player for Windows 10 Version 1709 - Windows 10 Version 1709 - Adobe Flash Player - KB4103729 (x64) Severity: Critical Fixlet ID: 410372925 Fixlet Link: https://support.microsoft.com/kb/4103729 Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player that is installed on any supported edition of Windows Server version 1803, Windows 10 version 1803, Windows Server 2016 Version 1709, Windows 10 version 1709, Windows RT, Windows 10 Version 1703, Windows Server 2016, Windows 10 Version 1607, Windows 10 (RTM), Windows Server 2012 R2, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV180008. *************************************************************** Title: MS18-MAY: Security Update for Adobe Flash Player for Windows 10 Version 1703 - Windows 10 Version 1703 - Adobe Flash Player - KB4103729 (x64) Severity: Critical Fixlet ID: 410372929 Fixlet Link: https://support.microsoft.com/kb/4103729 Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player that is installed on any supported edition of Windows Server version 1803, Windows 10 version 1803, Windows Server 2016 Version 1709, Windows 10 version 1709, Windows RT, Windows 10 Version 1703, Windows Server 2016, Windows 10 Version 1607, Windows 10 (RTM), Windows Server 2012 R2, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV180008. *************************************************************** Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 - KB4103730 (x64) Severity: Critical Fixlet ID: 410373001 Fixlet Link: https://support.microsoft.com/kb/4103730 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. *************************************************************** Title: MS18-MAY: Cumulative Update for Windows 10 Version 1703 - Windows 10 Version 1703 - KB4103731 (x64) Severity: Critical Fixlet ID: 410373101 Fixlet Link: https://support.microsoft.com/kb/4103731 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. *************************************************************** Title: MS18-MAY: Delta Update for Windows 10 Version 1703 - Windows 10 Version 1703 - Delta Update - KB4103731 (x64) Severity: Critical Fixlet ID: 410373103 Fixlet Link: https://support.microsoft.com/kb/4103731 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. *************************************************************** Title: MS18-MAY: Delta Update for Windows 10 Version 1703 - Windows 10 Version 1703 - Delta Update - KB4103731 Severity: Critical Fixlet ID: 410373105 Fixlet Link: https://support.microsoft.com/kb/4103731 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. *************************************************************** Title: MS18-MAY: Cumulative Update for Windows 10 Version 1703 - Windows 10 Version 1703 - KB4103731 Severity: Critical Fixlet ID: 410373107 Fixlet Link: https://support.microsoft.com/kb/4103731 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. *************************************************************** Title: MS18-MAY: Cumulative security update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 11 - KB4103768 (x64) Severity: Moderate Fixlet ID: 410376801 Fixlet Link: https://support.microsoft.com/kb/4103768 Fixlet Description: This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures. Additionally, see the following articles for more information about this cumulative update: Windows 7 SP1 and Windows Server 2008 R2 SP1 update history Windows Server 2012 update history Windows 8.1 and Windows Server 2012 R2 update history Windows 10 and Windows Server 2016 update history Important The fixes that are included in this Security Update for Internet Explorer 4103768 are also included in the May 2018 Security Monthly Quality Rollup. Installing either the Security Update for Internet Explorer or the Security Monthly Quality Rollup installs the fixes that are in this update. If you use update management processes other than Windows Update and you automatically approve all security updates classifications for deployment, this Security Update for Internet Explorer (KB 4103768), the May 2018 Security Only Quality Update, and the May 2018 Security Monthly Quality Rollup are deployed. We recommend that you review your update deployment rules to make sure that the desired updates are deployed. This Security Update for Internet Explorer is not applicable for installation on a computer where the Security Monthly Quality Rollup or the Preview of Monthly Quality Rollup from May 2018 (or a later month) is already installed. This is because those updates contain all the fixes that are in this Security Update for Internet Explorer. If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows. *************************************************************** Title: MS18-MAY: Cumulative security update for Internet Explorer - Windows 7 SP1 - IE 11 - KB4103768 (x64) Severity: Critical Fixlet ID: 410376803 Fixlet Link: https://support.microsoft.com/kb/4103768 Fixlet Description: This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures. Additionally, see the following articles for more information about this cumulative update: Windows 7 SP1 and Windows Server 2008 R2 SP1 update history Windows Server 2012 update history Windows 8.1 and Windows Server 2012 R2 update history Windows 10 and Windows Server 2016 update history Important The fixes that are included in this Security Update for Internet Explorer 4103768 are also included in the May 2018 Security Monthly Quality Rollup. Installing either the Security Update for Internet Explorer or the Security Monthly Quality Rollup installs the fixes that are in this update. If you use update management processes other than Windows Update and you automatically approve all security updates classifications for deployment, this Security Update for Internet Explorer (KB 4103768), the May 2018 Security Only Quality Update, and the May 2018 Security Monthly Quality Rollup are deployed. We recommend that you review your update deployment rules to make sure that the desired updates are deployed. This Security Update for Internet Explorer is not applicable for installation on a computer where the Security Monthly Quality Rollup or the Preview of Monthly Quality Rollup from May 2018 (or a later month) is already installed. This is because those updates contain all the fixes that are in this Security Update for Internet Explorer. If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows. *************************************************************** Title: MS18-MAY: Cumulative security update for Internet Explorer - Windows 7 SP1 - IE 11 - KB4103768 Severity: Critical Fixlet ID: 410376805 Fixlet Link: https://support.microsoft.com/kb/4103768 Fixlet Description: This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures. Additionally, see the following articles for more information about this cumulative update: Windows 7 SP1 and Windows Server 2008 R2 SP1 update history Windows Server 2012 update history Windows 8.1 and Windows Server 2012 R2 update history Windows 10 and Windows Server 2016 update history Important The fixes that are included in this Security Update for Internet Explorer 4103768 are also included in the May 2018 Security Monthly Quality Rollup. Installing either the Security Update for Internet Explorer or the Security Monthly Quality Rollup installs the fixes that are in this update. If you use update management processes other than Windows Update and you automatically approve all security updates classifications for deployment, this Security Update for Internet Explorer (KB 4103768), the May 2018 Security Only Quality Update, and the May 2018 Security Monthly Quality Rollup are deployed. We recommend that you review your update deployment rules to make sure that the desired updates are deployed. This Security Update for Internet Explorer is not applicable for installation on a computer where the Security Monthly Quality Rollup or the Preview of Monthly Quality Rollup from May 2018 (or a later month) is already installed. This is because those updates contain all the fixes that are in this Security Update for Internet Explorer. If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows. *************************************************************** Title: MS18-MAY: Cumulative security update for Internet Explorer - Windows Server 2008 SP2 - IE 9 - KB4103768 (x64) Severity: Moderate Fixlet ID: 410376807 Fixlet Link: https://support.microsoft.com/kb/4103768 Fixlet Description: This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures. Additionally, see the following articles for more information about this cumulative update: Windows 7 SP1 and Windows Server 2008 R2 SP1 update history Windows Server 2012 update history Windows 8.1 and Windows Server 2012 R2 update history Windows 10 and Windows Server 2016 update history Important The fixes that are included in this Security Update for Internet Explorer 4103768 are also included in the May 2018 Security Monthly Quality Rollup. Installing either the Security Update for Internet Explorer or the Security Monthly Quality Rollup installs the fixes that are in this update. If you use update management processes other than Windows Update and you automatically approve all security updates classifications for deployment, this Security Update for Internet Explorer (KB 4103768), the May 2018 Security Only Quality Update, and the May 2018 Security Monthly Quality Rollup are deployed. We recommend that you review your update deployment rules to make sure that the desired updates are deployed. This Security Update for Internet Explorer is not applicable for installation on a computer where the Security Monthly Quality Rollup or the Preview of Monthly Quality Rollup from May 2018 (or a later month) is already installed. This is because those updates contain all the fixes that are in this Security Update for Internet Explorer. If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows. *************************************************************** Title: MS18-MAY: Cumulative security update for Internet Explorer - Windows Server 2008 SP2 - IE 9 - KB4103768 Severity: Moderate Fixlet ID: 410376809 Fixlet Link: https://support.microsoft.com/kb/4103768 Fixlet Description: This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures. Additionally, see the following articles for more information about this cumulative update: Windows 7 SP1 and Windows Server 2008 R2 SP1 update history Windows Server 2012 update history Windows 8.1 and Windows Server 2012 R2 update history Windows 10 and Windows Server 2016 update history Important The fixes that are included in this Security Update for Internet Explorer 4103768 are also included in the May 2018 Security Monthly Quality Rollup. Installing either the Security Update for Internet Explorer or the Security Monthly Quality Rollup installs the fixes that are in this update. If you use update management processes other than Windows Update and you automatically approve all security updates classifications for deployment, this Security Update for Internet Explorer (KB 4103768), the May 2018 Security Only Quality Update, and the May 2018 Security Monthly Quality Rollup are deployed. We recommend that you review your update deployment rules to make sure that the desired updates are deployed. This Security Update for Internet Explorer is not applicable for installation on a computer where the Security Monthly Quality Rollup or the Preview of Monthly Quality Rollup from May 2018 (or a later month) is already installed. This is because those updates contain all the fixes that are in this Security Update for Internet Explorer. If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows. *************************************************************** Title: MS18-MAY: Cumulative security update for Internet Explorer - Windows Server 2012 - IE 10 - KB4103768 (x64) Severity: Moderate Fixlet ID: 410376811 Fixlet Link: https://support.microsoft.com/kb/4103768 Fixlet Description: This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures. Additionally, see the following articles for more information about this cumulative update: Windows 7 SP1 and Windows Server 2008 R2 SP1 update history Windows Server 2012 update history Windows 8.1 and Windows Server 2012 R2 update history Windows 10 and Windows Server 2016 update history Important The fixes that are included in this Security Update for Internet Explorer 4103768 are also included in the May 2018 Security Monthly Quality Rollup. Installing either the Security Update for Internet Explorer or the Security Monthly Quality Rollup installs the fixes that are in this update. If you use update management processes other than Windows Update and you automatically approve all security updates classifications for deployment, this Security Update for Internet Explorer (KB 4103768), the May 2018 Security Only Quality Update, and the May 2018 Security Monthly Quality Rollup are deployed. We recommend that you review your update deployment rules to make sure that the desired updates are deployed. This Security Update for Internet Explorer is not applicable for installation on a computer where the Security Monthly Quality Rollup or the Preview of Monthly Quality Rollup from May 2018 (or a later month) is already installed. This is because those updates contain all the fixes that are in this Security Update for Internet Explorer. If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows. *************************************************************** Title: MS18-MAY: Cumulative security update for Internet Explorer - Windows Server 2012 R2 - IE 11 - KB4103768 (x64) Severity: Moderate Fixlet ID: 410376813 Fixlet Link: https://support.microsoft.com/kb/4103768 Fixlet Description: This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures. Additionally, see the following articles for more information about this cumulative update: Windows 7 SP1 and Windows Server 2008 R2 SP1 update history Windows Server 2012 update history Windows 8.1 and Windows Server 2012 R2 update history Windows 10 and Windows Server 2016 update history Important The fixes that are included in this Security Update for Internet Explorer 4103768 are also included in the May 2018 Security Monthly Quality Rollup. Installing either the Security Update for Internet Explorer or the Security Monthly Quality Rollup installs the fixes that are in this update. If you use update management processes other than Windows Update and you automatically approve all security updates classifications for deployment, this Security Update for Internet Explorer (KB 4103768), the May 2018 Security Only Quality Update, and the May 2018 Security Monthly Quality Rollup are deployed. We recommend that you review your update deployment rules to make sure that the desired updates are deployed. This Security Update for Internet Explorer is not applicable for installation on a computer where the Security Monthly Quality Rollup or the Preview of Monthly Quality Rollup from May 2018 (or a later month) is already installed. This is because those updates contain all the fixes that are in this Security Update for Internet Explorer. If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows. *************************************************************** Title: MS18-MAY: Cumulative security update for Internet Explorer - Windows 8.1 - IE 11 - KB4103768 (x64) Severity: Critical Fixlet ID: 410376815 Fixlet Link: https://support.microsoft.com/kb/4103768 Fixlet Description: This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures. Additionally, see the following articles for more information about this cumulative update: Windows 7 SP1 and Windows Server 2008 R2 SP1 update history Windows Server 2012 update history Windows 8.1 and Windows Server 2012 R2 update history Windows 10 and Windows Server 2016 update history Important The fixes that are included in this Security Update for Internet Explorer 4103768 are also included in the May 2018 Security Monthly Quality Rollup. Installing either the Security Update for Internet Explorer or the Security Monthly Quality Rollup installs the fixes that are in this update. If you use update management processes other than Windows Update and you automatically approve all security updates classifications for deployment, this Security Update for Internet Explorer (KB 4103768), the May 2018 Security Only Quality Update, and the May 2018 Security Monthly Quality Rollup are deployed. We recommend that you review your update deployment rules to make sure that the desired updates are deployed. This Security Update for Internet Explorer is not applicable for installation on a computer where the Security Monthly Quality Rollup or the Preview of Monthly Quality Rollup from May 2018 (or a later month) is already installed. This is because those updates contain all the fixes that are in this Security Update for Internet Explorer. If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows. *************************************************************** Title: MS18-MAY: Cumulative security update for Internet Explorer - Windows 8.1 - IE 11 - KB4103768 Severity: Critical Fixlet ID: 410376817 Fixlet Link: https://support.microsoft.com/kb/4103768 Fixlet Description: This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures. Additionally, see the following articles for more information about this cumulative update: Windows 7 SP1 and Windows Server 2008 R2 SP1 update history Windows Server 2012 update history Windows 8.1 and Windows Server 2012 R2 update history Windows 10 and Windows Server 2016 update history Important The fixes that are included in this Security Update for Internet Explorer 4103768 are also included in the May 2018 Security Monthly Quality Rollup. Installing either the Security Update for Internet Explorer or the Security Monthly Quality Rollup installs the fixes that are in this update. If you use update management processes other than Windows Update and you automatically approve all security updates classifications for deployment, this Security Update for Internet Explorer (KB 4103768), the May 2018 Security Only Quality Update, and the May 2018 Security Monthly Quality Rollup are deployed. We recommend that you review your update deployment rules to make sure that the desired updates are deployed. This Security Update for Internet Explorer is not applicable for installation on a computer where the Security Monthly Quality Rollup or the Preview of Monthly Quality Rollup from May 2018 (or a later month) is already installed. This is because those updates contain all the fixes that are in this Security Update for Internet Explorer. If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows. *************************************************************** Title: MS18-MAY: Security update for the Windows common log file system driver elevation of privilege vulnerability in Windows Server 2008 - Windows Server 2008 SP2 - KB4130944 (x64) Severity: Important Fixlet ID: 413094401 Fixlet Link: https://support.microsoft.com/kb/4130944 Fixlet Description: An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. To learn more about the vulnerability, go to CVE-2018-8167. *************************************************************** Title: MS18-MAY: Security update for the Windows common log file system driver elevation of privilege vulnerability in Windows Server 2008 - Windows Server 2008 SP2 - KB4130944 Severity: Important Fixlet ID: 413094403 Fixlet Link: https://support.microsoft.com/kb/4130944 Fixlet Description: An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. To learn more about the vulnerability, go to CVE-2018-8167. *************************************************************** Title: MS18-MAY: Security update for the Win32k elevation of privilege vulnerability in Windows Server 2008, Windows Embedded POSReady 2009, and Windows Embedded Standard 2009 - Windows Server 2008 SP2 - KB4131188 (x64) Severity: Important Fixlet ID: 413118801 Fixlet Link: https://support.microsoft.com/kb/4131188 Fixlet Description: An elevation of privilege vulnerability and an information disclosure vulnerability exist in Windows when the Win32k component fails to properly handle objects in memory. To learn more about the vulnerabilities, see the following Common Vulnerabilities and Exposures (CVE). CVE-2018-8120 CVE-2018-8124 CVE-2018-8164 CVE-2018-8166 *************************************************************** Title: MS18-MAY: Security update for the Win32k elevation of privilege vulnerability in Windows Server 2008, Windows Embedded POSReady 2009, and Windows Embedded Standard 2009 - Windows Server 2008 SP2 - KB4131188 Severity: Important Fixlet ID: 413118803 Fixlet Link: https://support.microsoft.com/kb/4131188 Fixlet Description: An elevation of privilege vulnerability and an information disclosure vulnerability exist in Windows when the Win32k component fails to properly handle objects in memory. To learn more about the vulnerabilities, see the following Common Vulnerabilities and Exposures (CVE). CVE-2018-8120 CVE-2018-8124 CVE-2018-8164 CVE-2018-8166 *************************************************************** Title: MS18-MAY: Security update for vulnerabilities in Windows Server 2008, Windows Embedded POSReady 2009, and Windows Embedded Standard 2009 - Windows Server 2008 SP2 - KB4134651 (x64) Severity: Critical Fixlet ID: 413465101 Fixlet Link: https://support.microsoft.com/kb/4134651 Fixlet Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. To learn more about the vulnerabilities, go to the following Common Vulnerabilities and Exposures (CVE). CVE-2018-8174 CVE-2018-8897 *************************************************************** Title: MS18-MAY: Security update for vulnerabilities in Windows Server 2008, Windows Embedded POSReady 2009, and Windows Embedded Standard 2009 - Windows Server 2008 SP2 - KB4134651 Severity: Critical Fixlet ID: 413465103 Fixlet Link: https://support.microsoft.com/kb/4134651 Fixlet Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. To learn more about the vulnerabilities, go to the following Common Vulnerabilities and Exposures (CVE). CVE-2018-8174 CVE-2018-8897 From autonotify at us.ibm.com Fri May 11 02:04:32 2018 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Fri, 11 May 2018 02:04:32 -0700 Subject: [BigFix-Announcements] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows' Message-ID: Fixlet Site - 'Patches for Windows' Current Version: 2980 Published: Fri, 11 May 2018 07:01:20 GMT New Fixlets: ============ *************************************************************** Title: MS18-MAY: Cumulative Update for Windows 10 Version 1803 - Windows 10 Version 1803 - KB4103721 (x64) Severity: Critical Fixlet ID: 410372103 Fixlet Link: https://support.microsoft.com/kb/4103721 Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. *************************************************************** Title: MS18-MAY: Cumulative Update for Windows 10 Version 1803 - Windows 10 Version 1803 - KB4103721 Severity: Critical Fixlet ID: 410372105 Fixlet Link: https://support.microsoft.com/kb/4103721 Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. *************************************************************** Title: MS18-MAY: Security Update for Adobe Flash Player for Windows 10 Version 1803 - Windows 10 Version 1803 - Adobe Flash Player - KB4103729 Severity: Critical Fixlet ID: 410372915 Fixlet Link: https://support.microsoft.com/kb/4103729 Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player that is installed on any supported edition of Windows Server version 1803, Windows 10 version 1803, Windows Server 2016 Version 1709, Windows 10 version 1709, Windows RT, Windows 10 Version 1703, Windows Server 2016, Windows 10 Version 1607, Windows 10 (RTM), Windows Server 2012 R2, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV180008. *************************************************************** Title: MS18-MAY: Security Update for Adobe Flash Player for Windows 10 Version 1803 - Windows 10 Version 1803 - Adobe Flash Player - KB4103729 (x64) Severity: Critical Fixlet ID: 410372927 Fixlet Link: https://support.microsoft.com/kb/4103729 Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player that is installed on any supported edition of Windows Server version 1803, Windows 10 version 1803, Windows Server 2016 Version 1709, Windows 10 version 1709, Windows RT, Windows 10 Version 1703, Windows Server 2016, Windows 10 Version 1607, Windows 10 (RTM), Windows Server 2012 R2, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV180008. From autonotify at us.ibm.com Sat May 12 02:06:00 2018 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Sat, 12 May 2018 02:06:00 -0700 Subject: [BigFix-Announcements] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows' Message-ID: Fixlet Site - 'Patches for Windows' Current Version: 2983 Published: Sat, 12 May 2018 00:14:08 GMT New Fixlets: ============ *************************************************************** Title: MS18-MAY: Security update for Office 2016 - Office 2016 - KB4011237 (x64) Severity: Unspecified Fixlet ID: 401123701 Fixlet Link: https://support.microsoft.com/kb/4011237 Fixlet Description: A security vulnerability exists in Microsoft Office 2016 64-Bit Edition that could allow arbitrary code to run when a maliciously modified file is opened. This update resolves that vulnerability. *************************************************************** Title: MS18-MAY: Security update for Office 2016 - Office 2016 - KB4011237 Severity: Unspecified Fixlet ID: 401123703 Fixlet Link: https://support.microsoft.com/kb/4011237 Fixlet Description: A security vulnerability exists in Microsoft Office 2016 32-Bit Edition that could allow arbitrary code to run when a maliciously modified file is opened. This update resolves that vulnerability. *************************************************************** Title: MS18-MAY: Security update for Office 2016 - Office 2016 - KB4011239 (x64) Severity: Unspecified Fixlet ID: 401123901 Fixlet Link: https://support.microsoft.com/kb/4011239 Fixlet Description: A security vulnerability exists in Microsoft Office 2016 64-Bit Edition that could allow arbitrary code to run when a maliciously modified file is opened. This update resolves that vulnerability. *************************************************************** Title: MS18-MAY: Security update for Office 2016 - Office 2016 - KB4011239 Severity: Unspecified Fixlet ID: 401123903 Fixlet Link: https://support.microsoft.com/kb/4011239 Fixlet Description: A security vulnerability exists in Microsoft Office 2016 32-Bit Edition that could allow arbitrary code to run when a maliciously modified file is opened. This update resolves that vulnerability. *************************************************************** Title: MS18-MAY: Security update for Office 2013 - Office 2013 SP1 - KB4011253 (x64) Severity: Unspecified Fixlet ID: 401125301 Fixlet Link: https://support.microsoft.com/kb/4011253 Fixlet Description: A security vulnerability exists in Microsoft Office 2013 64-Bit Edition that could allow arbitrary code to run when a maliciously modified file is opened. This update resolves that vulnerability. *************************************************************** Title: MS18-MAY: Security update for Office 2013 - Office 2013 SP1 - KB4011253 Severity: Unspecified Fixlet ID: 401125303 Fixlet Link: https://support.microsoft.com/kb/4011253 Fixlet Description: A security vulnerability exists in Microsoft Office 2013 32-Bit Edition that could allow arbitrary code to run when a maliciously modified file is opened. This update resolves that vulnerability. *************************************************************** Title: MS18-MAY: Security update for Office 2013 - Office 2013 SP1 - KB4011254 (x64) Severity: Unspecified Fixlet ID: 401125401 Fixlet Link: https://support.microsoft.com/kb/4011254 Fixlet Description: A security vulnerability exists in Microsoft Office 2013 64-Bit Edition that could allow arbitrary code to run when a maliciously modified file is opened. This update resolves that vulnerability. *************************************************************** Title: MS18-MAY: Security update for Office 2013 - Office 2013 SP1 - KB4011254 Severity: Unspecified Fixlet ID: 401125403 Fixlet Link: https://support.microsoft.com/kb/4011254 Fixlet Description: A security vulnerability exists in Microsoft Office 2013 32-Bit Edition that could allow arbitrary code to run when a maliciously modified file is opened. This update resolves that vulnerability. *************************************************************** Title: MS18-MAY: Security update for Office 2010 - Office 2010 SP2 - KB4011274 (x64) Severity: Unspecified Fixlet ID: 401127401 Fixlet Link: https://support.microsoft.com/kb/4011274 Fixlet Description: A security vulnerability exists in Microsoft Office 2010 64-Bit Edition that could allow arbitrary code to run when a maliciously modified file is opened. This update resolves that vulnerability. *************************************************************** Title: MS18-MAY: Security update for Office 2010 - Office 2010 SP2 - KB4011274 Severity: Unspecified Fixlet ID: 401127403 Fixlet Link: https://support.microsoft.com/kb/4011274 Fixlet Description: A security vulnerability exists in Microsoft Office 2010 32-Bit Edition that could allow arbitrary code to run when a maliciously modified file is opened. This update resolves that vulnerability. *************************************************************** Title: MS18-MAY: Security update for Office 2010 - Office 2010 SP2 - KB4011275 (x64) Severity: Unspecified Fixlet ID: 401127501 Fixlet Link: https://support.microsoft.com/kb/4011275 Fixlet Description: A security vulnerability exists in Microsoft Office 2010 64-Bit Edition that could allow arbitrary code to run when a maliciously modified file is opened. This update resolves that vulnerability. *************************************************************** Title: MS18-MAY: Security update for Office 2010 - Office 2010 SP2 - KB4011275 Severity: Unspecified Fixlet ID: 401127503 Fixlet Link: https://support.microsoft.com/kb/4011275 Fixlet Description: A security vulnerability exists in Microsoft Office 2010 32-Bit Edition that could allow arbitrary code to run when a maliciously modified file is opened. This update resolves that vulnerability. From autonotify at us.ibm.com Mon May 14 02:05:26 2018 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Mon, 14 May 2018 02:05:26 -0700 Subject: [BigFix-Announcements] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows' Message-ID: Fixlet Site - 'Patches for Windows' Current Version: 2984 Published: Mon, 14 May 2018 07:32:59 GMT New Fixlets: ============ *************************************************************** Title: MS18-MAY: Security update for the Windows information disclosure vulnerability in Windows Server 2008, Windows Embedded POSReady 2009, and Windows Embedded Standard 2009 - Windows Server 2008 SP2 - KB4130957 (x64) Severity: Important Fixlet ID: 413095701 Fixlet Link: https://support.microsoft.com/kb/4130957 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. *************************************************************** Title: MS18-MAY: Security update for the Windows information disclosure vulnerability in Windows Server 2008, Windows Embedded POSReady 2009, and Windows Embedded Standard 2009 - Windows Server 2008 SP2 - KB4130957 Severity: Important Fixlet ID: 413095703 Fixlet Link: https://support.microsoft.com/kb/4130957 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. From autonotify at us.ibm.com Tue May 15 02:04:38 2018 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Tue, 15 May 2018 02:04:38 -0700 Subject: [BigFix-Announcements] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows' Message-ID: Fixlet Site - 'Patches for Windows' Current Version: 2986 Published: Tue, 15 May 2018 03:39:22 GMT New Fixlets: ============ *************************************************************** Title: 3203479: Update for Office 2016 - Office 2016 - KB3203479 (x64) Severity: Unspecified Fixlet ID: 320347901 Fixlet Link: https://support.microsoft.com/kb/3203479 Fixlet Description: Microsoft has released an update for Microsoft Office 2016 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2016 64-Bit Edition. Additionally, this update contains stability and performance improvements. *************************************************************** Title: 3203479: Update for Office 2016 - Office 2016 - KB3203479 Severity: Unspecified Fixlet ID: 320347903 Fixlet Link: https://support.microsoft.com/kb/3203479 Fixlet Description: Microsoft has released an update for Microsoft Office 2016 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2016 32-Bit Edition. Additionally, this update contains stability and performance improvements. *************************************************************** Title: 4011281: Update for OneNote 2013 - OneNote 2013 SP1 - KB4011281 (x64) Severity: Unspecified Fixlet ID: 401128101 Fixlet Link: https://support.microsoft.com/kb/4011281 Fixlet Description: Microsoft has released an update for Microsoft OneNote 2013 64-Bit Edition. This update provides the latest fixes to Microsoft OneNote 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. *************************************************************** Title: 4011281: Update for OneNote 2013 - OneNote 2013 SP1 - KB4011281 Severity: Unspecified Fixlet ID: 401128103 Fixlet Link: https://support.microsoft.com/kb/4011281 Fixlet Description: Microsoft has released an update for Microsoft OneNote 2013 32-Bit Edition. This update provides the latest fixes to Microsoft OneNote 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. *************************************************************** Title: 4011634: Update for Office 2016 - Office 2016 - KB4011634 (x64) Severity: Unspecified Fixlet ID: 401163401 Fixlet Link: https://support.microsoft.com/kb/4011634 Fixlet Description: Microsoft has released an update for Microsoft Office 2016 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2016 64-Bit Edition. Additionally, this update contains stability and performance improvements. *************************************************************** Title: 4011634: Update for Office 2016 - Office 2016 - KB4011634 Severity: Unspecified Fixlet ID: 401163403 Fixlet Link: https://support.microsoft.com/kb/4011634 Fixlet Description: Microsoft has released an update for Microsoft Office 2016 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2016 32-Bit Edition. Additionally, this update contains stability and performance improvements. *************************************************************** Title: 4018318: Update for Office 2016 - Office 2016 - KB4018318 (x64) Severity: Unspecified Fixlet ID: 401831801 Fixlet Link: https://support.microsoft.com/kb/4018318 Fixlet Description: Microsoft has released an update for Microsoft Office 2016 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2016 64-Bit Edition. Additionally, this update contains stability and performance improvements. *************************************************************** Title: 4018318: Update for Office 2016 - Office 2016 - KB4018318 Severity: Unspecified Fixlet ID: 401831803 Fixlet Link: https://support.microsoft.com/kb/4018318 Fixlet Description: Microsoft has released an update for Microsoft Office 2016 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2016 32-Bit Edition. Additionally, this update contains stability and performance improvements. *************************************************************** Title: 4018321: Update for OneNote 2016 - OneNote 2016 - KB4018321 (x64) Severity: Unspecified Fixlet ID: 401832101 Fixlet Link: https://support.microsoft.com/kb/4018321 Fixlet Description: Microsoft has released an update for Microsoft OneNote 2016 64-Bit Edition. This update provides the latest fixes to Microsoft OneNote 2016 64-Bit Edition. Additionally, this update contains stability and performance improvements. *************************************************************** Title: 4018321: Update for OneNote 2016 - OneNote 2016 - KB4018321 Severity: Unspecified Fixlet ID: 401832103 Fixlet Link: https://support.microsoft.com/kb/4018321 Fixlet Description: Microsoft has released an update for Microsoft OneNote 2016 32-Bit Edition. This update provides the latest fixes to Microsoft OneNote 2016 32-Bit Edition. Additionally, this update contains stability and performance improvements. *************************************************************** Title: 4018367: Update for Skype for Business 2016 - Skype for Business 2016 / Skype for Business Basic 2016 - KB4018367 (x64) Severity: Unspecified Fixlet ID: 401836701 Fixlet Link: https://support.microsoft.com/kb/4018367 Fixlet Description: Microsoft has released an update for Skype for Business 2016 64-Bit Edition. This update provides the latest fixes to Skype for Business 2016 64-Bit Edition. Additionally, this update contains stability and performance improvements. *************************************************************** Title: 4018367: Update for Skype for Business 2016 - Skype for Business 2016 / Skype for Business Basic 2016 - KB4018367 Severity: Unspecified Fixlet ID: 401836703 Fixlet Link: https://support.microsoft.com/kb/4018367 Fixlet Description: Microsoft has released an update for Skype for Business 2016 32-Bit Edition. This update provides the latest fixes to Skype for Business 2016 32-Bit Edition. Additionally, this update contains stability and performance improvements. *************************************************************** Title: 4018369: Update for Office 2016 - Office 2016 - KB4018369 (x64) Severity: Unspecified Fixlet ID: 401836901 Fixlet Link: https://support.microsoft.com/kb/4018369 Fixlet Description: Microsoft has released an update for Microsoft Office 2016 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2016 64-Bit Edition. Additionally, this update contains stability and performance improvements. *************************************************************** Title: 4018369: Update for Office 2016 - Office 2016 - KB4018369 Severity: Unspecified Fixlet ID: 401836903 Fixlet Link: https://support.microsoft.com/kb/4018369 Fixlet Description: Microsoft has released an update for Microsoft Office 2016 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2016 32-Bit Edition. Additionally, this update contains stability and performance improvements. *************************************************************** Title: 4018372: Update for Outlook 2016 - Outlook 2016 - KB4018372 (x64) Severity: Unspecified Fixlet ID: 401837201 Fixlet Link: https://support.microsoft.com/kb/4018372 Fixlet Description: Microsoft has released an update for Microsoft Outlook 2016 64-Bit Edition. This update provides the latest fixes to Microsoft Outlook 2016 64-Bit Edition. Additionally, this update contains stability and performance improvements. *************************************************************** Title: 4018372: Update for Outlook 2016 - Outlook 2016 - KB4018372 Severity: Unspecified Fixlet ID: 401837203 Fixlet Link: https://support.microsoft.com/kb/4018372 Fixlet Description: Microsoft has released an update for Microsoft Outlook 2016 32-Bit Edition. This update provides the latest fixes to Microsoft Outlook 2016 32-Bit Edition. Additionally, this update contains stability and performance improvements. *************************************************************** Title: 4018373: Update for Project 2016 - Project 2016 - KB4018373 (x64) Severity: Unspecified Fixlet ID: 401837301 Fixlet Link: https://support.microsoft.com/kb/4018373 Fixlet Description: Microsoft has released an update for Microsoft Project 2016 64-Bit Edition. This update provides the latest fixes to Microsoft Project 2016 64-Bit Edition. Additionally, this update contains stability and performance improvements. *************************************************************** Title: 4018373: Update for Project 2016 - Project 2016 - KB4018373 Severity: Unspecified Fixlet ID: 401837303 Fixlet Link: https://support.microsoft.com/kb/4018373 Fixlet Description: Microsoft has released an update for Microsoft Project 2016 32-Bit Edition. This update provides the latest fixes to Microsoft Project 2016 32-Bit Edition. Additionally, this update contains stability and performance improvements. *************************************************************** Title: 4018376: Update for Outlook 2013 - Outlook 2013 SP1 - KB4018376 (x64) Severity: Unspecified Fixlet ID: 401837601 Fixlet Link: https://support.microsoft.com/kb/4018376 Fixlet Description: Microsoft has released an update for Microsoft Outlook 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Outlook 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. *************************************************************** Title: 4018376: Update for Outlook 2013 - Outlook 2013 SP1 - KB4018376 Severity: Unspecified Fixlet ID: 401837603 Fixlet Link: https://support.microsoft.com/kb/4018376 Fixlet Description: Microsoft has released an update for Microsoft Outlook 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Outlook 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. *************************************************************** Title: 4018377: Update for Skype for Business 2015 (Lync 2013) - Lync 2013 SP1 (Skype for Business) / Lync Basic 2013 SP1 (Skype for Business Basic) - KB4018377 (x64) Severity: Unspecified Fixlet ID: 401837701 Fixlet Link: https://support.microsoft.com/kb/4018377 Fixlet Description: Microsoft has released an update for Skype for Business 2015 64-Bit Edition. This update provides the latest fixes to Skype for Business 2015 64-Bit Edition. Additionally, this update contains stability and performance improvements. *************************************************************** Title: 4018377: Update for Skype for Business 2015 (Lync 2013) - Lync 2013 SP1 (Skype for Business) / Lync Basic 2013 SP1 (Skype for Business Basic) - KB4018377 Severity: Unspecified Fixlet ID: 401837703 Fixlet Link: https://support.microsoft.com/kb/4018377 Fixlet Description: Microsoft has released an update for Skype for Business 2015 32-Bit Edition. This update provides the latest fixes to Skype for Business 2015 32-Bit Edition. Additionally, this update contains stability and performance improvements. *************************************************************** Title: 4018379: Update for Project 2013 - Project 2013 SP1 - KB4018379 (x64) Severity: Unspecified Fixlet ID: 401837901 Fixlet Link: https://support.microsoft.com/kb/4018379 Fixlet Description: Microsoft has released an update for Microsoft Project 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Project 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. *************************************************************** Title: 4018379: Update for Project 2013 - Project 2013 SP1 - KB4018379 Severity: Unspecified Fixlet ID: 401837903 Fixlet Link: https://support.microsoft.com/kb/4018379 Fixlet Description: Microsoft has released an update for Microsoft Project 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Project 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. *************************************************************** Title: 4018389: Update for Office 2013 - Office 2013 SP1 - KB4018389 (x64) Severity: Unspecified Fixlet ID: 401838901 Fixlet Link: https://support.microsoft.com/kb/4018389 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 64-Bit Edition. Additionally, this update contains stability and performance improvements. *************************************************************** Title: 4018389: Update for Office 2013 - Office 2013 SP1 - KB4018389 Severity: Unspecified Fixlet ID: 401838903 Fixlet Link: https://support.microsoft.com/kb/4018389 Fixlet Description: Microsoft has released an update for Microsoft Office 2013 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2013 32-Bit Edition. Additionally, this update contains stability and performance improvements. *************************************************************** Title: 4022133: Update for Office 2016 - Office 2016 - KB4022133 (x64) Severity: Unspecified Fixlet ID: 402213301 Fixlet Link: https://support.microsoft.com/kb/4022133 Fixlet Description: Microsoft has released an update for Microsoft Office 2016 64-Bit Edition. This update provides the latest fixes to Microsoft Office 2016 64-Bit Edition. Additionally, this update contains stability and performance improvements. *************************************************************** Title: 4022133: Update for Office 2016 - Office 2016 - KB4022133 Severity: Unspecified Fixlet ID: 402213303 Fixlet Link: https://support.microsoft.com/kb/4022133 Fixlet Description: Microsoft has released an update for Microsoft Office 2016 32-Bit Edition. This update provides the latest fixes to Microsoft Office 2016 32-Bit Edition. Additionally, this update contains stability and performance improvements. *************************************************************** Title: 4022144: Update for Outlook 2010 - Outlook 2010 SP2 - KB4022144 (x64) Severity: Unspecified Fixlet ID: 402214401 Fixlet Link: https://support.microsoft.com/kb/4022144 Fixlet Description: Microsoft has released an update for Microsoft Outlook 2010 64-Bit Edition. This update provides the latest fixes to Microsoft Outlook 2010 64-Bit Edition. Additionally, this update contains stability and performance improvements. *************************************************************** Title: 4022144: Update for Outlook 2010 - Outlook 2010 SP2 - KB4022144 Severity: Unspecified Fixlet ID: 402214403 Fixlet Link: https://support.microsoft.com/kb/4022144 Fixlet Description: Microsoft has released an update for Microsoft Outlook 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Outlook 2010 32-Bit Edition. Additionally, this update contains stability and performance improvements. *************************************************************** Title: 4131372: Update for Windows 10 Version 1709 - Windows 10 Version 1709 - KB4131372 (x64) Severity: Unspecified Fixlet ID: 413137201 Fixlet Link: https://support.microsoft.com/kb/4131372 Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. *************************************************************** Title: 4131372: Update for Windows 10 Version 1709 - Windows 10 Version 1709 - KB4131372 Severity: Unspecified Fixlet ID: 413137203 Fixlet Link: https://support.microsoft.com/kb/4131372 Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. From autonotify at us.ibm.com Wed May 16 02:04:43 2018 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Wed, 16 May 2018 02:04:43 -0700 Subject: [BigFix-Announcements] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows' Message-ID: Fixlet Site - 'Patches for Windows' Current Version: 2987 Published: Wed, 16 May 2018 00:38:09 GMT New Fixlets: ============ *************************************************************** Title: 2533623: Microsoft Security Advisory: Insecure library loading could allow remote code execution - Windows Server 2008 SP2 - KB2533623 (x64) Severity: Unspecified Fixlet ID: 253362301 Fixlet Link: https://support.microsoft.com/kb/2533623 Fixlet Description: Install this update to resolve issues in Windows. *************************************************************** Title: 2533623: Microsoft Security Advisory: Insecure library loading could allow remote code execution - Windows Server 2008 SP2 - KB2533623 Severity: Unspecified Fixlet ID: 253362305 Fixlet Link: https://support.microsoft.com/kb/2533623 Fixlet Description: Install this update to resolve issues in Windows. *************************************************************** Title: 2533623: Microsoft Security Advisory: Insecure library loading could allow remote code execution - Windows 7 SP1 - KB2533623 (x64) Severity: Unspecified Fixlet ID: 253362309 Fixlet Link: https://support.microsoft.com/kb/2533623 Fixlet Description: Install this update to resolve issues in Windows. *************************************************************** Title: 2533623: Microsoft Security Advisory: Insecure library loading could allow remote code execution - Windows Server 2008 R2 SP1 - KB2533623 (x64) Severity: Unspecified Fixlet ID: 253362311 Fixlet Link: https://support.microsoft.com/kb/2533623 Fixlet Description: Install this update to resolve issues in Windows. *************************************************************** Title: 2533623: Microsoft Security Advisory: Insecure library loading could allow remote code execution - Windows 7 SP1 - KB2533623 Severity: Unspecified Fixlet ID: 253362313 Fixlet Link: https://support.microsoft.com/kb/2533623 Fixlet Description: Install this update to resolve issues in Windows. From autonotify at us.ibm.com Thu May 17 02:04:54 2018 From: autonotify at us.ibm.com (autonotify at us.ibm.com) Date: Thu, 17 May 2018 02:04:54 -0700 Subject: [BigFix-Announcements] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows' Message-ID: Fixlet Site - 'Patches for Windows' Current Version: 2989 Published: Thu, 17 May 2018 03:55:40 GMT New Fixlets: ============ *************************************************************** Title: 4091666: Intel microcode updates - Windows 10 Version 1507 LTSB - KB4091666 (x64) Severity: Unspecified Fixlet ID: 409166601 Fixlet Link: https://support.microsoft.com/kb/4091666 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. *************************************************************** Title: 4091666: Intel microcode updates - Windows 10 Version 1507 LTSB - KB4091666 Severity: Unspecified Fixlet ID: 409166603 Fixlet Link: https://support.microsoft.com/kb/4091666 Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. *************************************************************** Title: 4100347: Intel microcode updates - Windows 10 Version 1803 - KB4100347 (x64) Severity: Unspecified Fixlet ID: 410034703 Fixlet Link: https://support.microsoft.com/kb/4100347 Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. *************************************************************** Title: 4100347: Intel microcode updates - Windows 10 Version 1803 - KB4100347 Severity: Unspecified Fixlet ID: 410034705 Fixlet Link: https://support.microsoft.com/kb/4100347 Fixlet Description: Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer.