[BigFix-Announcements] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows'

autonotify at us.ibm.com autonotify at us.ibm.com
Thu May 10 02:04:09 PDT 2018


Fixlet Site - 'Patches for Windows'
Current Version: 2978	Published: Wed, 09 May 2018 15:44:45  GMT

New Fixlets:
============

***************************************************************
Title: MS18-MAY: Security update for Office 2010 - Office 2010 SP2 - KB2899590 (x64)
Severity: Important
Fixlet ID: 289959001
Fixlet Link: https://support.microsoft.com/kb/2899590

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8147 Microsoft Common Vulnerabilities and Exposures CVE-2018-8148 Microsoft Common Vulnerabilities and Exposures CVE-2018-8157 Microsoft Common Vulnerabilities and Exposures CVE-2018-8158 Note To apply this security update, you must have the release version of Service Pack 2 for Office 2010 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2010. It doesn't apply to the Office 2010 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version).

***************************************************************
Title: MS18-MAY: Security update for Office 2010 - Office 2010 SP2 - KB2899590
Severity: Important
Fixlet ID: 289959003
Fixlet Link: https://support.microsoft.com/kb/2899590

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8147 Microsoft Common Vulnerabilities and Exposures CVE-2018-8148 Microsoft Common Vulnerabilities and Exposures CVE-2018-8157 Microsoft Common Vulnerabilities and Exposures CVE-2018-8158 Note To apply this security update, you must have the release version of Service Pack 2 for Office 2010 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2010. It doesn't apply to the Office 2010 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version).

***************************************************************
Title: MS18-MAY: Security update for Project Server 2010 - Project Server 2010 SP2 - KB3114889 (x64)
Severity: Important
Fixlet ID: 311488901
Fixlet Link: https://support.microsoft.com/kb/3114889

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8156. Note To apply this security update, you must have the release version of Service Pack 2 for Microsoft Project Server 2010 installed on the computer.

***************************************************************
Title: MS18-MAY: Security update for InfoPath 2013 - InfoPath 2013 SP1 - KB3162075 (x64)
Severity: Important
Fixlet ID: 316207501
Fixlet Link: https://support.microsoft.com/kb/3162075

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8173. Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft Office 2013 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2013. It doesn't apply to the Office 2013 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version).

***************************************************************
Title: MS18-MAY: Security update for InfoPath 2013 - InfoPath 2013 SP1 - KB3162075
Severity: Important
Fixlet ID: 316207503
Fixlet Link: https://support.microsoft.com/kb/3162075

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8173. Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft Office 2013 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2013. It doesn't apply to the Office 2013 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version).

***************************************************************
Title: MS18-MAY: Security update for Office 2013 - Office 2013 SP1 - KB3172436 (x64)
Severity: Important
Fixlet ID: 317243601
Fixlet Link: https://support.microsoft.com/kb/3172436

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8147 Microsoft Common Vulnerabilities and Exposures CVE-2018-8148 Microsoft Common Vulnerabilities and Exposures CVE-2018-8157 Microsoft Common Vulnerabilities and Exposures CVE-2018-8158 Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft Office 2013 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2013. It doesn't apply to the Office 2013 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version).

***************************************************************
Title: MS18-MAY: Security update for Office 2013 - Office 2013 SP1 - KB3172436
Severity: Important
Fixlet ID: 317243603
Fixlet Link: https://support.microsoft.com/kb/3172436

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8147 Microsoft Common Vulnerabilities and Exposures CVE-2018-8148 Microsoft Common Vulnerabilities and Exposures CVE-2018-8157 Microsoft Common Vulnerabilities and Exposures CVE-2018-8158 Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft Office 2013 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2013. It doesn't apply to the Office 2013 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version).

***************************************************************
Title: MS18-MAY: Security update for Microsoft Office Viewers and Office Compatibility Pack - Office Compatibility Pack SP3 - KB4018308
Severity: Important
Fixlet ID: 401830801
Fixlet Link: https://support.microsoft.com/kb/4018308

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8160. Note To apply this security update, you must have the release version of Microsoft Office Compatibility Pack Service Pack 3, Excel Viewer, or PowerPoint Viewer installed on a computer that is running Windows Embedded POSReady 2009.

***************************************************************
Title: MS18-MAY: Security update for Office 2016 - Office 2016 - KB4018327 (x64)
Severity: Important
Fixlet ID: 401832701
Fixlet Link: https://support.microsoft.com/kb/4018327

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8147 Microsoft Common Vulnerabilities and Exposures CVE-2018-8148 Microsoft Common Vulnerabilities and Exposures CVE-2018-8157 Microsoft Common Vulnerabilities and Exposures CVE-2018-8158 Note To apply this security update, you must have the release version of Office 2016 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2016. It doesn't apply to the Office 2016 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version).

***************************************************************
Title: MS18-MAY: Security update for Office 2016 - Office 2016 - KB4018327
Severity: Important
Fixlet ID: 401832703
Fixlet Link: https://support.microsoft.com/kb/4018327

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8147 Microsoft Common Vulnerabilities and Exposures CVE-2018-8148 Microsoft Common Vulnerabilities and Exposures CVE-2018-8157 Microsoft Common Vulnerabilities and Exposures CVE-2018-8158 Note To apply this security update, you must have the release version of Office 2016 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2016. It doesn't apply to the Office 2016 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version).

***************************************************************
Title: MS18-MAY: Security update for SharePoint Enterprise Server 2016 - SharePoint Server 2016 - KB4018381 (x64)
Severity: Important
Fixlet ID: 401838101
Fixlet Link: https://support.microsoft.com/kb/4018381

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8149 Microsoft Common Vulnerabilities and Exposures CVE-2018-8155 Microsoft Common Vulnerabilities and Exposures CVE-2018-8156 Microsoft Common Vulnerabilities and Exposures CVE-2018-8161 Note To apply this security update, you must have the release version of Microsoft Office SharePoint Server 2016 installed on the computer. This public update delivers Feature Pack 2 for SharePoint Server 2016, which contains the following feature: SharePoint Framework (SPFx) This public update also delivers all the features that were included in Feature Pack 1 for SharePoint Server 2016, including: Administrative Actions Logging MinRole enhancements SharePoint Custom Tiles Hybrid Auditing (preview) Hybrid Taxonomy OneDrive API for SharePoint on-premises OneDrive for Business modern experience (available to Software Assurance customers) The OneDrive for Business modern user experience requires an active Software Assurance contract at the time that the experience is enabled, either by installation of the public update or by manual enablement. If you don't have an active Software Assurance contract at the time of enablement, you must turn off the OneDrive for Business modern user experience. For more information, see New features included in the November 2016 Public Update for SharePoint Server 2016 (Feature Pack 1) and New features included in the September 2017 Public Update for SharePoint Server 2016 (Feature Pack 2).

***************************************************************
Title: MS18-MAY: Security update for Excel 2016 - Excel 2016 - KB4018382 (x64)
Severity: Important
Fixlet ID: 401838201
Fixlet Link: https://support.microsoft.com/kb/4018382

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8147 Microsoft Common Vulnerabilities and Exposures CVE-2018-8148 Microsoft Common Vulnerabilities and Exposures CVE-2018-8162 Microsoft Common Vulnerabilities and Exposures CVE-2018-8163 Note To apply this security update, you must have the release version of Excel 2016 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2016. It doesn't apply to the Office 2016 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version).

***************************************************************
Title: MS18-MAY: Security update for Excel 2016 - Excel 2016 - KB4018382
Severity: Important
Fixlet ID: 401838203
Fixlet Link: https://support.microsoft.com/kb/4018382

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8147 Microsoft Common Vulnerabilities and Exposures CVE-2018-8148 Microsoft Common Vulnerabilities and Exposures CVE-2018-8162 Microsoft Common Vulnerabilities and Exposures CVE-2018-8163 Note To apply this security update, you must have the release version of Excel 2016 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2016. It doesn't apply to the Office 2016 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version).

***************************************************************
Title: MS18-MAY: Security update for Word 2016 - Word 2016 - KB4018383 (x64)
Severity: Important
Fixlet ID: 401838301
Fixlet Link: https://support.microsoft.com/kb/4018383

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8161. Note To apply this security update, you must have the release version of Word 2016 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2016. It doesn't apply to the Office 2016 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version).

***************************************************************
Title: MS18-MAY: Security update for Word 2016 - Word 2016 - KB4018383
Severity: Important
Fixlet ID: 401838303
Fixlet Link: https://support.microsoft.com/kb/4018383

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8161. Note To apply this security update, you must have the release version of Word 2016 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2016. It doesn't apply to the Office 2016 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version).

***************************************************************
Title: MS18-MAY: Security update for SharePoint Enterprise Server 2013 - SharePoint Server 2013 SP1 - KB4018388 (x64)
Severity: Important
Fixlet ID: 401838801
Fixlet Link: https://support.microsoft.com/kb/4018388

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8161. Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft SharePoint Server 2013 installed on the computer.

***************************************************************
Title: MS18-MAY: Security update for SharePoint Enterprise Server 2013 - SharePoint Server 2013 SP1 - KB4018390 (x64)
Severity: Important
Fixlet ID: 401839001
Fixlet Link: https://support.microsoft.com/kb/4018390

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8149 Microsoft Common Vulnerabilities and Exposures CVE-2018-8168 Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft SharePoint Server 2013 installed on the computer.

***************************************************************
Title: MS18-MAY: Security update for Office Web Apps Server 2013 - Office Web Apps 2013 SP1 - KB4018393 (x64)
Severity: Important
Fixlet ID: 401839301
Fixlet Link: https://support.microsoft.com/kb/4018393

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8161. Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft Office Web Apps Server 2013 installed on the computer.

***************************************************************
Title: MS18-MAY: Security update for Word 2013 - Word 2013 SP1 - KB4018396 (x64)
Severity: Important
Fixlet ID: 401839601
Fixlet Link: https://support.microsoft.com/kb/4018396

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8161. Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft Office 2013 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2013. It doesn't apply to the Office 2013 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version).

***************************************************************
Title: MS18-MAY: Security update for Word 2013 - Word 2013 SP1 - KB4018396
Severity: Important
Fixlet ID: 401839603
Fixlet Link: https://support.microsoft.com/kb/4018396

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8161. Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft Office 2013 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2013. It doesn't apply to the Office 2013 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version).

***************************************************************
Title: MS18-MAY: Security update for SharePoint Foundation 2013 - SharePoint Foundation 2013 SP1 - KB4018398 (x64)
Severity: Important
Fixlet ID: 401839801
Fixlet Link: https://support.microsoft.com/kb/4018398

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8155. Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft SharePoint Foundation 2013 installed on the computer.

***************************************************************
Title: MS18-MAY: Security update for Excel 2013 - Excel 2013 SP1 - KB4018399 (x64)
Severity: Important
Fixlet ID: 401839901
Fixlet Link: https://support.microsoft.com/kb/4018399

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8147 Microsoft Common Vulnerabilities and Exposures CVE-2018-8148 Microsoft Common Vulnerabilities and Exposures CVE-2018-8162 Microsoft Common Vulnerabilities and Exposures CVE-2018-8163 Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft Office 2013 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2013. It doesn't apply to the Office 2013 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version).

***************************************************************
Title: MS18-MAY: Security update for Excel 2013 - Excel 2013 SP1 - KB4018399
Severity: Important
Fixlet ID: 401839903
Fixlet Link: https://support.microsoft.com/kb/4018399

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8147 Microsoft Common Vulnerabilities and Exposures CVE-2018-8148 Microsoft Common Vulnerabilities and Exposures CVE-2018-8162 Microsoft Common Vulnerabilities and Exposures CVE-2018-8163 Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft Office 2013 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2013. It doesn't apply to the Office 2013 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version).

***************************************************************
Title: MS18-MAY: Security update for Project Server 2013 - Project Server 2013 SP1 - KB4022130 (x64)
Severity: Important
Fixlet ID: 402213001
Fixlet Link: https://support.microsoft.com/kb/4022130

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8156. Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft Project Server 2013 installed on the computer.

***************************************************************
Title: MS18-MAY: Security update for SharePoint Server 2010 - SharePoint Server 2010 SP2 - KB4022135 (x64)
Severity: Important
Fixlet ID: 402213501
Fixlet Link: https://support.microsoft.com/kb/4022135

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8160 Microsoft Common Vulnerabilities and Exposures CVE-2018-8161 Note To apply this security update, you must have the release version of Service Pack 2 for Microsoft SharePoint Server 2010 installed on the computer.

***************************************************************
Title: MS18-MAY: Security update for Office 2010 - Office 2010 SP2 - KB4022137 (x64)
Severity: Important
Fixlet ID: 402213701
Fixlet Link: https://support.microsoft.com/kb/4022137

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8160. Note To apply this security update, you must have the release version of Service Pack 2 for Office 2010 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2010. It doesn't apply to the Office 2010 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version).

***************************************************************
Title: MS18-MAY: Security update for Office 2010 - Office 2010 SP2 - KB4022137
Severity: Important
Fixlet ID: 402213703
Fixlet Link: https://support.microsoft.com/kb/4022137

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8160. Note To apply this security update, you must have the release version of Service Pack 2 for Office 2010 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2010. It doesn't apply to the Office 2010 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version).

***************************************************************
Title: MS18-MAY: Security update for Office 2010 - Office 2010 SP2 - KB4022139 (x64)
Severity: Important
Fixlet ID: 402213901
Fixlet Link: https://support.microsoft.com/kb/4022139

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8161. Note To apply this security update, you must have the release version of Service Pack 2 for Office 2010 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2010. It doesn't apply to the Office 2010 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version).

***************************************************************
Title: MS18-MAY: Security update for Office 2010 - Office 2010 SP2 - KB4022139
Severity: Important
Fixlet ID: 402213903
Fixlet Link: https://support.microsoft.com/kb/4022139

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8161. Note To apply this security update, you must have the release version of Service Pack 2 for Office 2010 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2010. It doesn't apply to the Office 2010 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version).

***************************************************************
Title: MS18-MAY: Security update for Word 2010 - Word 2010 SP2 - KB4022141 (x64)
Severity: Important
Fixlet ID: 402214101
Fixlet Link: https://support.microsoft.com/kb/4022141

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8161. Note To apply this security update, you must have the release version of Service Pack 2 for Office 2010 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2010. It doesn't apply to the Office 2010 Click-to-Run editions, such as Microsoft Office 365 Home (seen Determining your Office version).

***************************************************************
Title: MS18-MAY: Security update for Word 2010 - Word 2010 SP2 - KB4022141
Severity: Important
Fixlet ID: 402214103
Fixlet Link: https://support.microsoft.com/kb/4022141

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8161. Note To apply this security update, you must have the release version of Service Pack 2 for Office 2010 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2010. It doesn't apply to the Office 2010 Click-to-Run editions, such as Microsoft Office 365 Home (seen Determining your Office version).

***************************************************************
Title: MS18-MAY: Security update for SharePoint Server 2010 Office Web Apps - Office Web Apps 2010 SP2 - KB4022142 (x64)
Severity: Important
Fixlet ID: 402214201
Fixlet Link: https://support.microsoft.com/kb/4022142

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8160 Microsoft Common Vulnerabilities and Exposures CVE-2018-8161 Note To apply this security update, you must have the release version of Service Pack 2 for SharePoint Server 2010 Office Web Apps installed on the computer.

***************************************************************
Title: MS18-MAY: Security update for SharePoint Server 2010 - SharePoint Server 2010 SP2 - KB4022145 (x64)
Severity: Important
Fixlet ID: 402214501
Fixlet Link: https://support.microsoft.com/kb/4022145

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8149 Microsoft Common Vulnerabilities and Exposures CVE-2018-8168 Note To apply this security update, you must have the release version of Service Pack 2 for Microsoft SharePoint Server 2010 installed on the computer.

***************************************************************
Title: MS18-MAY: Security update for Excel 2010 - Excel 2010 SP2 - KB4022146 (x64)
Severity: Important
Fixlet ID: 402214601
Fixlet Link: https://support.microsoft.com/kb/4022146

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8147 Microsoft Common Vulnerabilities and Exposures CVE-2018-8148 Microsoft Common Vulnerabilities and Exposures CVE-2018-8162 Microsoft Common Vulnerabilities and Exposures CVE-2018-8163 Note To apply this security update, you must have the release version of Service Pack 2 for Office 2010 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2010. It doesn't apply to the Office 2010 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version).

***************************************************************
Title: MS18-MAY: Security update for Excel 2010 - Excel 2010 SP2 - KB4022146
Severity: Important
Fixlet ID: 402214603
Fixlet Link: https://support.microsoft.com/kb/4022146

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8147 Microsoft Common Vulnerabilities and Exposures CVE-2018-8148 Microsoft Common Vulnerabilities and Exposures CVE-2018-8162 Microsoft Common Vulnerabilities and Exposures CVE-2018-8163 Note To apply this security update, you must have the release version of Service Pack 2 for Office 2010 installed on the computer. Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2010. It doesn't apply to the Office 2010 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version).

***************************************************************
Title: MS18-MAY: Security update for Microsoft Office Compatibility Pack Service Pack 3 - Office Compatibility Pack SP3 - KB4022150
Severity: Important
Fixlet ID: 402215001
Fixlet Link: https://support.microsoft.com/kb/4022150

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8147 Microsoft Common Vulnerabilities and Exposures CVE-2018-8148 Note To apply this security update, you must have the release version of Microsoft Office Compatibility Pack Service Pack 3 installed on a computer that is running Windows Embedded POSReady 2009.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Exchange Server 2010 SP3 SP3 - KB4091243 (x64)
Severity: Critical
Fixlet ID: 409124301
Fixlet Link: https://support.microsoft.com/kb/4091243

Fixlet Description: This update rollup is included in a security update. This security update resolves a vulnerability in Microsoft Exchange Outlook Web Access (OWA). The vulnerability could allow elevation of privilege or spoofing in Microsoft Exchange Server if an attacker sends an email message that has a specially crafted attachment to a vulnerable server that is running Exchange Server. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8151 Microsoft Common Vulnerabilities and Exposures CVE-2018-8154 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS18-MAY: Security update for Microsoft Exchange Server 2013 and 2016 - Exchange Server 2013 CU20 SP1 - KB4092041 (x64)
Severity: Critical
Fixlet ID: 409204101
Fixlet Link: https://support.microsoft.com/kb/4092041

Fixlet Description: This security update resolves a vulnerability in Microsoft Exchange Outlook Web Access (OWA). The vulnerability could allow elevation of privilege or spoofing in Microsoft Exchange Server if an attacker sends an email message that has a specially crafted attachment to a vulnerable server that is running Exchange Server. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8151 Microsoft Common Vulnerabilities and Exposures CVE-2018-8154 Microsoft Common Vulnerabilities and Exposures CVE-2018-8159 Microsoft Common Vulnerabilities and Exposures CVE-2018-8153 Microsoft Common Vulnerabilities and Exposures CVE-2018-8152 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS18-MAY: Security update for Microsoft Exchange Server 2013 and 2016 - Exchange Server 2013 CU19 SP1 - KB4092041 (x64)
Severity: Critical
Fixlet ID: 409204103
Fixlet Link: https://support.microsoft.com/kb/4092041

Fixlet Description: This security update resolves a vulnerability in Microsoft Exchange Outlook Web Access (OWA). The vulnerability could allow elevation of privilege or spoofing in Microsoft Exchange Server if an attacker sends an email message that has a specially crafted attachment to a vulnerable server that is running Exchange Server. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8151 Microsoft Common Vulnerabilities and Exposures CVE-2018-8154 Microsoft Common Vulnerabilities and Exposures CVE-2018-8159 Microsoft Common Vulnerabilities and Exposures CVE-2018-8153 Microsoft Common Vulnerabilities and Exposures CVE-2018-8152 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS18-MAY: Security update for Microsoft Exchange Server 2013 and 2016 - Exchange Server 2013 SP1 - KB4092041 (x64)
Severity: Critical
Fixlet ID: 409204105
Fixlet Link: https://support.microsoft.com/kb/4092041

Fixlet Description: This security update resolves a vulnerability in Microsoft Exchange Outlook Web Access (OWA). The vulnerability could allow elevation of privilege or spoofing in Microsoft Exchange Server if an attacker sends an email message that has a specially crafted attachment to a vulnerable server that is running Exchange Server. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8151 Microsoft Common Vulnerabilities and Exposures CVE-2018-8154 Microsoft Common Vulnerabilities and Exposures CVE-2018-8159 Microsoft Common Vulnerabilities and Exposures CVE-2018-8153 Microsoft Common Vulnerabilities and Exposures CVE-2018-8152 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS18-MAY: Security update for Microsoft Exchange Server 2013 and 2016 - Exchange Server 2016 CU9 - KB4092041 (x64)
Severity: Critical
Fixlet ID: 409204107
Fixlet Link: https://support.microsoft.com/kb/4092041

Fixlet Description: This security update resolves a vulnerability in Microsoft Exchange Outlook Web Access (OWA). The vulnerability could allow elevation of privilege or spoofing in Microsoft Exchange Server if an attacker sends an email message that has a specially crafted attachment to a vulnerable server that is running Exchange Server. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8151 Microsoft Common Vulnerabilities and Exposures CVE-2018-8154 Microsoft Common Vulnerabilities and Exposures CVE-2018-8159 Microsoft Common Vulnerabilities and Exposures CVE-2018-8153 Microsoft Common Vulnerabilities and Exposures CVE-2018-8152 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS18-MAY: Security update for Microsoft Exchange Server 2013 and 2016 - Exchange Server 2016 CU8 - KB4092041 (x64)
Severity: Critical
Fixlet ID: 409204109
Fixlet Link: https://support.microsoft.com/kb/4092041

Fixlet Description: This security update resolves a vulnerability in Microsoft Exchange Outlook Web Access (OWA). The vulnerability could allow elevation of privilege or spoofing in Microsoft Exchange Server if an attacker sends an email message that has a specially crafted attachment to a vulnerable server that is running Exchange Server. To learn more about these vulnerabilities, see the following Microsoft security advisories: Microsoft Common Vulnerabilities and Exposures CVE-2018-8151 Microsoft Common Vulnerabilities and Exposures CVE-2018-8154 Microsoft Common Vulnerabilities and Exposures CVE-2018-8159 Microsoft Common Vulnerabilities and Exposures CVE-2018-8153 Microsoft Common Vulnerabilities and Exposures CVE-2018-8152 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS18-MAY: Security update for the Hyper-V remote code execution vulnerability in Windows Server 2008 - Windows Server 2008 SP2 - KB4094079 (x64)
Severity: Critical
Fixlet ID: 409407901
Fixlet Link: https://support.microsoft.com/kb/4094079

Fixlet Description: A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To learn more about the vulnerability, see CVE-2018-0959.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2012 - .NET Framework 3.5 SP1 - KB4095512 (x64)
Severity: Important
Fixlet ID: 409551201
Fixlet Link: https://support.microsoft.com/kb/4099638

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2008 SP2 - .NET Framework 2.0 SP2 - KB4095513 (x64)
Severity: Important
Fixlet ID: 409551301
Fixlet Link: https://support.microsoft.com/kb/4099640

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2008 SP2 - .NET Framework 2.0 SP2 - KB4095513
Severity: Important
Fixlet ID: 409551303
Fixlet Link: https://support.microsoft.com/kb/4099640

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2008 R2 SP1 - .NET Framework 3.5.1 - KB4095514 (x64)
Severity: Important
Fixlet ID: 409551401
Fixlet Link: https://support.microsoft.com/kb/4099637

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows 7 SP1 - .NET Framework 3.5.1 - KB4095514 (x64)
Severity: Important
Fixlet ID: 409551403
Fixlet Link: https://support.microsoft.com/kb/4099637

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows 7 SP1 - .NET Framework 3.5.1 - KB4095514
Severity: Important
Fixlet ID: 409551405
Fixlet Link: https://support.microsoft.com/kb/4099637

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows 8.1 - .NET Framework 3.5 SP1 - KB4095515 (x64)
Severity: Important
Fixlet ID: 409551501
Fixlet Link: https://support.microsoft.com/kb/4099639

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2012 R2 - .NET Framework 3.5 SP1 - KB4095515 (x64)
Severity: Important
Fixlet ID: 409551503
Fixlet Link: https://support.microsoft.com/kb/4099639

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows 8.1 - .NET Framework 3.5 SP1 - KB4095515
Severity: Important
Fixlet ID: 409551505
Fixlet Link: https://support.microsoft.com/kb/4099639

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2012 R2 - .NET Framework 4.5.2 - KB4095517 (x64)
Severity: Important
Fixlet ID: 409551701
Fixlet Link: https://support.microsoft.com/kb/4099639

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows 8.1 - .NET Framework 4.5.2 - KB4095517 (x64)
Severity: Important
Fixlet ID: 409551703
Fixlet Link: https://support.microsoft.com/kb/4099639

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows 8.1 - .NET Framework 4.5.2 - KB4095517
Severity: Important
Fixlet ID: 409551705
Fixlet Link: https://support.microsoft.com/kb/4099639

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2012 - .NET Framework 4.5.2 - KB4095518 (x64)
Severity: Important
Fixlet ID: 409551801
Fixlet Link: https://support.microsoft.com/kb/4099638

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows 7 SP1 - .NET Framework 4.5.2 - KB4095519 (x64)
Severity: Important
Fixlet ID: 409551901
Fixlet Link: https://support.microsoft.com/kb/4099637

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2008 R2 SP1 - .NET Framework 4.5.2 - KB4095519 (x64)
Severity: Important
Fixlet ID: 409551903
Fixlet Link: https://support.microsoft.com/kb/4099637

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows 7 SP1 - .NET Framework 4.5.2 - KB4095519
Severity: Important
Fixlet ID: 409551905
Fixlet Link: https://support.microsoft.com/kb/4099637

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2008 SP2 - .NET Framework 4.5.2 - KB4095519 (x64)
Severity: Important
Fixlet ID: 409551907
Fixlet Link: https://support.microsoft.com/kb/4099640

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2008 SP2 - .NET Framework 4.5.2 - KB4095519
Severity: Important
Fixlet ID: 409551909
Fixlet Link: https://support.microsoft.com/kb/4099640

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 - .NET Framework 3.5 SP1 - KB4095872 (x64)
Severity: Important
Fixlet ID: 409587201
Fixlet Link: https://support.microsoft.com/kb/4099634

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 SP2 - .NET Framework 2.0 SP2 - KB4095873 (x64)
Severity: Important
Fixlet ID: 409587301
Fixlet Link: https://support.microsoft.com/kb/4099636

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of serviceagainst a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 SP2 - .NET Framework 2.0 SP2 - KB4095873
Severity: Important
Fixlet ID: 409587303
Fixlet Link: https://support.microsoft.com/kb/4099636

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of serviceagainst a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 R2 SP1 - .NET Framework 3.5.1 - KB4095874 (x64)
Severity: Important
Fixlet ID: 409587401
Fixlet Link: https://support.microsoft.com/kb/4099633

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows 7 SP1 - .NET Framework 3.5.1 - KB4095874 (x64)
Severity: Important
Fixlet ID: 409587403
Fixlet Link: https://support.microsoft.com/kb/4099633

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows 7 SP1 - .NET Framework 3.5.1 - KB4095874
Severity: Important
Fixlet ID: 409587405
Fixlet Link: https://support.microsoft.com/kb/4099633

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows 8.1 - .NET Framework 3.5 SP1 - KB4095875 (x64)
Severity: Important
Fixlet ID: 409587501
Fixlet Link: https://support.microsoft.com/kb/4099635

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 R2 - .NET Framework 3.5 SP1 - KB4095875 (x64)
Severity: Important
Fixlet ID: 409587503
Fixlet Link: https://support.microsoft.com/kb/4099635

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows 8.1 - .NET Framework 3.5 SP1 - KB4095875
Severity: Important
Fixlet ID: 409587505
Fixlet Link: https://support.microsoft.com/kb/4099635

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 R2 - .NET Framework 4.5.2 - KB4095876 (x64)
Severity: Important
Fixlet ID: 409587601
Fixlet Link: https://support.microsoft.com/kb/4099635

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows 8.1 - .NET Framework 4.5.2 - KB4095876 (x64)
Severity: Important
Fixlet ID: 409587603
Fixlet Link: https://support.microsoft.com/kb/4099635

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows 8.1 - .NET Framework 4.5.2 - KB4095876
Severity: Important
Fixlet ID: 409587605
Fixlet Link: https://support.microsoft.com/kb/4099635

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2012 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096235 (x64)
Severity: Important
Fixlet ID: 409623501
Fixlet Link: https://support.microsoft.com/kb/4099638

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows 8.1 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096236 (x64)
Severity: Important
Fixlet ID: 409623601
Fixlet Link: https://support.microsoft.com/kb/4099639

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could allow a Denial of Service attack when .NET Framework and .NET core components process XML documents incorrectly. An attacker who successfully exploits this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2012 R2 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096236 (x64)
Severity: Important
Fixlet ID: 409623603
Fixlet Link: https://support.microsoft.com/kb/4099639

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could allow a Denial of Service attack when .NET Framework and .NET core components process XML documents incorrectly. An attacker who successfully exploits this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows 8.1 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096236
Severity: Important
Fixlet ID: 409623605
Fixlet Link: https://support.microsoft.com/kb/4099639

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could allow a Denial of Service attack when .NET Framework and .NET core components process XML documents incorrectly. An attacker who successfully exploits this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows 7 SP1 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096237 (x64)
Severity: Important
Fixlet ID: 409623701
Fixlet Link: https://support.microsoft.com/kb/4099637

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2008 R2 SP1 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096237 (x64)
Severity: Important
Fixlet ID: 409623703
Fixlet Link: https://support.microsoft.com/kb/4099637

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows 7 SP1 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096237
Severity: Important
Fixlet ID: 409623705
Fixlet Link: https://support.microsoft.com/kb/4099637

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2008 SP2 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096237 (x64)
Severity: Important
Fixlet ID: 409623707
Fixlet Link: https://support.microsoft.com/kb/4099640

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2008 SP2 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096237
Severity: Important
Fixlet ID: 409623709
Fixlet Link: https://support.microsoft.com/kb/4099640

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096416 (x64)
Severity: Important
Fixlet ID: 409641601
Fixlet Link: https://support.microsoft.com/kb/4099634

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 R2 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096417 (x64)
Severity: Important
Fixlet ID: 409641701
Fixlet Link: https://support.microsoft.com/kb/4099635

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows 8.1 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096417 (x64)
Severity: Important
Fixlet ID: 409641703
Fixlet Link: https://support.microsoft.com/kb/4099635

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows 8.1 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096417
Severity: Important
Fixlet ID: 409641705
Fixlet Link: https://support.microsoft.com/kb/4099635

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 SP2 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096418 (x64)
Severity: Important
Fixlet ID: 409641801
Fixlet Link: https://support.microsoft.com/kb/4099636

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 SP2 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096418
Severity: Important
Fixlet ID: 409641803
Fixlet Link: https://support.microsoft.com/kb/4099636

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 R2 SP1 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096418 (x64)
Severity: Important
Fixlet ID: 409641805
Fixlet Link: https://support.microsoft.com/kb/4099633

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows 7 SP1 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096418 (x64)
Severity: Important
Fixlet ID: 409641807
Fixlet Link: https://support.microsoft.com/kb/4099633

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows 7 SP1 - .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 - KB4096418
Severity: Important
Fixlet ID: 409641809
Fixlet Link: https://support.microsoft.com/kb/4099633

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 - .NET Framework 4.5.2 - KB4096494 (x64)
Severity: Important
Fixlet ID: 409649401
Fixlet Link: https://support.microsoft.com/kb/4099634

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 SP2 - .NET Framework 4.5.2 - KB4096495 (x64)
Severity: Important
Fixlet ID: 409649501
Fixlet Link: https://support.microsoft.com/kb/4099636

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 SP2 - .NET Framework 4.5.2 - KB4096495
Severity: Important
Fixlet ID: 409649503
Fixlet Link: https://support.microsoft.com/kb/4099636

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 R2 SP1 - .NET Framework 4.5.2 - KB4096495 (x64)
Severity: Important
Fixlet ID: 409649505
Fixlet Link: https://support.microsoft.com/kb/4099633

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows 7 SP1 - .NET Framework 4.5.2 - KB4096495 (x64)
Severity: Important
Fixlet ID: 409649507
Fixlet Link: https://support.microsoft.com/kb/4099633

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows 7 SP1 - .NET Framework 4.5.2 - KB4096495
Severity: Important
Fixlet ID: 409649509
Fixlet Link: https://support.microsoft.com/kb/4099633

Fixlet Description: This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765. Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.

***************************************************************
Title: MS18-MAY: Security update for the Microsoft COM for Windows remote code execution vulnerability in Windows Server 2008, Windows Embedded POSReady 2009, and Windows Embedded Standard 2009 - Windows Server 2008 SP2 - KB4101477 (x64)
Severity: Important
Fixlet ID: 410147701
Fixlet Link: https://support.microsoft.com/kb/4101477

Fixlet Description: A remote code execution vulnerability exists in "Microsoft COM for Windows" when it fails to properly handle serialized objects. To learn more about the vulnerability, go to  CVE-2018-0824.

***************************************************************
Title: MS18-MAY: Security update for the Microsoft COM for Windows remote code execution vulnerability in Windows Server 2008, Windows Embedded POSReady 2009, and Windows Embedded Standard 2009 - Windows Server 2008 SP2 - KB4101477
Severity: Important
Fixlet ID: 410147703
Fixlet Link: https://support.microsoft.com/kb/4101477

Fixlet Description: A remote code execution vulnerability exists in "Microsoft COM for Windows" when it fails to properly handle serialized objects. To learn more about the vulnerability, go to  CVE-2018-0824.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2008 R2 SP1 - KB4103712 (x64)
Severity: Critical
Fixlet ID: 410371201
Fixlet Link: https://support.microsoft.com/kb/4103712

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows 7 SP1 - KB4103712 (x64)
Severity: Critical
Fixlet ID: 410371203
Fixlet Link: https://support.microsoft.com/kb/4103712

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows 7 SP1 - KB4103712
Severity: Critical
Fixlet ID: 410371205
Fixlet Link: https://support.microsoft.com/kb/4103712

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2012 R2 - KB4103715 (x64)
Severity: Critical
Fixlet ID: 410371501
Fixlet Link: https://support.microsoft.com/kb/4103715

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows 8.1 - KB4103715 (x64)
Severity: Critical
Fixlet ID: 410371503
Fixlet Link: https://support.microsoft.com/kb/4103715

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows 8.1 - KB4103715
Severity: Critical
Fixlet ID: 410371505
Fixlet Link: https://support.microsoft.com/kb/4103715

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.

***************************************************************
Title: MS18-MAY: Cumulative Update for Windows 10 Version 1507 - Windows 10 Version 1507 LTSB - KB4103716 (x64)
Severity: Critical
Fixlet ID: 410371601
Fixlet Link: https://support.microsoft.com/kb/4103716

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.

***************************************************************
Title: MS18-MAY: Cumulative Update for Windows 10 Version 1507 - Windows 10 Version 1507 LTSB - KB4103716
Severity: Critical
Fixlet ID: 410371603
Fixlet Link: https://support.microsoft.com/kb/4103716

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 R2 SP1 - KB4103718 (x64)
Severity: Critical
Fixlet ID: 410371801
Fixlet Link: https://support.microsoft.com/kb/4103718

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows 7 SP1 - KB4103718 (x64)
Severity: Critical
Fixlet ID: 410371803
Fixlet Link: https://support.microsoft.com/kb/4103718

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows 7 SP1 - KB4103718
Severity: Critical
Fixlet ID: 410371805
Fixlet Link: https://support.microsoft.com/kb/4103718

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS18-MAY: Cumulative Update for Windows Server 2016 - Windows Server 2016 - KB4103723 (x64)
Severity: Critical
Fixlet ID: 410372301
Fixlet Link: https://support.microsoft.com/kb/4103723

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS18-MAY: Cumulative Update for Windows 10 Version 1607 - Windows 10 Version 1607 - KB4103723 (x64)
Severity: Critical
Fixlet ID: 410372303
Fixlet Link: https://support.microsoft.com/kb/4103723

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS18-MAY: Delta Update for Windows 10 Version 1607 - Windows 10 Version 1607 - Delta Update - KB4103723 (x64)
Severity: Critical
Fixlet ID: 410372305
Fixlet Link: https://support.microsoft.com/kb/4103723

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS18-MAY: Delta Update for Windows Server 2016 - Windows Server 2016 - Delta Update - KB4103723 (x64)
Severity: Critical
Fixlet ID: 410372307
Fixlet Link: https://support.microsoft.com/kb/4103723

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS18-MAY: Cumulative Update for Windows 10 Version 1607 - Windows 10 Version 1607 - KB4103723
Severity: Critical
Fixlet ID: 410372309
Fixlet Link: https://support.microsoft.com/kb/4103723

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS18-MAY: Delta Update for Windows 10 Version 1607 - Windows 10 Version 1607 - Delta Update - KB4103723
Severity: Critical
Fixlet ID: 410372311
Fixlet Link: https://support.microsoft.com/kb/4103723

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 R2 - KB4103725 (x64)
Severity: Critical
Fixlet ID: 410372501
Fixlet Link: https://support.microsoft.com/kb/4103725

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows 8.1 - KB4103725 (x64)
Severity: Critical
Fixlet ID: 410372503
Fixlet Link: https://support.microsoft.com/kb/4103725

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows 8.1 - KB4103725
Severity: Critical
Fixlet ID: 410372505
Fixlet Link: https://support.microsoft.com/kb/4103725

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.

***************************************************************
Title: MS18-MAY: Security Only Quality Update - Security Only - Windows Server 2012 - KB4103726 (x64)
Severity: Critical
Fixlet ID: 410372601
Fixlet Link: https://support.microsoft.com/kb/4103726

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.

***************************************************************
Title: MS18-MAY: Cumulative Update for Windows 10 Version 1709 - Windows 10 Version 1709 - KB4103727 (x64)
Severity: Critical
Fixlet ID: 410372701
Fixlet Link: https://support.microsoft.com/kb/4103727

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS18-MAY: Delta Update for Windows 10 Version 1709 - Windows 10 Version 1709 - Delta Update - KB4103727 (x64)
Severity: Critical
Fixlet ID: 410372703
Fixlet Link: https://support.microsoft.com/kb/4103727

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS18-MAY: Cumulative Update for Windows 10 Version 1709 - Windows 10 Version 1709 - KB4103727
Severity: Critical
Fixlet ID: 410372705
Fixlet Link: https://support.microsoft.com/kb/4103727

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS18-MAY: Delta Update for Windows 10 Version 1709 - Windows 10 Version 1709 - Delta Update - KB4103727
Severity: Critical
Fixlet ID: 410372707
Fixlet Link: https://support.microsoft.com/kb/4103727

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS18-MAY: Security update for Adobe Flash Player - Windows Server 2012 - Adobe Flash Player - KB4103729 (x64)
Severity: Critical
Fixlet ID: 410372901
Fixlet Link: https://support.microsoft.com/kb/4103729

Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player that is installed on any supported edition of Windows Server version 1803, Windows 10 version 1803, Windows Server 2016 Version 1709, Windows 10 version 1709, Windows RT, Windows 10 Version 1703, Windows Server 2016, Windows 10 Version 1607, Windows 10 (RTM), Windows Server 2012 R2, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV180008.

***************************************************************
Title: MS18-MAY: Security update for Adobe Flash Player - Windows 8.1 - Adobe Flash Player - KB4103729 (x64)
Severity: Critical
Fixlet ID: 410372903
Fixlet Link: https://support.microsoft.com/kb/4103729

Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player that is installed on any supported edition of Windows Server version 1803, Windows 10 version 1803, Windows Server 2016 Version 1709, Windows 10 version 1709, Windows RT, Windows 10 Version 1703, Windows Server 2016, Windows 10 Version 1607, Windows 10 (RTM), Windows Server 2012 R2, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV180008.

***************************************************************
Title: MS18-MAY: Security update for Adobe Flash Player - Windows Server 2012 R2 - Adobe Flash Player - KB4103729 (x64)
Severity: Critical
Fixlet ID: 410372905
Fixlet Link: https://support.microsoft.com/kb/4103729

Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player that is installed on any supported edition of Windows Server version 1803, Windows 10 version 1803, Windows Server 2016 Version 1709, Windows 10 version 1709, Windows RT, Windows 10 Version 1703, Windows Server 2016, Windows 10 Version 1607, Windows 10 (RTM), Windows Server 2012 R2, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV180008.

***************************************************************
Title: MS18-MAY: Security update for Adobe Flash Player - Windows 8.1 - Adobe Flash Player - KB4103729
Severity: Critical
Fixlet ID: 410372907
Fixlet Link: https://support.microsoft.com/kb/4103729

Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player that is installed on any supported edition of Windows Server version 1803, Windows 10 version 1803, Windows Server 2016 Version 1709, Windows 10 version 1709, Windows RT, Windows 10 Version 1703, Windows Server 2016, Windows 10 Version 1607, Windows 10 (RTM), Windows Server 2012 R2, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV180008.

***************************************************************
Title: MS18-MAY: Security Update for Adobe Flash Player for Windows 10 Version 1607 - Windows 10 Version 1607 - Adobe Flash Player - KB4103729 (x64)
Severity: Critical
Fixlet ID: 410372909
Fixlet Link: https://support.microsoft.com/kb/4103729

Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player that is installed on any supported edition of Windows Server version 1803, Windows 10 version 1803, Windows Server 2016 Version 1709, Windows 10 version 1709, Windows RT, Windows 10 Version 1703, Windows Server 2016, Windows 10 Version 1607, Windows 10 (RTM), Windows Server 2012 R2, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV180008.

***************************************************************
Title: MS18-MAY: Security Update for Adobe Flash Player for Windows Server 2016 - Windows Server 2016 - Adobe Flash Player - KB4103729 (x64)
Severity: Critical
Fixlet ID: 410372911
Fixlet Link: https://support.microsoft.com/kb/4103729

Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player that is installed on any supported edition of Windows Server version 1803, Windows 10 version 1803, Windows Server 2016 Version 1709, Windows 10 version 1709, Windows RT, Windows 10 Version 1703, Windows Server 2016, Windows 10 Version 1607, Windows 10 (RTM), Windows Server 2012 R2, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV180008.

***************************************************************
Title: MS18-MAY: Security Update for Adobe Flash Player for Windows 10 Version 1703 - Windows 10 Version 1703 - Adobe Flash Player - KB4103729
Severity: Critical
Fixlet ID: 410372913
Fixlet Link: https://support.microsoft.com/kb/4103729

Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player that is installed on any supported edition of Windows Server version 1803, Windows 10 version 1803, Windows Server 2016 Version 1709, Windows 10 version 1709, Windows RT, Windows 10 Version 1703, Windows Server 2016, Windows 10 Version 1607, Windows 10 (RTM), Windows Server 2012 R2, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV180008.

***************************************************************
Title: MS18-MAY: Security Update for Adobe Flash Player for Windows 10 Version 1709 - Windows 10 Version 1709 - Adobe Flash Player - KB4103729
Severity: Critical
Fixlet ID: 410372917
Fixlet Link: https://support.microsoft.com/kb/4103729

Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player that is installed on any supported edition of Windows Server version 1803, Windows 10 version 1803, Windows Server 2016 Version 1709, Windows 10 version 1709, Windows RT, Windows 10 Version 1703, Windows Server 2016, Windows 10 Version 1607, Windows 10 (RTM), Windows Server 2012 R2, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV180008.

***************************************************************
Title: MS18-MAY: Security Update for Adobe Flash Player for Windows 10 Version 1507 - Windows 10 Version 1507 LTSB - Adobe Flash Player - KB4103729
Severity: Critical
Fixlet ID: 410372919
Fixlet Link: https://support.microsoft.com/kb/4103729

Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player that is installed on any supported edition of Windows Server version 1803, Windows 10 version 1803, Windows Server 2016 Version 1709, Windows 10 version 1709, Windows RT, Windows 10 Version 1703, Windows Server 2016, Windows 10 Version 1607, Windows 10 (RTM), Windows Server 2012 R2, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV180008.

***************************************************************
Title: MS18-MAY: Security Update for Adobe Flash Player for Windows 10 Version 1607 - Windows 10 Version 1607 - Adobe Flash Player - KB4103729
Severity: Critical
Fixlet ID: 410372921
Fixlet Link: https://support.microsoft.com/kb/4103729

Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player that is installed on any supported edition of Windows Server version 1803, Windows 10 version 1803, Windows Server 2016 Version 1709, Windows 10 version 1709, Windows RT, Windows 10 Version 1703, Windows Server 2016, Windows 10 Version 1607, Windows 10 (RTM), Windows Server 2012 R2, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV180008.

***************************************************************
Title: MS18-MAY: Security Update for Adobe Flash Player for Windows 10 Version 1507 - Windows 10 Version 1507 LTSB - Adobe Flash Player - KB4103729 (x64)
Severity: Critical
Fixlet ID: 410372923
Fixlet Link: https://support.microsoft.com/kb/4103729

Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player that is installed on any supported edition of Windows Server version 1803, Windows 10 version 1803, Windows Server 2016 Version 1709, Windows 10 version 1709, Windows RT, Windows 10 Version 1703, Windows Server 2016, Windows 10 Version 1607, Windows 10 (RTM), Windows Server 2012 R2, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV180008.

***************************************************************
Title: MS18-MAY: Security Update for Adobe Flash Player for Windows 10 Version 1709 - Windows 10 Version 1709 - Adobe Flash Player - KB4103729 (x64)
Severity: Critical
Fixlet ID: 410372925
Fixlet Link: https://support.microsoft.com/kb/4103729

Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player that is installed on any supported edition of Windows Server version 1803, Windows 10 version 1803, Windows Server 2016 Version 1709, Windows 10 version 1709, Windows RT, Windows 10 Version 1703, Windows Server 2016, Windows 10 Version 1607, Windows 10 (RTM), Windows Server 2012 R2, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV180008.

***************************************************************
Title: MS18-MAY: Security Update for Adobe Flash Player for Windows 10 Version 1703 - Windows 10 Version 1703 - Adobe Flash Player - KB4103729 (x64)
Severity: Critical
Fixlet ID: 410372929
Fixlet Link: https://support.microsoft.com/kb/4103729

Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player that is installed on any supported edition of Windows Server version 1803, Windows 10 version 1803, Windows Server 2016 Version 1709, Windows 10 version 1709, Windows RT, Windows 10 Version 1703, Windows Server 2016, Windows 10 Version 1607, Windows 10 (RTM), Windows Server 2012 R2, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV180008.

***************************************************************
Title: MS18-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 - KB4103730 (x64)
Severity: Critical
Fixlet ID: 410373001
Fixlet Link: https://support.microsoft.com/kb/4103730

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.

***************************************************************
Title: MS18-MAY: Cumulative Update for Windows 10 Version 1703 - Windows 10 Version 1703 - KB4103731 (x64)
Severity: Critical
Fixlet ID: 410373101
Fixlet Link: https://support.microsoft.com/kb/4103731

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.

***************************************************************
Title: MS18-MAY: Delta Update for Windows 10 Version 1703 - Windows 10 Version 1703 - Delta Update - KB4103731 (x64)
Severity: Critical
Fixlet ID: 410373103
Fixlet Link: https://support.microsoft.com/kb/4103731

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.

***************************************************************
Title: MS18-MAY: Delta Update for Windows 10 Version 1703 - Windows 10 Version 1703 - Delta Update - KB4103731
Severity: Critical
Fixlet ID: 410373105
Fixlet Link: https://support.microsoft.com/kb/4103731

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.

***************************************************************
Title: MS18-MAY: Cumulative Update for Windows 10 Version 1703 - Windows 10 Version 1703 - KB4103731
Severity: Critical
Fixlet ID: 410373107
Fixlet Link: https://support.microsoft.com/kb/4103731

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.

***************************************************************
Title: MS18-MAY: Cumulative security update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 11 - KB4103768 (x64)
Severity: Moderate
Fixlet ID: 410376801
Fixlet Link: https://support.microsoft.com/kb/4103768

Fixlet Description: This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures. Additionally, see the following articles for more information about this cumulative update: Windows 7 SP1 and Windows Server 2008 R2 SP1 update history Windows Server 2012 update history Windows 8.1 and Windows Server 2012 R2 update history Windows 10 and Windows Server 2016 update history Important The fixes that are included in this Security Update for Internet Explorer 4103768 are also included in the May 2018 Security Monthly Quality Rollup. Installing either the Security Update for Internet Explorer or the Security Monthly Quality Rollup installs the fixes that are in this update. If you use update management processes other than Windows Update and you automatically approve all security updates classifications for deployment, this Security Update for Internet Explorer (KB 4103768), the May 2018 Security Only Quality Update, and the May 2018 Security Monthly Quality Rollup are deployed. We recommend that you review your update deployment rules to make sure that the desired updates are deployed. This Security Update for Internet Explorer is not applicable for installation on a computer where the Security Monthly Quality Rollup or the Preview of Monthly Quality Rollup from May 2018 (or a later month) is already installed. This is because those updates contain all the fixes that are in this Security Update for Internet Explorer. If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

***************************************************************
Title: MS18-MAY: Cumulative security update for Internet Explorer - Windows 7 SP1 - IE 11 - KB4103768 (x64)
Severity: Critical
Fixlet ID: 410376803
Fixlet Link: https://support.microsoft.com/kb/4103768

Fixlet Description: This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures. Additionally, see the following articles for more information about this cumulative update: Windows 7 SP1 and Windows Server 2008 R2 SP1 update history Windows Server 2012 update history Windows 8.1 and Windows Server 2012 R2 update history Windows 10 and Windows Server 2016 update history Important The fixes that are included in this Security Update for Internet Explorer 4103768 are also included in the May 2018 Security Monthly Quality Rollup. Installing either the Security Update for Internet Explorer or the Security Monthly Quality Rollup installs the fixes that are in this update. If you use update management processes other than Windows Update and you automatically approve all security updates classifications for deployment, this Security Update for Internet Explorer (KB 4103768), the May 2018 Security Only Quality Update, and the May 2018 Security Monthly Quality Rollup are deployed. We recommend that you review your update deployment rules to make sure that the desired updates are deployed. This Security Update for Internet Explorer is not applicable for installation on a computer where the Security Monthly Quality Rollup or the Preview of Monthly Quality Rollup from May 2018 (or a later month) is already installed. This is because those updates contain all the fixes that are in this Security Update for Internet Explorer. If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

***************************************************************
Title: MS18-MAY: Cumulative security update for Internet Explorer - Windows 7 SP1 - IE 11 - KB4103768
Severity: Critical
Fixlet ID: 410376805
Fixlet Link: https://support.microsoft.com/kb/4103768

Fixlet Description: This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures. Additionally, see the following articles for more information about this cumulative update: Windows 7 SP1 and Windows Server 2008 R2 SP1 update history Windows Server 2012 update history Windows 8.1 and Windows Server 2012 R2 update history Windows 10 and Windows Server 2016 update history Important The fixes that are included in this Security Update for Internet Explorer 4103768 are also included in the May 2018 Security Monthly Quality Rollup. Installing either the Security Update for Internet Explorer or the Security Monthly Quality Rollup installs the fixes that are in this update. If you use update management processes other than Windows Update and you automatically approve all security updates classifications for deployment, this Security Update for Internet Explorer (KB 4103768), the May 2018 Security Only Quality Update, and the May 2018 Security Monthly Quality Rollup are deployed. We recommend that you review your update deployment rules to make sure that the desired updates are deployed. This Security Update for Internet Explorer is not applicable for installation on a computer where the Security Monthly Quality Rollup or the Preview of Monthly Quality Rollup from May 2018 (or a later month) is already installed. This is because those updates contain all the fixes that are in this Security Update for Internet Explorer. If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

***************************************************************
Title: MS18-MAY: Cumulative security update for Internet Explorer - Windows Server 2008 SP2 - IE 9 - KB4103768 (x64)
Severity: Moderate
Fixlet ID: 410376807
Fixlet Link: https://support.microsoft.com/kb/4103768

Fixlet Description: This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures. Additionally, see the following articles for more information about this cumulative update: Windows 7 SP1 and Windows Server 2008 R2 SP1 update history Windows Server 2012 update history Windows 8.1 and Windows Server 2012 R2 update history Windows 10 and Windows Server 2016 update history Important The fixes that are included in this Security Update for Internet Explorer 4103768 are also included in the May 2018 Security Monthly Quality Rollup. Installing either the Security Update for Internet Explorer or the Security Monthly Quality Rollup installs the fixes that are in this update. If you use update management processes other than Windows Update and you automatically approve all security updates classifications for deployment, this Security Update for Internet Explorer (KB 4103768), the May 2018 Security Only Quality Update, and the May 2018 Security Monthly Quality Rollup are deployed. We recommend that you review your update deployment rules to make sure that the desired updates are deployed. This Security Update for Internet Explorer is not applicable for installation on a computer where the Security Monthly Quality Rollup or the Preview of Monthly Quality Rollup from May 2018 (or a later month) is already installed. This is because those updates contain all the fixes that are in this Security Update for Internet Explorer. If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

***************************************************************
Title: MS18-MAY: Cumulative security update for Internet Explorer - Windows Server 2008 SP2 - IE 9 - KB4103768
Severity: Moderate
Fixlet ID: 410376809
Fixlet Link: https://support.microsoft.com/kb/4103768

Fixlet Description: This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures. Additionally, see the following articles for more information about this cumulative update: Windows 7 SP1 and Windows Server 2008 R2 SP1 update history Windows Server 2012 update history Windows 8.1 and Windows Server 2012 R2 update history Windows 10 and Windows Server 2016 update history Important The fixes that are included in this Security Update for Internet Explorer 4103768 are also included in the May 2018 Security Monthly Quality Rollup. Installing either the Security Update for Internet Explorer or the Security Monthly Quality Rollup installs the fixes that are in this update. If you use update management processes other than Windows Update and you automatically approve all security updates classifications for deployment, this Security Update for Internet Explorer (KB 4103768), the May 2018 Security Only Quality Update, and the May 2018 Security Monthly Quality Rollup are deployed. We recommend that you review your update deployment rules to make sure that the desired updates are deployed. This Security Update for Internet Explorer is not applicable for installation on a computer where the Security Monthly Quality Rollup or the Preview of Monthly Quality Rollup from May 2018 (or a later month) is already installed. This is because those updates contain all the fixes that are in this Security Update for Internet Explorer. If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

***************************************************************
Title: MS18-MAY: Cumulative security update for Internet Explorer - Windows Server 2012 - IE 10 - KB4103768 (x64)
Severity: Moderate
Fixlet ID: 410376811
Fixlet Link: https://support.microsoft.com/kb/4103768

Fixlet Description: This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures. Additionally, see the following articles for more information about this cumulative update: Windows 7 SP1 and Windows Server 2008 R2 SP1 update history Windows Server 2012 update history Windows 8.1 and Windows Server 2012 R2 update history Windows 10 and Windows Server 2016 update history Important The fixes that are included in this Security Update for Internet Explorer 4103768 are also included in the May 2018 Security Monthly Quality Rollup. Installing either the Security Update for Internet Explorer or the Security Monthly Quality Rollup installs the fixes that are in this update. If you use update management processes other than Windows Update and you automatically approve all security updates classifications for deployment, this Security Update for Internet Explorer (KB 4103768), the May 2018 Security Only Quality Update, and the May 2018 Security Monthly Quality Rollup are deployed. We recommend that you review your update deployment rules to make sure that the desired updates are deployed. This Security Update for Internet Explorer is not applicable for installation on a computer where the Security Monthly Quality Rollup or the Preview of Monthly Quality Rollup from May 2018 (or a later month) is already installed. This is because those updates contain all the fixes that are in this Security Update for Internet Explorer. If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

***************************************************************
Title: MS18-MAY: Cumulative security update for Internet Explorer - Windows Server 2012 R2 - IE 11 - KB4103768 (x64)
Severity: Moderate
Fixlet ID: 410376813
Fixlet Link: https://support.microsoft.com/kb/4103768

Fixlet Description: This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures. Additionally, see the following articles for more information about this cumulative update: Windows 7 SP1 and Windows Server 2008 R2 SP1 update history Windows Server 2012 update history Windows 8.1 and Windows Server 2012 R2 update history Windows 10 and Windows Server 2016 update history Important The fixes that are included in this Security Update for Internet Explorer 4103768 are also included in the May 2018 Security Monthly Quality Rollup. Installing either the Security Update for Internet Explorer or the Security Monthly Quality Rollup installs the fixes that are in this update. If you use update management processes other than Windows Update and you automatically approve all security updates classifications for deployment, this Security Update for Internet Explorer (KB 4103768), the May 2018 Security Only Quality Update, and the May 2018 Security Monthly Quality Rollup are deployed. We recommend that you review your update deployment rules to make sure that the desired updates are deployed. This Security Update for Internet Explorer is not applicable for installation on a computer where the Security Monthly Quality Rollup or the Preview of Monthly Quality Rollup from May 2018 (or a later month) is already installed. This is because those updates contain all the fixes that are in this Security Update for Internet Explorer. If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

***************************************************************
Title: MS18-MAY: Cumulative security update for Internet Explorer - Windows 8.1 - IE 11 - KB4103768 (x64)
Severity: Critical
Fixlet ID: 410376815
Fixlet Link: https://support.microsoft.com/kb/4103768

Fixlet Description: This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures. Additionally, see the following articles for more information about this cumulative update: Windows 7 SP1 and Windows Server 2008 R2 SP1 update history Windows Server 2012 update history Windows 8.1 and Windows Server 2012 R2 update history Windows 10 and Windows Server 2016 update history Important The fixes that are included in this Security Update for Internet Explorer 4103768 are also included in the May 2018 Security Monthly Quality Rollup. Installing either the Security Update for Internet Explorer or the Security Monthly Quality Rollup installs the fixes that are in this update. If you use update management processes other than Windows Update and you automatically approve all security updates classifications for deployment, this Security Update for Internet Explorer (KB 4103768), the May 2018 Security Only Quality Update, and the May 2018 Security Monthly Quality Rollup are deployed. We recommend that you review your update deployment rules to make sure that the desired updates are deployed. This Security Update for Internet Explorer is not applicable for installation on a computer where the Security Monthly Quality Rollup or the Preview of Monthly Quality Rollup from May 2018 (or a later month) is already installed. This is because those updates contain all the fixes that are in this Security Update for Internet Explorer. If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

***************************************************************
Title: MS18-MAY: Cumulative security update for Internet Explorer - Windows 8.1 - IE 11 - KB4103768
Severity: Critical
Fixlet ID: 410376817
Fixlet Link: https://support.microsoft.com/kb/4103768

Fixlet Description: This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures. Additionally, see the following articles for more information about this cumulative update: Windows 7 SP1 and Windows Server 2008 R2 SP1 update history Windows Server 2012 update history Windows 8.1 and Windows Server 2012 R2 update history Windows 10 and Windows Server 2016 update history Important The fixes that are included in this Security Update for Internet Explorer 4103768 are also included in the May 2018 Security Monthly Quality Rollup. Installing either the Security Update for Internet Explorer or the Security Monthly Quality Rollup installs the fixes that are in this update. If you use update management processes other than Windows Update and you automatically approve all security updates classifications for deployment, this Security Update for Internet Explorer (KB 4103768), the May 2018 Security Only Quality Update, and the May 2018 Security Monthly Quality Rollup are deployed. We recommend that you review your update deployment rules to make sure that the desired updates are deployed. This Security Update for Internet Explorer is not applicable for installation on a computer where the Security Monthly Quality Rollup or the Preview of Monthly Quality Rollup from May 2018 (or a later month) is already installed. This is because those updates contain all the fixes that are in this Security Update for Internet Explorer. If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

***************************************************************
Title: MS18-MAY: Security update for the Windows common log file system driver elevation of privilege vulnerability in Windows Server 2008 - Windows Server 2008 SP2 - KB4130944 (x64)
Severity: Important
Fixlet ID: 413094401
Fixlet Link: https://support.microsoft.com/kb/4130944

Fixlet Description: An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. To learn more about the vulnerability, go to  CVE-2018-8167.

***************************************************************
Title: MS18-MAY: Security update for the Windows common log file system driver elevation of privilege vulnerability in Windows Server 2008 - Windows Server 2008 SP2 - KB4130944
Severity: Important
Fixlet ID: 413094403
Fixlet Link: https://support.microsoft.com/kb/4130944

Fixlet Description: An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. To learn more about the vulnerability, go to  CVE-2018-8167.

***************************************************************
Title: MS18-MAY: Security update for the Win32k elevation of privilege vulnerability in Windows Server 2008, Windows Embedded POSReady 2009, and Windows Embedded Standard 2009 - Windows Server 2008 SP2 - KB4131188 (x64)
Severity: Important
Fixlet ID: 413118801
Fixlet Link: https://support.microsoft.com/kb/4131188

Fixlet Description: An elevation of privilege vulnerability and an information disclosure vulnerability exist in Windows when the Win32k component fails to properly handle objects in memory. To learn more about the vulnerabilities, see the following Common Vulnerabilities and Exposures (CVE). CVE-2018-8120 CVE-2018-8124 CVE-2018-8164 CVE-2018-8166

***************************************************************
Title: MS18-MAY: Security update for the Win32k elevation of privilege vulnerability in Windows Server 2008, Windows Embedded POSReady 2009, and Windows Embedded Standard 2009 - Windows Server 2008 SP2 - KB4131188
Severity: Important
Fixlet ID: 413118803
Fixlet Link: https://support.microsoft.com/kb/4131188

Fixlet Description: An elevation of privilege vulnerability and an information disclosure vulnerability exist in Windows when the Win32k component fails to properly handle objects in memory. To learn more about the vulnerabilities, see the following Common Vulnerabilities and Exposures (CVE). CVE-2018-8120 CVE-2018-8124 CVE-2018-8164 CVE-2018-8166

***************************************************************
Title: MS18-MAY: Security update for vulnerabilities in Windows Server 2008, Windows Embedded POSReady 2009, and Windows Embedded Standard 2009 - Windows Server 2008 SP2 - KB4134651 (x64)
Severity: Critical
Fixlet ID: 413465101
Fixlet Link: https://support.microsoft.com/kb/4134651

Fixlet Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. To learn more about the vulnerabilities, go to the following Common Vulnerabilities and Exposures (CVE). CVE-2018-8174 CVE-2018-8897

***************************************************************
Title: MS18-MAY: Security update for vulnerabilities in Windows Server 2008, Windows Embedded POSReady 2009, and Windows Embedded Standard 2009 - Windows Server 2008 SP2 - KB4134651
Severity: Critical
Fixlet ID: 413465103
Fixlet Link: https://support.microsoft.com/kb/4134651

Fixlet Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. To learn more about the vulnerabilities, go to the following Common Vulnerabilities and Exposures (CVE). CVE-2018-8174 CVE-2018-8897



More information about the BigFix-Announcements mailing list