Make Homepage | Add To Favorites | Print Page | Submit News | Feedback | Contact | 

Your Technical Computer Information Resource!  
     

  Microsoft Technical Updates [Page: 7 of 283] @ TACKtech Corp.  

08.12.2016 - MS16-102 - Critical: Security Update for Microsoft Windows PDF Library (3182248) - Version: 1.2



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.2 (August 12, 2016): Bulletin revised to correct the updates replaced for Window 8.1, Windows Server 2012, and Windows Server 2012. Bulletin revised to remove Windows 10 version 1607 from the affected software table because it is not affected. This is an informational change only. Customers who have already successfully installed the update do not need to take any action.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user views specially crafted PDF content online or opens a specially crafted PDF document. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Full View / NID: 60775 / Submitted by: The Zilla of Zuron

08.11.2016 - MS16-102 - Critical: Security Update for Microsoft Windows PDF Library (3182248) - Version: 1.1



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.1 (August 11, 2016): Bulletin revised to remove Windows Server 2012 R2 (Server Core installation) from the affected software table because the Server Core version of Windows Server 2012 R2 is not affected. This is an informational change only. Customers who have already successfully installed the update do not need to take any action
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user views specially crafted PDF content online or opens a specially crafted PDF document. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Full View / NID: 60769 / Submitted by: The Zilla of Zuron

08.11.2016 - MS16-099 - Critical: Security Update for Microsoft Office (3177451) - Version: 1.1



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.1 (August 11, 2016): Bulletin revised to correct the updates replaced for Microsoft Word Viewer packages 3115480 and 3115479. This is an informational change only. Customers who have already successfully updated their systems do not need to take any action.
Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Full View / NID: 60768 / Submitted by: The Zilla of Zuron

08.11.2016 - MS16-035 - Important: Security Update for .NET Framework to Address Security Feature Bypass (3141780) - Version: 2.3



View Microsoft related news. Severity Rating: Important
Revision Note: V2.3 (August 11, 2016): Revised bulletin to announce a detection change to correct an offering issue for 3135996. This is a detection change only. There were no changes to the update files. Customers who have already successfully installed the update do not need to take any action.
Summary: This security update resolves a vulnerability in Microsoft .NET Framework. The security feature bypass exists in a .NET Framework component that does not properly validate certain elements of a signed XML document.
Full View / NID: 60767 / Submitted by: The Zilla of Zuron

08.10.2016 - MS16-101 - Important: Security Update for Windows Authentication Methods (3178465) - Version: 1.1



View Microsoft related news. Severity Rating: Important
Revision Note: V1.1 (August 10, 2016): Bulletin revised to correct the security impact for CVE-2016-3237 from elevation of privilege to security feature bypass. This is an informational change only. Customers who have already successfully installed the update do not need to take any action.
Summary: This security update resolves multiple vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow elevation of privilege if an attacker runs a specially crafted application on a domain-joined system.
Full View / NID: 60749 / Submitted by: The Zilla of Zuron

08.09.2016 - MS16-096 - Critical: Cumulative Security Update for Microsoft Edge (3177358) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (August 9, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users with administrative user rights.
Full View / NID: 60860 / Submitted by: The Zilla of Zuron

08.09.2016 - MS16-095 - Critical: Cumulative Security Update for Internet Explorer (3177356) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (August 9, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Full View / NID: 60744 / Submitted by: The Zilla of Zuron

08.09.2016 - MS16-077 - Important: Security Update for WPAD (3165191) - Version: 1.3



View Microsoft related news. Severity Rating: Important
Revision Note: V1.3 (August 9, 2016): Bulletin revised to include an additional vulnerability, CVE-2016-3299. This is an informational change only. Customers who have successfully installed the updates do not need to take any further action.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if the Web Proxy Auto Discovery (WPAD) protocol falls back to a vulnerable proxy discovery process on a target system.
Full View / NID: 60743 / Submitted by: The Zilla of Zuron

08.09.2016 - MS16-103 - Important: Security Update for ActiveSyncProvider (3182332) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (August 9, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure when Universal Outlook fails to establish a secure connection.
Full View / NID: 60731 / Submitted by: The Zilla of Zuron

08.09.2016 - MS16-102 - Critical: Security Update for Microsoft Windows PDF Library (3182248) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (August 9, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user views specially crafted PDF content online or opens a specially crafted PDF document. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Full View / NID: 60730 / Submitted by: The Zilla of Zuron

08.09.2016 - MS16-101 - Important: Security Update for Windows Authentication Methods (3178465) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (August 9, 2016): Bulletin published.
Summary: This security update resolves multiple vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker runs a specially crafted application on a domain-joined system.
Full View / NID: 60728 / Submitted by: The Zilla of Zuron

08.09.2016 - MS16-099 - Critical: Security Update for Microsoft Office (3177451) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (August 9, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Full View / NID: 60719 / Submitted by: The Zilla of Zuron

08.09.2016 - MS16-100 - Important: Security Update for Secure Boot (3179577) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (August 9, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass if an attacker installs an affected boot manager and bypasses Windows security features.
Full View / NID: 60718 / Submitted by: The Zilla of Zuron

08.09.2016 - MS16-098 - Important: Security Update for Windows Kernel-Mode Drivers (3178466) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (August 9, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application that could exploit the vulnerabilities and take control of an affected system.
Full View / NID: 60717 / Submitted by: The Zilla of Zuron

08.09.2016 - MS16-097 - Critical: Security Update for Microsoft Graphics Component (3177393) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (August 9, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows, Microsoft Office, Skype for Business, and Microsoft Lync. The vulnerabilities could allow remote code execution if a user either visits a specially crafted website or opens a specially crafted document. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Full View / NID: 60716 / Submitted by: The Zilla of Zuron

08.09.2016 - MS16-054 - Critical: Security Update for Microsoft Office (3155544) - Version: 2.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V2.0 (August 9, 2016): Bulletin revised to inform customers of additional security updates for Microsoft Office 2007 (3114893), Microsoft Word 2007 Service Pack 3 (3115465), Microsoft Office Compatibility Pack Service Pack 3 (3115464), Microsoft Word Viewer (3115480), and Microsoft Word Viewer (3115479). The updates add to the original release to comprehensively address CVE-2016-0183. Microsoft recommends that customers running this affected software install the security updates to be fully protected from the vulnerabilities described in this bulletin. Customers running all other affected software who already successfully installed the updates from the original release do not need to take any action. See the Microsoft Knowledge Base Article on each respective update for more information and download links.
Summary: This security update resolves vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Full View / NID: 60715 / Submitted by: The Zilla of Zuron

07.26.2016 - MS16-058 - Important: Security Update for Windows IIS (3141083) - Version: 1.1



View Microsoft related news. Severity Rating: Important
Revision Note: V1.1 (July 26, 2016): Bulletin revised to add Updates Replaced information to all entries in the Affected Software table. This is an informational change only. Customers who have already successfully installed the updates do not need to take any action.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker with access to the local system executes a malicious application. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Full View / NID: 60530 / Submitted by: The Zilla of Zuron

07.18.2016 - MS16-094 - Important: Security Update for Secure Boot (3177404) - Version: 1.1



View Microsoft related news. Severity Rating: Important
Revision Note: V1.1 (July 18, 2016): Bulletin revised to add an Update FAQ to inform customers running Windows Server 2012 that they do not need to install the 3170377 and 3172727 updates in a particular order.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow Secure Boot security features to be bypassed if an attacker installs an affected policy on a target device. An attacker must have either administrative privileges or physical access to install a policy and bypass Secure Boot.
Full View / NID: 60400 / Submitted by: The Zilla of Zuron

07.18.2016 - MS16-092 - Important: Security Update for Windows Kernel (3171910) - Version: 1.1



View Microsoft related news. Severity Rating: Important
Revision Note: V1.1 (July 18, 2016): Bulletin revised to add an Update FAQ to inform customers running Windows Server 2012 that they do not need to install the 3170377 and 3172727 updates in a particular order.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow security feature bypass if the Windows kernel fails to properly validate permissions.
Full View / NID: 60399 / Submitted by: The Zilla of Zuron

07.13.2016 - MS16-035 - Important: Security Update for .NET Framework to Address Security Feature Bypass (3141780) - Version: 2.2



View Microsoft related news. Severity Rating: Important
Revision Note: V2.2 (July 13, 2016): Revised bulletin to inform customers that the 3135996 update has been refreshed. This is an informational notification only. Customers who have already successfully installed the update do not need to take any further action.
Summary: This security update resolves a vulnerability in Microsoft .NET Framework. The security feature bypass exists in a .NET Framework component that does not properly validate certain elements of a signed XML document.
Full View / NID: 60354 / Submitted by: The Zilla of Zuron
  Most Viewed  
  Quick Links  
  Top Affiliates  
.....