Make Homepage | Add To Favorites | Print Page | Submit News | Feedback | Contact | 

Your Technical Computer Information Resource!  
     

  Microsoft Technical Updates [Page: 8 of 283] @ TACKtech Corp.  

07.13.2016 - MS16-077 - Important: Security Update for WPAD (3165191) - Version: 1.2



View Microsoft related news. Severity Rating: Important
Revision Note: V1.2 (July 13, 2016): Bulletin revised to correct the workarounds for CVE-2016-3213 and CVE-2016-3236. This is an informational change only. Customers who have successfully installed the updates do not need to take any further action.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if the Web Proxy Auto Discovery (WPAD) protocol falls back to a vulnerable proxy discovery process on a target system.
Full View / NID: 60353 / Submitted by: The Zilla of Zuron

07.12.2016 - MS16-090 - Important: Security Update for Windows Kernel-Mode Drivers (3171481) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (July 12, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application that could exploit the vulnerabilities and take control of an affected system.
Full View / NID: 60456 / Submitted by: The Zilla of Zuron

07.12.2016 - MS16-088 - Critical: Security Update for Microsoft Office (3170008) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (July 12, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Full View / NID: 60411 / Submitted by: The Zilla of Zuron

07.12.2016 - MS16-091 - Important: Security Update for .NET Framework (3170048) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (July 12, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft .NET Framework. The vulnerability could cause information disclosure if an attacker uploads a specially crafted XML file to web-based application.
Full View / NID: 60391 / Submitted by: The Zilla of Zuron

07.12.2016 - MS16-087 - Critical: Security Update for Windows Print Spooler Components (3170005) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (July 12, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker is able to execute a man-in-the-middle (MiTM) attack on a workstation or print server, or sets up a rogue print server on a target network.
Full View / NID: 60390 / Submitted by: The Zilla of Zuron

07.12.2016 - MS16-089 - Important: Security Update for Windows Secure Kernel Mode (3170050) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (July 12, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure when Windows Secure Kernel Mode improperly handles objects in memory.
Full View / NID: 60333 / Submitted by: The Zilla of Zuron

07.12.2016 - MS16-086 - Critical: Cumulative Security Update for JScript and VBScript (3169996) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (July 12, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in the JScript and VBScript scripting engines in Microsoft Windows. The vulnerabilities could allow remote code execution if a user visits a specially crafted website. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited these vulnerabilities could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Full View / NID: 60332 / Submitted by: The Zilla of Zuron

07.12.2016 - MS16-085 - Critical: Cumulative Security Update for Microsoft Edge (3169999) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (July 12, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users with administrative user rights.
Full View / NID: 60331 / Submitted by: The Zilla of Zuron

07.12.2016 - MS16-084 - Critical: Cumulative Security Update for Internet Explorer (3169991) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (July 12, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Full View / NID: 60330 / Submitted by: The Zilla of Zuron

07.12.2016 - MS16-092 - Important: Security Update for Windows Kernel (3171910) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (July 12, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow security feature bypass if the Windows kernel fails to properly validate permissions.
Full View / NID: 60329 / Submitted by: The Zilla of Zuron

06.22.2016 - MS16-077 - Important: Security Update for WPAD (3165191) - Version: 1.1



View Microsoft related news. Severity Rating: Important
Revision Note: V1.1 (June 22, 2016): Bulletin revised to add an Update FAQ on behavior changes to be aware of after installing this update. This is an informational change only.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if the Web Proxy Auto Discovery (WPAD) protocol falls back to a vulnerable proxy discovery process on a target system.
Full View / NID: 60077 / Submitted by: The Zilla of Zuron

06.22.2016 - MS16-063 - Critical: Cumulative Security Update for Internet Explorer (3163649) - Version: 1.1



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.1 (June 22, 2016): Bulletin revised to add workarounds for CVE-2016-3213. This is an informational change only. Customers who have successfully installed the updates do not need to take any further action.
Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Full View / NID: 60076 / Submitted by: The Zilla of Zuron

06.16.2016 - MS16-083 - Critical: Security Update for Adobe Flash Player (3167685) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (June 16, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Adobe Flash Player when installed on all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, and Windows 10.
Full View / NID: 59987 / Submitted by: The Zilla of Zuron

06.15.2016 - MS16-074 - Important: Security Update for Microsoft Graphics Component (3164036) - Version: 1.1



View Microsoft related news. Severity Rating: Important
Revision Note: V1.1 (June 15, 2016): Revised the Executive Summary to correct the attack vector description. This is an informational change only.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if a user opens a specially crafted application.
Full View / NID: 59988 / Submitted by: The Zilla of Zuron

06.14.2016 - MS16-075 - Important: Security Update for Windows SMB Server (3164038) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (June 14, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application.
Full View / NID: 60285 / Submitted by: The Zilla of Zuron

06.14.2016 - MS16-082 - Important: Security Update for Microsoft Windows Search Component (3165270) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (June 14, 2016):
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker logs on to a target system and runs a specially crafted application.
Full View / NID: 60014 / Submitted by: The Zilla of Zuron

06.14.2016 - MS16-071 - Critical: Security Update for Microsoft Windows DNS Server (3164065) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (June 14, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted requests to a DNS server.
Full View / NID: 60013 / Submitted by: The Zilla of Zuron

06.14.2016 - MS16-079 - Important: Security Update for Microsoft Exchange Server (3160339) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (June 14, 2016): Bulletin published.
Summary: This security update resolves vulnerabilites in Microsoft Exchange Server. The most severe of the vulnerabilities could allow information disclosure if an attacker sends a specially crafted image URL in an Outlook Web Access (OWA) message that is loaded, without warning or filtering, from the attacker-controlled URL.
Full View / NID: 59980 / Submitted by: The Zilla of Zuron

06.14.2016 - MS16-078 - Important: Security Update for Windows Diagnostic Hub (3165479) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (June 14, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application.
Full View / NID: 59967 / Submitted by: The Zilla of Zuron

06.14.2016 - MS16-072 - Important: Security Update for Group Policy (3163622) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (June 14, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker launches a man-in-the-middle (MiTM) attack against the traffic passing between a domain controller and the target machine .
Full View / NID: 59966 / Submitted by: The Zilla of Zuron
  Most Viewed  
  Quick Links  
  Top Affiliates  
.....