Make Homepage | Add To Favorites | Print Page | Submit News | Feedback | Contact | 

Your Technical Computer Information Resource!  
     

  Microsoft related Technical Updates [Page: 11 of 98] @ TACKtech Corp.  

04.12.2016 - MS16-040 - Critical: Security Update for Microsoft XML Core Services (3148541) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (April 12, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user clicks a specially crafted link that could allow an attacker to run malicious code remotely to take control of the user’s system. However, in all cases an attacker would have no way to force a user to click a specially crafted link. An attacker would have to convince a user to click the link, typically by way of an enticement in an email or Instant Messenger message.
Full View / NID: 58994 / Submitted by: The Zilla of Zuron

04.12.2016 - MS16-038 - Critical: Cumulative Security Update for Microsoft Edge (3148532) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (April 12, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Edge. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Full View / NID: 58993 / Submitted by: The Zilla of Zuron

04.12.2016 - MS16-037 - Critical: Cumulative Security Update for Internet Explorer (3148531) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (April 12, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Full View / NID: 58992 / Submitted by: The Zilla of Zuron

04.12.2016 - MS16-044 - Important: Security Update for Windows OLE (3146706) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (April 12, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if Windows OLE fails to properly validate user input. An attacker could exploit the vulnerability to execute malicious code. However, an attacker must first convince a user to open either a specially crafted file or a program from either a webpage or an email message.
Full View / NID: 58991 / Submitted by: The Zilla of Zuron

04.12.2016 - MS15-040 - Critical: Security Update for Microsoft XML Core Service to Address Remote Code Execution (3148541) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (April 12, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow code execution if a user clicks a specially crafted link that could allow an attacker to run malicious code remotely to take control of the user’s system. However, in all cases an attacker would have no way to force users to click a specially crafted link. An attacker would have to convince users to click the link, typically by way of an enticement in an email or Instant Messenger message.
Full View / NID: 58990 / Submitted by: The Zilla of Zuron

04.07.2016 - MS13-082 - Critical: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Version: 1.2



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.2 (April 7, 2016): Corrected download links for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows 2008 R2. This is an informational change only. Customers who have already successfully updated their systems do not need to take any action.
Summary: This security update resolves two privately reported vulnerabilities and one publicly disclosed vulnerability in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if a user visits a website containing a specially crafted OpenType font (OTF) file using a browser capable of instantiating XBAP applications.
Full View / NID: 58928 / Submitted by: The Zilla of Zuron

04.07.2016 - MS15-121 - Important: Security Update for Schannel to Address Spoofing (3081320) - Version: 1.1



View Microsoft related news. Severity Rating: Important
Revision Note: V1.1 (April 7, 2016): Updated the footnotes following the Affected Software table to further clarify installation order for security update 3101746 in MS15-115, 3081320 in MS15-121, and 3101246 in MS15-122. This is an informational change only. Customers who have already successfully installed the update do not need to take any action.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow spoofing if an attacker performs a man-in-the-middle (MiTM) attack between a client and a legitimate server.
Full View / NID: 58927 / Submitted by: The Zilla of Zuron

04.07.2016 - MS15-115 - Critical: Security Update for Microsoft Windows to Address Remote Code Execution (3105864) - Version: 2.1



View Microsoft related news. Severity Rating: Critical
Revision Note: V2.1 (April 7, 2016): Updated the footnotes following the Affected Software table to further clarify installation order for security update 3101746 in MS15-115, 3081320 in MS15-121, and 3101246 in MS15-122. This is an informational change only. Customers who have already successfully installed the update do not need to take any action.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted webpage that contains embedded fonts.
Full View / NID: 58926 / Submitted by: The Zilla of Zuron

04.07.2016 - MS16-027 - Critical: Security Update for Windows Media to Address Remote Code Execution (3143146) - Version: 1.2



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.2 (April 7, 2016): Added a note to clarify that Windows Media is only enabled on Windows server operating systems when the Desktop Experience feature is enabled. This is an informational change only.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens specially crafted media content that is hosted on a website.
Full View / NID: 58925 / Submitted by: The Zilla of Zuron

04.07.2016 - MS15-122 - Important: Security Update for Kerberos to Address Security Feature Bypass (3105256) - Version: 1.2



View Microsoft related news. Severity Rating: Important
Revision Note: V1.2 (April 7, 2016): Updated the footnotes following the Affected Software and Vulnerability Severity Ratings table to further clarify installation order for security update 3101746 in MS15-115, 3081320 in MS15-121, and 3101246 in MS15-122. This is an informational change only. Customers who have already successfully installed the update do not need to take any action.
Summary: This security update resolves a security feature bypass in Microsoft Windows. An attacker could bypass Kerberos authentication on a target machine and decrypt drives protected by BitLocker. The bypass can be exploited only if the target system has BitLocker enabled without a PIN or USB key.
Full View / NID: 58924 / Submitted by: The Zilla of Zuron

03.24.2016 - MS16-028 - Critical: Security Update for Microsoft Windows PDF Library to Address Remote Code Execution (3143081) - Version: 1.1



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.1 (March 24, 2016): Removed Windows Server 2012 from the Affected Software and Vulnerability Severity Ratings table because it is not affected. This is an informational change only.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted .pdf file.
Full View / NID: 58699 / Submitted by: The Zilla of Zuron

03.16.2016 - MS16-029 - Important: Security Update for Microsoft Office to Address Remote Code Execution (3141806) - Version: 2.0



View Microsoft related news. Severity Rating: Important
Revision Note: V2.0 (March 16, 2016): Bulletin revised to announce that the 3138327 update is available for Microsoft Office 2016 for Mac, and the 3138328 update is available for Microsoft Office for Mac 2011. Please note that the 3138327 update for Microsoft Outlook 2016 for Mac was not released on March 16. This update will be released as soon as it is available and users will be notified via a bulletin revision. For more information, see Microsoft Knowledge Base Article 3138327 and Microsoft Knowledge Base Article 3138328.
Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Full View / NID: 58577 / Submitted by: The Zilla of Zuron

03.10.2016 - MS16-027 - Critical: Security Update for Windows Media to Address Remote Code Execution (3143146) - Version: 1.1



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.1 (March 10, 2016): Corrected the Updates Replaced for Windows 8.1 and Windows RT 8.1. This is an informational change only.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens specially crafted media content that is hosted on a website.
Full View / NID: 58481 / Submitted by: The Zilla of Zuron

03.10.2016 - MS16-036 - Critical: Security Update for Adobe Flash Player (3144756) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (March 10, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Adobe Flash Player when installed on all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, and Windows 10.
Full View / NID: 58479 / Submitted by: The Zilla of Zuron

03.08.2016 - MS16-030 - Important: Security Update for Windows OLE to Address Remote Code Execution (3143136) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (March 8, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if Windows OLE fails to properly validate user input. An attacker could exploit the vulnerabilities to execute malicious code. However, an attacker must first convince a user to open either a specially crafted file or a program from either a webpage or an email message.
Full View / NID: 58872 / Submitted by: The Zilla of Zuron

03.08.2016 - MS16-032 - Important: Security Update for Secondary Logon to Address Elevation of Privilege (3143141) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (March 8, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows Secondary Logon Service fails to properly manage request handles in memory.
Full View / NID: 58500 / Submitted by: The Zilla of Zuron

03.08.2016 - MS16-033 - Important: Security Update for Windows USB Mass Storage Class Driver to Address Elevation of Privilege (3143142) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (March 8, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker with physical access inserts a specially crafted USB device into the system.
Full View / NID: 58498 / Submitted by: The Zilla of Zuron

03.08.2016 - MS16-028 - Critical: Security Update for Microsoft Windows PDF Library to Address Remote Code Execution (3143081) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (March 8, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted .pdf file.
Full View / NID: 58497 / Submitted by: The Zilla of Zuron

03.08.2016 - MS16-035 - Important: Security Update for .NET Framework to Address Security Feature Bypass (3141780) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (March 8, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft .NET Framework. The security feature bypass exists in a .NET Framework component that does not properly validate certain elements of a signed XML document.
Full View / NID: 58454 / Submitted by: The Zilla of Zuron

03.08.2016 - MS16-026 - Critical: Security Update for Graphic Fonts to Address Remote Code Execution (3143148) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (March 8, 2016): Click here to enter text.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker either convinces a user to open a specially crafted document, or to visit a webpage that contains specially crafted embedded OpenType fonts.
Full View / NID: 58449 / Submitted by: The Zilla of Zuron
  Popular Tech News  
  Most Viewed News  
  Top Affiliates  
.....