Severity Rating: Important
Revision Note: V1.1 (May 29, 2013): Corrected update replacement entries in the Affected Software table for x64-based editions of Windows Server 2008 R2. This is a bulletin change only. There were no changes to detection logic or security update files.
Summary: This...
2013 bulletin
affectedsoftware
denial of service
kerberos
microsoft
patch
remote attack
revision note
security
session request
severity
update
vulnerability
windows server
Severity Rating: Critical
Revision Note: V1.1 (January 8, 2013): Corrected download links for Microsoft XML Core Services 3.0 on Windows Server 2003 with SP2 for Itanium-based Systems and for Microsoft XML Core Services 6.0 when installed on Windows Server 2003 with SP2 for...
affectedsoftware
attack vector
code execution
critical update
email threats
information change
internet explorer
microsoft xml
ms13-002
remote code execution
revision note
security
security update
server core
service pack
update
users
vulnerabilities
windows server
Severity Rating: Important
Revision Note: V1.0 (October 9, 2012): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in all supported releases of Microsoft Windows except Windows 8 and Windows Server 2012. This security update is...
affectedsoftware
bulletin
elevation
important
ms12-068
non-affectedsoftware
privilege
revision
security update
vulnerability
windows 2003
windows 2008
windows 2008 r2
windows 7
windows 8
windows kernel
windows server
windows vista
windows xp
Severity Rating: Important
Revision Note: V1.0 (December 13, 2011): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in all supported editions of Windows XP and Windows Server 2003. This security update is rated Important for all...
affectedsoftware
attacker
cve
exploit
important
microsoft
ms11-093
ole
patch
remote code execution
revision note
security bulletin
security update
technet
user rights
vulnerability
windows server 2003
windows xp
Revision Note: V1.1 (December 13, 2011): For MS11-099, corrected the severity ratings in the Affected Software table. For MS11-088, corrected the Key Note in the Exploitability Index. These are informational changes only. There were no changes to the security update files or detection logic...
Severity Rating: Important
Revision Note: V1.0 (December 13, 2011): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in all supported editions of Windows XP and Windows Server 2003. This security update is rated Important for all...
administrative rights
affectedsoftware
attack
bulletin
december 2011
execution
exploit
important
ms11-093
ole
patch management
privately reported
remote code
security update
software security
user accounts
user rights
vulnerability
windows server
windows xp
Revision Note: V6.0 (August 9, 2011): For MS11-025, added Microsoft Visual Studio 2010 Service Pack 1 (KB2565057) and Microsoft Visual C++ 2010 Redistributable Package Service Pack 1 (KB2565063) as Affected Software.
Summary: This bulletin summary lists security bulletins released for...
Severity Rating: Important
Revision Note: V4.0 (August 9, 2011): Added Microsoft Visual Studio 2010 Service Pack 1 (KB2565057) and Microsoft Visual C++ 2010 Redistributable Package Service Pack 1 (KB2565063) as Affected Software. See the update FAQ for details. Also corrected the...
Severity Rating: Important
Revision Note: V2.0 (August 9, 2011): Bulletin rereleased to announce a detection change to the update for Microsoft Visual Studio 2005 Service Pack 1 (KB2251481) to add detection for related software listed in the update FAQ. There were no changes to the...
affectedsoftware
august 2011
compromise
detection change
disco file
information disclosure
kb2251481
microsoft
privately reported
security bulletin
security update
service pack
system security
update faq
user rights
visual studio
vulnerability
web service
xml editor
Bulletin Severity Rating:Important - This security update resolves a privately reported vulnerability in ASP.NET Chart controls. The vulnerability could allow information disclosure if an attacker sent a specially crafted GET request to an affected server hosting the Chart controls. Note that...