Revision Note: V1.0 (May 14, 2013): Advisory published.
Summary: Microsoft is releasing this security advisory to help ensure customers are aware that an update to the Microsoft Malware Protection Engine also addresses a security vulnerability reported to Microsoft. The update addresses a...
Severity Rating: Critical
Revision Note: V1.0 (July 9, 2013): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted media...
Original release date: May 14, 2013
Systems Affected
Microsoft Windows
Internet Explorer
Microsoft .NET Framework
Microsoft Lync
Microsoft Office
Microsoft Windows Essentials
Overview Select Microsoft software products contain multiple vulnerabilities. Microsoft has released updates...
.net framework
automatic updates
codeexecution
denial of service
essentials
internet explorer
lync
may 2013
microsoft
office
patch management
remote access
security
security bulletin
system administration
system security
updates
us-cert
vulnerabilities
windows
We have updated Security Advisory 2847140 to include an easy, one-click Fix it to address the known attack vectors. The Fix it is available to all customers and helps prevent known attacks that leverage the vulnerability to execute code and should not affect your ability to browse the Web...
advisory
codeexecution
customer notice
fixit
internet explorer
kba
known issues
monthly bulletin
patch
protection
security
threat monitoring
update
user awareness
vulnerability
web browsing
Original release date: April 10, 2013
Systems Affected
Microsoft Windows
Microsoft Remote Desktop Client
Microsoft Antimalware Client
Microsoft Sharepoint
Overview Select Microsoft software products contain multiple vulnerabilities. Microsoft has released updates to address these...
Severity Rating: Important
Revision Note: V1.0 (April 9, 2013): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in the Microsoft Antimalware Client. The vulnerability could allow elevation of privilege due to the pathnames used...
Severity Rating: Critical
Revision Note: V1.0 (March 12, 2013): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Microsoft Silverlight. The vulnerability could allow remote code execution if an attacker hosts a website that...
Original release date: March 05, 2013
Systems Affected
Any system using Oracle Java 7, 6, 5 (1.7, 1.6, 1.5) including
Java Platform Standard Edition 7 (Java SE 7)
Java Platform Standard Edition 6 (Java SE 6)
Java Platform Standard Edition 6 (Java SE 5)
Java SE Development Kit (JDK...
Severity Rating: Critical
Revision Note: V1.1 (January 8, 2013): Corrected download links for Microsoft XML Core Services 3.0 on Windows Server 2003 with SP2 for Itanium-based Systems and for Microsoft XML Core Services 6.0 when installed on Windows Server 2003 with SP2 for...
affected software
attack vector
codeexecution
critical update
email threats
information change
internet explorer
microsoft xml
ms13-002
remote codeexecution
revision note
security
security update
server core
service pack
update
users
vulnerabilities
windows server
We have updated Security Advisory 2749920 to include the Fix it we discussed in Saturday’s blog post. This easy, one-click Fix it is Link Removed to everyone and prevents the vulnerability from being used for code execution without affecting your ability to browse the Web. Additionally...
Revision Note: V1.0 (July 10, 2012): Advisory published.
Summary: Microsoft is announcing the availability of an automated Microsoft Fix it solution that disables the Windows Sidebar and Gadgets on supported editions of Windows Vista and Windows 7. Disabling the Windows Sidebar and...
Revision Note: V1.0 (June 12, 2012): Advisory published.
Summary: Microsoft is investigating reports of a vulnerability in Microsoft XML Core Services. The vulnerability could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker...
Severity Rating: Critical
Revision Note: V1.0 (June 12): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in the Remote Desktop Protocol. The vulnerability could allow remote code execution if an attacker sends a sequence of...
Severity Rating: Critical
Revision Note: V1.0 (March 13, 2012): Bulletin published.
Summary: This security update resolves two privately reported vulnerabilities in the Remote Desktop Protocol. The more severe of these vulnerabilities could allow remote code execution if an...
Hello,
Have you ever wondered why bulletins group particular issues together? Or one set of products and not another? Well today Jonathan Ness has posted an insightful Security Research & Defense (SRD) blog discussing some of the nuances and packaging decisions that went into MS12-034. This is...
april
blog
bulletin
codeexecution
critical
deployment
framework
management
microsoft
nuances
office
process
research
security
silverlight
technical
updates
vulnerability
webcast
windows
Resolves a vulnerability in the Windows kernel-mode drivers that could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that embeds TrueType font files.
More...
Resolves a vulnerability in Windows that could allow remote code execution if a user viewed content rendered in a specially crafted Embedded OpenType (EOT) font in any of the three client applications that can render EOT fonts.
More...
Java and .NET are like twins separated at birth, but what if you actually want to run your Java code on .NET? IKVM.NET aims to provide a full Java platform on top of the .NET Framework and in this talk we'll look at how this is accomplished and what the challenges are.
Link Removed
More...