Severity Rating: Critical
Revision Note: V1.0 (October 14, 2014): Bulletin published.
Summary: This security update resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially...
Today, we provide advance notification for the release of nine Security Bulletins. Three of these updates are rated Critical, five are rated as Important, and one is rated Moderate in severity. These updates are for Microsoft Windows, Internet Explorer, Office, .NET Framework, and ASP.NET.
As...
.net framework
asp.net
bulletin
communications
critical
deployment
guidance
important
internet explorer
moderate
notification
october 2014
office
security
technology
testing
updates
webcast
windows
Severity Rating: Critical
Revision Note: V1.0 (September 9, 2014): Bulletin published.
Summary: This security update resolves one publicly disclosed and thirty-six privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution...
Severity Rating: Critical
Revision Note: V1.0 (September 9, 2014): Bulletin published.
Summary: This security update resolves one publicly disclosed and thirty-six privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution...
Severity Rating: Critical
Revision Note: V1.0 (August 12, 2014): Bulletin published.
Summary: This security update resolves one publicly disclosed and twenty-five privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution...
Severity Rating: Critical
Revision Note: V1.0 (August 12, 2014): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office file that...
Severity Rating: Critical
Revision Note: V1.0 (August 12, 2014): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office file that...
Today, as part of Update Tuesday, we released nine security updates – two rated Critical and seven rated Important – to address 37 Common Vulnerabilities & Exposures (CVEs) in SQL Server, OneNote, SharePoint, .NET, Windows and Internet Explorer (IE). We encourage you to apply all of these...
activex
august 2014
common vulnerabilities
critical
cumulative update
deployment
exploit index
exploitability
important
internet explorer
microsoft
onenote
patch management
security
sharepoint
sql server
trustworthy computing
updates
vulnerabilities
webcast
Severity Rating: Critical
Revision Note: V1.0 (July 8, 2014): Bulletin published.
Summary: This security update resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code...
Many around the globe have been following the 2014 FIFA World Cup Brazil™ closely. Regardless of which country you are supporting, many folks have been impressed by the defensive display put on by keeper Tim Howard in a loss against Belgium. It was a great performance highlighting a strong...
Severity Rating: Critical
Revision Note: V1.0 (July 8, 2014): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Journal file. An attacker...
Severity Rating: Critical
Revision Note: V1.3 (February 28, 2014): Bulletin revised to announce a detection change in the 2893294 update for Windows 8.1 for 32-bit Systems, Windows 8.1 for x64-based Systems, Windows RT 8.1, and Windows Server 2012 R2. This is a detection change only. There were...
Severity Rating: Critical
Revision Note: V1.1 (May 20, 2014): Clarified in the vulnerability FAQ what systems are primarily at risk for CVE-2014-0317. Added Update FAQ to explain why users running Windows Vista, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, or Windows Server...
Severity Rating: Critical
Revision Note: V1.1 (April 17, 2014): Revised bulletin to help clarify that although Internet Explorer 10 is not affected by the vulnerabilities described in this bulletin, an update is available for Internet Explorer 10 that includes non-security updates. See the...
administrative
attacker
bulletin
code
critical
cumulative
details
execution
explorer
impact
internet
microsoft
patch
remote
revision
rights
security
update
user
vulnerabilities
Severity Rating: Critical
Revision Note: V1.1 (February 28, 2014): Bulletin revised to announce a detection change in the 2900986 update for Windows 8.1 for 32-bit Systems, Windows 8.1 for x64-based Systems, Windows RT 8.1, and Windows Server 2012 R2. This is a detection change only. There were...
Severity Rating: Critical
Revision Note: V2.0 (January 14, 2014): Rereleased bulletin to announce the reoffering of the 2862330 update to systems running Windows 7 or Windows Server 2008 R2. See the Update FAQ for details.
Summary: This security update resolves seven privately reported...
bulletin
code execution
control
critical
drivers
exploitation
font files
january 2014
kernel
microsoft
patch
remote
rereleased
security
server 2008
update
update faq
vulnerabilities
windows
windows 7
Severity Rating: Critical
Revision Note: V1.3 (December 16, 2013): Revised bulletin to announce a detection change to correct an offering issue for Windows RT (2835361) and for Windows RT (2835364). This is a detection change only. There were no changes to the update files. Customers who have...
Severity Rating: Critical
Revision Note: V1.0 (April 8, 2014): Bulletin published.
Summary: This security update resolves six privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted webpage using...