Today, we released Link Removed to address a vulnerability in Secure Sockets Layer (SSL) 3.0 which could allow information disclosure. This is an industry-wide vulnerability that affects the protocol itself, and is not specific to Microsoft’s implementation of SSL or the Windows operating...
Severity Rating: Important
Revision Note: V1.1 (June 12, 2013): Updated the Known Issues entry in the Knowledge Base Article section from "None" to "Yes".
Summary: This security update resolves one privately reported vulnerability in Windows Kernel. The vulnerability could...
Severity Rating: Important
Revision Note: V1.0 (April 9, 2013): Bulletin published.
Summary: This security update resolves a publicly disclosed vulnerability in Microsoft Office. The vulnerability could allow elevation of privilege if an attacker sends specially crafted...
Severity Rating: Moderate
Revision Note: V1.0 (November 13, 2012): Bulletin published.
Summary: This security update resolves two privately reported vulnerabilities in Microsoft Internet Information Services (IIS). The more severe vulnerability could allow information...
Today we released Security Advisory 2755801 that addresses vulnerabilities in Adobe Flash Player in Internet Explorer 10 on Windows 8. The majority of customers have automatic updates enabled and will not need to take any action because protections will be downloaded and installed automatically...
adobe
advisory
automatic
coordination
customers
disclosure
flash player
internet explorer
management
microsoft
protection
quality
release timing
security
software
threat landscape
update
update process
vulnerabilities
windows 8
Severity Rating: Important
Revision Note: V1.0 (July 10, 2012): Bulletin published.
Summary: This security update resolves a publicly disclosed vulnerability in TLS. The vulnerability could allow information disclosure if an attacker intercepts encrypted web traffic served...
Resolves a vulnerability in ASP.NET that could allow information disclosure. An attacker that successfully exploited this vulnerability could read data, such as the view state, which was encrypted by the server.
Link Removed
Resolves a vulnerability in ASP.NET that could allow information disclosure. An attacker that successfully exploited this vulnerability could read data, such as the view state, which was encrypted by the server.
More...
During our investigation into the disclosure of confidential data shared with our Microsoft Active Protections Program (MAPP) partners, we determined that a member of the MAPP program, Hangzhou DPTech Technologies Co., Ltd., had breached our non-disclosure agreement (NDA). Microsoft takes...
Resolves a vulnerability in ASP.NET that could allow information disclosure. An attacker that successfully exploited this vulnerability could read data, such as the view state, which was encrypted by the server.
More...
Severity Rating: Critical
Revision Note: V1.0 (December 13, 2011): Bulletin published.
Summary: This security update resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted...
2011
bulletin
critical
december
disclosure
drivers
execution
font files
kernel-mode
malicious
microsoft
patch
remote code
revision
security
truetype
update
vulnerability
web page
windows
Revision Note: V2.0 (September 28, 2010): Advisory updated to reflect publication of security bulletin
Summary: Microsoft has completed the investigation into a public report of this vulnerability. We have issued MS10-070 to address this issue. For more information about this issue...
advisory
asp.net
bulletin
complaints
cve-2010-3332
disclosure
information
investigation
issue
microsoft
ms10-070
oracle
padding
public report
revision note
security
security update
september 2010
update
vulnerability
Revision Note: V2.0 (September 28, 2010): Advisory updated to reflect publication of security bulletin
Summary: Microsoft has completed the investigation into a public report of this vulnerability. We have issued MS10-070 to address this issue. For more information about this issue...
Revision Note: V2.0 (April 12, 2011): Advisory updated to reflect publication of security bulletin.
Summary: Microsoft has completed the investigation into public reports of this vulnerability. We have issued MS11-026 to address this issue. For more information about this issue...
Today, the MSRC released its Link Removed due to 404 Errort highlighting advancements of key Microsoft programs designed to help prevent and defend against online threats. The Microsoft programs featured in this paper include the following:
The Link Removed due to 404 Error (MAPP) and Link...