Severity Rating: Important
Revision Note: V1.0 (August 11, 2015): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker forces an encrypted Secure Socket Layer (SSL) 2.0 session with a...
attack
august 2015
cybersecurity
encryption
important
information disclosure
maintenance
man-in-the-middle
microsoft windows
ms15-089
network security
patch
revisionnote
security update
ssl 2.0
system update
threat
traffic decryption
vulnerability
webdav
Severity Rating: Important
Revision Note: V1.0 (August 11, 2015): Bulletin published.
Summary: This security update helps to resolve an information disclosure vulnerability in Microsoft Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability an attacker would first have to...
bug fix
command line
exploitation
information disclosure
internet explorer
microsoft office
ms15-088
notepad
office updates
patch
powerpoint
revisionnote
risk mitigation
security
software security
software vulnerability
technical bulletin
update
vulnerability
windows
Severity Rating: Critical
Revision Note: V1.0 (August 11, 2015): Bulletin published.
Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet...
administrative
august 2015
bulletin
critical
cumulative
exploit
internet explorer
ms15-079
remote code execution
revisionnote
security update
user impact
user rights
vulnerabilities
webpage
Severity Rating: None
Revision Note: V1.0 (August 11, 2015): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker inserts a malicious USB device into a target system. An attacker could...
Severity Rating: Critical
Revision Note: V1.0 (August 11, 2015): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An...
Severity Rating: Critical
Revision Note: V1.0 (July 20, 2015): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that...
Severity Rating: Important
Revision Note: V1.0 (July 14, 2015): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow Remote Code Execution if an attacker first places a specially crafted dynamic link library (DLL) file...
attacker
control
cybersecurity
dll
exploitation
malware
microsoft
ms15-069
patch
remote code execution
revisionnote
rtf file
security
severity rating
system protection
update
user rights
vulnerabilities
windows
Severity Rating: Important
Revision Note: V1.0 (July 14, 2015): Bulletin published
Summary: This security update resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially crafted query that is...
Severity Rating: Important
Revision Note: V1.0 (July 14, 2015): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow Remote Code Execution if an attacker first places a specially crafted dynamic link library (DLL) file...
attack
control
cybersecurity
dll
exploitation
important
malware
microsoft
ms15-069
patch
protection
remote code execution
revisionnote
rtf
security
severity rating
update
user rights
vulnerability
windows
Severity Rating: Important
Revision Note: V1.0 (July 14, 2015): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An...
administrative rights
arbitrary code
bulletin
microsoft office
ms15-070
remote code execution
revisionnote
security update
severity rating
technet
user rights
vulnerabilities
Severity Rating: Important
Revision Note: V1.0 (July 14, 2015): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to a target system and runs a specially crafted...
accounts
arbitrary code
attack
bulletin
control
cve
elevation of privilege
important
july 2015
microsoft
ms15-077
patch
programs
revisionnote
security update
software
system
vulnerability
windows
Severity Rating: Critical
Revision Note: V1.0 (July 14, 2015): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sends a specially crafted sequence of packets to a targeted system...
Severity Rating: Important
Revision Note: V1.0 (July 14, 2015): Advisory published
Summary: Microsoft is releasing this security advisory to inform customers that an update to the Microsoft Malicious Software Removal Tool (MSRT) is available that addresses a security vulnerability that was...
Severity Rating: Important
Revision Note: V1.0 (June 9, 2015): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Exchange Server. The most severe of the vulnerabilities could allow elevation of privilege if a user clicks a specially crafted URL that takes...
Severity Rating: Critical
Revision Note: V1.0 (June 9, 2015): Bulletin published.
Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet...
administration
attack
browser security
critical
cumulative
exploit
internet explorer
june 2015
microsoft
ms15-056
patch
remote code execution
revisionnote
security update
systems
technical
updates
user rights
vulnerabilities
webpage
Severity Rating: Important
Revision Note: V1.0 (May 12, 2015): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Silverlight. The vulnerability could allow elevation of privilege if a specially crafted Silverlight application is run on an affected system. To...
application
attacker
crafted application
cybersecurity
elevation of privilege
important
july 2015
microsoft
ms15-049
patch
privilege escalation
revisionnote
security
silverlight
system security
technical documentation
update
user security
vulnerability
Severity Rating: Important
Revision Note: V1.0 (May 12, 2015): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure when Secure Channel (Schannel) allows the use of a weak Diffie-Hellman ephemeral...
attacks
bit length
bulletin
configuration
dhe
diffie-hellman
encryption
information disclosure
key exchange
microsoft
minimum key length
revisionnote
schannel
security
server
severity rating
tls
update
vulnerability
windows
Severity Rating: Important
Revision Note: V1.0 (April 14, 2015): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. An attacker who successfully exploited the vulnerability could leverage a known invalid task to cause Task Scheduler to run a...
administrator
april 2015
bulletin
cybersecurity
data protection
elevation
exploitation
microsoft
revisionnote
security
security advisory
software
system account
task scheduler
update
user rights
vulnerability
windows
Severity Rating: Critical
Revision Note: V1.0 (April 14, 2015): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sends a specially crafted HTTP request to an affected Windows...
Revision Note: V1.0 (March 16, 2015): Advisory published.
Summary: Microsoft is aware of an improperly issued SSL certificate for the domain “live.fi” that could be used in attempts to spoof content, perform phishing attacks, or perform man-in-the-middle attacks. This issue affects all supported...