severity

  1. MS11-703 - Important: Test MNP bulletin #3 (test0703)

    Bulletin Severity Rating:None - Test MNP bulletin #3 Link Removed due to 404 Error
  2. MS11-702 - Moderate: Test MNP bulletin #2 (test0702) - Version:1.0

    Severity Rating: None - Revision Note: V1.0 (June 6, 2011): Bulletin published.Summary: Test MNP bulletin #2 Link Removed due to 404 Error
  3. MS11-703 - Important: Test MNP bulletin #3 (test0703) - Version:1.0

    Severity Rating: None - Revision Note: V1.0 (June 6, 2011): Bulletin published.Summary: Test MNP bulletin #3 Link Removed due to 404 Error
  4. Fukushima vs Chernobyl

    Japanese authorities have raised the severity rating of the nuclear crisis at the damaged Fukushima Daiichi power plant to the highest level, seven. The decision reflects the ongoing release of radiation, rather than a sudden deterioration. Level seven previously only applied to the 1986...
  5. What does 'safe' mean in a nuclear disaster?

    The news out of Japan has not been good this week. Officials there raised the severity rating of the nuclear disaster at the Fukushima Daiichi power plant to the highest level, while the plant continues to dump radiation into the air and water and radiation is found in milk and drinking water in...
  6. MS11-023 - Important: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2489293

    Severity Rating: Important - Revision Note: V1.0 (April 12, 2011): Bulletin published.Summary: This security update resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a...
  7. MS11-023 - Important: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2489293

    Bulletin Severity Rating:Important - This security update resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Office file or if a user opens a...
  8. MS11-005 - Important: Vulnerability in Active Directory Could Allow Denial of Service (2478953) - Ve

    Severity Rating: Important - Revision Note: V1.0 (February 8, 2011): Bulletin published.Summary: This security update resolves a publicly disclosed vulnerability in Active Directory. The vulnerability could allow denial of service if an attacker sent a specially crafted packet to an affected...
  9. MS11-013 - Important: Vulnerabilities in Kerberos Could Allow Elevation of Privilege (2496930)

    Bulletin Severity Rating:Important - This security update resolves one privately reported vulnerability and one publicly disclosed vulnerability in Microsoft Windows. The more severe of these vulnerabilities could allow elevation of privilege if a local, authenticated attacker installs a...
  10. MS11-001 - Important: Vulnerability in Windows Backup Manager Could Allow Remote Code Execution (247

    Bulletin Severity Rating:Important - This security update resolves a publicly disclosed vulnerability in Windows Backup Manager. The vulnerability could allow remote code execution if a user opens a legitimate Windows Backup Manager file that is located in the same network directory as a...
  11. MS10-094 - Important: Vulnerability in Windows Media Encoder Could Allow Remote Code Execution (2447

    Severity Rating: Important - Revision Note: 1.0 (December 14, 2010): Bulletin published.Summary: This security update resolves a publicly disclosed vulnerability in Windows Media Encoder. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate...
  12. MS10-045 - Important: Vulnerability in Microsoft Office Outlook Could Allow Remote Code Execution (9

    Severity Rating: Important - Revision Note: V1.0 (July 13, 2010): Bulletin published.Summary: This security update resolves a privately reported vulnerability. The vulnerability could allow remote code execution if a user opened an attachment in a specially crafted e-mail message using an...