Make Homepage | Add To Favorites | Print Page | Submit News | Feedback | Contact | 

Your Technical Computer Information Resource!  
     
 
Keep TACKtech.com free by purchasing something from our sponsors.
Make a financial contribution
  OS Technical Updates [Page: 7 of 289] @ TACKtech Corp.  

02.09.2016 - MS16-012 - Critical: Security Update for Microsoft Windows PDF Library to Address Remote Code Execution (3138938) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (February 9, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if Microsoft Windows PDF Library improperly handles application programming interface (API) calls, which could allow an attacker to run arbitrary code on the user’s system. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. However, an attacker would have no way to force users to download or open a malicious PDF document.
Full View / NID: 58036 / Submitted by: The Zilla of Zuron

02.09.2016 - MS16-011 - Critical: Cumulative Security Update for Microsoft Edge (3134225) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (February 9, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Edge. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Full View / NID: 58019 / Submitted by: The Zilla of Zuron

02.09.2016 - MS16-018 - Important: Security Update for Windows Kernel-Mode Drivers to Address Elevation of Privilege (3136082) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (February 9, 2016): Click here to enter text.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to visit a malicious website.
Full View / NID: 58003 / Submitted by: The Zilla of Zuron

02.09.2016 - MS16-009 - Critical: Cumulative Security Update for Internet Explorer (3134220) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (February 9, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Full View / NID: 58002 / Submitted by: The Zilla of Zuron

02.09.2016 - MS15-015 - Critical: Security Update for Microsoft Office to Address Remote Code Execution (3134226) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (February 9, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Full View / NID: 58001 / Submitted by: The Zilla of Zuron

02.09.2016 - MS15-016 - Important: Security Update for WebDAV to Address Elevation of Privilege (3136041) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (February 9, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker uses the Microsoft Web Distributed Authoring and Versioning (WebDAV) client to improperly validate input.
Full View / NID: 58000 / Submitted by: The Zilla of Zuron

02.09.2016 - MS15-118 - Important: Security Update for .NET Framework to Address Elevation of Privilege (3104507) - Version: 2.0



View Microsoft related news. Severity Rating: Important
Revision Note: V2.0 (February 9, 2016): Revised bulletin to announce the re-release of update 3098785 to address known issues, discussed in Microsoft Knowledge Base Article 3318750, that customers who are running Windows 8.1, Windows RT, or Windows Server 2012 R2 may have experienced after installing .NET Framework 4.6 on a machine that already has a fully-updated version of .NET Framework 4.5.x. Microsoft recommends that customers scan for new updates to download, and install the re-released update 3098785. For more information see Microsoft Knowledge Base Article 3318750.
Summary: This security update resolves vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow elevation of privilege if an attacker convinces a user to navigate to a compromised website or open a link in a specially crafted email that is designed to inject client-side code into the user’s browser.
Full View / NID: 57999 / Submitted by: The Zilla of Zuron

02.09.2016 - MS15-101 - Important: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege (3089662) - Version: 1.2



View Microsoft related news. Severity Rating: Important
Revision Note: V1.2 (February 9, 2016): Revised bulletin to announce a detection change for the 3074554 update for .NET Framework 4.6. This is an informational change only. Customers who have already successfully updated their systems do not need to take any action.
Summary: This security update resolves vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow elevation of privilege if a user runs a specially crafted .NET application. However, in all cases, an attacker would have no way to force users to run the application; an attacker would have to convince users to do so.
Full View / NID: 57998 / Submitted by: The Zilla of Zuron

02.09.2016 - MS15-012 - Critical: Security Update for Microsoft Windows PDF Library to Address Remote Code Execution (3081682) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (February 9, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if Microsoft Windows PDF Library improperly handles application programming interface (API) calls, which could allow an attacker to run arbitrary code on the user’s system. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. However, an attacker would have no way to force users to download or open a malicious PDF document.
Full View / NID: 57997 / Submitted by: The Zilla of Zuron

01.27.2016 - MS15-106 - Critical: Cumulative Security Update for Internet Explorer (3096441) - Version: 2.1



View Microsoft related news. Severity Rating: Critical
Revision Note: V2.1 (January 27, 2016): Bulletin revised to add CVE-2015-6184. This is an informational change only.
Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Full View / NID: 57836 / Submitted by: The Zilla of Zuron

01.27.2016 - MS16-007 - Important: Security Update for Microsoft Windows to Address Remote Code Execution (3124901) - Version: 1.1



View Microsoft related news. Severity Rating: Important
Revision Note: V1.1 (January 27, 2016): 1) Added an Update FAQ to explain that only certain versions of aepic.dll are affected by CVE-2016-0018; therefore, some customers will not be offered update 3121461. 2) Added an Update FAQ to explain why some customers are not being offered update 3109560. These are informational change only. Customers who have already successfully installed the updates do not need to take any further action.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker is able to log on to a target system and run a specially crafted application.
Full View / NID: 57835 / Submitted by: The Zilla of Zuron

01.14.2016 - MS16-006 - Critical: Security Update for Silverlight to Address Remote Code Execution (3126036) - Version: 1.1



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.1 (January 14, 2016): Revised the exploit status of CVE-2016-0034. At the time this security bulletin was originally issued, Microsoft received a report that could indicate a limited attack attempting to exploit this vulnerability. This is an informational change only. Customers who have successfully installed the update do not need to take any further action.
Summary: This security update resolves a vulnerability in Microsoft Silverlight. The vulnerability could allow remote code execution if a user visits a compromised website that contains a specially crafted Silverlight application. An attacker would have no way to force users to visit a compromised website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email or instant message that takes users to the attacker's website.
Full View / NID: 57664 / Submitted by: The Zilla of Zuron

01.13.2016 - MS16-004 - Critical: Security Update for Microsoft Office to Address Remote Code Execution (3124585) - Version: 1.1



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.1 (January 13, 2016): For CVE-2016-0010, clarified that the Preview Pane is an attack vector for this vulnerability.
Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Full View / NID: 57651 / Submitted by: The Zilla of Zuron

01.13.2016 - MS16-005 - Critical: Security Update for Windows Kernel-Mode Drivers to Address Remote Code Execution (3124584) - Version: 1.1



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.1 (January 13, 2016): Corrected severity and impact entries for Windows 10 in the Affected Software and Vulnerability Severity Ratings table. This is an informational change only. Customers who have successfully installed the update do not need to take any further action.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to visit a malicious website.
Full View / NID: 57650 / Submitted by: The Zilla of Zuron

01.12.2016 - MS16-008 - Important: Security Update for Windows Kernel to Address Elevation of Privilege (3124605) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (January 12, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application.
Full View / NID: 57695 / Submitted by: The Zilla of Zuron

01.12.2016 - MS16-007 - Important: Security Update for Microsoft Windows to Address Remote Code Execution (3124901) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (January 12, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker is able to log on to a target system and run a specially crafted application.
Full View / NID: 57675 / Submitted by: The Zilla of Zuron

01.12.2016 - MS16-010 - Important: Security Update in Microsoft Exchange Server to Address Spoofing (3124557) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (January 12, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Exchange Server. The most severe of the vulnerabilities could allow spoofing if Outlook Web Access (OWA) fails to properly handle web requests, and sanitize user input and email content.
Full View / NID: 57636 / Submitted by: The Zilla of Zuron

01.12.2016 - MS16-002 - Critical: Cumulative Security Update for Microsoft Edge (3124904) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (January 12, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Edge. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Full View / NID: 57634 / Submitted by: The Zilla of Zuron

01.12.2016 - MS16-001 - Critical: Cumulative Security Update for Internet Explorer (3124903) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (January 12, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Full View / NID: 57633 / Submitted by: The Zilla of Zuron

01.12.2016 - MS16-003 - Critical: Cumulative Security Update for JScript and VBScript to Address Remote Code Execution (3125540) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (January 12, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visits a specially crafted website. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Full View / NID: 57632 / Submitted by: The Zilla of Zuron
  Most Viewed  
  Quick Links  
  Top Affiliates  
........