Make Homepage | Add To Favorites | Print Page | Submit News | Feedback | Contact | 

Your Technical Computer Information Resource!  
     
  OS Technical Updates [Page: 3 of 293] @ TACKtech Corp.  

11.08.2016 - MS16-135 - Important: Security Update for Windows Kernel-Mode Drivers (3199135) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (November 8, 2016): Click here to enter text.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application that could exploit the vulnerabilities and take control of an affected system.
Full View / NID: 62073 / Submitted by: The Zilla of Zuron

11.08.2016 - MS16-137 - Important: Security Update for Windows Authentication Methods (3199173) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (November 8, 2016): Bulletin published
Summary: This security update resolves multiple vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow elevation of privilege. To exploit this vulnerability, the attacker would first need to authenticate to the target, domain-joined system using valid user credentials. An attacker who successfully exploited this vulnerability could elevate their permissions from unprivileged user account to administrator.
Full View / NID: 62072 / Submitted by: The Zilla of Zuron

11.08.2016 - MS16-035 - Important: Security Update for .NET Framework to Address Security Feature Bypass (3141780) - Version: 2.6



View Microsoft related news. Severity Rating: Important
Revision Note: V2.6 (November 8, 2016): Revised bulletin to announce that a detection change was made to account for .NET Framework 4.6.1 hotfix rollup customers who were not being properly offered security updates applicable to the .NET Framework 4.6.1.
Summary: This security update resolves a vulnerability in Microsoft .NET Framework. The security feature bypass exists in a .NET Framework component that does not properly validate certain elements of a signed XML document.
Full View / NID: 62071 / Submitted by: The Zilla of Zuron

11.08.2016 - MS16-091 - Important: Security Update for .NET Framework (3170048) - Version: 1.1



View Microsoft related news. Severity Rating: Important
Revision Note: V1.1 (November 8, 2016):
Summary: This security update resolves a vulnerability in Microsoft .NET Framework. The vulnerability could cause information disclosure if an attacker uploads a specially crafted XML file to web-based application.
Full View / NID: 62070 / Submitted by: The Zilla of Zuron

11.08.2016 - MS16-120 - Critical: Security Update for Microsoft Graphics Component (3192884) - Version: 1.1



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.1 (November 8, 2016): Revise bulletin to announce a detection change to address an issue in supersedence, specifically in WSUS environments where various updates applicable to Windows 7 SP1 and Windows Server 2008 R2 SP1 were incorrectly marked as being superseded. This is a detection change only. There were no changes to the update files. Customers who have already successfully installed the update do not need to take any action
Summary: This security update resolves vulnerabilities in Microsoft Windows, Microsoft Office, Skype for Business, Silverlight and Microsoft Lync. The most serious of these vulnerabilities could allow remote code execution if a user either visits a specially crafted website or opens a specially crafted document. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Full View / NID: 62063 / Submitted by: The Zilla of Zuron

11.08.2016 - MS16-131 - Critical: Security Update for Microsoft Video Control (3199151) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (November 8, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution when Microsoft Video Control fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. However, an attacker must first convince a user to open either a specially crafted file or a program from either a webpage or an email message.
Full View / NID: 62062 / Submitted by: The Zilla of Zuron

11.08.2016 - MS16-139 - Important: Security Update for Windows Kernel (3199720) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (November 8, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker runs a specially crafted application to access sensitive information. A locally authenticated attacker could attempt to exploit this vulnerability by running a specially crafted application. An attacker can gain access to information not intended to be available to the user by using this method.
Full View / NID: 62051 / Submitted by: The Zilla of Zuron

11.08.2016 - MS16-130 - Critical: Security Update for Microsoft Windows (3199172) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (November 8, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if a locally authenticated attacker runs a specially crafted application.
Full View / NID: 62050 / Submitted by: The Zilla of Zuron

11.08.2016 - MS16-133 - Important: Security Update for Microsoft Office (3199168) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (November 8, 2016): Bulletin published
Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Full View / NID: 62049 / Submitted by: The Zilla of Zuron

11.08.2016 - MS16-136 - Important: Security Update for SQL Server (3199641) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (November 8, 2016): Bulletin Published.
Summary: This security update resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow an attacker could to gain elevated privileges that could be used to view, change, or delete data; or create new accounts. The security update addresses these most severe vulnerabilities by correcting how SQL Server handles pointer casting.
Full View / NID: 62048 / Submitted by: The Zilla of Zuron

11.08.2016 - MS16-138 - Important: Security Update for Microsoft Virtual Hard Disk Driver (3199647) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (November 8, 2016): Bulletin published.
Summary: The Windows Virtual Hard Disk Driver improperly handles user access to certain files. An attacker can manipulate files in locations not intended to be available to the user by exploiting this vulnerability.
Full View / NID: 62047 / Submitted by: The Zilla of Zuron

10.27.2016 - MS16-128 - Critical: Security Update for Adobe Flash Player (3201860) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (October 27, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Adobe Flash Player when installed on all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, and Windows 10.
Full View / NID: 61898 / Submitted by: The Zilla of Zuron

10.21.2016 - MS16-110 - Important: Security Update for Microsoft Windows (3178467) - Version: 1.1



View Microsoft related news. Severity Rating: Important
Revision Note: V1.1 (October 21, 2016): Bulletin update to remove duplicated sections. This is an informational change only.
Summary: This security update resolves multiple vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker creates a specially crafted request and executes arbitrary code with elevated permissions on a target system.
Full View / NID: 61817 / Submitted by: The Zilla of Zuron

10.12.2016 - MS16-121 - Critical: Security Update for Microsoft Office (3194063) - Version: 1.1



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.1 (October 12, 2016): This bulletin has been revised to change the severity to Critical. This is an informational change only.
Summary: This security update resolves a vulnerability in Microsoft Office. An Office RTF remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle RTF files. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user.
Full View / NID: 61697 / Submitted by: The Zilla of Zuron

10.11.2016 - MS16-127 - Critical: Security Update for Adobe Flash Player (3194343) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (October 11, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Adobe Flash Player when installed on all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, and Windows 10.
Full View / NID: 61708 / Submitted by: The Zilla of Zuron

10.11.2016 - MS16-123 - Important: Security Update for Windows Kernel-Mode Drivers (3192892) - Version: 1.1



View Microsoft related news. Severity Rating: Important
Revision Note: V1.1 (October 11, 2016): Bulletin revised to correct a CVE ID. CVE-2016-7191 has been changed to CVE-2016-7211. This is an informational change only. Customers who have successfully installed the updates do not need to take any further action.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application that could exploit the vulnerabilities and take control of an affected system.
Full View / NID: 61707 / Submitted by: The Zilla of Zuron

10.11.2016 - MS16-101 - Important: Security Update for Windows Authentication Methods (3178465) - Version: 2.0



View Microsoft related news. Severity Rating: Important
Revision Note: V2.0 (October 11, 2016): To address issues with Security Update 3167679, Microsoft re-released MS16-101 to comprehensively address known issues with CVE-2016-3237. See Microsoft Knowledge Base Article 3167679 for more information.
Summary: This security update resolves multiple vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow elevation of privilege if an attacker runs a specially crafted application on a domain-joined system.
Full View / NID: 61706 / Submitted by: The Zilla of Zuron

10.11.2016 - MS16-119 - Critical: Cumulative Security Update for Microsoft Edge (3192890) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (October 11, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users with administrative user rights.
Full View / NID: 61677 / Submitted by: The Zilla of Zuron

10.11.2016 - MS16-118 - Critical: Cumulative Security Update for Internet Explorer (3192887) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (October 11, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Full View / NID: 61676 / Submitted by: The Zilla of Zuron

10.11.2016 - MS16-120 - Critical: Security Update for Microsoft Graphics Component (3192884) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (October 11, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows, Microsoft Office, Skype for Business, Silverlight and Microsoft Lync. The most serious of these vulnerabilities could allow remote code execution if a user either visits a specially crafted website or opens a specially crafted document. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Full View / NID: 61675 / Submitted by: The Zilla of Zuron
  Most Viewed  
  Quick Links  
  Top Affiliates  
........