Make Homepage | Add To Favorites | Print Page | Submit News | Feedback | Contact | 

Your Technical Computer Information Resource!  
     
  OS Technical Updates [Page: 1 of 290] @ TACKtech Corp.  

09.22.2016 - MS16-107 - Critical: Security Update for Microsoft Office (3185852) - Version: 2.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V2.0 (September 22, 2016): Bulletin revised to announce the availability of the 14.6.8 update for Microsoft Office for Mac 2011 (3186805) and the 15.25 update for Microsoft Office 2016 for Mac (3186807). Customers running affected Mac software should install the appropriate update for their product to be protected from the vulnerabilities discussed in this bulletin. Customers running other Microsoft Office software do not need to take any action. See Microsoft Knowledge Base Article 3186805 and Microsoft Knowledge Base Article 3186807 for more information and download links.
Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Full View / NID: 61407 / Submitted by: The Zilla of Zuron

09.13.2016 - MS16-111 - Important: Security Update for Windows Kernel (3186973) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (September 13, 2016): Click here to enter text.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker runs a specially crafted application on a target system.
Full View / NID: 61380 / Submitted by: The Zilla of Zuron

09.13.2016 - MS16-113 - Important: Security Update for Windows Secure Kernel Mode (3185876) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (September 13, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure when Windows Secure Kernel Mode improperly handles objects in memory.
Full View / NID: 61379 / Submitted by: The Zilla of Zuron

09.13.2016 - MS16-114 - Important: Security Update for Windows SMBv1 Server (3185879) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (September 13, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. On Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 operating systems, the vulnerability could allow remote code execution if an authenticated attacker sends specially crafted packets to an affected Microsoft Server Message Block 1.0 (SMBv1) Server. The vulnerability does not impact other SMB Server versions. Although later operating systems are affected, the potential impact is denial of service.
Full View / NID: 61307 / Submitted by: The Zilla of Zuron

09.13.2016 - MS16-110 - Important: Security Update for Microsoft Windows (3178467) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (September 13, 2016): Bulletin published.
Summary: This security update resolves multiple vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker creates a specially crafted request and executes arbitrary code with elevated permissions on a target system.
Full View / NID: 61267 / Submitted by: The Zilla of Zuron

09.13.2016 - MS16-108 - Critical: Security Update for Microsoft Exchange Server (3185883) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (September 13, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Exchange Server. The most severe of the vulnerabilities could allow remote code execution in some Oracle Outside In libraries that are built into Exchange Server if an attacker sends an email with a specially crafted attachment to a vulnerable Exchange server.
Full View / NID: 61262 / Submitted by: The Zilla of Zuron

09.13.2016 - MS16-109 - Important: Security Update for Silverlight (3182373) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (September 13, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Silverlight. The vulnerability could allow remote code execution if a user visits a compromised website that contains a specially crafted Silverlight application. An attacker would have no way to force a user to visit a compromised website. Instead, an attacker would have to convince the user to visit the website, typically by enticing the user to click a link in either an email or instant message that takes the user to the attacker's website.
Full View / NID: 61250 / Submitted by: The Zilla of Zuron

09.13.2016 - MS16-112 - Important: Security Update for Windows Lock Screen (3178469) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (September 13, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if Windows improperly allows web content to load from the Windows lock screen.
Full View / NID: 61249 / Submitted by: The Zilla of Zuron

09.13.2016 - MS16-107 - Critical: Security Update for Microsoft Office (3185852) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (September 13, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Full View / NID: 61248 / Submitted by: The Zilla of Zuron

09.13.2016 - MS16-116 - Critical: Security Update in OLE Automation for VBScript Scripting Engine (3188724) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (September 13, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker successfully convinces a user of an affected system to visit a malicious or compromised website. Note that you must install two updates to be protected from the vulnerability discussed in this bulletin: The update in this bulletin, MS16-116, and the update in MS16-104.
Full View / NID: 61243 / Submitted by: The Zilla of Zuron

09.13.2016 - MS16-117 - Critical: Security Update for Adobe Flash Player (3188128) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (September 13, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Adobe Flash Player when installed on all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, and Windows 10.
Full View / NID: 61224 / Submitted by: The Zilla of Zuron

09.13.2016 - MS16-104 - Critical: Cumulative Security Update for Internet Explorer (3183038) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (September 13, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Full View / NID: 61223 / Submitted by: The Zilla of Zuron

09.13.2016 - MS16-105 - Critical: Cumulative Security Update for Microsoft Edge (3183043) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (September 13, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users with administrative user rights.
Full View / NID: 61222 / Submitted by: The Zilla of Zuron

09.13.2016 - MS16-115 - Important: Security Update for Microsoft Windows PDF Library (3188733) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (September 13, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow information disclosure if a user views specially crafted PDF content online or opens a specially crafted PDF document.
Full View / NID: 61221 / Submitted by: The Zilla of Zuron

09.13.2016 - MS16-106 - Critical: Security Update for Microsoft Graphics Component (3185848) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (September 13, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user either visits a specially crafted website or opens a specially crafted document. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Full View / NID: 61220 / Submitted by: The Zilla of Zuron

09.02.2016 - MS16-101 - Important: Security Update for Windows Authentication Methods (3178465) - Version: 1.2



View Microsoft related news. Severity Rating: Important
Revision Note: V1.2 (September 2, 2016): Bulletin revised to correct the Mitigating Factors section for CVE-2016-3237 — Microsoft has not identified any mitigations for this vulnerability.
Summary: This security update resolves multiple vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow elevation of privilege if an attacker runs a specially crafted application on a domain-joined system.
Full View / NID: 61084 / Submitted by: The Zilla of Zuron

08.22.2016 - MS16-099 - Critical: Security Update for Microsoft Office (3177451) - Version: 2.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V2.0 (August 22, 2016): V2.0 (August 22, 2016): Bulletin revised to announce the availability of the 14.6.7 update for Microsoft Office for Mac 2011 (3179162) and the 15.25 update for Microsoft Office 2016 for Mac (3179163). Customers running affected Mac software should install the appropriate update for their product to be protected from the vulnerabilities discussed in this bulletin. Customers running other Microsoft Office software do not need to take any action. See Microsoft Knowledge Base Article 3179162 and Microsoft Knowledge Base Article 3179163 for more information and download links.
Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Full View / NID: 60904 / Submitted by: The Zilla of Zuron

08.18.2016 - MS16-075 - Important: Security Update for Windows SMB Server (3164038) - Version: 1.1



View Microsoft related news. Severity Rating: Important
Revision Note: V1.1 (August 18, 2016): Bulletin revised to correct the Updates Replaced references for Window 10 and Windows 10 Version 1511 in the Affected Software table. This is an informational change only.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application.
Full View / NID: 60881 / Submitted by: The Zilla of Zuron

08.12.2016 - MS16-102 - Critical: Security Update for Microsoft Windows PDF Library (3182248) - Version: 1.2



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.2 (August 12, 2016): Bulletin revised to correct the updates replaced for Window 8.1, Windows Server 2012, and Windows Server 2012. Bulletin revised to remove Windows 10 version 1607 from the affected software table because it is not affected. This is an informational change only. Customers who have already successfully installed the update do not need to take any action.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user views specially crafted PDF content online or opens a specially crafted PDF document. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Full View / NID: 60775 / Submitted by: The Zilla of Zuron

08.11.2016 - MS16-102 - Critical: Security Update for Microsoft Windows PDF Library (3182248) - Version: 1.1



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.1 (August 11, 2016): Bulletin revised to remove Windows Server 2012 R2 (Server Core installation) from the affected software table because the Server Core version of Windows Server 2012 R2 is not affected. This is an informational change only. Customers who have already successfully installed the update do not need to take any action
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user views specially crafted PDF content online or opens a specially crafted PDF document. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Full View / NID: 60769 / Submitted by: The Zilla of Zuron
  Most Viewed  
  Quick Links  
  Top Affiliates  
........