Make Homepage | Add To Favorites | Print Page | Submit News | Feedback | Contact | 

Your Technical Computer Information Resource!  
     
  OS Technical Updates [Page: 4 of 286] @ TACKtech Corp.  

02.19.2016 - MS16-001 - Critical: Cumulative Security Update for Internet Explorer (3124903) - Version: 1.1



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.1 (February 19, 2016): In the Affected Software table, removed the severity and impact entries for Internet Explorer on all applicable versions of Microsoft Windows. Internet Explorer 7 is not affected by the vulnerabilities discussed in this bulletin; however, customers running Internet Explorer 7 will still be offered the 3124275 update. Microsoft recommends that customers install update 3124275 on systems that are running Internet Explorer 7 to receive the applicable non-security fixes listed in Microsoft Knowledge Base Article 3124275. This is an informational change only.
Summary: This security update resolves vulnerabilities in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Full View / NID: 58162 / Submitted by: The Zilla of Zuron

02.16.2016 - MS16-015 - Critical: Security Update for Microsoft Office to Address Remote Code Execution (3134226) - Version: 2.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V2.0 (February 16, 2016): Bulletin revised to announce that the 3134241 update is available for Microsoft Office 2016 for Mac, and the 3137721 update is available for Microsoft Office for Mac 2011. For more information, see Microsoft Knowledge Base Article 3134241 and Microsoft Knowledge Base Article 3137721.
Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Full View / NID: 58107 / Submitted by: The Zilla of Zuron

02.12.2016 - MS16-022 - Critical: Security Update for Adobe Flash Player (3135782) - Version: 1.1



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.1 (February 12, 2016): Revised bulletin to add links to update 3135782 on the Download Center for Windows 8.1 for 32-bit Systems, Windows 8.1 for x64-based Systems, Windows Server 2012, and Windows Server 2012 R2. This is an informational change only. Customers who have already successfully installed the update do not need to take any further action.
Summary: This security update resolves vulnerabilities in Adobe Flash Player when installed on all supported editions of Windows Server 2012, Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, Windows 10, and Windows 10 Version 1511. For more information, see the Affected Software section. The update addresses the vulnerabilities in Adobe Flash Player by updating the affected Adobe Flash libraries contained within Internet Explorer 10, Internet Explorer 11, and Microsoft Edge.
Full View / NID: 58063 / Submitted by: The Zilla of Zuron

02.10.2016 - MS16-014 - Important: Security Update for Microsoft Windows to Address Remote Code Execution (3134228) - Version: 2.0



View Microsoft related news. Severity Rating: Important
Revision Note: V2.0 (February 10, 2016): Bulletin revised to announce the availability of update 3126041 for Microsoft Windows Vista, Windows Server 2008, Windows Server 2008 for Itanium-based Systems, Windows 8.1, and Windows Server 2012 R2. Customers should apply the applicable updates to be protected from the vulnerabilities discussed in this bulletin. The majority of customers have automatic updating enabled and will not need to take any action because the updates will be downloaded and installed automatically.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker is able to log on to a target system and run a specially crafted application.
Full View / NID: 58037 / Submitted by: The Zilla of Zuron

02.09.2016 - MS16-013 - Critical: Security Update for Windows Journal to Address Remote Code Execution (3134811) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (February 9, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Journal file. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Full View / NID: 58077 / Submitted by: The Zilla of Zuron

02.09.2016 - MS15-128 - Critical: Security Update for Microsoft Graphics Component to Address Remote Code Execution (3104503) - Version: 1.1



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.1 (February 9, 2016): Revised bulletin to correct the updates replaced for .NET Framework 3.5.1 installed on supported editions of Windows 7 and Windows Server 2008 R2. This is an informational change only. There were no changes to the update files. Customers who have already successfully updated their systems do not need to take any action.
Summary: This security update resolves vulnerabilities in Microsoft Windows, .NET Framework, Microsoft Office, Skype for Business, Microsoft Lync, and Silverlight. The vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a webpage that contains specially crafted embedded fonts.
Full View / NID: 58060 / Submitted by: The Zilla of Zuron

02.09.2016 - MS16-022 - Critical: Security Update for Adobe Flash Player (3135782) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (February 9, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Adobe Flash Player when installed on all supported editions of Windows Server 2012, Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, Windows 10, and Windows 10 Version 1511. For more information, see the Affected Software section. The update addresses the vulnerabilities in Adobe Flash Player by updating the affected Adobe Flash libraries contained within Internet Explorer 10, Internet Explorer 11, and Microsoft Edge.
Full View / NID: 58059 / Submitted by: The Zilla of Zuron

02.09.2016 - MS16-021 - Important: Security Update for NPS RADIUS Server to Address Denial of Service (3133043) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (February 9, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could cause denial of service on a Network Policy Server (NPS) if an attacker sends specially crafted username strings to the NPS, which could prevent RADIUS authentication on the NPS.
Full View / NID: 58058 / Submitted by: The Zilla of Zuron

02.09.2016 - MS16-016 - Important: Security Update for WebDAV to Address Elevation of Privilege (3136041) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (February 9, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker uses the Microsoft Web Distributed Authoring and Versioning (WebDAV) client to improperly validate input.
Full View / NID: 58046 / Submitted by: The Zilla of Zuron

02.09.2016 - MS16-015 - Critical: Security Update for Microsoft Office to Address Remote Code Execution (3134226) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (February 9, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Full View / NID: 58039 / Submitted by: The Zilla of Zuron

02.09.2016 - MS16-017 - Important: Security Update for Remote Desktop Display Driver to Address Elevation of Privilege (3134700) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (February 9, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an authenticated attacker logs on to the target system using RDP and sends specially crafted data over the connection. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk.
Full View / NID: 58038 / Submitted by: The Zilla of Zuron

02.09.2016 - MS16-012 - Critical: Security Update for Microsoft Windows PDF Library to Address Remote Code Execution (3138938) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (February 9, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if Microsoft Windows PDF Library improperly handles application programming interface (API) calls, which could allow an attacker to run arbitrary code on the user’s system. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. However, an attacker would have no way to force users to download or open a malicious PDF document.
Full View / NID: 58036 / Submitted by: The Zilla of Zuron

02.09.2016 - MS16-011 - Critical: Cumulative Security Update for Microsoft Edge (3134225) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (February 9, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Edge. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Full View / NID: 58019 / Submitted by: The Zilla of Zuron

02.09.2016 - MS16-018 - Important: Security Update for Windows Kernel-Mode Drivers to Address Elevation of Privilege (3136082) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (February 9, 2016): Click here to enter text.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to visit a malicious website.
Full View / NID: 58003 / Submitted by: The Zilla of Zuron

02.09.2016 - MS16-009 - Critical: Cumulative Security Update for Internet Explorer (3134220) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (February 9, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Full View / NID: 58002 / Submitted by: The Zilla of Zuron

02.09.2016 - MS15-015 - Critical: Security Update for Microsoft Office to Address Remote Code Execution (3134226) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (February 9, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Full View / NID: 58001 / Submitted by: The Zilla of Zuron

02.09.2016 - MS15-016 - Important: Security Update for WebDAV to Address Elevation of Privilege (3136041) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (February 9, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker uses the Microsoft Web Distributed Authoring and Versioning (WebDAV) client to improperly validate input.
Full View / NID: 58000 / Submitted by: The Zilla of Zuron

02.09.2016 - MS15-118 - Important: Security Update for .NET Framework to Address Elevation of Privilege (3104507) - Version: 2.0



View Microsoft related news. Severity Rating: Important
Revision Note: V2.0 (February 9, 2016): Revised bulletin to announce the re-release of update 3098785 to address known issues, discussed in Microsoft Knowledge Base Article 3318750, that customers who are running Windows 8.1, Windows RT, or Windows Server 2012 R2 may have experienced after installing .NET Framework 4.6 on a machine that already has a fully-updated version of .NET Framework 4.5.x. Microsoft recommends that customers scan for new updates to download, and install the re-released update 3098785. For more information see Microsoft Knowledge Base Article 3318750.
Summary: This security update resolves vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow elevation of privilege if an attacker convinces a user to navigate to a compromised website or open a link in a specially crafted email that is designed to inject client-side code into the user’s browser.
Full View / NID: 57999 / Submitted by: The Zilla of Zuron

02.09.2016 - MS15-101 - Important: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege (3089662) - Version: 1.2



View Microsoft related news. Severity Rating: Important
Revision Note: V1.2 (February 9, 2016): Revised bulletin to announce a detection change for the 3074554 update for .NET Framework 4.6. This is an informational change only. Customers who have already successfully updated their systems do not need to take any action.
Summary: This security update resolves vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow elevation of privilege if a user runs a specially crafted .NET application. However, in all cases, an attacker would have no way to force users to run the application; an attacker would have to convince users to do so.
Full View / NID: 57998 / Submitted by: The Zilla of Zuron

02.09.2016 - MS15-012 - Critical: Security Update for Microsoft Windows PDF Library to Address Remote Code Execution (3081682) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (February 9, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if Microsoft Windows PDF Library improperly handles application programming interface (API) calls, which could allow an attacker to run arbitrary code on the user’s system. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. However, an attacker would have no way to force users to download or open a malicious PDF document.
Full View / NID: 57997 / Submitted by: The Zilla of Zuron
  Most Viewed  
  Quick Links  
  Top Affiliates  
........