Page 23 of 47 FirstFirst ... 1319202122232425262733 ... LastLast
Results 221 to 230 of 467

Thread: Microsoft Alerts

  1. #221
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation MS14-080: IE cumulative update - Known issues...

    FYI...

    KB3008923 Compromises MS Baseline Security Analyzer's Results Report
    - https://social.technet.microsoft.com...itproappcompat
    Saturday, December 13, 2014 1:11 AM
    ... confirmed KB3008923 compromises MS Baseline Security Analyzer's Results Reports by uninstalling the KB. MS BSA now works as before. I don't use IE so I can't help you there but I presume BSA uses some IE modules. I know that there are many problems with KB3008923 across many platforms...

    ... the IE cumulative update + Repair fixed the issues with BSA...
    > Marked as answer by Phantom of the Mobile 15 hours 11 minutes ago
    Wednesday, December 24, 2014 3:41 PM
    ___

    MS14-080: Cumulative security update for Internet Explorer: December 9, 2014
    > https://support.microsoft.com/KB/3008923
    Last Review: Dec 18, 2014 - Rev: 7.0
    Applies to:
    Internet Explorer 11
    Internet Explorer 10
    Windows Internet Explorer 9
    Windows Internet Explorer 8
    Windows Internet Explorer 7
    Microsoft Internet Explorer 6.0

    > Known issues with this security update
    >Issue 1:
    We are aware of some reports of functional issues on sites that use nested modal dialog boxes on Internet Explorer -11- that occur after you install this security update.
    To resolve this issue, install update 3025390. For more information, click the following article number to view the article in the Microsoft Knowledge Base:
    3025390 Some web application modal dialog boxes don't work correctly in Internet Explorer 11 after you install update 3008923
    >Issue 2:
    We are aware of some limited reports of Internet Explorer -9- crashing after you apply this security update.
    Microsoft is researching this problem and will post more information in this article when the information becomes available.
    ___

    > http://www.microsoft.com/en-us/searc...q=kb%203008923

    - https://support.microsoft.com/kb/3025390/
    Last Review: Dec 17, 2014 - Rev: 1.0
    > http://www.microsoft.com/en-us/searc...q=kb%203025390

    Last edited by AplusWebMaster; 2014-12-26 at 22:46.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  2. #222
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Question Office 2010 ActiveX Disabled - KB2553154

    FYI...

    UPDATE: Office 2010 ActiveX Disabled - December Update KB2553154
    - http://blogs.technet.com/b/office_su...kb2553154.aspx
    12 Dec 2014 - "An issue has been discovered in Security Update for Microsoft Office 2010 (KB2553154*) that disables ActiveX controls. A workaround for this issue can be found at KB3025036**."

    MS14-082: Description of the security update for Microsoft Office 2010: Dec 9, 2014
    * https://support.microsoft.com/KB/2553154
    Last Review: Dec 16, 2014 - Rev: 4.0

    "Cannot insert object" error in an ActiveX custom Office solution after you install the
    MS14-082 security update
    ** https://support.microsoft.com/kb/3025036
    Dec 30, 2014 - Rev: 7.0

    Office Updates
    - http://blogs.technet.com/b/office_su...d_engineering/
    ______

    Best / Last / End-of-the-year 2014 MS support “guesses” found:

    - http://windowssecrets.com/patch-watc...ffice-updates/
    Dec 22, 2014 - "It’s been a long year of security fixes, broken patches, and enhancements for Windows, Office, and other applications. As we close the book on 2014 updating, we’re still missing a bit of holiday cheer — there are a couple of remaining fixes for IE and Excel updates.

    MS14-080 (3008923)
    Problems with IE 11 and IE 9 rollup updates: December’s cumulative update for Internet Explorer 11 reportedly patched 14 vulnerabilities, but it also came with a few issues of its own. Soon after KB 3008923 was released, there were reports of problems with a few websites and line-of-business platforms. To patch the patch, Microsoft released KB 3025390.
    As briefly noted in MS article KB 3008923, a few IE 9 users are reporting browser crashes after installing the December update. So far, there’s no fix or workaround — Microsoft is still “researching this problem.” -All- IE users should keep in mind that Microsoft wants you running IE 11 as soon as possible. As noted in an IEBlog post, beginning Jan. 12, 2016, Microsoft will support IE 11 -only- on Win7 and Win8 workstation systems. (It will continue to support IE 9 on Vista. Support for Vista ends on April 11, 2017.)

    - What to do: IE 9 users who run into issues with KB 3008923 (MS14-080) will have to -uninstall- the update and wait for another update. IE 11 users should install KB 3025390 to fix problems with the December cumulative update.

    MS14-082: Office patch results in an Excel macro bug... MS14-082 included three updates designed to quash a vulnerability in MS Office that could lead to a remote takeover of your system. But an unintended consequent of the patch is ActiveX controls failures in Office documents. In some cases, the update breaks Excel macros. For example, if you apply the update on one PC and then save an Excel document containing ActiveX controls, macros might -fail- when the document is opened on a system that has -not- been updated with MS14-082."

    Last edited by AplusWebMaster; 2014-12-31 at 18:18.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  3. #223
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Thumbs down MS patch hangover from patch-batch of Dec 2014 ...

    FYI...

    MS patch hangover: KB 3008923, 2553154, 2726958, 3004394, 3011970
    ... a slew of December Black Tuesday patches -didn't- get fixed over the holidays.
    - http://www.infoworld.com/article/286...8-3004394.html
    Jan 6, 2015 - "December 2014 will likely go down in the annals of Windows pain as the worst patching month ever. Depending on how you count, roughly a quarter of all the patches that rolled out the Automatic Update chute on Dec. 9 have encountered problems - some quite spectacular. Microsoft's more advanced customers (the ones who figured out why their machines weren't working right) have complained bitterly. You might think that while the rest of us were downing copious quantities of eggnog and designer microbrew, the Microsoft elves would have been busy fixing what went wrong. While there's been progress, many of the problems have been abandoned. Others were given a quick band-aid and declared fixed. With one week to go before a new year of Black Tuesdays starts, we're looking at lots of dead and wounded..."
    (Much -more- detail at the infoworld URL above.)

    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  4. #224
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation Microsoft advanced notification service changes

    FYI...

    Microsoft advanced notification service changes <<<
    - https://isc.sans.edu/diary.html?storyid=19167
    2015-01-09 - "... Microsoft is changing the way in which they provide information... You can read the full blog here:
    >> http://blogs.technet.com/b/msrc/arch...s-in-2015.aspx
    In a nutshell if you want to be advised in advance you now need to register, select the products used and you will then be provided with information relating to the patches that will be released. If you are a premier customer your technical contact can provide information. The main point for me is this one:
    'Moving forward, we will provide ANS information directly to Premier customers and current organizations involved in our security programs, and will no longer make this information broadly available through a blog post and web page.'

    Now a lot of us do look at that information to plan their next patching cycle. So you will need to look at that process and see what needs changing. You'll have to rely on the information in your patching solution, or register. You can register here:
    > http://mybulletins.technet.microsoft.com/
    The dashboard that is created in the end looks nice, but for me too early to tell how useful it is at this stage, although it was slightly painful to review each bulletin. It will take a few patch cycles to sort it all out I'd say.
    Screenshot: https://isc.sans.edu/diaryimages/ima...2018_34_43.png

    So going forward you will need to adjust how you identify the patches to be applied within your environment. If you do not want to register you can just visit the main bulletins page here:
    --> https://technet.microsoft.com/en-us/.../dn631937.aspx
    This page has a list of all released bulletins."
    ___

    myBulletins Q&A: http://technet.microsoft.com/en-us/security/dn722424
    ___

    - https://technet.microsoft.com/en-us/security/bulletin
    Next release: January 13, 2015

    > http://www.microsoft.com/en-us/downl....aspx?id=36982
    Note: There are multiple files available for this download. Once you click on the "Download" button, you will be prompted to select the files you need.
    Version: 1.0
    File Name: BulletinSearch.xlsx - File Size: 1.9 MB
    MSRC-CVRF.zip - 881 KB
    Date Published: 1/5/2015

    This download offers the following items:
    1. Excel file that contains affected software, bulletin replacement, reboot requirements, and CVE information from the Microsoft security bulletins (since June 1998)
    2. Zip file that contains security bulletins in the Common Vulnerability Reporting Framework (CVRF) format (since June 2012)

    > http://www.microsoft.com/en-us/downl....aspx?id=36982
    ___

    - http://www.theinquirer.net/inquirer/...e-notification
    Jan 9 2015 - "... This is the -second- time that Microsoft has attempted to kill off the ANS. In July 2014, the company was forced to backpedal after announcing the end of ANS by email with almost no advance notification before giving the following advance notification a few days later: "We have reviewed our processes and will resume these security notifications with our monthly Advanced Notification Service on July 3 2014." Whether or not the ANS will be brought back from the boneyard a second time remains to be seen, but it may come down to feedback, especially given the -lack- of advance notification that it was to close. The previous move was due to regulations on email distribution being tightened, but this time it appears that the death knell of the ANS is more extensive. We know that many of our readers have taken a -keen- interest in the Advance Notification articles that we have written every month, and so we are as surprised as you are that there will no longer be any advance notification. But take this as advance notification that our coverage and analysis of Patch Tuesday will continue in 2015. Albeit -without- advance notification."

    - http://www.infoworld.com/article/286...fications.html
    Jan 9 2015 - "For those of us who watch every month for advance warning of Microsoft security patches - they appear on the Thursday preceding Black Tuesday, every month - yesterday came as a slap in the face. Without any warning, Microsoft abruptly stopped its free Advance Notification Service on the day we were all expecting the usual advanced warnings for the January 2015 Black Tuesday patches... Translation: If you want advanced notice of upcoming security bulletins, you have to become a 'Premier customer'... In the past year, Microsoft patching has reached breathtaking new lows, both in quantity -and- quality of patches delivered. The situation's deteriorated so much that many graybeards are beginning to wonder if Windows is so unwieldy that it's become unusable. Somehow, I don't think the powers-that-be understand the way decisions like this affect the Windows support community. I can't fathom why Microsoft would so aggressively piss-off the people who are trying to keep Windows working, over such a tiny concession."

    Last edited by AplusWebMaster; 2015-01-10 at 05:15.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  5. #225
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation MS Security Bulletin Summary - January 2015

    FYI...

    - https://technet.microsoft.com/library/security/ms15-jan
    Jan 13, 2015 - "This bulletin summary lists security bulletins released for January 2015...
    (Total of -8-)

    Microsoft Security Bulletin MS15-001 - Important
    Vulnerability in Windows Application Compatibility Cache Could Allow Elevation of Privilege (3023266)
    - https://technet.microsoft.com/library/security/MS15-001
    Important - Elevation of Privilege - Requires restart- Microsoft Windows

    Microsoft Security Bulletin MS15-002 - Critical
    Vulnerability in Windows Telnet Service Could Allow Remote Code Execution (3020393)
    - https://technet.microsoft.com/library/security/MS15-002
    Critical - Remote Code Execution - May require restart - Microsoft Windows

    Microsoft Security Bulletin MS15-003 - Important
    Vulnerability in Windows User Profile Service Could Allow Elevation of Privilege (3021674)
    - https://technet.microsoft.com/library/security/MS15-003
    Important - Elevation of Privilege - May require restart - Microsoft Windows

    Microsoft Security Bulletin MS15-004 - Important
    Vulnerability in Windows Components Could Allow Elevation of Privilege (3025421)
    - https://technet.microsoft.com/library/security/MS15-004
    Important - Elevation of Privilege - May require restart - Microsoft Windows

    Microsoft Security Bulletin MS15-005 - Important
    Vulnerability in Network Location Awareness Service Could Allow Security Feature Bypass (3022777)
    - https://technet.microsoft.com/library/security/MS15-005
    Important - Security Feature Bypass - Requires restart - Microsoft Windows

    Microsoft Security Bulletin MS15-006 - Important
    Vulnerability in Windows Error Reporting Could Allow Security Feature Bypass (3004365)
    - https://technet.microsoft.com/library/security/MS15-006
    Important - Security Feature Bypass - May require restart - Microsoft Windows

    Microsoft Security Bulletin MS15-007 - Important
    Vulnerability in Network Policy Server RADIUS Implementation Could Cause Denial of Service (3014029)
    - https://technet.microsoft.com/library/security/MS15-007
    Important - Denial of Service - May require restart - Microsoft Windows

    Microsoft Security Bulletin MS15-008 - Important
    Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (3019215)
    - https://technet.microsoft.com/library/security/MS15-008
    Important - Elevation of Privilege - Requires restart - Microsoft Windows
    ___

    - http://blogs.technet.com/b/msrc/arch...5-updates.aspx
    Jan 13, 2015 - "... We re-released one Security Bulletin:
    - MS14-080 Cumulative Security Update for Internet Explorer
    > https://technet.microsoft.com/library/security/MS14-080 *
    One Security Advisory was revised:
    - Update for Vulnerabilities in Adobe Flash Player in Internet Explorer (2755801)
    > https://technet.microsoft.com/en-us/...y/2755801.aspx ..."

    * V1.0 (December 9, 2014): Bulletin published.
    V2.0 (January 13, 2015): To address issues with Security Update 3008923, Microsoft re-released MS14-080 to comprehensively address CVE-2014-6363. In addition to installing update 3008923, customers running Explorer 10 on Windows 8, Windows Server 2012, or Window RT should also install update 3029449, which has been added with this rerelease. Customers who have already successfully installed the 3008923 update, which has not changed since its original release, do -not- need to reinstall it. See Microsoft Knowledge Base Article 3008923** for more information.
    ** https://support.microsoft.com/kb/3008923
    Last Review: Jan 13, 2015 - Rev: 8.0
    Last Review: Jan 14, 2015 - Rev: 9.0

    Office Updates
    - http://blogs.technet.com/b/office_su...d_engineering/
    ___

    - http://www.securitytracker.com/id/1031527 - MS15-001
    - http://www.securitytracker.com/id/1031523 - MS15-002
    - http://www.securitytracker.com/id/1031528 - MS15-003
    - http://www.securitytracker.com/id/1031524 - MS15-004
    - http://www.securitytracker.com/id/1031529 - MS15-005
    - http://www.securitytracker.com/id/1031530 - MS15-006
    - http://www.securitytracker.com/id/1031532 - MS15-007
    - http://www.securitytracker.com/id/1031531 - MS15-008
    ___

    ISC Analysis
    - https://isc.sans.edu/diary.html?storyid=19179
    2015-01-13 - 18:26:14 UTC

    .
    Last edited by AplusWebMaster; 2015-01-14 at 08:11.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  6. #226
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Thumbs down Relief for botched Excel patch/fixes for KB 2553154, 2726958 -missing- ...

    FYI...

    Relief for botched Excel patch/fixes for KB 2553154, 2726958 -missing- from January patch-Tuesday
    ... included a patch-of-a-patch-of-a-patch, but -lacked- several crucial fixes
    - http://www.infoworld.com/article/286...6958-botc.html
    Jan 14, 2015 - "... On Tuesday Microsoft released its crop of patches for January, including the following:
    A -new- MS14-080 / KB 3029449, which is an Internet Explorer cumulative rollup re-release of the old MS14-080 / KB 3008923, which was one of the botched-hangover-patches from December. Note the change in KB number. In certain circumstances (which I describe below) you may need to install -both- patches.
    A "critical" patch, MS15-002 / KB 3020393, for Telnet, which is a communication protocol that's 45 years old - and rarely used on modern Windows desktops. That's the -only- critical patch this month; all the others are "Important."
    A fix, MS15-003 / KB 3021674, for the zero-day User Profile Services escalation that was publicly (and controversially) reported by Google on Sunday, Jan. 11. This isn't a critical flaw in Windows because it entails escalation of privilege - elevating your session to Admin mode. In order to exploit the flaw, the miscreant has to be in the computer already.
    A fix for the other zero-day bug, ahcache.sys/NtApphelpCacheControl, which Google publicly disclosed on Dec. 29. That's MS15-001 / KB 3023266.
    Here's what we -didn't- get on Tuesday:
    A fix for the badly botched MS14-082 / KB 3017349 Office patch, which clobbers Excel ActiveX in Office 2007, 2010, and 2013, as reported on Dec. 11. There's even a newly reported problem, where default naming of controls gets all screwed up. The three component patches - KB 2726958 for Office 2013, KB 2553154 for Office 2010, and KB 2596927 for Office 2007 - are -still- being offered via Automatic Update. If you create or distribute Office macros, Microsoft continues to screw up your programs, rolling the poison pill out the Automatic Update chute. It's still way too early to tell if there are additional problems with this month's patches. I fully expect the Windows Kernel Mode driver patch, MS15-008 / KB 3019215 will figure prominently in due course, simply because Kernel Mode driver patches always seem to cause trouble.
    Here's what's happening with the re-released (but differently numbered) MS14-080 patch... This gets messy. The original MS14-080 / KB 3008923 IE rollup had all sorts of bugs. Microsoft issued a patch, KB 3025390, to fix the problems but it, in turn, caused even more problems (see the comments to my InfoWorld article). In addition, Microsoft discovered that the original KB 3008923 didn't fix a VBScript security hole, known as CVE-2014-6363. So this month, Microsoft issued an update to MS14-080 called KB 3029449 that specifically addresses the VBScript hole. As the KB 302449 article puts it:
    This package contains the VBScript 5.8 updates that are intended for Internet Explorer 10 in a Windows 8 or Windows Server 2012 environment. Install this update and the December cumulative security update for Internet Explorer.
    MS14-080 now includes these bafflegab instructions:
    To address issues with Security Update 3008923, Microsoft re-released MS14-080 to comprehensively address CVE-2014-6363. In addition to installing update 3008923, customers running Internet Explorer 10 on Windows 8, Windows Server 2012, or Window RT should also install update 3029449, which has been added with this rerelease. Customers who have already successfully installed the 3008923 update, which has not changed since its original release, do not need to reinstall it. See Microsoft Knowledge Base Article 3008923 for more information.
    It isn't at all clear if the new version of MS14-080 includes -fixes- for the problems introduced by the old MS14-080, and/or the problems introduced by KB 3025390, which was -supposed- to solve those original MS14-080 problems..."
    * http://www.infoworld.com/article/286...b-3008923.html

    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  7. #227
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation MS finally solves big problems with Surface Pro 3

    FYI...

    MS finally solves big problems with Surface Pro 3
    - http://www.infoworld.com/article/287...ace-pro-3.html
    Jan 21, 2015 - "Judging by many comments on the Microsoft Answers forum and elsewhere, Microsoft's Jan. 15 firmware update* for the Surface Pro 3 has solved almost all outstanding issues with Wi-Fi connections, hibernating, Bluetooth connectivity, battery drain on standby, Hyper-V interference with Wi-Fi, and more... It now appears that the Surface Pro 3 is relatively glitch-free and ready for the big time. That's a big step up from the problems we've seen with the last -nine- firmware patches."
    (More detail at the infoworld URL above.)
    * http://blogs.technet.com/b/surface/a...e-devices.aspx

    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  8. #228
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation Microsoft Security Advisory 2755801 - Flash updt ...

    FYI...

    Microsoft Security Advisory 2755801
    Update for Vulnerabilities in Adobe Flash Player in Internet Explorer
    - https://technet.microsoft.com/en-us/...curity/2755801
    V35.0 (Jan 22, 2015): Added the 3033408 update to the Current Update section...
    "... Affected Software: This advisory discusses the following software.
    Windows 8 for 32-bit Systems / Adobe Flash Player in Internet Explorer 10
    Windows 8 for 64-bit Systems / Adobe Flash Player in Internet Explorer 10
    Windows Server 2012 / Adobe Flash Player in Internet Explorer 10
    Windows RT / Adobe Flash Player in Internet Explorer 10
    Windows 8.1 for 32-bit Systems / Adobe Flash Player in Internet Explorer 11
    Windows 8.1 for 64-bit Systems / Adobe Flash Player in Internet Explorer 11
    Windows Server 2012 R2 / Adobe Flash Player in Internet Explorer 11
    Windows RT 8.1 / Adobe Flash Player in Internet Explorer 11
    ... The update addresses the vulnerabilities in Adobe Flash Player by updating the affected Adobe Flash libraries contained within Internet Explorer 10 and Internet Explorer 11..."

    [Link: https://support.microsoft.com/kb/3033408 ]

    Last edited by AplusWebMaster; 2015-01-23 at 00:43.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  9. #229
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation MS Update for vulnerabilities in Adobe Flash Player in IE 10/11

    FYI...

    Microsoft Security Advisory 2755801
    Update for Vulnerabilities in Adobe Flash Player in IE 10/11
    - https://technet.microsoft.com/en-us/...curity/2755801
    Updated: Jan 27, 2015
    V36.0 - "... The update addresses the vulnerabilities in Adobe Flash Player by updating the affected Adobe Flash libraries contained within Internet Explorer 10 and Internet Explorer 11..."
    > https://support.microsoft.com/kb/3035034
    ___

    - https://helpx.adobe.com/security/pro...apsb15-03.html
    Jan 27, 2015
    CVE-2015-0312: https://cve.mitre.org/cgi-bin/cvenam...=CVE-2015-0312
    "... Adobe is aware of reports that CVE-2015-0311 is actively being exploited in the wild via drive-by-download attacks against systems running Internet Explorer and Firefox on Windows 8.1 and below. Adobe recommends users update their product installations to the latest versions:
    - Users of the Adobe Flash Player desktop runtime for Windows and Macintosh should update to Adobe Flash Player 16.0.0.296.
    - Users of the Adobe Flash Player Extended Support Release should update to Adobe Flash Player 13.0.0.264.
    - Users of Adobe Flash Player for Linux should update to Adobe Flash Player 11.2.202.440.
    - Adobe Flash Player installed with Google Chrome, as well as Internet Explorer on Windows 8.x, will automatically update to version 16.0.0.296.
    > Affected software versions:
    Adobe Flash Player 16.0.0.287 and earlier versions
    Adobe Flash Player 13.0.0.262 and earlier 13.x versions
    Adobe Flash Player 11.2.202.438 and earlier versions for Linux..."
    ___

    - http://www.securitytracker.com/id/1031635
    CVE Reference: https://cve.mitre.org/cgi-bin/cvenam...=CVE-2015-0312
    Jan 27 2015

    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  10. #230
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation MS I/E 10, 11 updated Flash Player

    FYI...

    Microsoft Security Advisory 2755801
    Update for Vulnerabilities in Adobe Flash Player in Internet Explorer
    - https://technet.microsoft.com/en-us/...curity/2755801
    Updated: Feb 5, 2015 - V37.0
    "Microsoft is announcing the availability of an update for Adobe Flash Player in Internet Explorer on all supported editions of Windows 8, Windows Server 2012, Windows RT, Windows 8.1, Windows Server 2012 R2, and Windows RT 8.1. The update addresses the vulnerabilities in Adobe Flash Player by updating the affected Adobe Flash libraries contained within Internet Explorer 10 and Internet Explorer 11...
    - https://support.microsoft.com/kb/3021953
    Last Review: Feb 5, 2015 - Rev 1.0

    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •