Severity Rating: Important
Revision Note: V1.0 (March 8, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker is able to log on to a target system and run a specially crafted application.
Category Archives: Microsft
Microsoft
MS16-026 – Critical: Security Update for Graphic Fonts to Address Remote Code Execution (3143148) – Version: 1.0
Severity Rating: Critical
Revision Note: V1.0 (March 8, 2016): Click here to enter text.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker either convinces a user to open a specially crafted document, or to visit a webpage that contains specially crafted embedded OpenType fonts.
MS16-035 – Important: Security Update for .NET Framework to Address Security Feature Bypass (3141780) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (March 8, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft .NET Framework. The security feature bypass exists in a .NET Framework component that does not properly validate certain elements of a signed XML document.
MS16-028 – Critical: Security Update for Microsoft Windows PDF Library to Address Remote Code Execution (3143081) – Version: 1.0
Severity Rating: Critical
Revision Note: V1.0 (March 8, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted .pdf file.
MS16-027 – Critical: Security Update for Windows Media to Address Remote Code Execution (3143146) – Version: 1.0
Severity Rating: Critical
Revision Note: V1.0 (March 8, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens specially crafted media content that is hosted on a website.
MS16-032 – Important: Security Update for Secondary Logon to Address Elevation of Privilege (3143141) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (March 8, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows Secondary Logon Service fails to properly manage request handles in memory.
MS16-033 – Important: Security Update for Windows USB Mass Storage Class Driver to Address Elevation of Privilege (3143142) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (March 8, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker with physical access inserts a specially crafted USB device into the system.
MS16-022 – Critical: Security Update for Adobe Flash Player (3135782) – Version: 1.0
Severity Rating: Critical
Revision Note: V1.0 (February 9, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Adobe Flash Player when installed on all supported editions of Windows Server 2012, Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, Windows 10, and Windows 10 Version 1511. For more information, see the Affected Software section. The update addresses the vulnerabilities in Adobe Flash Player by updating the affected Adobe Flash libraries contained within Internet Explorer 10, Internet Explorer 11, and Microsoft Edge.
MS16-014 – Important: Security Update for Microsoft Windows to Address Remote Code Execution (3134228) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (February 9, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker is able to log on to a target system and run a specially crafted application.
MS16- – Important: Security Update for NPS RADIUS Server to Address Denial of Service (3133043) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (February 9, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could cause denial of service on a Network Policy Server (NPS) or an Internet Authentication Service (IAS) if an attacker sends specially crafted username strings to the IAS or NPS, which could prevent RADIUS authentication on the NPS or IAS.