Documente Academic
Documente Profesional
Documente Cultură
March 2014
Contents
Introduction ................................................................................................. 4
Scope and Intended Audience ......................................................................... 4
Verints Policy Regarding Updates .................................................................... 4
Updates Recommended .............................................................................. 4
Updates Not Recommended ......................................................................... 5
Non Approved Security Updates ................................................................... 5
Verint Guidance on Security Updates ............................................................... 5
Post-Installation Requirements .................................................................... 6
Security Updates Recommended Microsoft ................................................ 11
Windows Updates Recommended Microsoft ............................................... 87
JRE & Apache Tomcat Updates .................................................................. 7
Apache HTTP Server for Cognos ................................................................. 10
Non Approved Security Updates ................................................................. 10
Introduction
Introduction
This cumulative bulletin contains Microsoft updates & Third-Party updates in accordance
with Verints policy on supporting Microsoft Operating Systems, Service Packs, Security
Bulletins and Security updates.
For information on Verints policy, see Verints Microsoft and Third-Party Support Policy
document.
Updates Recommended
Updates Recommended
Verint provides recommendations for the following Third-Party product updates, which are
used by the Verint products:
JRE
Apache Tomcat
Microsoft Service Packs that are not part of the Verints supported products
Microsoft Security Updates that are not part of the Verints supported products
It is Verints recommendation that customers DO NOT install these types of updates, but
rather wait for the relevant Microsoft Service Packs that roll up all the non-critical updates.
Should the customer choose to apply any of these updates as per their own IT policy, the
customer must contact Verint Systems Technical Support.
Post-Installation Requirements
Post-Installation Requirements
This section presents third party updates, which may cause dis-functionality in Impact 360
systems, and to overcome these issues, certain steps should be taken.
Published Date
JRE 7 Update 51
December 2013
Important Notice
This client version is supported only if the following is done:
For WFM:
On Application Server: Set non Static JRE Versioning in System Management General
Settings
On Client Browser: (If I360 version is lower than 11.1.1.1929)
Click Run to allow application will run with unrestricted access.. (can be suppressed
to only shown once by checking Do Not show this again for apps from the
publisher)
Add Exception Site list, the AppServer and port number to Java Control Panel
Security tab of each Client machine or via file.
http://docs.oracle.com/javase/7/docs/technotes/guides/jweb/exception_site_list.html
For Data Analytics Instance Builder & Storage Manager Rule Editor:
After KB installations the following Windows will be shown when trying to open Data
Analytics Instance Builder or Storage manager Rule Editor, make sure you check the I
accept and click Run
Second window will be empty, click Close and you will then be able to open the applications
properly.
Server Policy
Updating desktops is the customers responsibility. However Verint certifies its server
software against the latest available 3rd party software version on a monthly basis. As
opposed to desktops, the software updates used are only the ones supplied by Verint.
Do not use other packages from the 3rd party software vendors.
A tool which automates the updates of the JRE version and the Apache Tomcat can be
downloaded from GURU.
The JRE & Apache version update tool is provided in two formats:
A standalone installation tool.
Included in the HFR kit.
NOTE
Published Date
JRE 6 Update 71
December 2013
May 2012
Installation Steps for JRE & Apache Tomcat updates on Impact360 Servers:
1. From the Latest Hotfix section in Guru, download the Hotfix Deploy
Tool.zip
NOTE
If you have downloaded the Hotfix Deploy Tool.zip in the past you do not need
to download it again.
2. Unzip the Deploy tool in any computer that has network connection to the
system.
3. Download the JavaUpgrade.exe from one of the following links and click
Open:
a. For Verint Internal user, please use this link
b. For Online users, please use this link
10
This file holds the updated JRE and Tomcat versions as mentioned below.
4. Copy JavaUpgrade.exe to the same folder which the Deploy tool has been
extracted.
5. Double click on the Hotfix Deploy Tool.exe
6. Double click on the JavaUpgrade.exe.
7. Double click on Setup.exe and click Next when prompted, until the task is
completed.
There is an option use the deploy tool to install on multiple servers. For further
instructions please see the Hotfix Deploy Tool User Guide which is located in
the same location where the tool was downloaded from.
Installation Steps for JRE & Apache Tomcat updates on KMS Servers:
For Verint Internal users, please use this link and click Open
For External users, please use this link and click Open
Apache Version
Download Link
For Verint Internal user, please use
this link
For External users, please use this link
Product
Summary / Version
Published Date
N/A
N/A
N/A
N/A
11
MS14-012
Maximum Severity
Rating and
Vulnerability
Impact
Critical
Remote Code Execution
MS14-013
Critical
Execution (2929961)
MS14-015
Important
Elevation of Privilege
12
Bulletin
ID
Maximum Severity
Rating and
Vulnerability
Impact
MS14-016
Important
February 2014
Bulletin
ID
MS14-010
Maximum Severity
Rating and
Vulnerability
Impact
Critical
Remote Code Execution
MS14-011
Critical
13
Bulletin
ID
Maximum Severity
Rating and
Vulnerability
Impact
MS14-007
Critical
(2912390)
MS14-008
Critical
MS14-009
Important
Privilege (2916607)
Elevation of Privilege
14
Bulletin
ID
Maximum Severity
Rating and
Vulnerability
Impact
MS14-005
Important
Information Disclosure
MS14-006
Important
Denial of Service
January 2014
Bulletin
ID
MS14-002
Maximum Severity
Rating and
Vulnerability
Impact
Important
Elevation of Privilege
15
Bulletin
ID
Maximum Severity
Rating and
Vulnerability
Impact
MS14-003
Important
Elevation of Privilege
December 2013
Bulletin ID
MS13-096
Maximum Severity
Rating and
Vulnerability
Impact
Critical
Remote Code
Execution
MS13-097
Critical
Remote Code
Execution
16
Bulletin ID
Maximum Severity
Rating and
Vulnerability
Impact
MS13-098
Critical
Remote Code
Execution
MS13-099
Critical
Remote Code
Execution
MS13-101
Important
Elevation of Privilege
MS13-102
Important
17
Bulletin ID
Maximum Severity
Rating and
Vulnerability
Impact
Elevation of Privilege
November 2013
Bulletin ID
MS13-088
Maximum Severity
Rating and
Vulnerability
Impact
Critical
Remote Code
Execution
MS13-089
Critical
Remote Code
Execution
18
Bulletin ID
Maximum Severity
Rating and
Vulnerability
Impact
MS13-090
Critical
Remote Code
Execution
MS13-092
Important
Elevation of Privilege
MS13-093
Important
Information Disclosure
19
Bulletin ID
Maximum Severity
Rating and
Vulnerability
Impact
MS13-095
Important
Denial of Service
October 2013
Bulletin ID
Maximum Severity
Rating and
Vulnerability Impact
MS13-080
Critical
Remote Code Execution
MS13-081
Critical
Remote Code Execution
20
Bulletin ID
Maximum Severity
Rating and
Vulnerability Impact
MS13-082
Critical
Remote Code Execution
MS13-083
Critical
Remote Code Execution
September 2013
Bulletin ID
MS13-069
Critical
Remote Code Execution
21
Bulletin ID
MS13-070
Critical
Remote Code Execution
MS13-071
Important
Remote Code Execution
MS13-076
Important
Elevation of Privilege
MS13-077
Important
22
Bulletin ID
Elevation of Privilege
MS13-079
Important
Denial of Service
August 2013
Bulletin ID
MS13-059
Critical
Remote Code Execution
23
Bulletin ID
MS13-060
Critical
Remote Code Execution
MS13-062
Important
Elevation of Privilege
MS13-063
Important
Elevation of Privilege
MS13-064
Important
Denial of Service
24
Bulletin ID
MS13-065
Important
Denial of Service
MS13-066
Important
Information Disclosure
July 2013
Bulletin ID
MS13-052
Maximum Severity
Rating and
Vulnerability Impact
Critical
Remote Code Execution
25
Bulletin ID
Maximum Severity
Rating and
Vulnerability Impact
MS13-053
Critical
Remote Code Execution
MS13-054
Critical
Remote Code Execution
MS13-055
Critical
Remote Code Execution
26
Bulletin ID
Maximum Severity
Rating and
Vulnerability Impact
MS13-056
Critical
Remote Code Execution
MS13-057
Critical
Remote Code Execution
MS13-058
Important
Elevation of Privilege
27
Bulletin ID
Maximum Severity
Rating and
Vulnerability Impact
June 2013
Bulletin ID
Maximum Severity
Rating and
Vulnerability Impact
MS13-047
Critical
Remote Code Execution
MS13-048
Important
Information Disclosure
28
Bulletin ID
Maximum Severity
Rating and
Vulnerability Impact
MS13-049
Important
Denial of Service
MS13-050
Important
Elevation of privilege
May 2013
Bulletin ID
Maximum Severity
Rating and
Vulnerability Impact
MS13-037
Critical
Remote Code Execution
29
Bulletin ID
Maximum Severity
Rating and
Vulnerability Impact
MS13-038
Critical
Remote Code Execution
MS13-039
Important
Denial of Service
MS13-040
Important
Spoofing
30
Bulletin ID
Maximum Severity
Rating and
Vulnerability Impact
MS13-046
Important
Elevation of Privilege
April 2013
Bulletin ID
Maximum Severity
Rating and
Vulnerability Impact
MS13-028
Critical
Remote Code Execution
MS13-029
Critical
31
Bulletin ID
Maximum Severity
Rating and
Vulnerability Impact
MS13-031
Important
Elevation of Privilege
MS13-032
Important
Denial of Service
MS13-033
Important
Elevation of Privilege
32
Bulletin ID
Maximum Severity
Rating and
Vulnerability Impact
Important
Elevation of Privilege
March 2013
Bulletin ID
Maximum Severity
Rating and
Vulnerability Impact
MS13-021
Critical
Remote Code Execution
MS13-027
Important
Elevation of Privilege
33
Bulletin ID
Maximum Severity
Rating and
Vulnerability Impact
February 2013
Bulletin ID
Maximum Severity
Rating and
Vulnerability Impact
MS13-009
MS13-010
Critical
Remote Code Execution
MS13-011
34
Bulletin ID
Maximum Severity
Rating and
Vulnerability Impact
MS13-020
Critical
Remote Code Execution
MS13-014
Important
Denial of Service
MS13-015
35
Bulletin ID
Maximum Severity
Rating and
Vulnerability Impact
MS13-016
Important
Elevation of Privilege
MS13-017
Important
Elevation of Privilege
MS13-018
Important
Denial of Service
MS13-019
36
January 2013
Bulletin ID
Maximum Severity
Rating and
Vulnerability Impact
MS13-008
Critical
Remote Code Execution
MS13-001
Critical
Remote Code Execution
MS13-002
MS13-004
Important
Elevation of Privilege
37
Bulletin ID
Maximum Severity
Rating and
Vulnerability Impact
MS13-005
Important
Elevation of Privilege
MS13-006
Important
Security Feature Bypass
MS13-007
Important
Denial of Service
38
December 2012
Bulletin ID
Maximum Severity
Rating and
Vulnerability Impact
MS12-077
Critical
Remote Code Execution
MS12-078
MS12-081
Critical
Remote Code Execution
39
Bulletin ID
Maximum Severity
Rating and
Vulnerability Impact
MS12-082
Important
Remote Code Execution
MS12-083
Important
Security Feature Bypass
November 2012
Bulletin ID
Maximum Severity
Rating and
Vulnerability Impact
MS12-071
Critical
Remote Code Execution
40
Bulletin ID
Maximum Severity
Rating and
Vulnerability Impact
user rights.
Vulnerabilities in Windows Shell Could Allow
Remote Code Execution (2727528)
MS12-072
Critical
Remote Code Execution
MS12-074
MS12-075
MS12-073
Critical
Remote Code Execution
Moderate
41
Bulletin ID
Maximum Severity
Rating and
Vulnerability Impact
Information Disclosure
October 2012
Bulletin ID
MS12-068
Maximum Severity
Rating and
Vulnerability Impact
Important
Elevation of Privilege
MS12-069
Important
Denial of Service
42
Bulletin ID
Maximum Severity
Rating and
Vulnerability Impact
MS12-070
Important
Elevation of Privilege
September 2012
Bulletin ID
MS12-061
Maximum Severity
Rating and
Vulnerability Impact
Important
Elevation of Privilege
43
Bulletin ID
Maximum Severity
Rating and
Vulnerability Impact
MS12-063
Critical
Remote Code Execution
August 2012
Bulletin ID
MS12-052
Critical
Explorer (2722913)
44
Bulletin ID
MS12-054
Critical
Execution (2733594)
This security update resolves four privately reported
vulnerabilities in Microsoft Windows. The most severe
of these vulnerabilities could allow remote code
execution if an attacker sends a specially crafted
response to a Windows print spooler request. Firewall
best practices and standard default firewall
configurations can help protect networks from attacks
that originate outside the enterprise perimeter. Best
practices recommend that systems connected directly
to the Internet have a minimal number of ports
exposed.
MS12-060
Critical
MS12-055
Important
Elevation of Privilege
45
Bulletin ID
MS12-056
Important
July 2012
Bulletin ID
MS12-043
Critical
46
Bulletin ID
MS12-044
Critical
Explorer (2719177)
MS12-045
Critical
Execution (2698365)
This security update resolves a privately reported
vulnerability in Microsoft Windows. The vulnerability
could allow remote code execution if a user views a
specially crafted webpage. An attacker who
successfully exploited this vulnerability could gain the
same user rights as the current user. Users whose
accounts are configured to have fewer user rights on
the system could be less impacted than users who
operate with administrative user rights.
MS12-047
Important
Elevation of Privilege
47
Bulletin ID
MS12-048
Important
MS12-049
Important
Disclosure (2655992)
Information Disclosure
June 2012
Bulletin ID
MS12-036
Critical
48
Bulletin ID
MS12-037
Critical
Explorer (2699988)
MS12-038
Critical
49
Bulletin ID
MS12-041
Important
Elevation of Privilege
MS12-042
Important
Elevation of Privilege
May 2012
50
Bulletin ID
MS12-034
Critical
Remote Code Execution
MS12-035
MS12-032
MS12-033
Important
Elevation of Privilege
Important
Elevation of Privilege
51
Bulletin ID
April 2012
Bulletin ID
MS12-023
Maximum Severity
Rating and
Vulnerability
Impact
Critical
(2675157)
Remote Code
Execution
MS12-024
Critical
Execution (2653956)
Remote Code
Execution
Critical
Remote Code
Execution
52
Critical
Remote Code
Execution
53
March 2012
Bulletin ID
MS12-020
Maximum Severity
Rating and
Vulnerability
Impact
Critical
Remote Code
Execution
Important
Service (2647170)
Denial of Service
Important
Elevation
Moderate
Service (2665364)
Denial of
54
February 2012
Bulletin ID
MS12-008
Maximum Severity
Rating and
Vulnerability
Impact
Critical
Remote Code
Execution
Critical
(2647516)
Remote Code
Execution
55
rights.
MS12-013
Critical
Remote Code
Execution
Critical
Remote Code
(2651026)
Execution
Important
Elevation of Privilege
56
MS12-012
Important
Remote Code
Execution
January 2012
Bulletin ID
MS12-004
Critical
Remote Code
Execution
MS12-001
Important
Security Feature
Bypass
57
Bulletin ID
MS12-002
Important
Remote Code
Execution
MS12-003
Important
Elevation of Privilege
(2646524)
This security update resolves one privately reported
vulnerability in Microsoft Windows. This security update is
rated Important for all supported editions of Windows XP,
Windows Server 2003, Windows Vista, and Windows
Server 2008. All supported editions of Windows 7 and
Windows Server 2008 R2 are not affected by this
vulnerability.
The vulnerability could allow elevation of privilege if an
attacker logs on to an affected system and runs a specially
crafted application. The attacker could then take complete
control of the affected system and install programs; view,
change, or delete data; or create new accounts with full
user rights. This vulnerability can only be exploited on
58
Bulletin ID
MS12-005
Important
Remote Code
Execution
MS12-006
Important
Disclosure (2643584)
Information Disclosure
December 2011
Bulletin ID
MS11-087
Critical
Remote Code
Execution
59
Bulletin ID
MS11-090
Critical
(2618451)
Remote Code
Execution
MS11-092
Critical
Remote Code
Execution
MS11-093
Important
Execution (2624667)
Remote Code
Execution
60
Bulletin ID
MS11-095
Important
Remote Code
Execution
MS11-097
Important
Elevation of Privilege
(2620712)
This security update resolves a privately reported
vulnerability in Microsoft Windows. The vulnerability could
allow elevation of privilege if an attacker logs on to an
affected system and runs a specially crafted application
designed to send a device event message to a higherintegrity process. An attacker must have valid logon
credentials and be able to log on locally to exploit this
vulnerability.
MS11-098
Important
61
Bulletin ID
MS11-099
Important
(2618444)
Remote Code
Execution
MS11-100
Critical
Elevation of Privilege
November 2011
62
Bulletin ID
MS11-083
Critical
Execution (2588516)
Remote Code
Execution
MS11-085
Important
Remote Code
(2620704)
Execution
63
Bulletin ID
MS11-086
Important
Elevation of Privilege
MS11-084
Moderate
Denial of Service
October 2011
64
Bulletin ID
Summary
MS11-078
Critical
Remote Code
(2604930)
Execution
MS11-081
Critical
(2586448)
Remote Code
Execution
MS11-075
Important
Remote Code
Execution
65
Bulletin ID
Summary
MS11-076
Important
Remote Code
Execution
MS11-077
Important
Remote Code
Execution
66
Bulletin ID
Summary
MS11-080
Important
Elevation of Privilege
September 2011
Bulletin ID
Summary
MS11-070
Important
Privilege (2571621)
Elevation of Privilege
MS11-071
Important
Remote Code
Execution
67
Bulletin ID
Summary
August 2011
Bulletin ID
MS11-057
Summary
Critical
(2559049)
Critical
Important
68
Bulletin ID
Summary
Important
Elevation of Privilege
Important
Elevation of Privilege
69
Bulletin ID
Summary
Important
Elevation of Privilege
(2567680)
This security update resolves a privately reported
vulnerability in Microsoft Windows. The vulnerability could
allow elevation of privilege if an attacker logs on to an
affected system and runs a specially crafted application
designed to send a device event message to a higherintegrity process. An attacker must have valid logon
credentials and be able to log on locally to exploit this
vulnerability.
MS11-064
Important
Service (2563894)
Denial of Service
Denial of Service
Important
Information Disclosure
70
Bulletin ID
Summary
Moderate
of Service (2556532)
Denial of Service
July 2011
Bulletin ID
MS11-053
Summary
Critical
71
Bulletin ID
Summary
Important
Elevation of Privilege
Important
Elevation of Privilege
(2507938)
This security update resolves five privately reported
vulnerabilities in the Microsoft Windows Client/Server Runtime Subsystem (CSRSS). The vulnerabilities could allow
elevation of privilege if an attacker logs on to a user's
system and runs a specially crafted application. An attacker
must have valid logon credentials and be able to log on
locally to exploit the vulnerabilities.
June 2011
ID
MS11-038
Summary
Critical
72
ID
Summary
Critical
(2514842)
This security update resolves a privately reported
vulnerability in Microsoft .NET Framework and Microsoft
Silverlight. The vulnerability could allow remote code
execution on a client system if a user views a specially
crafted Web page using a Web browser that can run XAML
Browser Applications (XBAPs) or Silverlight applications.
Users whose accounts are configured to have fewer user
rights on the system could be less impacted than users who
operate with administrative user rights. The vulnerability
could also allow remote code execution on a server system
running IIS, if that server allows processing ASP.NET pages
and an attacker succeeds in uploading a specially crafted
ASP.NET page to that server and then executes the page,
as could be the case in a Web hosting scenario. This
vulnerability could also be used by Windows .NET
applications to bypass Code Access Security (CAS)
restrictions.
MS11-041
Critical
73
ID
Summary
Critical
Critical
Execution (2536276)
Critical
74
ID
Summary
Critical
(2530548)
Critical
Important
Disclosure (2544893)
Information Disclosure
75
ID
Summary
Important
Elevation of Privilege
Denial of Service
Important
Service (2536275)
Denial of Service
76
ID
Summary
Important
Information Disclosure
Important
Elevation of Privilege
(2518295)
This security update resolves a privately reported
vulnerability in Active Directory Certificate Services Web
Enrollment. The vulnerability is a cross-site scripting (XSS)
vulnerability that could allow elevation of privilege, enabling
an attacker to execute arbitrary commands on the site in
the context of the target user. An attacker who successfully
exploited this vulnerability would need to send a specially
crafted link and convince a user to click the link. In all
cases, however, an attacker would have no way to force a
user to visit the Web site. Instead, an attacker would have
to persuade a user to visit the Web site, typically by getting
them to click a link in an e-mail message or Instant
Messenger message that takes the user to the vulnerable
Web site.
May 2011
ID
MS11-035
Summary
Vulnerability in WINS Could Allow Remote Code
77
ID
Summary
Execution (2524426)
April 2011
ID
MS11-018
Summary
Critical
(2497640)
Critical
78
ID
Summary
Critical
Execution (2508429)
Critical
(2508272)
Critical
79
ID
Summary
Critical
Execution (2489979)
Critical
Critical
(2514666)
80
ID
Summary
Critical
(2507618)
This security update resolves a privately reported
vulnerability in the OpenType Compact Font Format (CFF)
driver. The vulnerability could allow remote code execution
if a user views content rendered in a specially crafted CFF
font. In all cases, an attacker would have no way to force
users to view the specially crafted content. Instead, an
attacker would have to convince users to visit a Web site,
typically by getting them to click a link in an e-mail
message or Instant Messenger message that takes users to
the attacker's Web site.
MS11-024
Important
Important
Disclosure (2503658)
Information Disclosure
81
ID
Summary
Elevation of Privilege
82
ID
MS11-025
Summary
Vulnerability in Microsoft Foundation Class (MFC)
Library Could Allow Remote Code Execution
(2500212)
March 2011
ID
MS11-015
Summary
Critical
Important
83
ID
Summary
Summary
Critical
(2482017)
Critical
Critical
(2485376)
This security update resolves a privately reported
84
ID
Summary
Important
(2489256)
This security update resolves a publicly disclosed
vulnerability in Microsoft Internet Information Services (IIS)
FTP Service. The vulnerability could allow remote code
execution if an FTP server receives a specially crafted FTP
command. FTP Service is not installed by default on IIS.
MS11-005
Important
Service (2478953)
Denial of Service
Important
Information Disclosure
(2475792)
This security update resolves a privately reported
vulnerability in the JScript and VBScript scripting engines.
The vulnerability could allow information disclosure if a user
visited a specially crafted Web site. An attacker would have
no way to force users to visit these Web sites. Instead, an
attacker would have to convince users to visit the Web site,
typically by getting them to click a link in an e-mail
85
ID
Summary
Important
Elevation of Privilege
(2476687)
This security update resolves a privately reported
vulnerability in the Microsoft Windows Client/Server Runtime Subsystem (CSRSS) in Windows XP and Windows
Server 2003.
The vulnerability could allow elevation of privilege if an
attacker logs on to a user's system and starts a specially
crafted application that continues running after the attacker
logs off in order to obtain the logon credentials of
subsequent users. An attacker must have valid logon
credentials and be able to log on locally to exploit this
vulnerability. The vulnerability could not be exploited
remotely or by anonymous users.
MS11-011
Important
Elevation of Privilege
Elevation of Privilege
86
ID
Summary
Important
Privilege (2496930)
Elevation of Privilege
Important
Elevation of Privilege
(2478960)
This security update resolves a privately reported
vulnerability in the Local Security Authority Subsystem
Service (LSASS) in Windows XP and Windows Server 2003.
The vulnerability could allow elevation of privilege if an
attacker logs on to a system and runs a specially crafted
application. An attacker must have valid logon credentials
and be able to log on locally to exploit this vulnerability.
The vulnerability could not be exploited remotely or by
anonymous users.
January 2011
ID
MS11-002
Summary
Critical
87
ID
Summary
Important
Critical Updates
Critical Updates
Critical Updates
Update for Microsoft XML Core Services 4.0 Service Pack 2 for x64based Systems (KB973688)
Critical Updates
Critical Updates
88
Critical Updates
Critical Updates
Critical Updates
Critical Updates
Critical Updates
Critical Updates
Critical Updates
Feature Packs
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
89
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
90
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Update for Microsoft Office 2003 Web Components for the
2007 Microsoft Office System (KB947318)
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Update for Microsoft Visual Studio 2008 Service Pack 1 XML
Editor (KB2251487)
Security Updates
Security Update for Microsoft XML Core Services 4.0 Service Pack 2 for
x64-based Systems (KB954430)
Security Updates
Security Updates
Security Updates
91
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
92
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
93
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
94
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
95
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Security Updates
Update Rollups
Windows Internet Explorer 9 for Windows Server 2008 R2 for x64based Systems
Update Rollups
Update Rollups
Updates
Updates
Updates
Updates
Updates
Updates
Updates
96
(KB2830477)
Update for Windows Server 2008 R2 x64 Edition (KB2484033)
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
97
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Updates
Critical Updates
98
Critical Updates
Critical Updates
99