Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 13 vulnerabilities that were fixed in 8 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 8 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
An elevation of privilege vulnerability exists in Microsoft SharePoint Server. An attacker who successfully exploited this vulnerability could perform cross-site scripting attacks on affected systems and run script in the security context of the logged-on user. (CVE-2014-1754)
Affected Software:
Microsoft SharePoint Server 2007, Microsoft SharePoint Server 2010, Microsoft SharePoint Server 2013, Microsoft Office Web Apps 2010, Microsoft Office Web Apps Server 2013, Microsoft SharePoint Services 3.0, and Microsoft SharePoint Foundation 2010, Microsoft SharePoint Foundation 2013, Microsoft SharePoint Designer 2007, Microsoft SharePoint Designer 2010, and Microsoft SharePoint Designer 2013
This security update is rated Critical for supported editions of Microsoft SharePoint Server.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS14-022 Microsoft Office Web Apps 2010 Service Pack 1(Microsoft Web Applications 2010 Service Pack 1)
MS14-022 Microsoft Office Web Apps 2010 Service Pack 2(Microsoft Web Applications 2010 Service Pack 2)
MS14-022 Microsoft Office Web Apps 2013(Microsoft Office Web Apps Server 2013)
MS14-022 Microsoft Office Web Apps 2013 Service Pack 1(Microsoft Office Web Apps Server 2013 Service Pack 1)
MS14-022 Microsoft SharePoint Designer 2007 Service Pack 3
MS14-022 Microsoft SharePoint Designer 2007 Service Pack 3
MS14-022 Microsoft SharePoint Designer 2010 Service Pack 1 (32-bit versions)
MS14-022 Microsoft SharePoint Designer 2010 Service Pack 1 (64-bit versions)
MS14-022 Microsoft SharePoint Designer 2010 Service Pack 2 (32-bit versions)
MS14-022 Microsoft SharePoint Designer 2010 Service Pack 2 (64-bit versions)
MS14-022 Microsoft SharePoint Designer 2013 (32-bit versions)
MS14-022 Microsoft SharePoint Designer 2013 (32-bit versions)
MS14-022 Microsoft SharePoint Designer 2013 (64-bit versions)
MS14-022 Microsoft SharePoint Designer 2013 (64-bit versions)
MS14-022 Microsoft SharePoint Designer 2013 Service Pack 1 (32-bit versions)
MS14-022 Microsoft SharePoint Designer 2013 Service Pack 1 (32-bit versions)
MS14-022 Microsoft SharePoint Designer 2013 Service Pack 1 (64-bit versions)
MS14-022 Microsoft SharePoint Designer 2013 Service Pack 1 (64-bit versions)
MS14-022 Microsoft SharePoint Server 2007 Service Pack 3 (32-bit editions)(Microsoft Windows SharePoint Services 3.0 Service Pack 3 (32-bit versions))
MS14-022 Microsoft SharePoint Server 2007 Service Pack 3 (32-bit editions)(SharePoint Server 2007 Service Pack 3 (32-bit editions))
MS14-022 Microsoft SharePoint Server 2007 Service Pack 3 (32-bit editions)(SharePoint Server 2007 Service Pack 3 (32-bit editions))
MS14-022 Microsoft SharePoint Server 2007 Service Pack 3 (64-bit editions)(Microsoft Windows SharePoint Services 3.0 Service Pack 3 (64-bit versions))
MS14-022 Microsoft SharePoint Server 2007 Service Pack 3 (64-bit editions)(SharePoint Server 2007 Service Pack 3 (64-bit editions))
MS14-022 Microsoft SharePoint Server 2007 Service Pack 3 (64-bit editions)(SharePoint Server 2007 Service Pack 3 (64-bit editions))
MS14-022 Microsoft SharePoint Server 2010 Service Pack 1(Microsoft Project Server 2010 Service Pack 1)
MS14-022 Microsoft SharePoint Server 2010 Service Pack 1(Microsoft SharePoint Foundation 2010 Service Pack 1)
MS14-022 Microsoft SharePoint Server 2010 Service Pack 1(Microsoft SharePoint Server 2010 Service Pack 1)
MS14-022 Microsoft SharePoint Server 2010 Service Pack 2(Microsoft Project Server 2010 Service Pack 2)
MS14-022 Microsoft SharePoint Server 2010 Service Pack 2(Microsoft SharePoint Foundation 2010 Service Pack 2)
MS14-022 Microsoft SharePoint Server 2010 Service Pack 2(Microsoft SharePoint Server 2010 Service Pack 2)
MS14-022 Microsoft SharePoint Server 2013(Microsoft Project Server 2013)
MS14-022 Microsoft SharePoint Server 2013(Microsoft SharePoint Foundation 2013)
MS14-022 Microsoft SharePoint Server 2013(Microsoft SharePoint Foundation 2013)
MS14-022 Microsoft SharePoint Server 2013(Microsoft SharePoint Server 2013)
MS14-022 Microsoft SharePoint Server 2013 Service Pack 1(Microsoft Project Server 2013 Service Pack 1)
MS14-022 Microsoft SharePoint Server 2013 Service Pack 1(Microsoft SharePoint Foundation 2013 Service Pack 1)
MS14-022 Microsoft SharePoint Server 2013 Service Pack 1(Microsoft SharePoint Foundation 2013 Service Pack 1)
MS14-022 Microsoft SharePoint Server 2013 Service Pack 1(Microsoft SharePoint Server 2013 Service Pack 1)
MS14-022 SharePoint Server 2013 Client Components SDK (32-bit version)
MS14-022 SharePoint Server 2013 Client Components SDK (64-bit version)
The security update addresses the vulnerabilities by helping to ensure that the Chinese (Simplified) Grammar Checker feature in Microsoft Office properly verifies file paths before loading external libraries and by helping to ensure that Microsoft Office software properly handles specially crafted responses from websites.
Affected Versions:
Microsoft Office 2007, Microsoft Office 2010, and Microsoft Office 2013
Workaround:
CVE-2014-1756:
Disable loading of libraries from WebDAV and remote network shares.
Disable the WebClient service
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS14-023 Microsoft Office 2007 Service Pack 3
MS14-023 Microsoft Office 2010 Service Pack 1 (32-bit editions)
MS14-023 Microsoft Office 2010 Service Pack 1 (64-bit editions)
MS14-023 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS14-023 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS14-023 Microsoft Office 2013 (32-bit editions)
MS14-023 Microsoft Office 2013 (32-bit editions)
MS14-023 Microsoft Office 2013 (64-bit editions)
MS14-023 Microsoft Office 2013 (64-bit editions)
MS14-023 Microsoft Office 2013 Service Pack 1 (32-bit editions)
MS14-023 Microsoft Office 2013 Service Pack 1 (32-bit editions)
MS14-023 Microsoft Office 2013 Service Pack 1 (64-bit editions)
MS14-023 Microsoft Office 2013 Service Pack 1 (64-bit editions)
Microsoft has released a security update that resolves one privately reported vulnerability in an implementation of the MSCOMCTL common controls library.
This security update is rated Important for supported editions of Microsoft Office 2007, Microsoft Office 2010, and Microsoft Office 2013.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS14-024 Microsoft Office 2007 Service Pack 3
MS14-024 Microsoft Office 2007 Service Pack 3
MS14-024 Microsoft Office 2007 Service Pack 3
MS14-024 Microsoft Office 2007 Service Pack 3
MS14-024 Microsoft Office 2010 Service Pack 1 (32-bit editions)
MS14-024 Microsoft Office 2010 Service Pack 1 (32-bit editions)
MS14-024 Microsoft Office 2010 Service Pack 1 (32-bit editions)
MS14-024 Microsoft Office 2010 Service Pack 1 (64-bit editions)
MS14-024 Microsoft Office 2010 Service Pack 1 (64-bit editions)
MS14-024 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS14-024 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS14-024 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS14-024 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS14-024 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS14-024 Microsoft Office 2013 (32-bit editions)
MS14-024 Microsoft Office 2013 (32-bit editions)
MS14-024 Microsoft Office 2013 (64-bit editions)
MS14-024 Microsoft Office 2013 Service Pack 1 (32-bit editions)
MS14-024 Microsoft Office 2013 Service Pack 1 (32-bit editions)
MS14-024 Microsoft Office 2013 Service Pack 1 (64-bit editions)
A privilege elevation vulnerability has been reported which is exploitable if Active Directory Group Policy Preferences are used to distribute passwords across the domain.This could allow an attacker to retrieve and decrypt the password stored with Group Policy preferences.
Affected Versions
Windows Vista
Windows Server 2008
Windows 7
Windows Server 2008 R2
Windows 8 and Windows 8.1
Windows Server 2012 and Windows Server 2012 R2
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS14-025 Windows 7 for 32-bit Systems Service Pack 1(Remote Server Administration Tools)
MS14-025 Windows 7 for x64-based Systems Service Pack 1(Remote Server Administration Tools)
MS14-025 Windows 8 for 32-bit Systems(Remote Server Administration Tools)
MS14-025 Windows 8 for x64-based Systems(Remote Server Administration Tools)
MS14-025 Windows 8.1 for 32-bit Systems(Remote Server Administration Tools)
MS14-025 Windows 8.1 for 32-bit Systems(Remote Server Administration Tools)
MS14-025 Windows 8.1 for x64-based Systems(Remote Server Administration Tools)
MS14-025 Windows 8.1 for x64-based Systems(Remote Server Administration Tools)
MS14-025 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS14-025 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS14-025 Windows Server 2008 for 32-bit Systems Service Pack 2
MS14-025 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS14-025 Windows Server 2008 for x64-based Systems Service Pack 2
MS14-025 Windows Server 2012
MS14-025 Windows Server 2012 R2
MS14-025 Windows Server 2012 R2
MS14-025 Windows Vista Service Pack 2(Remote Server Administration Tools)
MS14-025 Windows Vista x64 Edition Service Pack 2(Remote Server Administration Tools)
An elevation of privilege vulnerability exists in the way that .NET Framework handles TypeFilterLevel checks for some malformed objects (CVE-2014-1806).
This security update is rated Important for Microsoft .NET Framework 1.1 Service Pack 1, Microsoft .NET Framework 2.0 Service Pack 2, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4, Microsoft .NET Framework 4.5, and Microsoft .NET Framework 4.5.1 on affected releases of Microsoft Windows.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS14-026 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS14-026 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 4)
MS14-026 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 4.5)
MS14-026 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 4.5.1)
MS14-026 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS14-026 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4)
MS14-026 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.5)
MS14-026 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.5.1)
MS14-026 Windows 8 for 32-bit Systems(Microsoft .NET Framework 3.5)
MS14-026 Windows 8 for 32-bit Systems(Microsoft .NET Framework 4.5)
MS14-026 Windows 8 for 32-bit Systems(Microsoft .NET Framework 4.5.1)
MS14-026 Windows 8 for x64-based Systems(Microsoft .NET Framework 3.5)
MS14-026 Windows 8 for x64-based Systems(Microsoft .NET Framework 4.5)
MS14-026 Windows 8 for x64-based Systems(Microsoft .NET Framework 4.5.1)
MS14-026 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 3.5)
MS14-026 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 4.5.1)
MS14-026 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 3.5)
MS14-026 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 4.5.1)
MS14-026 Windows Server 2003 Service Pack 2(Microsoft .NET Framework 1.1 Service Pack 1)
MS14-026 Windows Server 2003 Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS14-026 Windows Server 2003 Service Pack 2(Microsoft .NET Framework 4)
MS14-026 Windows Server 2003 with SP2 for Itanium-based Systems(Microsoft .NET Framework 2.0 Service Pack 2)
MS14-026 Windows Server 2003 with SP2 for Itanium-based Systems(Microsoft .NET Framework 4)
MS14-026 Windows Server 2003 x64 Edition Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS14-026 Windows Server 2003 x64 Edition Service Pack 2(Microsoft .NET Framework 4)
MS14-026 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS14-026 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(Microsoft .NET Framework 4)
MS14-026 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS14-026 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4)
MS14-026 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.5)
MS14-026 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.5.1)
MS14-026 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 3.5.1)
MS14-026 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 4)
MS14-026 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 4.5)
MS14-026 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 4.5.1)
MS14-026 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS14-026 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4)
MS14-026 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4.5)
MS14-026 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4.5.1)
MS14-026 Windows Server 2008 for Itanium-based Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS14-026 Windows Server 2008 for Itanium-based Systems Service Pack 2(Microsoft .NET Framework 4)
MS14-026 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS14-026 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4)
MS14-026 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4.5)
MS14-026 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4.5.1)
MS14-026 Windows Server 2012(Microsoft .NET Framework 3.5)
MS14-026 Windows Server 2012(Microsoft .NET Framework 4.5)
MS14-026 Windows Server 2012(Microsoft .NET Framework 4.5.1)
MS14-026 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 3.5)
MS14-026 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 4.5)
MS14-026 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 4.5.1)
MS14-026 Windows Server 2012 R2(Microsoft .NET Framework 3.5)
MS14-026 Windows Server 2012 R2(Microsoft .NET Framework 4.5.1)
MS14-026 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 3.5)
MS14-026 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 4.5.1)
MS14-026 Windows Vista Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS14-026 Windows Vista Service Pack 2(Microsoft .NET Framework 4)
MS14-026 Windows Vista Service Pack 2(Microsoft .NET Framework 4.5)
MS14-026 Windows Vista Service Pack 2(Microsoft .NET Framework 4.5.1)
MS14-026 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS14-026 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4)
MS14-026 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4.5)
MS14-026 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4.5.1)
Microsoft Windows is prone to a vulnerability that could allow elevation of privilege if an attacker runs a specially crafted application that uses ShellExecute which improperly handles file associations.
An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability.
This security update is rated Important for all supported releases of Windows.
Successful exploitation of this issue allows an attacker to run arbitrary code in the context of the Local System account. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS14-027 Windows 7 for 32-bit Systems Service Pack 1
MS14-027 Windows 7 for x64-based Systems Service Pack 1
MS14-027 Windows 8 for 32-bit Systems
MS14-027 Windows 8 for x64-based Systems
MS14-027 Windows 8.1 for 32-bit Systems
MS14-027 Windows 8.1 for 32-bit Systems
MS14-027 Windows 8.1 for x64-based Systems
MS14-027 Windows 8.1 for x64-based Systems
MS14-027 Windows Server 2003 Service Pack 2
MS14-027 Windows Server 2003 with SP2 for Itanium-based Systems
MS14-027 Windows Server 2003 x64 Edition Service Pack 2
MS14-027 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS14-027 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS14-027 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS14-027 Windows Server 2008 for 32-bit Systems Service Pack 2
MS14-027 Windows Server 2008 for 32-bit Systems Service Pack 2
MS14-027 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS14-027 Windows Server 2008 for x64-based Systems Service Pack 2
MS14-027 Windows Server 2008 for x64-based Systems Service Pack 2
MS14-027 Windows Server 2012
MS14-027 Windows Server 2012
MS14-027 Windows Server 2012 R2
MS14-027 Windows Server 2012 R2
MS14-027 Windows Server 2012 R2
MS14-027 Windows Server 2012 R2
MS14-027 Windows Vista Service Pack 2
MS14-027 Windows Vista x64 Edition Service Pack 2
A denial of service vulnerability has been reported in Microsoft Window which exist due the way some operating systems handle iSCSI packets.
Affected Versions:
Windows Server 2008
Windows Server 2008 R2
Windows Server 2012
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2 (Server Core installation)
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS14-028 Windows Server 2008 R2 for x64-based Systems Service Pack 1(iSCSI Software Target 3.3)
MS14-028 Windows Server 2012
MS14-028 Windows Server 2012
MS14-028 Windows Server 2012 R2
MS14-028 Windows Server 2012 R2
MS14-028 Windows Server 2012 R2
MS14-028 Windows Server 2012 R2
This security update resolves two vulnerabilities in Internet Explorer that exist because of improper handling of objects in the memory. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer.
This security update is rated Critical for Internet Explorer 6 (IE 6), Internet Explorer 7 (IE 7), Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows clients, Moderate for Internet Explorer 6 (IE 6), Internet Explorer 7 (IE 7), Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows servers.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS14-029 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 10)
MS14-029 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 11)
MS14-029 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 11)
MS14-029 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 8)
MS14-029 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 9)
MS14-029 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 10)
MS14-029 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS14-029 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS14-029 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 8)
MS14-029 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 9)
MS14-029 Windows 8 for 32-bit Systems(Internet Explorer 10)
MS14-029 Windows 8 for x64-based Systems(Internet Explorer 10)
MS14-029 Windows 8.1 for 32-bit Systems(Internet Explorer 11)
MS14-029 Windows 8.1 for 32-bit Systems(Internet Explorer 11)
MS14-029 Windows 8.1 for x64-based Systems(Internet Explorer 11)
MS14-029 Windows 8.1 for x64-based Systems(Internet Explorer 11)
MS14-029 Windows Server 2003 Service Pack 2(Internet Explorer 6)
MS14-029 Windows Server 2003 Service Pack 2(Internet Explorer 7)
MS14-029 Windows Server 2003 Service Pack 2(Internet Explorer 8)
MS14-029 Windows Server 2003 with SP2 for Itanium-based Systems(Internet Explorer 6)
MS14-029 Windows Server 2003 with SP2 for Itanium-based Systems(Internet Explorer 7)
MS14-029 Windows Server 2003 x64 Edition Service Pack 2(Internet Explorer 6)
MS14-029 Windows Server 2003 x64 Edition Service Pack 2(Internet Explorer 7)
MS14-029 Windows Server 2003 x64 Edition Service Pack 2(Internet Explorer 8)
MS14-029 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(Internet Explorer 8)
MS14-029 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 10)
MS14-029 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS14-029 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS14-029 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 8)
MS14-029 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 9)
MS14-029 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 7)
MS14-029 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 8)
MS14-029 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 9)
MS14-029 Windows Server 2008 for Itanium-based Systems Service Pack 2(Internet Explorer 7)
MS14-029 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 7)
MS14-029 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 8)
MS14-029 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 9)
MS14-029 Windows Server 2012(Internet Explorer 10)
MS14-029 Windows Server 2012 R2(Internet Explorer 11)
MS14-029 Windows Server 2012 R2(Internet Explorer 11)
MS14-029 Windows Vista Service Pack 2(Internet Explorer 7)
MS14-029 Windows Vista Service Pack 2(Internet Explorer 8)
MS14-029 Windows Vista Service Pack 2(Internet Explorer 9)
MS14-029 Windows Vista x64 Edition Service Pack 2(Internet Explorer 7)
MS14-029 Windows Vista x64 Edition Service Pack 2(Internet Explorer 8)
MS14-029 Windows Vista x64 Edition Service Pack 2(Internet Explorer 9)
These new vulnerability checks are included in Qualys vulnerability signature 2.2.726-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.