This time Microsoft has a big pile of security patches in the month of November 2014 that will address almost 60 non-security updates for its windows operating system along with the 16 security updates.
For the 16 security patches the software released the Advance Notification the most than in the 3 years which will be addressed from this month. The five of the bulletin marked are "critical", nine are "important" in sternness, while the other two are labeled "moderate."
The update will space vulnerabilities in Microsoftâs different software including the Internet Explorer (IE), Exchange Server, Windows, SharePoint Server, Office and the .NET framework.
The 5 decisive vulnerabilities which affect the particular version of Microsoft Windows including Windows Server, Windows RT, Windows 7 and Windows 8.One of them even affect the Internet Explorer versions 7 through 11.
Four of five vital bugs that said to let remote code execution means a successful hacker can easily hack the system and install malicious software on the victimâs operating system and the slat can allow the computer hacker to gain administrative right on the infected system.
Microsoft describes a critical patch by stating "A vulnerability whose exploitation could allow code execution without user interaction. These scenarios include self-propagating malware (e.g. network worms), or unavoidable common use scenarios where code execution occurs without warnings or prompts. This could mean browsing to a web page or opening email".
Other nine patches are charged as the "important", that are not as brutal as the critical ones could still be installed in order to keep the operating system secure. It can affect Microsoft Exchange, Microsoft Windows and Office.
The important updated five of nine will patch "elevation of privilege" liabilities other two fix the Operating system security features bypass the exposure, one addresses the remote code execution bug while other one plug an information leak.
The last two patches are charged as the "moderate" that include risk but still installed by the users. One of them addresses a rebuff of service flaw in Microsoft Windows, while other patches as the Elevation of concession bug.
If you got Automatic Updates enabled on your system these fixes will be made available through Windows Update and be automatically applied for some of the users. But in case the user hasnât enabled it, Microsoft encourages them, to enable the Automatic Updates option. Some Microsoft security patches might need restarting the servers.
This blog is listed under Operating Systems Community