Content Modification: Patches for Windows published 2020-02-25

Content in the Patches for Windows site has been modified.

Modified:

[Major] MS13-023: Vulnerability in Microsoft Visio Viewer 2010 Could Allow Remote Code Execution - Visio Viewer 2010 SP1 (ID: 1302301)
[Major] Security advisory: Scripting Engine Memory Corruption Vulnerability - Disable Workaround (ID: 450033109)
[Major] Security advisory: Scripting Engine Memory Corruption Vulnerability - Disable Workaround (x64) (ID: 286872526)
[Major] Security advisory: Scripting Engine Memory Corruption Vulnerability - Enable Workaround (ID: 450033110)
[Major] Security advisory: Scripting Engine Memory Corruption Vulnerability - Enable Workaround (x64) (ID: 286872527)

Reason for Update:

Update relevane in workaround fixlets to account for wow redirection
Fixed hash mismatch issue in fixlet ID: 1302301

Actions to Take:
None

Published site version:
Patches for Windows, version 3483

Additional links:
None

Application Engineering Team
BigFix

This topic was automatically closed after 30 days. New replies are no longer allowed.