This one should eliminate duplicates. I also modified it so that it will look at the last Patch Tuesday (second Tues of month) so you won’t have to hard code the date manually.
concatenation “
” of htmls(it) of unique values of (it as string) of messages of bes fixlets whose (source of it = “Microsoft” and source release date of it = (first tuesday of month_and_year of current date + 1 * week))
You can open up web reports and drop this code into a web report and save it… You just need to add relevance pre and post tags like this:
<?Relevance concatenation "" of htmls(it) of unique values of (it as string) of messages of bes fixlets whose (source of it = "Microsoft" and source release date of it = (first tuesday of month_and_year of current date + 1 * week)) ?>
Microsoft has released a security update that resolves a privately reported vulnerability in COM validation in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Excel, Word, Visio, Publisher, or PowerPoint file with an affected version of Microsoft Office. The vulnerability cannot be exploited automatically through e-mail. For an attack to be successful a user must open an attachment that is sent in an e-mail message.
After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
Note: Affected computers may report back as ‘Pending Restart’ once the update has run successfully, but will not report back their final status until the computer has been restarted.
Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.
Important Note: In addition to this update, customers also need to install the update for 2007 Microsoft Office System Service Pack 1 and 2007 Microsoft Office System Service Pack 2 (KB982312) to be protected from the vulnerability described in this bulletin.
Note: Microsoft has announced that this update will be included in a future service pack or update rollup.
Note: This security update is also referenced under KB982127.
Note: If this patch has already been installed on computers reporting relevant, it means that one or more files updated by the patch have been downgraded to unsafe versions. In order to ensure security, it is recommended that the patch be reinstalled.
File Size:
15.5 MB
Microsoft has released a security update that resolves a privately reported vulnerability in COM validation in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Excel, Word, Visio, Publisher, or PowerPoint file with an affected version of Microsoft Office. The vulnerability cannot be exploited automatically through e-mail. For an attack to be successful a user must open an attachment that is sent in an e-mail message.
After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
Note: Affected computers may report back as ‘Pending Restart’ once the update has run successfully, but will not report back their final status until the computer has been restarted.
Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.
Important Note: In addition to this update, customers also need to install the update for 2007 Microsoft Office System Service Pack 1 and 2007 Microsoft Office System Service Pack 2 (KB982312) to be protected from the vulnerability described in this bulletin.
Note: Microsoft has announced that this update will be included in a future service pack or update rollup.
Note: This security update is also referenced under KB982127.
Note: If this patch has already been installed on computers reporting relevant, it means that one or more files updated by the patch have been downgraded to unsafe versions. In order to ensure security, it is recommended that the patch be reinstalled.
<?Relevance
concatenation "" of unique values of (it as string) of (h2 of name of it & br & message of it ) of bes fixlets whose (source of it = "Microsoft" and name of it starts with "MS" and source release date of it = (first tuesday of month_and_year of current date + 1 * week))
?>
MS10-032: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows 2000 SP4 - CORRUPT PATCH
The listed computers have faulty installations of a patch for the vulnerability described in MS10-032. Some files being used by these computers have versions earlier than those of the corresponding files installed by the patch. Services or applications installed after the patch was distributed may have overwritten the files, or the initial installation may have been faulty. We recommend reinstalling this patch to ensure the safety of affected computers.
Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in the Windows kernel-mode drivers. The vulnerabilities could allow elevation of privilege if a user views content rendered in a specially crafted TrueType font.
After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
Note: Affected computers may report back as ‘Pending Restart’ once the update has run successfully, but will not report back their final status until the computer has been restarted.
Note: Microsoft has announced that this update may be included in a future service pack or update rollup.
Note: This security update is also referenced under KB979559.
File Size:
1.25 MB
MS10-032: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows 2000 SP4
Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in the Windows kernel-mode drivers. The vulnerabilities could allow elevation of privilege if a user views content rendered in a specially crafted TrueType font.
After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
Note: Affected computers may report back as ‘Pending Restart’ once the update has run successfully, but will not report back their final status until the computer has been restarted.
Note: Microsoft has announced that this update may be included in a future service pack or update rollup.
Note: This security update is also referenced under KB979559.
File Size:
1.25 MB
MS10-032: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows 7 (x64)
Microsoft has released a security update that resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in the Windows kernel-mode drivers. The vulnerabilities could allow elevation of privilege if a user views content rendered in a specially crafted TrueType font.
After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
Note: Affected computers may report back as ‘Pending Restart’ once the update has run successfully, but will not report back their final status until the computer has been restarted.
Note: Microsoft has announced that this update may be included in a future service pack or update rollup.
Note: This security update is also referenced under KB979559.
<?Relevance
html (concatenation "" of unique values of (it as string) of (h2 of name of it & br & message of it ) of bes fixlets whose (source of it = "Microsoft" and name of it starts with "MS" and source release date of it = (first tuesday of month_and_year of current date + 1 * week)))
?>
unique values of (it as string) of (h3 of name of it & “||” & message of it) of bes fixlets whose (source of it = “Microsoft” and name of it starts with “MS” and name of it as lowercase does not contain “corrupt patch” and source release date of it = (first tuesday of month_and_year of current date + 1 * week))
Let me know what you find and we should be able to figure out the problem.
Hi,
How can we configure the report Current Microsoft Security
Bulletins to sent in schedule every time it change (on each Patch
Tuesday to be specific). I can see the source of the web report have
this: relevance first tuesday of month_and_year of current date + 1 * week but don’t know how to used it on the schedule report wizard, relevance area
Test button says:
Q:
E: This expression could not be parsed
This looks like a great report but it’s not working for me. I’m able to get the relevance to evaluate properly so its probably some javascript failing somewhere.