SHARE
TWEET

windows-7-sp1-x64-Tom-Updates-2015-09-09.ul

a guest Sep 9th, 2015 572 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. <?xml version="1.0" encoding="utf-8"?>
  2.  
  3. <updatelist product="Windows 7 Tom Updates" servicepack="Service Pack 1" platform="x64" language="ENU" lastupdate="2015-09-09" xmlns="http://www.windowsupdatesdownloader.com" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.windowsupdatesdownloader.com http://www.windowsupdatesdownloader.com/wud.xsd">
  4.  
  5. <!-- Created by ChefTom -->
  6.  
  7. <categories>
  8.   <category id="1">Tom Security Updates</category>
  9.   <category id="2">Tom Non-Security Updates</category>
  10.   <category id="5">Tom Optional Updates</category>
  11.   <category id="6">Tom .NET Framework 3.5.1, 4.5, 4.5.1, and 4.5.2 Updates</category>
  12. </categories>
  13.  
  14. <updates>
  15.   <update id="KB3087985" category="1" publishdate="2015-08-18" article="https://support.microsoft.com/en-us/kb/3087985">
  16.     <title>Security Update for Internet Explorer 11 for Windows 7 for x64-based Systems (KB3087985)</title>
  17.     <description>This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer.</description>
  18.     <filename>IE11-Windows6.1-KB3087985-x64.msu</filename>
  19.     <url>http://download.microsoft.com/download/4/F/7/4F77D5B9-6A41-4BAB-83CC-346D4FE4697E/IE11-Windows6.1-KB3087985-x64.msu</url>
  20.   </update>
  21.  
  22.   <update id="KB2952664" category="2" publishdate="2014-04-22" article="https://support.microsoft.com/en-us/kb/2952664">
  23.     <title>Update for Windows 7 for x64-based Systems (KB2952664)</title>
  24.     <description>This update helps Microsoft make improvements to the current operating system in order to ease the upgrade experience to the latest version of Windows.</description>
  25.     <filename>windows6.1-kb2952664-v10-x64_6cb844c61ff4a77098ee895e0f2904d494ff5d24.msu</filename>
  26.     <url>http://download.windowsupdate.com/d/msdownload/update/software/updt/2015/05/windows6.1-kb2952664-v10-x64_6cb844c61ff4a77098ee895e0f2904d494ff5d24.msu</url>
  27.   </update>
  28.  
  29.   <update id="KB3067903" category="1" publishdate="2015-07-13" article="https://support.microsoft.com/en-us/kb/3067903">
  30.     <title>Security Update for Windows 7 for x64-based Systems (KB3067903)</title>
  31.     <description>This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user’s current working directory. Then, the attacker convinces the user to open an .rtf file or to start a program that is designed to load a trusted DLL file. But instead, the program loads the attacker’s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts that have full user rights.</description>
  32.     <filename>Windows6.1-KB3067903-x64.msu</filename>
  33.     <url>http://download.microsoft.com/download/6/9/4/694FF328-63E9-4E62-87F5-FA0BC8BE75C0/Windows6.1-KB3067903-x64.msu</url>
  34.   </update>
  35.  
  36.   <update id="KB3061518" category="1" publishdate="2015-05-11" article="https://support.microsoft.com/en-us/kb/3061518">
  37.     <title>Security Update for Windows 7 for x64-based Systems (KB3061518)</title>
  38.     <description>This security update resolves a vulnerability in Windows. The vulnerability could allow information disclosure when Secure Channel (Schannel) allows the use of a weak Diffie-Hellman ephemeral (DHE) key length of 512 bits in an encrypted Transport Layer Security (TLS) session. Allowing 512-bit DHE keys makes DHE key exchanges weak and vulnerable to various attacks. For an attack to be successful, a server has to support 512-bit DHE key lengths. Windows TLS servers send a default DHE key length of 1,024 bits.</description>
  39.     <filename>Windows6.1-KB3061518-x64.msu</filename>
  40.     <url>http://download.microsoft.com/download/3/0/D/30DA5A7C-7C4C-4129-8AF3-4CB86CCB0799/Windows6.1-KB3061518-x64.msu</url>
  41.   </update>
  42.  
  43.   <update id="KB3075226" category="1" publishdate="2015-08-10" article="https://support.microsoft.com/en-us/kb/3075226">
  44.     <title>Security Update for Windows 7 for x64-based Systems (KB3075226)</title>
  45.     <description>This security update resolves vulnerabilities in Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user’s current working directory and then convinces the user to open an RDP file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker’s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs, could view, change, or delete data, or could create new accounts that have full user rights. This security update addresses the vulnerability by correcting how the Remote Desktop Session Host (RDSH) validates certificates and how RDP loads certain binaries. </description>
  46.     <filename>Windows6.1-KB3075226-x64.msu</filename>
  47.     <url>http://download.microsoft.com/download/2/A/D/2AD517A7-5816-4CD9-949D-28DAD8C70259/Windows6.1-KB3075226-x64.msu</url>
  48.   </update>
  49.  
  50.   <update id="KB2972107" category="6" publishdate="2015-10-14" article="https://support.microsoft.com/en-us/kb/2972107">
  51.     <title>Security Update for Microsoft .NET Framework 4.5. 4.5.1 and 4.5.2 on Windows 7, Vista, Server 2008, Server 2008 R2 x64 (KB2972107)</title>
  52.     <description>This security update resolves vulnerabilities that could allow remote code execution if an attacker sends a specially crafted URL request that contains international characters to a .NET web application.</description>
  53.     <filename>NDP45-KB2972107-x64.exe</filename>
  54.     <url>http://download.microsoft.com/download/6/C/F/6CF80DC8-0CE8-460A-98EC-48E8F4951BC4/NDP45-KB2972107-x64.exe</url>
  55.   </update>
  56.  
  57. <update id="KB3055642" category="1" publishdate="2015-05-11" article="https://support.microsoft.com/en-us/kb/3055642">
  58.     <title>Security Update for Windows 7 for x64-based Systems (KB3055642)</title>
  59.     <description>This security update resolves a vulnerability in Windows Service Control Manager (SCM). This vulnerability is caused when SCM incorrectly verifies impersonation levels. The vulnerability could allow elevation of privilege if an attacker can first log on to the system and then run a specially crafted application that is designed to increase privileges.</description>
  60.     <filename>Windows6.1-KB3055642-x64.msu</filename>
  61.     <url>http://download.microsoft.com/download/4/D/A/4DAA998D-1109-4A8B-9518-ED69C65120AE/Windows6.1-KB3055642-x64.msu</url>
  62.   </update>
  63.  
  64. <update id="KB3072305" category="6" publishdate="2015-08-10" article="https://support.microsoft.com/en-us/kb/3072305">
  65.     <title>Security Update for Microsoft .NET Framework 3.5.1 on Windows 7 SP1 and Windows Server 2008 R2 SP1 (KB3072305)</title>
  66.     <description>This security update resolves vulnerabilities in the Microsoft .NET Framework and Microsoft Silverlight. These vulnerabilities could allow remote code execution if a user opens a specially crafted document or goes to an untrusted webpage that contains embedded TrueType or OpenType fonts.</description>
  67.     <filename>Windows6.1-KB3072305-x64.msu</filename>
  68.     <url>http://download.microsoft.com/download/7/B/6/7B602692-F67E-47D4-9123-6FA5FBE292BA/Windows6.1-KB3072305-x64.msu</url>
  69.   </update>
  70.  
  71. <update id="KB3048761" category="2" publishdate="2015-04-20" article="https://support.microsoft.com/en-us/kb/3048761">
  72.     <title>Update for Windows 7 for x64-based Systems (KB3048761)</title>
  73.     <description>This update fixes an issue that occurs because memory leak occurs in Desktop Window Manager (DWM.exe) when a window changes its parent window in an application. This issue occurs when several windows are displayed in multiple applications at the same time in Windows 7 Service Pack 1 (SP1) or Windows Server 2008 R2 SP1.</description>
  74.     <filename>Windows6.1-KB3048761-x64.msu</filename>
  75.     <url>http://download.microsoft.com/download/C/3/5/C35EDC8E-2D3C-493D-85A2-6092425529BB/Windows6.1-KB3048761-x64.msu</url>
  76.   </update>
  77.  
  78. <update id="KB3080333" category="5" publishdate="2015-08-07" article="https://support.microsoft.com/en-us/kb/3080333">
  79.     <title>Security Update for Microsoft Silverlight (KB3080333)</title>
  80.     <description>In addition to the vulnerabilities fixed that are by this security update, the update also includes functional, performance, reliability, and security improvements. This security update is backward-compatible with web applications that were created for earlier versions of Silverlight. This security update also includes the following improvements and fixes the following issues:Issue 1, Fixes an issue in the Silverlight 64-bit runtime that causes some applications to crash on Internet Explorer 11.Issue 2, Updates the Macintosh installer to successfully install on OS X systems that have Gatekeeper security enabled.Issue 3, Updates the Windows manual installer to include options to set MSN as your default homepage and Bing as your default search engine. Automated installations and upgrades of Silverlight (for example, installations and upgrades performed by Microsoft Update and WSUS) do not use the Silverlight installer user interface and do not offer to change your homepage or search engine.</description>
  81.     <filename>Silverlight_x64.exe</filename>
  82.     <url>http://download.microsoft.com/download/8/E/7/8E7D9B4B-2088-4AED-8356-20E65BE3EC91/40728.00/Silverlight_x64.exe</url>
  83.   </update>
  84.  
  85. <update id="KB3071756" category="1" publishdate="2015-08-10" article="https://support.microsoft.com/en-us/kb/3071756">
  86.     <title>Security Update for Windows 7 for x64-based Systems (KB3071756)</title>
  87.     <description>This security update resolves a vulnerability in Windows that could allow elevation of privilege if an attacker inserts a malicious USB device into a target system. An attacker could then write a malicious binary to disk and execute the code.</description>
  88.     <filename>Windows6.1-KB3071756-x64.msu</filename>
  89.     <url>http://download.microsoft.com/download/E/0/5/E05EA464-AB79-484E-BB88-28DACE3172D0/Windows6.1-KB3071756-x64.msu</url>
  90.   </update>
  91.  
  92. <update id="KB2894844" category="6" publishdate="2013-12-10" article="https://support.microsoft.com/en-us/kb/2894844">
  93.     <title>Security Update for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2 SP1 for x64-based Systems (KB2894844)</title>
  94.     <description>This security update resolves a vulnerability in the Microsoft .NET Framework 3.5.1 that could allow elevation of privilege on a server system if a user views a specially crafted webpage by using a web browser that can run ASP.NET applications. This security update applies to Windows 7 Service Pack 1 and Windows Server 2008 R2 Service Pack 1.</description>
  95.     <filename>Windows6.1-KB2894844-x64.msu</filename>
  96.     <url>http://download.microsoft.com/download/9/1/C/91C53D25-7A2E-411B-B3F5-33AE18ABFAA5/Windows6.1-KB2894844-x64.msu</url>
  97.   </update>
  98.  
  99. <update id="KB2979578" category="6" publishdate="2014-10-14" article="https://support.microsoft.com/en-us/kb/2979578">
  100.     <title>Security Update for Microsoft .NET Framework 4.5, 4.5.1 and 4.5.2 on Windows 7, Vista, Server 2008, Server 2008 R2 x64 (KB2979578)</title>
  101.     <description>This security update resolves the vulnerabilities that could allow elevation of privileges by improving how the Microsoft .NET Framework communicates with the ClickOnce installer process.</description>
  102.     <filename>NDP45-KB2979578-v2-x64.exe</filename>
  103.     <url>http://download.microsoft.com/download/F/A/A/FAACFBCF-E291-4208-A615-BD1E4768E372/NDP45-KB2979578-v2-x64.exe</url>
  104.   </update>
  105.  
  106. <update id="KB2972216" category="6" publishdate="2014-09-09" article="https://support.microsoft.com/en-us/kb/2972216">
  107.     <title>Security Update for Microsoft .NET Framework 4.5, 4.5.1 and 4.5.2 on Windows 7, Vista, Server 2008, Server 2008 R2 x64 (KB2972216)</title>
  108.     <description>This update resolves a vulnerability in the Microsoft .NET Framework that could allow denial of service if an attacker sends a few specially crafted requests to an affected .NET-enabled website. By default, ASP.NET is not installed when the .NET Framework is installed on any supported edition of Windows. To be affected by the vulnerability, customers must manually install and enable ASP.NET by registering it with Internet Information Services (IIS).</description>
  109.     <filename>NDP45-KB2972216-x64.exe</filename>
  110.     <url>http://download.microsoft.com/download/9/A/6/9A66A5DE-39AA-4F2C-8B00-06EEA7697EEF/NDP45-KB2972216-x64.exe</url>
  111.   </update>
  112.  
  113. <update id="KB3037581" category="6" publishdate="2015-04-13" article="https://support.microsoft.com/en-us/kb/3037581">
  114.     <title>Security Update for Microsoft .NET Framework 4.5, 4.5.1 and 4.5.2 on Windows 7, Vista, Server 2008, Server 2008 R2 x64 (KB3037581)</title>
  115.     <description>This update resolves a vulnerability in the Microsoft .NET Framework that could allow information disclosure if an attacker sends a specially crafted web request to an affected server that has custom error messages disabled. An attacker who successfully exploits the vulnerability would be able to view parts of a web configuration file that could expose sensitive information.</description>
  116.     <filename>NDP45-KB3037581-x64.exe</filename>
  117.     <url>http://download.microsoft.com/download/1/E/C/1EC99153-0699-4B6B-BCC4-8A881CE67602/NDP45-KB3037581-x64.exe</url>
  118.   </update>
  119.  
  120. <update id="KB3069762" category="1" publishdate="2015-07-13" article="https://support.microsoft.com/en-us/kb/3069762">
  121.     <title>Security Update for Windows 7 for x64-based Systems (KB3069762)</title>
  122.     <description>This security update resolves a vulnerability in Windows that could allow remote code execution if an attacker sends a specially crafted sequence of packets to a targeted system that has the Remote Desktop Protocol (RDP) server service enabled. By default, the RDP server service is not enabled on any Windows operating system. Systems that do not have the RDP server service enabled are not at risk. </description>
  123.     <filename>Windows6.1-KB3069762-x64.msu</filename>
  124.     <url>http://download.microsoft.com/download/6/D/5/6D51C6C5-2DE4-4990-BA2E-261460B2A568/Windows6.1-KB3069762-x64.msu</url>
  125.   </update>
  126.  
  127. <update id="KB3077715" category="2" publishdate="2015-08-17" article="https://support.microsoft.com/en-us/kb/3077715">
  128.     <title>Update for Windows 7 for x64-based Systems (KB3077715)</title>
  129.     <description>This update supersedes and replaces the update that is described in Microsoft Knowledge Base article 3013410 that was released in December 2014. All additional time zone changes that were released as hotfixes after update 3013410 was released are incorporated in this update.</description>
  130.     <filename>Windows6.1-KB3077715-x64.msu</filename>
  131.     <url>http://download.microsoft.com/download/F/0/D/F0DB76BD-3BD1-4D44-963B-99CD47119722/Windows6.1-KB3077715-x64.msu</url>
  132.   </update>
  133.  
  134. <update id="KB3078667" category="2" publishdate="2015-08-17" article="https://support.microsoft.com/en-us/kb/3078667">
  135.     <title>Update for Windows 7 for x64-based Systems (KB3078667)</title>
  136.     <description>This update fixes an issue in which a memory leak occurs in Desktop Window Manager (dwm.exe) in Windows 7 Service Pack 1 (SP1) or Windows Server 2008 R2 SP1.</description>
  137.     <filename>Windows6.1-KB3078667-x64.msu</filename>
  138.     <url>http://download.microsoft.com/download/C/A/7/CA7C5C4C-2025-4204-9958-5B6F27B391CF/Windows6.1-KB3078667-x64.msu</url>
  139.   </update>
  140.  
  141. <update id="KB3046002" category="1" publishdate="2015-05-11" article="https://support.microsoft.com/en-us/kb/3046002">
  142.     <title>Security Update for Windows 7 for x64-based Systems (KB3046002)</title>
  143.     <description>This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted Journal file. Users whose accounts are configured to have fewer user rights on the system could be less affected than users who have administrative user rights.</description>
  144.     <filename>Windows6.1-KB3046002-x64.msu</filename>
  145.     <url>http://download.microsoft.com/download/2/A/1/2A1E3B5C-83CC-4C4C-BF7D-C91FB26ABE35/Windows6.1-KB3046002-x64.msu</url>
  146.   </update>
  147.  
  148. <update id="KB3020370" category="2" publishdate="2015-04-20" article="https://support.microsoft.com/en-us/kb/3020370">
  149.     <title>Update for Windows 7 for x64-based Systems (KB3020370)</title>
  150.     <description>This update fixes an issue in Windows Server 2008 R2 and improves the copy of the Cmitrust.dll file in Windows 8.1, Windows RT 8.1, Windows 8, Windows RT, and Windows 7.</description>
  151.     <filename>Windows6.1-KB3020370-x64.msu</filename>
  152.     <url>http://download.microsoft.com/download/8/7/9/879FE45F-1B15-44F9-AB29-DAE40009CA36/Windows6.1-KB3020370-x64.msu</url>
  153.   </update>
  154.  
  155. <update id="KB3060716" category="1" publishdate="2015-08-10" article="https://support.microsoft.com/en-us/kb/3060716">
  156.     <title>Security Update for Windows 7 for x64-based Systems (KB3060716)</title>
  157.     <description>This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application or convinces a user to open a specially crafted file that invokes a vulnerable sandboxed application, allowing an attacker to escape the sandbox.</description>
  158.     <filename>Windows6.1-KB3060716-x64.msu</filename>
  159.     <url>http://download.microsoft.com/download/4/9/6/49687DF6-BEFE-41E5-A1C8-A41C1CF44AE5/Windows6.1-KB3060716-x64.msu</url>
  160.   </update>
  161.  
  162. <update id="KB3078071" category="1" publishdate="2015-08-10" article="https://support.microsoft.com/en-us/kb/3078071">
  163.     <title>Cumulative Security Update for Internet Explorer 11 for Windows 7 for x64-based Systems (KB3078071)</title>
  164.     <description>This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer.</description>
  165.     <filename>IE11-Windows6.1-KB3078071-x64.msu</filename>
  166.     <url>http://download.microsoft.com/download/8/0/5/8053377B-6551-4AEC-8E3E-2F24CBF4C17A/IE11-Windows6.1-KB3078071-x64.msu</url>
  167.   </update>
  168.  
  169. <update id="KB3013531" category="2" publishdate="2015-04-20" article="https://support.microsoft.com/en-us/kb/3013531">
  170.     <title>Update for Windows 7 for x64-based Systems (KB3013531)</title>
  171.     <description>This is an Optional update. Before you apply this update, you may receive a warning when you copy .mkv files from a computer to a Windows Phone. After you install this update, you will not receive the warning when you copy .mkv files to your Windows Phone.</description>
  172.     <filename>Windows6.1-KB3013531-v2-x64.msu</filename>
  173.     <url>http://download.microsoft.com/download/6/2/9/629E3C3E-509B-4648-911B-84501EEBB0B7/Windows6.1-KB3013531-v2-x64.msu</url>
  174.   </update>
  175.  
  176. <update id="KB3076949" category="1" publishdate="2015-08-10" article="https://support.microsoft.com/en-us/kb/3076949">
  177.     <title>Security Update for Windows 7 for x64-based Systems (KB3076949)</title>
  178.     <description>This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker forces an encrypted Secure Socket Layer (SSL) 2.0 session and uses a man-in-the-middle (MiTM) attack to decrypt parts of the encrypted traffic.</description>
  179.     <filename>Windows6.1-KB3076949-x64.msu</filename>
  180.     <url>http://download.microsoft.com/download/7/9/8/798C1015-04D9-4ECF-B34F-5A7E538A18CB/Windows6.1-KB3076949-x64.msu</url>
  181.   </update>
  182.  
  183. <update id="KB3076895" category="1" publishdate="2015-08-10" article="https://support.microsoft.com/en-us/kb/3076895">
  184.     <title>Security Update for Windows 7 for x64-based Systems (KB3076895)</title>
  185.     <description>This security update resolves vulnerabilities in Microsoft Windows and Microsoft Office. The vulnerabilities could allow information disclosure by either exposing memory addresses if a user clicks a specially crafted link or by explicitly allowing the use of Secure Sockets Layer (SSL) 2.0. However, in every case an attacker would have no way to force users to click a specially crafted link. An attacker would have to convince users to click the link, typically by way of an enticement in an email or Instant Messenger message.</description>
  186.     <filename>Windows6.1-KB3076895-x64.msu</filename>
  187.     <url>http://download.microsoft.com/download/0/2/F/02FEF9E1-EF54-48D1-A423-4EE4BF663183/Windows6.1-KB3076895-x64.msu</url>
  188.   </update>
  189.  
  190. <update id="KB3069392" category="1" publishdate="2015-07-13" article="https://support.microsoft.com/en-us/kb/3069392">
  191.     <title>Security Update for Windows 7 for x64-based Systems (KB3069392)</title>
  192.     <description>This security update resolves a vulnerability in Windows that could allow elevation of privilege if the Windows graphics component fails to correctly process bitmap conversions. An authenticated attacker who successfully exploited this vulnerability could elevate privileges on a targeted system. An attacker could then install programs, could view, change, or delete data, or could create new accounts with full administrative rights. An attacker must first log on to the system to exploit this vulnerability.</description>
  193.     <filename>Windows6.1-KB3069392-x64.msu</filename>
  194.     <url>http://download.microsoft.com/download/6/6/4/664C0A4C-74C3-42E1-8D5F-09A4F7471BF0/Windows6.1-KB3069392-x64.msu</url>
  195.   </update>
  196.  
  197. <update id="KB3046269" category="1" publishdate="2015-04-13" article="https://support.microsoft.com/en-us/kb/3046269">
  198.     <title>Security Update for Windows 7 for x64-based Systems (KB3046269)</title>
  199.     <description>This security update resolves a vulnerability in Microsoft Windows. An attacker who successfully exploited the vulnerability could take advantage of a known invalid task to cause Task Scheduler to run a specially crafted application in the context of the System account. An attacker could then do the following: Install programs. View, change, or delete data. Create new accounts that have full user rights.</description>
  200.     <filename>Windows6.1-KB3046269-x64.msu</filename>
  201.     <url>http://download.microsoft.com/download/8/6/6/866F143B-55ED-4308-81EA-20EE4167A639/Windows6.1-KB3046269-x64.msu</url>
  202.   </update>
  203.  
  204. <update id="KB3035490" category="6" publishdate="2015-05-11" article="https://support.microsoft.com/en-us/kb/3035490">
  205.     <title>Security Update for Microsoft .NET Framework 4.5, 4.5.1 and 4.5.2 on Windows 7, Vista, Server 2008, Server 2008 R2 x64 (KB3035490)</title>
  206.     <description>This update resolves vulnerabilities in the Microsoft .NET Framework. These vulnerabilities allow denial of service (DoS).</description>
  207.     <filename>NDP45-KB3035490-x64.exe</filename>
  208.     <url>http://download.microsoft.com/download/9/0/E/90EE0DDE-6DE6-485C-9FDE-CF9188DC44C5/NDP45-KB3035490-x64.exe</url>
  209.   </update>
  210.  
  211. <update id="KB3059317" category="2" publishdate="2015-06-02" article="https://support.microsoft.com/en-us/kb/3059317">
  212.     <title>Security Update for Windows 7 for x64-based Systems (KB3059317)</title>
  213.     <description>This security update resolves a vulnerability in Windows that could allow remote code execution if a user clicks a specially crafted link or a link to specially crafted content and then invokes F12 developer tools in Internet Explorer.</description>
  214.     <filename>Windows6.1-KB3059317-x64.msu</filename>
  215.     <url>http://download.microsoft.com/download/0/D/2/0D257A30-9009-4922-939C-358ED071FF63/Windows6.1-KB3059317-x64.msu</url>
  216.   </update>
  217.  
  218. <update id="KB3032655" category="6" publishdate="2015-11-05" article="https://support.microsoft.com/en-us/kb/3032655">
  219.     <title>Security Update for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2 SP1 for x64-based Systems (KB3032655)</title>
  220.     <description>This update resolves vulnerabilities in the Microsoft .NET Framework. These vulnerabilities could allow denial of service (DoS).</description>
  221.     <filename>Windows6.1-KB3032655-x64.msu</filename>
  222.     <url>http://download.microsoft.com/download/0/7/0/07075A5B-7921-4E01-B71E-003EBB8C3893/Windows6.1-KB3032655-x64.msu</url>
  223.   </update>
  224.  
  225. <update id="KB3072633" category="1" publishdate="2015-07-13" article="https://support.microsoft.com/en-us/kb/3072633">
  226.     <title>Security Update for Windows 7 for x64-based Systems (KB3072633)</title>
  227.     <description>This security update resolves vulnerabilities in Windows. These vulnerabilities could allow elevation of privilege if they are used together with another vulnerability that allows arbitrary code to be run through Internet Explorer. If the other vulnerability is exploited, an attacker could then exploit the vulnerabilities that are addressed in this bulletin to cause arbitrary code to run at a medium integrity level.</description>
  228.     <filename>Windows6.1-KB3072633-x64.msu</filename>
  229.     <url>http://download.microsoft.com/download/A/9/3/A93D131A-B9CE-4446-A615-32DCCBFFDAE7/Windows6.1-KB3072633-x64.msu</url>
  230.   </update>
  231.  
  232. <update id="KB3040272" category="2" publishdate="2015-06-15" article="https://support.microsoft.com/en-us/kb/3040272">
  233.     <title>Update for Windows 7 for x64-based Systems (KB3040272)</title>
  234.     <description>This update fixes an issue that occurs because the language pack catalogs with more than 127 characters in the file names will be truncated when the characters are added to the catalog database. If more than three of these catalogs exist on a system, the system will rebuild the catalog database on every start. Therefore, the start time increases. This issue occurs when you install another language pack to Windows 8, Windows Server 2012, Windows 7 Service Pack 1 (SP1), or Windows Server 2008 R2 SP1.</description>
  235.     <filename>Windows6.1-KB3040272-x64.msu</filename>
  236.     <url>http://download.microsoft.com/download/6/4/B/64B593B0-B208-4CED-8489-881BC66B8DD6/Windows6.1-KB3040272-x64.msu</url>
  237.   </update>
  238.  
  239. <update id="KB3023215" category="6" publishdate="2015-05-12" article="https://support.microsoft.com/en-us/kb/3023215">
  240.     <title>Security Update for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2 SP1 for x64-based Systems (KB3023215)</title>
  241.     <description>This update resolves vulnerabilities in the Microsoft .NET Framework. These vulnerabilities could allow elevation of privilege if an attacker sends specially crafted data to a WinForms application that is running in partial trust.</description>
  242.     <filename>Windows6.1-KB3023215-x64.msu</filename>
  243.     <url>http://download.microsoft.com/download/7/7/F/77F162BC-9A0D-4716-915C-80FDE79EA3AA/Windows6.1-KB3023215-x64.msu</url>
  244.   </update>
  245.  
  246. <update id="KB3057154" category="1" publishdate="2015-07-13" article="https://support.microsoft.com/en-us/kb/3057154">
  247.     <title>Security Update for Windows 7 for x64-based Systems (KB3057154)</title>
  248.     <description>Microsoft is announcing the availability of an update to harden scenarios in which Data Encryption Standard (DES) encryption keys are used with accounts. Microsoft disabled DES by default starting in Windows 7 and Windows Server 2008 R2. However, this update provides enhanced user protection in environments where DES is still enabled for application compatibility reasons. The improvement is part of ongoing efforts to bolster the effectiveness of encryption in Windows. If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update.</description>
  249.     <filename>Windows6.1-KB3057154-x64.msu</filename>
  250.     <url>http://download.microsoft.com/download/5/0/2/50265C6B-3557-4B68-891E-8B0A8B6F868F/Windows6.1-KB3057154-x64.msu</url>
  251.   </update>
  252.  
  253. <update id="KB3072630" category="1" publishdate="2015-07-13" article="https://support.microsoft.com/en-us/kb/3072630">
  254.     <title>Security Update for Windows 7 for x64-based Systems (KB3072630)</title>
  255.     <description>This security update resolves a vulnerability in Windows that could allow elevation of privilege if the Windows Installer service incorrectly runs custom action scripts. To exploit the vulnerability, an attacker must first compromise a user who is logged on to the target system. An attacker could then install programs, could view, change, or delete data, or could create new accounts by having full administrative rights.</description>
  256.     <filename>Windows6.1-KB3072630-x64.msu</filename>
  257.     <url>http://download.microsoft.com/download/C/F/D/CFD7C6AF-CDED-43EE-BF3B-3E542F661FD0/Windows6.1-KB3072630-x64.msu</url>
  258.   </update>
  259.  
  260. <update id="KB3078601" category="1" publishdate="2015-08-18" article="https://support.microsoft.com/en-us/kb/3078601">
  261.     <title>Security Update for Windows 7 for x64-based Systems (KB3078601)</title>
  262.     <description>This security update resolves vulnerabilities in Windows that could allow remote code execution if a user opens a specially crafted document or goes to an untrusted webpage that contains embedded TrueType or OpenType fonts.</description>
  263.     <filename>Windows6.1-KB3078601-x64.msu</filename>
  264.     <url>http://download.microsoft.com/download/0/4/A/04A4348A-EB14-461C-B5B1-25EEBB1A24B8/Windows6.1-KB3078601-x64.msu</url>
  265.   </update>
  266.  
  267. <update id="KB3080149" category="2" publishdate="2015-08-17" article="https://support.microsoft.com/en-us/kb/3080149">
  268.     <title>Update for Windows 7 for x64-based Systems (KB3080149)</title>
  269.     <description>This package updates the Diagnostics and Telemetry tracking service to existing devices. This service provides benefits from the latest version of Windows to systems that have not yet upgraded. The update also supports applications that are subscribed to Visual Studio Application Insights.</description>
  270.     <filename>Windows6.1-KB3080149-x64.msu</filename>
  271.     <url>http://download.microsoft.com/download/4/E/8/4E864B31-7756-4639-8716-0379F6435016/Windows6.1-KB3080149-x64.msu</url>
  272.   </update>
  273.  
  274. <update id="KB3046017" category="1" publishdate="2015-08-10" article="https://support.microsoft.com/en-us/kb/3046017">
  275.     <title>Security Update for Windows 7 for x64-based Systems (KB3046017)</title>
  276.     <description>This security update helps resolve an information disclosure vulnerability in Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability, an attacker would first have to use another vulnerability in Internet Explorer to run code in the sandboxed process. The attacker could then run Notepad, Visio, PowerPoint, Excel, or Word by using an unsafe command-line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates that are provided in this bulletin and also the update for Internet Explorer that is provided in MS15-079. Similarly, customers who are running an affected Office product must also install the applicable updates that are provided in MS15-081.</description>
  277.     <filename>Windows6.1-KB3046017-x64.msu</filename>
  278.     <url>http://download.microsoft.com/download/6/6/1/661F385D-4FC9-4145-A38B-FFB515F6322B/Windows6.1-KB3046017-x64.msu</url>
  279.   </update>
  280.  
  281. <update id="KB3020388" category="1" publishdate="2015-01-12" article="https://support.microsoft.com/en-us/kb/3020388">
  282.     <title>Security Update for Windows 7 for x64-based Systems (KB3020388)</title>
  283.     <description>This security update resolves a privately reported vulnerability in the TS WebProxy component in Windows 7 and Windows Server 2008 R2 if the Remote Desktop Connection 8.1 client update is installed. The vulnerability could allow elevation of privilege if an attacker convinces a user to run a specially crafted application. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on by using administrative user rights, an attacker could then do the following: Install programs, View, change, or delete data, Create new accounts that have full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less affected than users who operate by using administrative user rights.</description>
  284.     <filename>Windows6.1-KB3020388-x64.msu</filename>
  285.     <url>http://download.microsoft.com/download/A/D/6/AD64890E-91F8-4E9A-80CC-D5A92998F9E3/Windows6.1-KB3020388-x64.msu</url>
  286.   </update>
  287.  
  288. <update id="KB3075249" category="2" publishdate="2015-08-17" article="https://support.microsoft.com/en-us/kb/3075249">
  289.     <title>Update for Windows 7 for x64-based Systems (KB3075249)</title>
  290.     <description>This update adds telemetry points to the User Account Control (UAC) feature to collect information on elevations that come from low integrity levels.</description>
  291.     <filename>Windows6.1-KB3075249-x64.msu</filename>
  292.     <url>http://download.microsoft.com/download/0/4/6/046ABE19-0298-454A-9712-C0E17A905D19/Windows6.1-KB3075249-x64.msu</url>
  293.   </update>
  294.  
  295. <update id="KB3020369" category="2" publishdate="_" article="https://support.microsoft.com/en-us/kb/3020369">
  296.     <title>Update for Windows 7 for x64-based Systems (KB3020369)</title>
  297.     <description>Update 2819745 installation fails when you try to upgrade to Windows Management Framework (WMF) 4.0 by installing update 2819745 on a read-only domain controller (RODC) in Windows 7 Service Pack 1 (SP1) or Windows Server 2008 R2 SP1.</description>
  298.     <filename>Windows6.1-KB3020369-x64.msu</filename>
  299.     <url>http://download.microsoft.com/download/5/D/0/5D0821EB-A92D-4CA2-9020-EC41D56B074F/Windows6.1-KB3020369-x64.msu</url>
  300.   </update>
  301.  
  302. <update id="KB3054476" category="2" publishdate="2015-05-18" article="https://support.microsoft.com/en-us/kb/3054476">
  303.     <title>Update for Windows 7 for x64-based Systems (KB3054476)</title>
  304.     <description>This update helps Microsoft improve the experiences when users run stream.sys driver-based applications in Windows 7 Service Pack 1 (SP1) or Windows Server 2008 R2 SP1, such as the performance and the quality improvements.</description>
  305.     <filename>Windows6.1-KB3054476-x64.msu</filename>
  306.     <url>http://download.microsoft.com/download/9/2/2/922E1CE7-FDEF-4A1B-8B7E-4A9DE2526C65/Windows6.1-KB3054476-x64.msu</url>
  307.   </update>
  308.  
  309. <update id="KB3042553" category="1" publishdate="2015-04-13" article="https://support.microsoft.com/en-us/kb/3042553">
  310.     <title>Security Update for Windows 7 for x64-based Systems (KB3042553)</title>
  311.     <description>This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sends a specially crafted HTTP request to an affected Windows system. The security update addresses the vulnerability by modifying how the Windows HTTP stack handles requests.</description>
  312.     <filename>Windows6.1-KB3042553-x64.msu</filename>
  313.     <url>http://download.microsoft.com/download/B/B/4/BB460DAB-93FA-4E09-804D-95DBB44787AD/Windows6.1-KB3042553-x64.msu</url>
  314.   </update>
  315.  
  316. <update id="KB3023224" category="6" publishdate="2015-05-12" article="https://support.microsoft.com/en-us/kb/3023224">
  317.     <title>Security Update for Microsoft .NET Framework 4.5, 4.5.1 and 4.5.2 on Windows 7, Vista, Server 2008, Server 2008 R2 x64 (KB3023224)</title>
  318.     <description>This update resolves vulnerabilities in the Microsoft .NET Framework. These vulnerabilities could allow elevation of privilege if an attacker sends specially crafted data to a WinForms application that is running in partial trust.</description>
  319.     <filename>NDP45-KB3023224-x64.exe</filename>
  320.     <url>http://download.microsoft.com/download/9/B/6/9B6C8064-B957-4B66-83F4-F4EDD5943452/NDP45-KB3023224-x64.exe</url>
  321.   </update>
  322.  
  323. <update id="KB3092627" category="2" publishdate="2015-09-01" article="https://support.microsoft.com/en-us/kb/3092627">
  324.     <title>Update for Windows 7 for x64-based Systems (KB3092627)</title>
  325.     <description>This fixes an issue in which programs or Windows may freeze after you install security update 3076895.</description>
  326.     <filename>Windows6.1-KB3092627-x64.msu</filename>
  327.     <url>http://download.microsoft.com/download/2/6/5/265A92BD-1A85-4218-9FB9-1D8F908B75D9/Windows6.1-KB3092627-x64.msu</url>
  328.   </update>
  329.  
  330. <update id="KB3037574" category="6" publishdate="2015-04-13" article="https://support.microsoft.com/en-us/kb/3037574">
  331.     <title>Security Update for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2 SP1 for x64-based Systems (KB3037574)</title>
  332.     <description>This update resolves a vulnerability in the Microsoft .NET Framework that could allow information disclosure if an attacker sends a specially crafted web request to an affected server that has custom error messages disabled. An attacker who successfully exploits the vulnerability could view parts of a web configuration file that could expose sensitive information.</description>
  333.     <filename>Windows6.1-KB3037574-x64.msu</filename>
  334.     <url>http://download.microsoft.com/download/4/C/1/4C15B4E7-ECF4-43D1-BD09-DE16C3DA2EF6/Windows6.1-KB3037574-x64.msu</url>
  335.   </update>
  336.  
  337. <update id="KB2978128" category="6" publishdate="2014-11-11" article="https://support.microsoft.com/en-us/kb/2978128">
  338.     <title>Security Update for Microsoft .NET Framework 4.5, 4.5.1 and 4.5.2 on Windows 7, Vista, Server 2008, Server 2008 R2 x64 (KB2978128)</title>
  339.     <description>This update resolves a vulnerability in the Microsoft .NET Framework that could allow elevation of privilege.</description>
  340.     <filename>NDP45-KB2978128-x64.exe</filename>
  341.     <url>http://download.microsoft.com/download/4/A/6/4A6F3D9B-18B7-4BB0-BFAF-1342B0C5B798/NDP45-KB2978128-x64.exe</url>
  342.   </update>
  343.  
  344. <update id="KB3045645" category="2" publishdate="2015-04-22" article="https://support.microsoft.com/en-us/kb/3045645">
  345.     <title>Update for Windows 7 for x64-based Systems (KB3045645)</title>
  346.     <description>This update is available when a customized .sdb file is created in Windows 8, Windows RT, Windows Server 2012, Windows 7 Service Pack 1 (SP1), or Windows Server 2008 R2 SP1.</description>
  347.     <filename>Windows6.1-KB3045645-x64.msu</filename>
  348.     <url>http://download.microsoft.com/download/D/F/7/DF76C57D-2085-49D5-B703-57CE16445725/Windows6.1-KB3045645-x64.msu</url>
  349.   </update>
  350.  
  351. <update id="KB3004375" category="1" publishdate="2015-02-09" article="https://support.microsoft.com/en-us/kb/3004375">
  352.     <title>Security Update for Windows 7 (KB3004375)</title>
  353.     <description>This update expands the Audit Process Creation policy to include the command information that is passed to every process. This is a new feature that provides valuable information to help administrators investigate, monitor, and troubleshoot security-related issues on their networks.</description>
  354.     <filename>Windows6.1-KB3004375-v3-x86.msu</filename>
  355.     <url>http://download.microsoft.com/download/0/E/3/0E32F39B-1D5E-4B0E-804C-F736DAADDD93/Windows6.1-KB3004375-v3-x86.msu</url>
  356.   </update>
  357.  
  358. <update id="KB3079757" category="1" publishdate="2015-08-10" article="https://support.microsoft.com/en-us/kb/3079757">
  359.     <title>Security Update for Windows 7 for x64-based Systems (KB3079757)</title>
  360.     <description>This security update helps resolve an information disclosure vulnerability in Windows, Internet Explorer, and Microsoft Office. To exploit the vulnerability, an attacker would first have to use another vulnerability in Internet Explorer to run code in the sandboxed process. The attacker could then run Notepad, Visio, PowerPoint, Excel, or Word by using an unsafe command-line parameter to effect information disclosure. To be protected from the vulnerability, customers must apply the updates that is provided in this bulletin and also the update for Internet Explorer that is provided in MS15-079. Similarly, customers who are running an affected Microsoft Office product must also install the applicable updates that are provided in MS15-081.</description>
  361.     <filename>Windows6.1-KB3079757-x64.msu</filename>
  362.     <url>http://download.microsoft.com/download/0/3/C/03C00A89-C1BE-48CC-A20E-C717B37886E1/Windows6.1-KB3079757-x64.msu</url>
  363.   </update>
  364.  
  365. <update id="KB3045685" category="1" publishdate="2015-04-13" article="https://support.microsoft.com/en-us/kb/3045685">
  366.     <title>Security Update for Windows 7 for x64-based Systems (KB3045685)</title>
  367.     <description>This security update resolves vulnerabilities in Windows. These vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. To exploit the vulnerabilities, an attacker would first have to log on to the system. This security update addresses the vulnerabilities by correcting how Windows validates impersonation events.</description>
  368.     <filename>Windows6.1-KB3045685-x64.msu</filename>
  369.     <url>http://download.microsoft.com/download/A/7/A/A7A9D4F9-4F88-4238-AD5D-60B9E6F04A84/Windows6.1-KB3045685-x64.msu</url>
  370.   </update>
  371.  
  372. <update id="KB3031432" category="1" publishdate="2015-02-09" article="https://support.microsoft.com/en-us/kb/3031432">
  373.     <title>Security Update for Windows 7 for x64-based Systems (KB3031432)</title>
  374.     <description>This security update resolves a vulnerability in Microsoft Windows that could allow an attacker to take advantage of the lack of impersonation-level security checks to elevate privileges during process creation. An authenticated attacker who successfully exploited this vulnerability could obtain administrator credentials and use them to elevate privileges. An attacker could then do the following: Install programs, View, change, or delete data, Create new accounts that have full administrative rights.</description>
  375.     <filename>Windows6.1-KB3031432-x64.msu</filename>
  376.     <url>http://download.microsoft.com/download/D/D/E/DDEEA567-71E7-40A1-A77D-47A305233B4C/Windows6.1-KB3031432-x64.msu</url>
  377.   </update>
  378.  
  379. <update id="KB3075851" category="2" publishdate="_2015-08-03" article="https://support.microsoft.com/en-us/kb/3075851">
  380.     <title>Update for Windows 7 for x64-based Systems (KB3075851)</title>
  381.     <description>This update contains some improvements to Windows Update Client in Windows 7 Service Pack 1 (SP1) and Windows Server 2008 R2 SP1. This update also resolves an issue in which certain Windows Update operations fail when you install Windows Update Client for Windows 7 and Windows Server 2008 R2: July 2015 (3065987) on Windows 7 Embedded editions.</description>
  382.     <filename>Windows6.1-KB3075851-x64.msu</filename>
  383.     <url>http://download.microsoft.com/download/0/7/3/073377A6-5DF7-485F-8EA0-BEB0B90C2099/Windows6.1-KB3075851-x64.msu</url>
  384.   </update>
  385.  
  386. <update id="KB2984976" category="1" publishdate="2014-10-13" article="https://support.microsoft.com/en-us/kb/2984976">
  387.     <title>Security Update for Windows 7 for x64-based Systems (KB2984976)</title>
  388.     <description>This Remote Desktop Protocol (RDP) 8.0 update enables the Remote Desktop Connection client to perform restricted administration logons. It also enables the Remote Desktop Service that is running the RDP 8.0 host to perform restricted administration.</description>
  389.     <filename>Windows6.1-KB2984976-x64.msu</filename>
  390.     <url>http://download.microsoft.com/download/D/D/F/DDF595D0-4EAB-49A9-AE1B-CBF90479ADE1/Windows6.1-KB2984976-x64.msu</url>
  391.   </update>
  392.  
  393. <update id="KB2965788" category="1" publishdate="2014-06-09" article="https://support.microsoft.com/en-us/kb/2965788">
  394.     <title>Security Update for Windows 7 for x64-based Systems (KB2965788)</title>
  395.     <description>This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow tampering if an attacker gains access to the same network segment as the targeted system during an active Remote Desktop Protocol (RDP) session, and then sends specially crafted RDP packets to the targeted system. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk.</description>
  396.     <filename>Windows6.1-KB2965788-x64.msu</filename>
  397.     <url>http://download.microsoft.com/download/4/4/6/446309DE-268B-45CD-B6F5-6BCCECC450D2/Windows6.1-KB2965788-x64.msu</url>
  398.   </update>
  399.  
  400. <update id="KB2592687" category="2" publishdate="2012-10-22" article="https://support.microsoft.com/en-us/kb/2592687">
  401.     <title>Update for Windows 7 for x64-based Systems (KB2592687)</title>
  402.     <description>The Remote Desktop Protocol 8.0 update enables you to use the new Remote Desktop Services features. These features are introduced in Windows 8 and in Windows Server 2012 and are available for computers that are running Windows 7 Service Pack 1 or Windows Server 2008 R2 Service Pack 1.</description>
  403.     <filename>Windows6.1-KB2592687-x64.msu</filename>
  404.     <url>http://download.microsoft.com/download/A/F/5/AF5C565C-9771-4BFB-973B-4094C1F58646/Windows6.1-KB2592687-x64.msu</url>
  405.   </update>
  406.  
  407. <update id="KB2533552" category="2" publishdate="2011-05-09" article="https://support.microsoft.com/en-us/kb/2533552">
  408.     <title>Update for Windows 7 for x64-based Systems (KB2533552)</title>
  409.     <description>Install this update to enable future updates to install successfully on all editions of Windows 7 or Windows Server 2008 R2. This update may be required before selected future updates can be installed. After you install this item, it cannot be removed.</description>
  410.     <filename>Windows6.1-KB2533552-x64.msu</filename>
  411.     <url>http://download.microsoft.com/download/B/6/F/B6F95B10-8B74-42F2-B57A-2C559D43BC28/Windows6.1-KB2533552-x64.msu</url>
  412.   </update>
  413.  
  414. <update id="KB3069114" category="1" publishdate="2015-09-07" article="https://support.microsoft.com/en-us/kb/3069114">
  415.     <title>Security Update for Windows 7 for x64-based Systems (KB3069114)</title>
  416.     <description>This security update resolves vulnerabilities in Windows. The more severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Windows Journal file. Users whose accounts are configured to have fewer user rights on the system could be less affected than users who operate with administrative user rights.</description>
  417.     <filename>Windows6.1-KB3069114-x64.msu</filename>
  418.     <url>http://download.microsoft.com/download/2/3/6/23620954-7559-4DF9-9AF1-CE0836B6768B/Windows6.1-KB3069114-x64.msu</url>
  419.   </update>
  420.  
  421. <update id="KB3074550" category="6" publishdate="2015-09-07" article="https://support.microsoft.com/en-us/kb/3074550">
  422.     <title>Security Update for Microsoft .NET Framework 4.5, 4.5.1 and 4.5.2 on Windows 7, Vista, Server 2008, Server 2008 R2 x64 (KB3074550)</title>
  423.     <description>This update resolves vulnerabilities in the Microsoft .NET Framework that could allow elevation of privilege if a user runs a specially crafted .NET Framework application.</description>
  424.     <filename>NDP45-KB3074550-x64.exe</filename>
  425.     <url>http://download.microsoft.com/download/0/5/4/054BD648-DAF1-409C-871A-38D8881EEBDE/NDP45-KB3074550-x64.exe</url>
  426.   </update>
  427.  
  428. <update id="KB3084135" category="1" publishdate="2015-09-07" article="https://support.microsoft.com/en-us/kb/3084135">
  429.     <title>Security Update for Windows 7 for x64-based Systems (KB3084135)</title>
  430.     <description>This security update resolves vulnerabilities in Windows that could allow elevation of privilege if an attacker logs on to a system and runs a specially crafted application.</description>
  431.     <filename>Windows6.1-KB3084135-x64.msu</filename>
  432.     <url>http://download.microsoft.com/download/3/5/5/3553449F-7393-44A2-A940-2E6A72AA6238/Windows6.1-KB3084135-x64.msu</url>
  433.   </update>
  434.  
  435. <update id="KB890830" category="5" publishdate="2015-09-08" article="https://support.microsoft.com/en-us/kb/890830">
  436.     <title>Windows Malicious Software Removal Tool x64 - September 2015 (KB890830)</title>
  437.     <description>The Microsoft Windows Malicious Software Removal Tool helps remove malicious software from your computers that are running Windows 10 Technical Preview, Windows 8.1, Windows Server 2012 R2, Windows 8, Windows Server 2012, Windows 7, Windows Vista, Windows Server 2003, Windows Server 2008, or Windows XP.</description>
  438.     <filename>Windows-KB890830-x64-V5.28.exe</filename>
  439.     <url>http://download.microsoft.com/download/2/C/5/2C563B99-54D9-4D85-A82B-45D3CD2F53CE/Windows-KB890830-x64-V5.28.exe</url>
  440.   </update>
  441.  
  442. <update id="(KB3087038" category="1" publishdate="2015-09-07" article="https://support.microsoft.com/en-us/kb/3087038">
  443.     <title>Cumulative Security Update for Internet Explorer 11 for Windows 7 for x64-based Systems (KB3087038)</title>
  444.     <description>This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer.</description>
  445.     <filename>IE11-Windows6.1-KB3087038-x64.msu</filename>
  446.     <url>http://download.microsoft.com/download/6/B/6/6B6A405C-EBF7-403A-B971-787DC746E892/IE11-Windows6.1-KB3087038-x64.msu</url>
  447.   </update>
  448.  
  449. <update id="KB3074543" category="6" publishdate="2015-09-04" article="https://support.microsoft.com/en-us/kb/3074543">
  450.     <title>Security Update for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2 SP1 for x64-based Systems (KB3074543)</title>
  451.     <description>This update resolves vulnerabilities in the Microsoft .NET Framework that could allow elevation of privilege if a user runs a specially crafted .NET Framework application.</description>
  452.     <filename>Windows6.1-KB3074543-x64.msu</filename>
  453.     <url>http://download.microsoft.com/download/4/6/C/46C9B354-83B1-405D-B28B-842987161999/Windows6.1-KB3074543-x64.msu</url>
  454.   </update>
  455.  
  456. <update id="KB3083992" category="1" publishdate="2015-09-07" article="https://support.microsoft.com/en-us/kb/3083992">
  457.     <title>Security Update for Windows 7 for x64-based Systems (KB3083992)</title>
  458.     <description>A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.</description>
  459.     <filename>Windows6.1-KB3083992-x64.msu</filename>
  460.     <url>http://download.microsoft.com/download/8/F/9/8F907ED6-25DD-49F0-B172-38DCB40B2F8B/Windows6.1-KB3083992-x64.msu</url>
  461.   </update>
  462.  
  463. <update id="KB3087039" category="1" publishdate="2015-09-08" article="https://support.microsoft.com/en-us/kb/3087039">
  464.     <title>Security Update for Windows 7 for x64-based Systems (KB3087039)</title>
  465.     <description>This security update resolves vulnerabilities in Windows, Microsoft Office, and Microsoft Lync. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or goes to an untrusted webpage that contains embedded OpenType fonts.</description>
  466.     <filename>Windows6.1-KB3087039-x64.msu</filename>
  467.     <url>http://download.microsoft.com/download/4/2/F/42F048F1-A3AE-41D9-9965-AA57F8C44FA4/Windows6.1-KB3087039-x64.msu</url>
  468.   </update>
  469.  
  470. <update id="KB3083324" category="2" publishdate="2015-09-08" article="https://support.microsoft.com/en-us/kb/3083324">
  471.     <title>Update for Windows 7 for x64-based Systems (KB3083324)</title>
  472.     <description>This update contains some improvements to Windows Update Client in Windows 7 Service Pack 1 (SP1) and Windows Server 2008 R2 SP1.</description>
  473.     <filename>Windows6.1-KB3083324-x64.msu</filename>
  474.     <url>http://download.microsoft.com/download/B/E/C/BEC640F7-0741-49B6-9F46-696D4437254B/Windows6.1-KB3083324-x64.msu</url>
  475.   </update>
  476.  
  477. </updates>
  478.  
  479. </updatelist>
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top