Patch Repository - latest Security Patches

.NET Framework 3.5 (x64) Patch Details
Patch Name Windows6.1-KB2861698-x64.msu
Patch Description Security Update for Microsoft .NET Framework 3.5.1 on Windows 7 Service Pack 1 and Windows Server 2008 R2 Service Pack 1 (KB2861698)
Bulletin Id MS13-082
Bulletin Title Vulnerabilities in .NET Framework Could Allow Remote Code Execution (2878890)
Severity Important
Location Path Windows6.1-KB2861698-x64.msu
Bulletin Summary This security update is rated Critical for Microsoft .NET Framework 3.0 Service Pack 2, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4, and Microsoft .NET Framework 4.5 on affected editions of Microsoft Windows; it is rated Important for Microsoft .NET Framework 2.0 Service Pack 2 and Microsoft .NET Framework 3.5 Service Pack 1 on affected editions of Microsoft Windows.
Superceding Bulletin Id None
Patch Release Date Oct 8, 2013

Affected Product Information

Product Name Service Pack Name
.NET Framework 3.5 (x64).NET Framework 3.5 (x64) SP1
Windows 7 Ultimate Edition (x64)Windows 7 SP1 (x64)
Windows 7 Professional Edition (x64)Windows 7 SP1 (x64)
Windows 7 Enterprise Edition (x64)Windows 7 SP1 (x64)
Windows Server 2008 R2 Standard Edition (x64)Windows Server 2008 R2 SP1 (x64)
Windows Server 2008 R2 Enterprise Edition (x64)Windows Server 2008 R2 SP1 (x64)
Windows Server 2008 R2 Datacenter Edition (x64)Windows Server 2008 R2 SP1 (x64)
Windows Server 2008 R2 Web Server Edition (x64)Windows Server 2008 R2 SP1 (x64)
Windows 7 Embedded Standard Edition (x64)Windows 7 SP1 (x64)
Windows Server 2008 R2 Foundation Edition (x64)Windows Server 2008 R2 SP1 (x64)
Windows 7 Home Premium Edition (x64)Windows 7 SP1 (x64)

Disclaimer: This webpage is intended to provide you information about patch announcement for certain specific software products. The information is provided "As Is" without warranty of any kind. The links provided point to pages on the vendors websites. You can get more information by clicking the links to visit the relevant pages on the vendors website.