Patch Repository

MS16-123 Bulletin Details
Bulletin ID MS16-123
Title Security Update for Windows Kernel-Mode Drivers (3192892)
Summary This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application that could exploit the vulnerabilities and take control of an affected system.
Knowledgebase 3192892

List of Patches

S.No Patch Description Severity
.Security Update for Windows Vista for x64-based Systems (KB3183431)Important
.Security Update for Windows Vista (KB3191203)Important
.Security Update for Windows Vista (KB3183431)Important
.Security Update for Windows Server 2008 (KB3191203)Important
.Security Update for Windows Server 2008 (KB3183431)Important
.October, 2016 Security Only Quality Update for Windows 7 (KB3192391)Important
.October, 2016 Security Only Quality Update for Windows 8.1 (KB3192392)Important
.Security Update for Windows Vista for x64-based Systems (KB3191203)Important
.October, 2016 Security Only Quality Update for Windows 8.1 for x64-based Systems (KB3192392)Important
.Security Update for Windows Server 2008 x64 Edition (KB3191203)Important
.Security Update for Windows Server 2008 x64 Edition (KB3183431)Important
.October, 2016 Security Only Quality Update for Windows 7 for x64-based Systems (KB3192391)Important
.October, 2016 Security Only Quality Update for Windows Server 2008 R2 for x64-based Systems (KB3192391)Important
.October, 2016 Security Only Quality Update for Windows Server 2012 (KB3192393)Important
.October, 2016 Security Only Quality Update for Windows Server 2012 R2 (KB3192392)Important

Disclaimer: This webpage is intended to provide you information about patch announcement for certain specific software products. The information is provided "As Is" without warranty of any kind. The links provided point to pages on the vendors websites. You can get more information by clicking the links to visit the relevant pages on the vendors website.