MS18-MAY8 Bulletin Details
Bulletin ID MS18-MAY8
Title Security Update for .NET Framework (KB4095875)
Summary A security feature bypass vulnerability exists in .Net Framework which could allow an attacker to bypass Device Guard. An attacker who successfully exploited this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the machine. To exploit the vulnerability, an attacker would first have to access the local machine, and then run a malicious program. The update addresses the vulnerability by correcting how .Net Framework instantiates COM objects.
Knowledgebase 4095875

List of Patches

S.No Patch Name Severity
1Windows6.0-kb4095513-x86.msuImportant
2Windows6.0-kb4095873-x86.msuImportant
3Windows6.0-kb4095513-x64.msuImportant
4Windows6.0-kb4095873-x64.msuImportant
5Windows8.1-kb4095515-x86.msuImportant
6Windows8.1-kb4095875-x86.msuImportant
7Windows6.1-kb4095514-x86.msuImportant
8Windows6.1-kb4095874-x86.msuImportant
9Windows8-rt-kb4095872-x64.msuImportant
10Windows8-rt-kb4095512-x64.msuImportant
11Windows8.1-kb4095515-x64.msuImportant
12Windows6.1-kb4095514-x64.msuImportant
13Windows8.1-kb4095875-x64.msuImportant
14windows6.1-kb4095874-x64.msuImportant
15ndp45-kb4095519-x86.exeImportant
16ndp45-kb4095519-x64.exeImportant
17Windows8-rt-kb4096494-x64.msuImportant
18Windows8-rt-kb4095518-x64.msuImportant
19Windows8.1-kb4095517-x86.msuImportant
20ndp45-kb4096495-x64.exeImportant
21ndp45-kb4096495-x86.exeImportant
22Windows8.1-kb4095517-x64.msuImportant
23Windows8.1-kb4095876-x86.msuImportant
24Windows8.1-kb4095876-x64.msuImportant
25Windows8-rt-kb4096416-x64.msuImportant
26ndp47-kb4096237-x86.exeImportant
27Windows8-rt-kb4096235-x64.msuImportant
28ndp47-kb4096237-x64.exeImportant
29Windows8.1-kb4096236-x86.msuImportant
30Windows8.1-kb4096236-x64.msuImportant
31ndp47-kb4096418-x86.exeImportant
32ndp47-kb4096418-x64.exeImportant
33Windows8.1-kb4096417-x86.msuImportant
34Windows8.1-kb4096417-x64.msuImportant

Disclaimer: This webpage is intended to provide you information about patch announcement for certain specific software products. The information is provided "As Is" without warranty of any kind. The links provided point to pages on the vendors websites. You can get more information by clicking the links to visit the relevant pages on the vendors website.