Patch Repository

MSXML 3.0 Patch Details
Patch Name Windows6.0-2008-KB3146963-x64.msu
Patch Description Security Update for Windows Server 2008 x64 Edition (KB3146963)
Bulletin Id MS16-040
Bulletin Title Security Update for Microsoft XML Core Services (3148541)
Severity Critical
Location Path Windows6.0-2008-KB3146963-x64.msu
Bulletin Summary This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user clicks a specially crafted link that could allow an attacker to run malicious code remotely to take control of the users system.
Superceding Bulletin Id MS17-022
Patch Release Date Apr 12, 2016

Affected Product Information

Product Name Service Pack Name
MSXML 3.0MSXML 3.0 Gold
MSXML 3.0MSXML 3.0 SP1
MSXML 3.0MSXML 3.0 SP2
MSXML 3.0MSXML 3.0 SP3
MSXML 3.0MSXML 3.0 SP4
MSXML 3.0MSXML 3.0 SP5
MSXML 3.0MSXML 3.0 SP7
MSXML 3.0MSXML 3.0 SP8
MSXML 3.0MSXML 3.0 SP9
MSXML 3.0MSXML 3.0 SP10
MSXML 3.0MSXML 3.0 SP11
Windows Server 2008 Standard Edition (x64)Windows Server 2008 SP2 (x64)
Windows Server 2008 Enterprise Edition (x64)Windows Server 2008 SP2 (x64)
Windows Server 2008 Datacenter Edition (x64)Windows Server 2008 SP2 (x64)
Windows Server 2008 Foundation Edition (x64)Windows Server 2008 SP2 (x64)
Windows Server 2008 Web Server Edition (x64)Windows Server 2008 SP2 (x64)
Windows Server 2008 HPC Edition (x64)Windows Server 2008 SP2 (x64)
Windows Server 2008 Datacenter Edition without Hyper-V (x64)Windows Server 2008 SP2 (x64)
Windows Server 2008 Enterprise Edition without Hyper-V (x64)Windows Server 2008 SP2 (x64)
Windows Server 2008 Standard Edition without Hyper-V (x64)Windows Server 2008 SP2 (x64)
Windows Server 2008 Small Business Server (x64)Windows Server 2008 SP2 (x64)

Disclaimer: This webpage is intended to provide you information about patch announcement for certain specific software products. The information is provided "As Is" without warranty of any kind. The links provided point to pages on the vendors websites. You can get more information by clicking the links to visit the relevant pages on the vendors website.