{"id": "OPENVAS:1361412562310814908", "vendorId": null, "type": "openvas", "bulletinFamily": "scanner", "title": "Microsoft Office Security Feature Bypass Vulnerabilities (KB4092465)", "description": "This host is missing an important security\n update according to Microsoft KB4092465", "published": "2019-02-13T00:00:00", "modified": "2020-06-04T00:00:00", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cvss2": {}, "cvss3": {}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814908", "reporter": "Copyright (C) 2019 Greenbone Networks GmbH", "references": ["https://support.microsoft.com/en-us/help/4092465"], "cvelist": ["CVE-2019-0540"], "immutableFields": [], "lastseen": "2020-06-05T16:27:13", "viewCount": 49, "enchantments": {"dependencies": {"references": [{"type": "checkpoint_advisories", "idList": ["CPAI-2019-1533"]}, {"type": "cve", "idList": ["CVE-2019-0540"]}, {"type": "kaspersky", "idList": ["KLA11417"]}, {"type": "mscve", "idList": ["MS:CVE-2019-0540"]}, {"type": "mskb", "idList": ["KB4092465", "KB4462138", "KB4462146", "KB4462154", "KB4462174"]}, {"type": "nessus", "idList": ["SMB_NT_MS19_FEB_OFFICE.NASL", "SMB_NT_MS19_FEB_OFFICE_C2R.NASL", "SMB_NT_MS19_FEB_OFFICE_VIEWERS.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310814735", "OPENVAS:1361412562310814737", "OPENVAS:1361412562310814738", "OPENVAS:1361412562310814742", "OPENVAS:1361412562310814755"]}, {"type": "symantec", "idList": ["SMNTC-106863"]}, {"type": "talosblog", "idList": ["TALOSBLOG:AB5E63755953149993334997F5123794"]}]}, "score": {"value": 0.2, "vector": "NONE"}, "backreferences": {"references": [{"type": "checkpoint_advisories", "idList": ["CPAI-2019-1533"]}, {"type": "cve", "idList": ["CVE-2019-0540"]}, {"type": "kaspersky", "idList": ["KLA11417"]}, {"type": "mscve", "idList": ["MS:CVE-2019-0540"]}, {"type": "mskb", "idList": ["KB4462174"]}, {"type": "nessus", "idList": ["SMB_NT_MS19_FEB_OFFICE_VIEWERS.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310814735", "OPENVAS:1361412562310814737", "OPENVAS:1361412562310814738", "OPENVAS:1361412562310814742", "OPENVAS:1361412562310814755"]}, {"type": "talosblog", "idList": ["TALOSBLOG:AB5E63755953149993334997F5123794"]}]}, "exploitation": null, "epss": [{"cve": "CVE-2019-0540", "epss": "0.304330000", "percentile": "0.962320000", "modified": "2023-03-15"}], "vulnersScore": 0.2}, "_state": {"dependencies": 1678956824, "score": 1683995972, "epss": 1678956824}, "_internal": {"score_hash": "e3f9df271dbce69b719ccfd028d7614d"}, "pluginID": "1361412562310814908", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814908\");\n script_version(\"2020-06-04T09:02:37+0000\");\n script_cve_id(\"CVE-2019-0540\");\n script_bugtraq_id(106863);\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_tag(name:\"last_modification\", value:\"2020-06-04 09:02:37 +0000 (Thu, 04 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2019-02-13 12:16:48 +0530 (Wed, 13 Feb 2019)\");\n script_name(\"Microsoft Office Security Feature Bypass Vulnerabilities (KB4092465)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft KB4092465\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"A security feature bypass vulnerability\n exists when Microsoft Office does not validate URLs.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to perform a phishing attack.\");\n\n script_tag(name:\"affected\", value:\"- Microsoft Excel Viewer 2007 Service Pack 3\n\n - Microsoft PowerPoint Viewer and Microsoft Office Compatibility Pack Service Pack 3\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/help/4092465\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"secpod_office_products_version_900032.nasl\");\n script_mandatory_keys(\"SMB/Office/ComptPack/Version\");\n script_require_ports(139, 445);\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(!os_arch = get_kb_item(\"SMB/Windows/Arch\")){\n exit(0);\n}\n\nif(\"x86\" >< os_arch){\n key_list = make_list(\"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\");\n}\nelse if(\"x64\" >< os_arch){\n key_list = make_list(\"SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\",\n \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\");\n}\n\nforeach key(key_list)\n{\n commonpath = registry_get_sz(key:key, item:\"CommonFilesDir\");\n\n if(!commonpath){\n exit(0);\n }\n\n offPath = commonpath + \"\\Microsoft Shared\\Office12\";\n offexeVer = fetch_file_version(sysPath:offPath, file_name:\"Mso.dll\");\n if(!offexeVer){\n continue;\n }\n\n if(version_in_range(version:offexeVer, test_version:\"12.0\", test_version2:\"12.0.6807.4999\"))\n {\n report = report_fixed_ver( file_checked:offPath + \"\\Mso.dl\",\n file_version:offexeVer, vulnerable_range:\"12.0 - 12.0.6807.4999\");\n security_message(data:report);\n exit(0);\n }\n}\n", "naslFamily": "Windows : Microsoft Bulletins"}
{"checkpoint_advisories": [{"lastseen": "2021-12-17T15:24:51", "description": "An information disclosure vulnerability exists in the Word component of Microsoft Office. This vulnerability is due to improper handling of fields. Successful exploitation could cause an information disclosure.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "baseScore": 5.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 3.6}, "published": "2019-11-26T00:00:00", "type": "checkpoint_advisories", "title": "Microsoft Office Word Security Feature Bypass (CVE-2019-0540)", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-0540"], "modified": "2019-11-26T00:00:00", "id": "CPAI-2019-1533", "href": "", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "openvas": [{"lastseen": "2020-06-05T16:27:12", "description": "This host is missing an important security\n update according to Microsoft KB4462146", "cvss3": {}, "published": "2019-02-13T00:00:00", "type": "openvas", "title": "Microsoft Office 2016 Security Feature Bypass Vulnerability (KB4462146)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-0540"], "modified": "2020-06-04T00:00:00", "id": "OPENVAS:1361412562310814737", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814737", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814737\");\n script_version(\"2020-06-04T09:02:37+0000\");\n script_cve_id(\"CVE-2019-0540\");\n script_bugtraq_id(106863);\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_tag(name:\"last_modification\", value:\"2020-06-04 09:02:37 +0000 (Thu, 04 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2019-02-13 09:37:43 +0530 (Wed, 13 Feb 2019)\");\n script_name(\"Microsoft Office 2016 Security Feature Bypass Vulnerability (KB4462146)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft KB4462146\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The flaw exists due to an error when Microsoft\n Office does not validate URLs.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to send a victim a specially crafted file, which could trick the victim into\n entering credentials.\");\n\n script_tag(name:\"affected\", value:\"Microsoft Office 2016.\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/help/4462146\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"secpod_office_products_version_900032.nasl\");\n script_mandatory_keys(\"MS/Office/Ver\");\n script_require_ports(139, 445);\n exit(0);\n}\n\ninclude(\"smb_nt.inc\");\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nofficeVer = get_kb_item(\"MS/Office/Ver\");\nif(!officeVer || officeVer !~ \"^16\\.\"){\n exit(0);\n}\n\nos_arch = get_kb_item(\"SMB/Windows/Arch\");\nif(\"x86\" >< os_arch){\n key_list = make_list(\"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\");\n}\nelse if(\"x64\" >< os_arch){\n key_list = make_list(\"SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\",\n \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\");\n}\n\nforeach key(key_list)\n{\n msPath = registry_get_sz(key:key, item:\"ProgramFilesDir\");\n if(msPath)\n {\n\n offPath = msPath + \"\\Microsoft Office\\root\\VFS\\ProgramFilesCommonX86\\Microsoft Shared\\Office16\";\n\n offdllVer = fetch_file_version(sysPath:offPath, file_name:\"mso.dll\");\n if(!offdllVer){\n continue;\n }\n\n if(offdllVer =~ \"^16\\.\" && version_is_less(version:offdllVer, test_version:\"16.0.4810.1000\"))\n {\n report = report_fixed_ver( file_checked:msPath + \"\\Microsoft Office\\Root\\VFS\\ProgramFilesCommonX86\\Microsoft Shared\\Office16\\Mso.dll\",\n file_version:offdllVer, vulnerable_range:\"16.0 - 16.0.4810.0999\");\n security_message(data:report);\n exit(0);\n }\n }\n}\nexit(99);\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2020-06-05T16:27:24", "description": "This host is missing an important security\n update according to Microsoft KB4462154", "cvss3": {}, "published": "2019-02-13T00:00:00", "type": "openvas", "title": "Microsoft Office Word Viewer Security Feature Bypass Vulnerability (KB4462154)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-0540"], "modified": "2020-06-04T00:00:00", "id": "OPENVAS:1361412562310814742", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814742", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814742\");\n script_version(\"2020-06-04T09:02:37+0000\");\n script_cve_id(\"CVE-2019-0540\");\n script_bugtraq_id(106863);\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_tag(name:\"last_modification\", value:\"2020-06-04 09:02:37 +0000 (Thu, 04 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2019-02-13 10:55:46 +0530 (Wed, 13 Feb 2019)\");\n script_name(\"Microsoft Office Word Viewer Security Feature Bypass Vulnerability (KB4462154)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft KB4462154\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The flaw exists due to an error when Microsoft\n Office does not validate URLs.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to send a victim a specially crafted file, which could trick the victim into\n entering credentials.\");\n\n script_tag(name:\"affected\", value:\"Microsoft Office Word Viewer.\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/help/4462154\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"secpod_office_products_version_900032.nasl\");\n script_mandatory_keys(\"SMB/Office/WordView/Version\");\n script_require_ports(139, 445);\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(!os_arch = get_kb_item(\"SMB/Windows/Arch\")){\n exit(0);\n}\n\nif(\"x86\" >< os_arch){\n key_list = make_list(\"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\");\n}\nelse if(\"x64\" >< os_arch){\n key_list = make_list(\"SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\",\n \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\");\n}\n\nforeach key(key_list)\n{\n propath = registry_get_sz(key:key, item:\"CommonFilesDir\");\n if(propath)\n {\n offPath = propath + \"\\Microsoft Shared\\OFFICE11\";\n exeVer = fetch_file_version(sysPath:offPath, file_name:\"Mso.dll\");\n if(exeVer && exeVer =~ \"^(11\\.)\")\n {\n if(version_is_less(version:exeVer, test_version:\"11.0.8453.0\"))\n {\n report = report_fixed_ver(file_checked:offPath + \"\\Mso.dll\",\n file_version:exeVer, vulnerable_range:\"11.0 - 11.0.8452\");\n security_message(data:report);\n exit(0);\n }\n }\n }\n}\nexit(99);\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2020-06-05T16:27:17", "description": "This host is missing an important security\n update according to Microsoft KB4462174", "cvss3": {}, "published": "2019-02-13T00:00:00", "type": "openvas", "title": "Microsoft Office 2010 Service Pack 2 Security Feature Bypass Vulnerability (KB4462174)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-0540"], "modified": "2020-06-04T00:00:00", "id": "OPENVAS:1361412562310814738", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814738", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814738\");\n script_version(\"2020-06-04T09:02:37+0000\");\n script_cve_id(\"CVE-2019-0540\");\n script_bugtraq_id(106863);\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_tag(name:\"last_modification\", value:\"2020-06-04 09:02:37 +0000 (Thu, 04 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2019-02-13 09:49:19 +0530 (Wed, 13 Feb 2019)\");\n script_name(\"Microsoft Office 2010 Service Pack 2 Security Feature Bypass Vulnerability (KB4462174)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft KB4462174\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The flaw exists due to an error when\n Microsoft Office does not validate URLs.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to send victim a specially crafted file, which could trick the victim into\n entering credentials.\");\n\n script_tag(name:\"affected\", value:\"Microsoft Office 2010 Service Pack 2.\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/help/4462174\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"secpod_office_products_version_900032.nasl\");\n script_mandatory_keys(\"MS/Office/Ver\");\n script_require_ports(139, 445);\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\noffVer = get_kb_item(\"MS/Office/Ver\");\nif(!offVer || offVer !~ \"^14\\.\"){\n exit(0);\n}\n\nif(!os_arch = get_kb_item(\"SMB/Windows/Arch\")){\n exit(0);\n}\n\nif(\"x86\" >< os_arch){\n key_list = make_list(\"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\");\n}\nelse if(\"x64\" >< os_arch){\n key_list = make_list(\"SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\",\n \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\");\n}\n\nforeach key(key_list)\n{\n commonpath = registry_get_sz(key:key, item:\"CommonFilesDir\");\n if(!commonpath){\n continue;\n }\n\n offPath = commonpath + \"\\Microsoft Shared\\Office14\";\n\n offexeVer = fetch_file_version(sysPath:offPath, file_name:\"Mso.dll\");\n\n if(offexeVer && version_in_range(version:offexeVer, test_version:\"14.0\", test_version2:\"14.0.7229.4999\"))\n {\n report = report_fixed_ver(file_checked:offPath + \"\\Mso.dll\",\n file_version:offexeVer, vulnerable_range:\"14.0 - 14.0.7229.4999\");\n security_message(data:report);\n exit(0);\n }\n}\nexit(99);\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2020-06-05T16:27:13", "description": "This host is missing an important security\n update according to Microsoft KB4462138", "cvss3": {}, "published": "2019-02-13T00:00:00", "type": "openvas", "title": "Microsoft Office 2013 Service Pack 1 Security Feature Bypass Vulnerability (KB4462138)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-0540"], "modified": "2020-06-04T00:00:00", "id": "OPENVAS:1361412562310814735", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814735", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814735\");\n script_version(\"2020-06-04T09:02:37+0000\");\n script_cve_id(\"CVE-2019-0540\");\n script_bugtraq_id(106863);\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_tag(name:\"last_modification\", value:\"2020-06-04 09:02:37 +0000 (Thu, 04 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2019-02-13 09:18:59 +0530 (Wed, 13 Feb 2019)\");\n script_name(\"Microsoft Office 2013 Service Pack 1 Security Feature Bypass Vulnerability (KB4462138)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft KB4462138\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The flaw exists due to an error when Microsoft\n Office does not validate URLs.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to perform a phishing attack\");\n\n script_tag(name:\"affected\", value:\"Microsoft Office 2013 Service Pack 1.\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/help/4462138\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"secpod_office_products_version_900032.nasl\");\n script_mandatory_keys(\"MS/Office/Ver\");\n script_require_ports(139, 445);\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\noffVer = get_kb_item(\"MS/Office/Ver\");\nif(!offVer || offVer !~ \"^15\\.\"){\n exit(0);\n}\n\nif(!os_arch = get_kb_item(\"SMB/Windows/Arch\")){\n exit(0);\n}\n\nif(\"x86\" >< os_arch){\n key_list = make_list(\"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\");\n}\nelse if(\"x64\" >< os_arch){\n key_list = make_list(\"SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\",\n \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\");\n}\n\nforeach key(key_list)\n{\n commonpath = registry_get_sz(key:key, item:\"CommonFilesDir\");\n if(!commonpath){\n continue;\n }\n\n offPath = commonpath + \"\\Microsoft Shared\\Office15\";\n offexeVer = fetch_file_version(sysPath:offPath, file_name:\"Mso.dll\");\n\n if(offexeVer && version_in_range(version:offexeVer, test_version:\"15.0\", test_version2:\"15.0.5111.0999\"))\n {\n report = report_fixed_ver(file_checked:offPath + \"\\Mso.dll\",\n file_version:offexeVer, vulnerable_range:\"15.0 - 15.0.5111.0999\");\n security_message(data:report);\n exit(0);\n }\n}\nexit(99);\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2020-06-05T16:27:13", "description": "This host is missing an important security\n update according to Microsoft Office Click-to-Run updates.", "cvss3": {}, "published": "2019-02-14T00:00:00", "type": "openvas", "title": "Microsoft Office 365 (2016 Click-to-Run) Multiple Vulnerabilities-February19", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-0582", "CVE-2019-0672", "CVE-2019-0540", "CVE-2019-0669", "CVE-2019-0673", "CVE-2019-0671", "CVE-2019-0674"], "modified": "2020-06-04T00:00:00", "id": "OPENVAS:1361412562310814755", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814755", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814755\");\n script_version(\"2020-06-04T09:02:37+0000\");\n script_cve_id(\"CVE-2019-0540\", \"CVE-2019-0582\", \"CVE-2019-0669\", \"CVE-2019-0671\",\n \"CVE-2019-0672\", \"CVE-2019-0673\", \"CVE-2019-0674\");\n script_bugtraq_id(106863, 106433, 106897, 106928, 106929, 106930, 106931);\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-04 09:02:37 +0000 (Thu, 04 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2019-02-14 12:17:57 +0530 (Thu, 14 Feb 2019)\");\n script_name(\"Microsoft Office 365 (2016 Click-to-Run) Multiple Vulnerabilities-February19\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft Office Click-to-Run updates.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - An error when Microsoft Office does not validate URLs.\n\n - An error when the Windows Jet Database Engine improperly handles objects in\n memory.\n\n - An error when Microsoft Excel improperly discloses the contents of its memory.\n\n - Multiple errors when the Microsoft Office Access Connectivity Engine improperly\n handles objects in memory.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to run arbitrary code in the context of the current user, bypass security\n restriction and gain access to sensitive information.\");\n\n script_tag(name:\"affected\", value:\"Microsoft Office 365 (2016 Click-to-Run).\");\n\n script_tag(name:\"solution\", value:\"Upgrade to latest version of Microsoft Office\n 365 (2016 Click-to-Run) with respect to update channel used. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_xref(name:\"URL\", value:\"https://docs.microsoft.com/en-us/officeupdates/office365-proplus-security-updates\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"gb_ms_office_click2run_detect_win.nasl\");\n script_mandatory_keys(\"MS/Off/C2R/Ver\", \"MS/Office/C2R/UpdateChannel\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nofficeVer = get_kb_item(\"MS/Off/C2R/Ver\");\nif(!officeVer || officeVer !~ \"^16\\.\"){\n exit(0);\n}\n\nUpdateChannel = get_kb_item(\"MS/Office/C2R/UpdateChannel\");\nofficePath = get_kb_item(\"MS/Off/C2R/InstallPath\");\n\n## Version 1901 (Build 11231.20174)\nif(UpdateChannel == \"Monthly Channel\")\n{\n if(version_is_less(version:officeVer, test_version:\"16.0.11231.20174\")){\n fix = \"1901 (Build 11231.20174)\";\n }\n}\n\n## Version 1808 (Build 10730.20280)\nelse if(UpdateChannel == \"Semi-Annual Channel (Targeted)\")\n{\n if(version_is_less(version:officeVer, test_version:\"16.0.10730.20280\")){\n fix = \"1808 (Build 10730.20280)\";\n }\n}\n\n## 1708 (Build 8431.2372)\n## 1803 (Build 9126.2356)\n## 1808 (Build 10730.20280)\nelse if(UpdateChannel == \"Semi-Annual Channel\")\n{\n if(version_is_less(version:officeVer, test_version:\"16.0.8431.2372\")){\n fix = \"1708 (Build 8431.2372)\";\n }\n else if(version_in_range(version:officeVer, test_version:\"16.0.9000\", test_version2:\"16.0.9126.2355\")){\n fix = \"1803 (Build 9126.2356)\";\n }\n else if(version_in_range(version:officeVer, test_version:\"16.0.10730\", test_version2:\"16.0.10730.20279\")){\n fix = \"1808 (Build 10730.20280)\";\n }\n}\n\nif(fix)\n{\n report = report_fixed_ver(installed_version:officeVer, fixed_version:fix, install_path:officePath);\n security_message(data:report);\n exit(0);\n}\nexit(99);\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "mskb": [{"lastseen": "2023-05-26T10:19:12", "description": "None\n## Summary\n\nThis security update resolves a security feature bypass vulnerability that exists when Microsoft Office does not validate URLs. To learn more about the vulnerability, see [Microsoft Common Vulnerabilities and Exposures CVE-2019-0540](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0540>).**Note** To apply this security update, you must have the release version of [Microsoft Office Compatibility Pack Service Pack 3](<https://www.microsoft.com/download/details.aspx?id=27836>), Excel Viewer, or PowerPoint Viewer installed on a computer that is running Windows Embedded POSReady 2009. \n\n## How to get and install the update\n\n### Method 1: Microsoft Update\n\nThis update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see [Windows Update: FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>).\n\n### Method 2: Microsoft Update Catalog\n\nTo get the standalone package for this update, go to the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/Search.aspx?q=KB4092465>) website.\n\n### Method 3: Microsoft Download Center\n\nYou can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.\n\n * [Download security update KB 4092465 for the 32-bit version of Office Viewers and Office Compatibility Pack](<http://www.microsoft.com/download/details.aspx?familyid=8e834d78-1328-44da-a04b-b867d98662f5>)\n\n## More Information\n\n### Security update deployment information\n\nFor deployment information about this update, see [security update deployment information: February 12, 2019](<https://support.microsoft.com/en-us/help/20190212>).\n\n### Security update replacement information\n\nThis security update replaces the previously released security update [4022195](<https://support.microsoft.com/help/4022195>).\n\n### File hash information\n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nmso2007-kb4092465-fullfile-x86-glb.exe| CB3F18EC33338F800B35348D06D1A52FE8C23AA9| DC64A70B8EA43CAC2ADE4413E8CCE383F847E48B84306ED18EEF532B15DF0FD3 \n \nFile informationThe English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.\n\n## \n\n__\n\nFor all supported x86-based versions of Office Viewers and Office Compatibility Pack\n\nFile identifier| File name| File version| File size| Date| Time \n---|---|---|---|---|--- \nmso.dll| mso.dll| 12.0.6807.5000| 17,211,024| 22-Jan-2019| 06:40 \n \nHow to get help and support for this security updateHelp for installing updates: [Protect yourself online](<https://www.microsoft.com/safety/pc-security/updates.aspx>) \n \nHelp for protecting your Windows-based computer from viruses and malware: [Microsoft Security](<http://support.microsoft.com/contactus/cu_sc_virsec_master>) \n \nLocal support according to your country: [International Support](<https://www.microsoft.com/en-us/locale.aspx>)\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 5.5, "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2019-02-12T08:00:00", "type": "mskb", "title": "Description of the security update for Microsoft Office Viewers and Office Compatibility Pack: February 12, 2019", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-0540"], "modified": "2019-02-12T08:00:00", "id": "KB4092465", "href": "https://support.microsoft.com/en-us/help/4092465", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2023-05-26T10:22:05", "description": "None\n## Summary\n\nThis security update resolves a security feature bypass vulnerability that exists when Microsoft Office does not validate URLs. To learn more about this vulnerability, see [Microsoft Common Vulnerabilities and Exposures CVE-2019-0540](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0540>). \n \n**Note** To apply this security update, you must have the release version of [Service Pack 3 for Microsoft Word Viewer 2003](<http://www.microsoft.com/en-us/download/details.aspx?id=7176>) installed on the computer that's running Windows Embedded POSReady 2009.\n\n## How to get and install the update\n\n### Method 1: Microsoft Update\n\nThis update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see [Windows Update: FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>).\n\n### Method 2: Microsoft Update Catalog\n\nTo get the standalone package for this update, go to the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/Search.aspx?q=KB4462154>) website.\n\n### Method 3: Microsoft Download Center\n\nYou can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.\n\n * [Download security update KB 4462154 for the 32-bit version of Word Viewer](<http://www.microsoft.com/download/details.aspx?familyid=f36986cf-3f24-4eb4-aca2-9f0bb0bcc484>)\n\n## More Information\n\n### Security update deployment information\n\nFor deployment information about this update, see [security update deployment information: February 12, 2019](<https://support.microsoft.com/en-us/help/20190212>).\n\n### Security update replacement information\n\nThis security update doesn't replace any previously released update.\n\n### File hash information\n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \noffice2003-kb4462154-fullfile-enu.exe| 468889FE0C100D269866219967D81B48F7CCD062| 238AF1FBF0F70F882A5465F9308B92D9046E6706C9BDD431B6FB717E654CA208 \n \nFile informationThe English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.\n\n## \n\n__\n\nFor all supported x86-based versions of Word Viewer\n\nFile name| File version| File size| Date| Time| Platform \n---|---|---|---|---|--- \nIetag.dll| 11.0.8164.0| 167,256| 19-Apr-2007| 21:09| x86 \nMso.dll| 11.0.8453.0| 11,471,616| 14-Dec-2018| 18:56| x86 \nMsohtmed.exe| 11.0.8453.0| 68,880| 14-Dec-2018| 19:02| x86 \n \nHow to get help and support for this security updateHelp for installing updates: [Protect yourself online](<https://www.microsoft.com/safety/pc-security/updates.aspx>) \n \nHelp for protecting your Windows-based computer from viruses and malware: [Microsoft Security](<http://support.microsoft.com/contactus/cu_sc_virsec_master>) \n \nLocal support according to your country: [International Support](<https://www.microsoft.com/en-us/locale.aspx>)\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 5.5, "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2019-02-12T08:00:00", "type": "mskb", "title": "Description of the security update for Word Viewer: February 12, 2019", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-0540"], "modified": "2019-02-12T08:00:00", "id": "KB4462154", "href": "https://support.microsoft.com/en-us/help/4462154", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2023-05-26T10:22:02", "description": "None\n## Summary\n\nThis security update resolves a security feature bypass vulnerability that exists when Microsoft Office does not validate URLs. To learn more about this vulnerability, see [Microsoft Common Vulnerabilities and Exposures CVE-2019-0540](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0540>). \n \n**Note** To apply this security update, you must have the release version of Office 2016 installed.Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2016. It doesn't apply to the Office 2016 Click-to-Run editions, such as Microsoft Office 365 Home (see [Determining your Office version](<https://blogs.technet.microsoft.com/office_integration__sharepoint/2016/06/23/determining-your-office-version-msi-vs-c2r/>)).\n\n## Improvements and fixes\n\nThis security update contains the following improvements and fixes:\n\n * This update improves translations of some error messages for multiple languages of Microsoft Excel 2016.\n * When you accept multiple separate instances of a recurring meeting, and then you synchronize the Calendar folder in Outlook 2016, you notice that some instances are sometimes mistakenly removed from the calendar.\n\n## How to get and install the update\n\n### Method 1: Microsoft Update\n\nThis update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see [Windows Update: FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>).\n\n### Method 2: Microsoft Update Catalog\n\nTo get the standalone package for this update, go to the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/Search.aspx?q=KB4462146>) website.\n\n### Method 3: Microsoft Download Center\n\nYou can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.\n\n * [Download security update KB 4462146 for the 32-bit version of Office 2016](<http://www.microsoft.com/download/details.aspx?familyid=1a9b1e8e-1e9f-4836-9d9f-221613ac8520>)\n * [Download security update KB 4462146 for the 64-bit version of Office 2016](<http://www.microsoft.com/download/details.aspx?familyid=1105453d-46fa-4bd8-9785-f5492653e5ae>)\n\n## More Information\n\n### Security update deployment information\n\nFor deployment information about this update, see [security update deployment information: February 12, 2019](<https://support.microsoft.com/en-us/help/20190212>).\n\n### Security update replacement information\n\nThis security update replaces the previously released security update [4461535](<https://support.microsoft.com/help/4461535>).\n\n### File hash information\n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nmso2016-kb4462146-fullfile-x86-glb.exe| AE91485FB8DD16961CC4444371895E7F055779E4| 02B8BBD5D607520A56C45643B59317C5C8A162D78B9D62E123FA7B8639FD5200 \nmso2016-kb4462146-fullfile-x64-glb.exe| E16026BB3E845159F46574ACA6B38AD97413C08B| DA2D1FFCE9DA7DC5720F9A96C158311623EFC98758260845825704D5CB5CD7D7 \n \nFile informationThe English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.\n\n## \n\n__\n\nFor all supported x86-based versions of Office 2016\n\nFile identifier| File name| File version| File size| Date| Time \n---|---|---|---|---|--- \nfirstrun.exe| firstrun.exe| 16.0.4810.1000| 770136| 16-Jan-19| 06:26 \nmsointl.dll.x86.1025| msointl.dll| 16.0.4810.1000| 3286160| 16-Jan-19| 06:33 \nmsointl.dll.x86.1026| msointl.dll| 16.0.4810.1000| 1884504| 16-Jan-19| 06:30 \nmsointl.dll.x86.1027| msointl.dll| 16.0.4810.1000| 1816208| 16-Jan-19| 06:48 \nmsointl.dll.x86.1029| msointl.dll| 16.0.4810.1000| 1926288| 16-Jan-19| 06:33 \nmsointl.dll.x86.1030| msointl.dll| 16.0.4807.1000| 1756504| 16-Jan-19| 08:09 \nmsointl.dll.x86.1031| msointl.dll| 16.0.4807.1000| 1946968| 16-Jan-19| 08:09 \nmsointl.dll.x86.1032| msointl.dll| 16.0.4807.1000| 2055512| 16-Jan-19| 08:09 \nmsointl.dll.x86.3082| msointl.dll| 16.0.4810.1000| 1824392| 16-Jan-19| 06:33 \nmsointl.dll.x86.1061| msointl.dll| 16.0.4807.1000| 1729880| 16-Jan-19| 08:06 \nmsointl.dll.x86.1069| msointl.dll| 16.0.4810.1000| 1739104| 16-Jan-19| 06:48 \nmsointl.dll.x86.1035| msointl.dll| 16.0.4807.1000| 1736536| 16-Jan-19| 08:09 \nmsointl.dll.x86.1036| msointl.dll| 16.0.4807.1000| 1973632| 16-Jan-19| 08:09 \nmsointl.dll.x86.1110| msointl.dll| 16.0.4810.1000| 1772888| 16-Jan-19| 06:48 \nmsointl.dll.x86.1095| msointl.dll| 16.0.4810.1000| 1828704| 16-Jan-19| 06:48 \nmsointl.dll.x86.1037| msointl.dll| 16.0.4807.1000| 2906400| 16-Jan-19| 08:09 \nmsointl.dll.x86.1081| msointl.dll| 16.0.4807.1000| 1950552| 16-Jan-19| 08:09 \nmsointl.dll.x86.1050| msointl.dll| 16.0.4810.1000| 1739920| 16-Jan-19| 06:33 \nmsointl.dll.x86.1038| msointl.dll| 16.0.4807.1000| 1950040| 16-Jan-19| 08:06 \nmsointl.dll.x86.1057| msointl.dll| 16.0.4810.1000| 1620104| 16-Jan-19| 06:30 \nmsointl.dll.x86.1040| msointl.dll| 16.0.4810.1000| 1764704| 16-Jan-19| 06:33 \nmsointl.dll.x86.1041| msointl.dll| 16.0.4810.1000| 2010976| 16-Jan-19| 06:33 \nmsointl.dll.x86.1087| msointl.dll| 16.0.4810.1000| 2101904| 16-Jan-19| 06:33 \nmsointl.dll.x86.1099| msointl.dll| 16.0.4810.1000| 1938784| 16-Jan-19| 06:49 \nmsointl.dll.x86.1042| msointl.dll| 16.0.4810.1000| 2766992| 16-Jan-19| 06:33 \nmsointl.dll.x86.1063| msointl.dll| 16.0.4810.1000| 1844064| 16-Jan-19| 06:33 \nmsointl.dll.x86.1062| msointl.dll| 16.0.4810.1000| 1830024| 16-Jan-19| 06:33 \nmsointl.dll.x86.1086| msointl.dll| 16.0.4810.1000| 1647240| 16-Jan-19| 06:31 \nmsointl.dll.x86.1044| msointl.dll| 16.0.4810.1000| 1719432| 16-Jan-19| 06:33 \nmsointl.dll.x86.1043| msointl.dll| 16.0.4807.1000| 1769296| 16-Jan-19| 08:09 \nmsointl.dll.x86.1045| msointl.dll| 16.0.4810.1000| 1915528| 16-Jan-19| 06:33 \nmsointl.dll.x86.1046| msointl.dll| 16.0.4810.1000| 1827472| 16-Jan-19| 06:33 \nmsointl.dll.x86.2070| msointl.dll| 16.0.4810.1000| 1834128| 16-Jan-19| 06:33 \nmsointl.dll.x86.1048| msointl.dll| 16.0.4810.1000| 1960584| 16-Jan-19| 06:33 \nmsointl.dll.x86.1049| msointl.dll| 16.0.4810.1000| 1901704| 16-Jan-19| 06:33 \nmsointl.dll.x86.1051| msointl.dll| 16.0.4810.1000| 1969800| 16-Jan-19| 06:31 \nmsointl.dll.x86.1060| msointl.dll| 16.0.4810.1000| 1806176| 16-Jan-19| 06:31 \nmsointl.dll.x86.2074| msointl.dll| 16.0.4795.1000| 1764192| 16-Jan-19| 08:09 \nmsointl.dll.x86.9242| msointl.dll| 16.0.4810.1000| 1793160| 16-Jan-19| 06:33 \nmsointl.dll.x86.1053| msointl.dll| 16.0.4810.1000| 1732960| 16-Jan-19| 06:33 \nmsointl.dll.x86.1054| msointl.dll| 16.0.4810.1000| 1825416| 16-Jan-19| 06:33 \nmsointl.dll.x86.1055| msointl.dll| 16.0.4810.1000| 1996936| 16-Jan-19| 06:33 \nmsointl.dll.x86.1058| msointl.dll| 16.0.4810.1000| 1889928| 16-Jan-19| 06:33 \nmsointl.dll.x86.1066| msointl.dll| 16.0.4810.1000| 2003592| 16-Jan-19| 06:31 \nmsointl.dll.x86.2052| msointl.dll| 16.0.4810.1000| 2320168| 16-Jan-19| 06:33 \nmsointl.dll.x86.1028| msointl.dll| 16.0.4810.1000| 2327632| 16-Jan-19| 06:33 \nmsores.dll| msores.dll| 16.0.4795.1000| 81683304| 15-Jan-19| 08:45 \nmsores.dll.x86| msores.dll| 16.0.4795.1000| 81683304| 15-Jan-19| 08:56 \nmso.dll.x86| mso.dll| 16.0.4810.1000| 14394512| 16-Jan-19| 06:25 \nmsointl.dll.x86.1033| msointl.dll| 16.0.4795.1000| 1537880| 15-Jan-19| 08:45 \n \n## \n\n__\n\nFor all supported x64-based versions of Office 2016\n\nFile identifier| File name| File version| File size| Date| Time \n---|---|---|---|---|--- \nfirstrun.exe| firstrun.exe| 16.0.4702.1000| 815280| 15-Jan-19| 08:55 \nmsointl.dll.x64.1025| msointl.dll| 16.0.4810.1000| 3323232| 16-Jan-19| 06:57 \nmsointl.dll.x64.1026| msointl.dll| 16.0.4810.1000| 1908360| 16-Jan-19| 06:34 \nmsointl.dll.x64.1027| msointl.dll| 16.0.4810.1000| 1840480| 16-Jan-19| 06:51 \nmsointl.dll.x64.1029| msointl.dll| 16.0.4810.1000| 1950344| 16-Jan-19| 06:57 \nmsointl.dll.x64.1030| msointl.dll| 16.0.4810.1000| 1780576| 16-Jan-19| 06:57 \nmsointl.dll.x64.1031| msointl.dll| 16.0.4810.1000| 1971336| 16-Jan-19| 06:57 \nmsointl.dll.x64.1032| msointl.dll| 16.0.4810.1000| 2079880| 16-Jan-19| 06:57 \nmsointl.dll.x64.3082| msointl.dll| 16.0.4810.1000| 1848968| 16-Jan-19| 06:57 \nmsointl.dll.x64.1061| msointl.dll| 16.0.4810.1000| 1753952| 16-Jan-19| 06:34 \nmsointl.dll.x64.1069| msointl.dll| 16.0.4810.1000| 1762952| 16-Jan-19| 06:51 \nmsointl.dll.x64.1035| msointl.dll| 16.0.4810.1000| 1760904| 16-Jan-19| 06:57 \nmsointl.dll.x64.1036| msointl.dll| 16.0.4810.1000| 1997704| 16-Jan-19| 06:57 \nmsointl.dll.x64.1110| msointl.dll| 16.0.4810.1000| 1797264| 16-Jan-19| 06:51 \nmsointl.dll.x64.1095| msointl.dll| 16.0.4810.1000| 1853072| 16-Jan-19| 06:51 \nmsointl.dll.x64.1037| msointl.dll| 16.0.4810.1000| 2943064| 16-Jan-19| 06:57 \nmsointl.dll.x64.1081| msointl.dll| 16.0.4810.1000| 1974928| 16-Jan-19| 06:57 \nmsointl.dll.x64.1050| msointl.dll| 16.0.4810.1000| 1764496| 16-Jan-19| 06:57 \nmsointl.dll.x64.1038| msointl.dll| 16.0.4810.1000| 1973904| 16-Jan-19| 06:34 \nmsointl.dll.x64.1057| msointl.dll| 16.0.4810.1000| 1644176| 16-Jan-19| 06:34 \nmsointl.dll.x64.1040| msointl.dll| 16.0.4810.1000| 1789072| 16-Jan-19| 06:57 \nmsointl.dll.x64.1041| msointl.dll| 16.0.4810.1000| 2034824| 16-Jan-19| 06:57 \nmsointl.dll.x64.1087| msointl.dll| 16.0.4810.1000| 2126480| 16-Jan-19| 06:57 \nmsointl.dll.x64.1099| msointl.dll| 16.0.4810.1000| 1962640| 16-Jan-19| 06:51 \nmsointl.dll.x64.1042| msointl.dll| 16.0.4810.1000| 2791568| 16-Jan-19| 06:57 \nmsointl.dll.x64.1063| msointl.dll| 16.0.4810.1000| 1867920| 16-Jan-19| 06:57 \nmsointl.dll.x64.1062| msointl.dll| 16.0.4810.1000| 1854096| 16-Jan-19| 06:57 \nmsointl.dll.x64.1086| msointl.dll| 16.0.4810.1000| 1671816| 16-Jan-19| 06:34 \nmsointl.dll.x64.1044| msointl.dll| 16.0.4810.1000| 1743496| 16-Jan-19| 06:57 \nmsointl.dll.x64.1043| msointl.dll| 16.0.4810.1000| 1793680| 16-Jan-19| 06:57 \nmsointl.dll.x64.1045| msointl.dll| 16.0.4810.1000| 1939592| 16-Jan-19| 06:57 \nmsointl.dll.x64.1046| msointl.dll| 16.0.4810.1000| 1852048| 16-Jan-19| 06:57 \nmsointl.dll.x64.2070| msointl.dll| 16.0.4810.1000| 1858696| 16-Jan-19| 06:57 \nmsointl.dll.x64.1048| msointl.dll| 16.0.4810.1000| 1985376| 16-Jan-19| 06:57 \nmsointl.dll.x64.1049| msointl.dll| 16.0.4810.1000| 1926496| 16-Jan-19| 06:57 \nmsointl.dll.x64.1051| msointl.dll| 16.0.4810.1000| 1993864| 16-Jan-19| 06:34 \nmsointl.dll.x64.1060| msointl.dll| 16.0.4810.1000| 1830544| 16-Jan-19| 06:34 \nmsointl.dll.x64.2074| msointl.dll| 16.0.4810.1000| 1788560| 16-Jan-19| 06:57 \nmsointl.dll.x64.9242| msointl.dll| 16.0.4810.1000| 1817232| 16-Jan-19| 06:57 \nmsointl.dll.x64.1053| msointl.dll| 16.0.4810.1000| 1757536| 16-Jan-19| 06:57 \nmsointl.dll.x64.1054| msointl.dll| 16.0.4810.1000| 1849488| 16-Jan-19| 06:57 \nmsointl.dll.x64.1055| msointl.dll| 16.0.4810.1000| 2021744| 16-Jan-19| 06:57 \nmsointl.dll.x64.1058| msointl.dll| 16.0.4810.1000| 1914208| 16-Jan-19| 06:57 \nmsointl.dll.x64.1066| msointl.dll| 16.0.4810.1000| 2028384| 16-Jan-19| 06:34 \nmsointl.dll.x64.2052| msointl.dll| 16.0.4810.1000| 2344536| 16-Jan-19| 06:57 \nmsointl.dll.x64.1028| msointl.dll| 16.0.4810.1000| 2352216| 16-Jan-19| 06:57 \nmsointl.dll.x86.1025| msointl.dll| 16.0.4810.1000| 3286160| 16-Jan-19| 06:33 \nmsointl.dll.x86.1026| msointl.dll| 16.0.4810.1000| 1884504| 16-Jan-19| 06:30 \nmsointl.dll.x86.1029| msointl.dll| 16.0.4810.1000| 1926288| 16-Jan-19| 06:33 \nmsointl.dll.x86.1030| msointl.dll| 16.0.4807.1000| 1756504| 16-Jan-19| 08:09 \nmsointl.dll.x86.1031| msointl.dll| 16.0.4807.1000| 1946968| 16-Jan-19| 08:09 \nmsointl.dll.x86.1032| msointl.dll| 16.0.4807.1000| 2055512| 16-Jan-19| 08:09 \nmsointl.dll.x86.3082| msointl.dll| 16.0.4810.1000| 1824392| 16-Jan-19| 06:33 \nmsointl.dll.x86.1061| msointl.dll| 16.0.4807.1000| 1729880| 16-Jan-19| 08:06 \nmsointl.dll.x86.1035| msointl.dll| 16.0.4807.1000| 1736536| 16-Jan-19| 08:09 \nmsointl.dll.x86.1036| msointl.dll| 16.0.4807.1000| 1973632| 16-Jan-19| 08:09 \nmsointl.dll.x86.1037| msointl.dll| 16.0.4807.1000| 2906400| 16-Jan-19| 08:09 \nmsointl.dll.x86.1081| msointl.dll| 16.0.4807.1000| 1950552| 16-Jan-19| 08:09 \nmsointl.dll.x86.1050| msointl.dll| 16.0.4810.1000| 1739920| 16-Jan-19| 06:33 \nmsointl.dll.x86.1038| msointl.dll| 16.0.4807.1000| 1950040| 16-Jan-19| 08:06 \nmsointl.dll.x86.1057| msointl.dll| 16.0.4810.1000| 1620104| 16-Jan-19| 06:30 \nmsointl.dll.x86.1040| msointl.dll| 16.0.4810.1000| 1764704| 16-Jan-19| 06:33 \nmsointl.dll.x86.1041| msointl.dll| 16.0.4810.1000| 2010976| 16-Jan-19| 06:33 \nmsointl.dll.x86.1087| msointl.dll| 16.0.4810.1000| 2101904| 16-Jan-19| 06:33 \nmsointl.dll.x86.1042| msointl.dll| 16.0.4810.1000| 2766992| 16-Jan-19| 06:33 \nmsointl.dll.x86.1063| msointl.dll| 16.0.4810.1000| 1844064| 16-Jan-19| 06:33 \nmsointl.dll.x86.1062| msointl.dll| 16.0.4810.1000| 1830024| 16-Jan-19| 06:33 \nmsointl.dll.x86.1086| msointl.dll| 16.0.4810.1000| 1647240| 16-Jan-19| 06:31 \nmsointl.dll.x86.1044| msointl.dll| 16.0.4810.1000| 1719432| 16-Jan-19| 06:33 \nmsointl.dll.x86.1043| msointl.dll| 16.0.4807.1000| 1769296| 16-Jan-19| 08:09 \nmsointl.dll.x86.1045| msointl.dll| 16.0.4810.1000| 1915528| 16-Jan-19| 06:33 \nmsointl.dll.x86.1046| msointl.dll| 16.0.4810.1000| 1827472| 16-Jan-19| 06:33 \nmsointl.dll.x86.2070| msointl.dll| 16.0.4810.1000| 1834128| 16-Jan-19| 06:33 \nmsointl.dll.x86.1048| msointl.dll| 16.0.4810.1000| 1960584| 16-Jan-19| 06:33 \nmsointl.dll.x86.1049| msointl.dll| 16.0.4810.1000| 1901704| 16-Jan-19| 06:33 \nmsointl.dll.x86.1051| msointl.dll| 16.0.4810.1000| 1969800| 16-Jan-19| 06:31 \nmsointl.dll.x86.1060| msointl.dll| 16.0.4810.1000| 1806176| 16-Jan-19| 06:31 \nmsointl.dll.x86.2074| msointl.dll| 16.0.4795.1000| 1764192| 16-Jan-19| 08:09 \nmsointl.dll.x86.9242| msointl.dll| 16.0.4810.1000| 1793160| 16-Jan-19| 06:33 \nmsointl.dll.x86.1053| msointl.dll| 16.0.4810.1000| 1732960| 16-Jan-19| 06:33 \nmsointl.dll.x86.1054| msointl.dll| 16.0.4810.1000| 1825416| 16-Jan-19| 06:33 \nmsointl.dll.x86.1055| msointl.dll| 16.0.4810.1000| 1996936| 16-Jan-19| 06:33 \nmsointl.dll.x86.1058| msointl.dll| 16.0.4810.1000| 1889928| 16-Jan-19| 06:33 \nmsointl.dll.x86.1066| msointl.dll| 16.0.4810.1000| 2003592| 16-Jan-19| 06:31 \nmsointl.dll.x86.2052| msointl.dll| 16.0.4810.1000| 2320168| 16-Jan-19| 06:33 \nmsointl.dll.x86.1028| msointl.dll| 16.0.4810.1000| 2327632| 16-Jan-19| 06:33 \nconversion.office.msores.dll| msores.dll| 16.0.4795.1000| 81683088| 15-Jan-19| 08:50 \nmsores.dll| msores.dll| 16.0.4795.1000| 81683088| 15-Jan-19| 08:45 \nppt.conversion.msores.dll| msores.dll| 16.0.4795.1000| 81683088| | \nppt.edit.msores.dll| msores.dll| 16.0.4795.1000| 81683088| | \nwac.office.msores.dll| msores.dll| 16.0.4795.1000| 81683088| | \nmsores.dll| msores.dll| 16.0.4795.1000| 81683304| 15-Jan-19| 08:45 \nmsores.dll.x86| msores.dll| 16.0.4795.1000| 81683304| 15-Jan-19| 08:56 \nmso.dll.x64| mso.dll| 16.0.4810.1000| 19844472| 16-Jan-19| 06:29 \nmso.dll.x86| mso.dll| 16.0.4810.1000| 14394512| 16-Jan-19| 06:25 \nmsointl.dll.x64.1033| msointl.dll| 16.0.4795.1000| 1562448| 15-Jan-19| 08:50 \nmsointl.dll.x86.1033| msointl.dll| 16.0.4795.1000| 1537880| 15-Jan-19| 08:45 \n \nHow to get help and support for this security updateHelp for installing updates: [Protect yourself online](<https://www.microsoft.com/safety/pc-security/updates.aspx>) \n \nHelp for protecting your Windows-based computer from viruses and malware: [Microsoft Security](<http://support.microsoft.com/contactus/cu_sc_virsec_master>) \n \nLocal support according to your country: [International Support](<https://www.microsoft.com/en-us/locale.aspx>)\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 5.5, "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2019-02-12T08:00:00", "type": "mskb", "title": "Description of the security update for Office 2016: February 12, 2019", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-0540"], "modified": "2019-02-12T08:00:00", "id": "KB4462146", "href": "https://support.microsoft.com/en-us/help/4462146", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2023-05-26T10:22:01", "description": "None\n## Summary\n\nThis security update resolves a security feature bypass vulnerability that exists when Microsoft Office does not validate URLs. To learn more about this vulnerability, see [Microsoft Common Vulnerabilities and Exposures CVE-2019-0540](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0540>). \n \n**Note** To apply this security update, you must have the release version of [Service Pack 1 for Microsoft Office 2013](<http://support.microsoft.com/kb/2817430>) installed.Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2013. It doesn't apply to the Office 2013 Click-to-Run editions, such as Microsoft Office 365 Home (see [Determining your Office version](<https://blogs.technet.microsoft.com/office_integration__sharepoint/2016/06/23/determining-your-office-version-msi-vs-c2r/>)).\n\n## Improvements and fixes\n\nThis update makes improvements so that Excel 2013 can use the new Japanese era when it becomes available.**Note** To enable these improvements, you have to install [KB 3178640](<https://support.microsoft.com/en-us/help/3178640>) together with this update.\n\n## How to get and install the update\n\n### Method 1: Microsoft Update\n\nThis update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see [Windows Update: FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>).\n\n### Method 2: Microsoft Update Catalog\n\nTo get the standalone package for this update, go to the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/Search.aspx?q=KB4462138>) website.\n\n### Method 3: Microsoft Download Center\n\nYou can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.\n\n * [Download security update KB 4462138 for the 32-bit version of Office 2013](<http://www.microsoft.com/download/details.aspx?familyid=976c26ea-b6fc-413b-bc9a-61e679c310d8>)\n * [Download security update KB 4462138 for the 64-bit version of Office 2013](<http://www.microsoft.com/download/details.aspx?familyid=ad97a14b-1c29-4723-bc6e-d12dc569d175>)\n\n## More Information\n\n### Security update deployment information\n\nFor deployment information about this update, see [security update deployment information: February 12, 2019](<https://support.microsoft.com/en-us/help/20190212>).\n\n### Security update replacement information\n\nThis security update replaces the previously released security update [4461537](<https://support.microsoft.com/help/4461537>).\n\n### File hash information\n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nmso2013-kb4462138-fullfile-x86-glb.exe| 1D33500EA1E616916A7AD5D21648A9241EEB9615| C9E5CAEAC6122E78FB74668694D4E919312342E67BEAD1E4439321E3F99E9A37 \nmso2013-kb4462138-fullfile-x64-glb.exe| 7E901CAC0A742894B89CE3C187A6057A41E9A0A3| 122D7B6D4CDD09351A8177AA01E735BD480A0F23C5531B7D851458D5ED9BA177 \n \nFile informationThe English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.\n\n## \n\n__\n\nFor all supported x86-based versions of Office 2013\n\nFile identifier| File name| File version| File size| Date| Time \n---|---|---|---|---|--- \nfirstrun.exe| firstrun.exe| 15.0.5111.1000| 998488| 19-Jan-19| 11:05 \nmsointl.dll.x86.1025| msointl.dll| 15.0.4903.1000| 4330240| 22-Jan-19| 01:29 \nmsointl.dll.x86.1026| msointl.dll| 15.0.4903.1000| 3243256| 22-Jan-19| 01:29 \nmsointl.dll.x86.1027| msointl.dll| 15.0.4897.1000| 3237120| 22-Jan-19| 01:29 \nmsointl.dll.x86.1029| msointl.dll| 15.0.4903.1000| 3238144| 22-Jan-19| 01:29 \nmsointl.dll.x86.1030| msointl.dll| 15.0.5015.1000| 2988264| 22-Jan-19| 01:29 \nmsointl.dll.x86.1031| msointl.dll| 15.0.4989.1000| 3183848| 22-Jan-19| 01:28 \nmsointl.dll.x86.1032| msointl.dll| 15.0.4903.1000| 3605752| 22-Jan-19| 01:29 \nmsointl.dll.x86.3082| msointl.dll| 15.0.4903.1000| 3212536| 22-Jan-19| 01:28 \nmsointl.dll.x86.1061| msointl.dll| 15.0.5007.1000| 3001064| 22-Jan-19| 01:29 \nmsointl.dll.x86.1069| msointl.dll| 15.0.4897.1000| 3093240| 22-Jan-19| 01:29 \nmsointl.dll.x86.1035| msointl.dll| 15.0.4945.1000| 3016448| 22-Jan-19| 01:29 \nmsointl.dll.x86.1036| msointl.dll| 15.0.5015.1000| 3871480| 22-Jan-19| 01:28 \nmsointl.dll.x86.1110| msointl.dll| 15.0.4897.1000| 3152128| 22-Jan-19| 01:29 \nmsointl.dll.x86.1095| msointl.dll| 15.0.4897.1000| 3019512| 22-Jan-19| 01:29 \nmsointl.dll.x86.1037| msointl.dll| 15.0.4903.1000| 4118216| 22-Jan-19| 01:29 \nmsointl.dll.x86.1081| msointl.dll| 15.0.4903.1000| 3093240| 22-Jan-19| 01:29 \nmsointl.dll.x86.1050| msointl.dll| 15.0.4903.1000| 3103992| 22-Jan-19| 01:29 \nmsointl.dll.x86.1038| msointl.dll| 15.0.4903.1000| 3294464| 22-Jan-19| 01:29 \nmsointl.dll.x86.1057| msointl.dll| 15.0.4903.1000| 2812672| 22-Jan-19| 01:29 \nmsointl.dll.x86.1040| msointl.dll| 15.0.4903.1000| 3130624| 22-Jan-19| 01:28 \nmsointl.dll.x86.1041| msointl.dll| 15.0.4903.1000| 3093248| 22-Jan-19| 01:28 \nmsointl.dll.x86.1087| msointl.dll| 15.0.4903.1000| 3288832| 22-Jan-19| 01:29 \nmsointl.dll.x86.1099| msointl.dll| 15.0.4897.1000| 3162880| 22-Jan-19| 01:29 \nmsointl.dll.x86.1042| msointl.dll| 15.0.5007.1000| 3764456| 22-Jan-19| 01:28 \nmsointl.dll.x86.1063| msointl.dll| 15.0.4903.1000| 3245304| 22-Jan-19| 01:29 \nmsointl.dll.x86.1062| msointl.dll| 15.0.4903.1000| 3211512| 22-Jan-19| 01:29 \nmsointl.dll.x86.1086| msointl.dll| 15.0.4903.1000| 2831616| 22-Jan-19| 01:29 \nmsointl.dll.x86.1044| msointl.dll| 15.0.4903.1000| 2938112| 22-Jan-19| 01:29 \nmsointl.dll.x86.1043| msointl.dll| 15.0.4989.1000| 3098856| 22-Jan-19| 01:29 \nmsointl.dll.x86.1045| msointl.dll| 15.0.4903.1000| 3326200| 22-Jan-19| 01:29 \nmsointl.dll.x86.1046| msointl.dll| 15.0.4903.1000| 3131136| 22-Jan-19| 01:29 \nmsointl.dll.x86.2070| msointl.dll| 15.0.4903.1000| 3155704| 22-Jan-19| 01:29 \nmsointl.dll.x86.1048| msointl.dll| 15.0.4903.1000| 3270912| 22-Jan-19| 01:29 \nmsointl.dll.x86.1049| msointl.dll| 15.0.4903.1000| 3285760| 22-Jan-19| 01:29 \nmsointl.dll.x86.1051| msointl.dll| 15.0.4903.1000| 3285752| 22-Jan-19| 01:29 \nmsointl.dll.x86.1060| msointl.dll| 15.0.4903.1000| 3099392| 22-Jan-19| 01:29 \nmsointl.dll.x86.2074| msointl.dll| 15.0.4945.1000| 3141376| 22-Jan-19| 01:29 \nmsointl.dll.x86.1053| msointl.dll| 15.0.5031.1000| 2985704| 22-Jan-19| 01:29 \nmsointl.dll.x86.1054| msointl.dll| 15.0.4903.1000| 2932992| 22-Jan-19| 01:29 \nmsointl.dll.x86.1055| msointl.dll| 15.0.4903.1000| 3155192| 22-Jan-19| 01:29 \nmsointl.dll.x86.1058| msointl.dll| 15.0.4903.1000| 3265784| 22-Jan-19| 01:29 \nmsointl.dll.x86.1066| msointl.dll| 15.0.4903.1000| 3275000| 22-Jan-19| 01:29 \nmsointl.dll.x86.2052| msointl.dll| 15.0.4997.1000| 3110056| 22-Jan-19| 01:28 \nmsointl.dll.x86.1028| msointl.dll| 15.0.4997.1000| 3182760| 22-Jan-19| 01:28 \nmsointl.dll.x86.1033| msointl.dll| 15.0.4897.1000| 3819264| 19-Jan-19| 11:05 \nacmcompanion.mso.dll| mso.dll| 15.0.5111.1000| 26962520| | \nmso.dll.x86| mso.dll| 15.0.5111.1000| 26962520| 19-Jan-19| 11:05 \nmsores.dll| msores.dll| 15.0.4963.1000| 135076608| 19-Jan-19| 11:05 \nmsores.dll.x86| msores.dll| 15.0.4963.1000| 135076608| 19-Jan-19| 11:17 \nacmserver.office.dll| office.dll| 15.0.5111.1000| 466512| 19-Jan-19| 11:05 \ndcfoffice.dll| office.dll| 15.0.5111.1000| 466512| 19-Jan-19| 11:05 \ndcfoffice.dll.x86| office.dll| 15.0.5111.1000| 466512| 19-Jan-19| 11:05 \noffice.dll| office.dll| 15.0.5111.1000| 466512| 19-Jan-19| 11:05 \nmsosqm.exe| msosqm.exe| 15.0.5085.1000| 559400| 19-Jan-19| 11:05 \nmsointl.rest.idx_dll.x86.1025| msointl.rest.idx_dll| 15.0.4859.1000| 1499848| 22-Jan-19| 01:29 \nmsointl.dll.idx_dll.x86.1026| msointl.dll.idx_dll| 15.0.4460.1000| 53312| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1026| msointl.rest.idx_dll| 15.0.4859.1000| 1503424| 22-Jan-19| 01:29 \nmsointl.dll.idx_dll.x86.1027| msointl.dll.idx_dll| 15.0.4442.1000| 52848| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1027| msointl.rest.idx_dll| 15.0.4853.1000| 1476800| 22-Jan-19| 01:29 \nmsointl.dll.idx_dll.x86.1029| msointl.dll.idx_dll| 15.0.4454.1000| 52800| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1029| msointl.rest.idx_dll| 15.0.4859.1000| 1468608| 22-Jan-19| 01:29 \nmsointl.dll.idx_dll.x86.1030| msointl.dll.idx_dll| 15.0.4442.1000| 52336| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1030| msointl.rest.idx_dll| 15.0.5015.1000| 1464496| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1031| msointl.rest.idx_dll| 15.0.4989.1000| 1470640| 22-Jan-19| 01:28 \nmsointl.dll.idx_dll.x86.1032| msointl.dll.idx_dll| 15.0.4448.1000| 52800| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1032| msointl.rest.idx_dll| 15.0.4859.1000| 1476288| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1033| msointl.rest.idx_dll| 15.0.4853.1000| 1493760| 19-Jan-19| 11:05 \nmsointl.rest.idx_dll.x86.3082| msointl.rest.idx_dll| 15.0.4859.1000| 1479360| 22-Jan-19| 01:28 \nmsointl.dll.idx_dll.x86.1061| msointl.dll.idx_dll| 15.0.4463.1000| 52816| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1061| msointl.rest.idx_dll| 15.0.5007.1000| 1475248| 22-Jan-19| 01:29 \nmsointl.dll.idx_dll.x86.1069| msointl.dll.idx_dll| 15.0.4442.1000| 52352| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1069| msointl.rest.idx_dll| 15.0.4853.1000| 1476800| 22-Jan-19| 01:29 \nmsointl.dll.idx_dll.x86.1035| msointl.dll.idx_dll| 15.0.4445.1000| 52800| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1035| msointl.rest.idx_dll| 15.0.4945.1000| 1465032| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1036| msointl.rest.idx_dll| 15.0.5015.1000| 1476784| 22-Jan-19| 01:28 \nmsointl.dll.idx_dll.x86.1110| msointl.dll.idx_dll| 15.0.4442.1000| 52336| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1110| msointl.rest.idx_dll| 15.0.4853.1000| 1480384| 22-Jan-19| 01:29 \nmsointl.dll.idx_dll.x86.1095| msointl.dll.idx_dll| 15.0.4527.1000| 52392| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1095| msointl.rest.idx_dll| 15.0.4853.1000| 1488072| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1037| msointl.rest.idx_dll| 15.0.4859.1000| 1483968| 22-Jan-19| 01:29 \nmsointl.dll.idx_dll.x86.1081| msointl.dll.idx_dll| 15.0.4442.1000| 52336| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1081| msointl.rest.idx_dll| 15.0.4859.1000| 1499328| 22-Jan-19| 01:29 \nmsointl.dll.idx_dll.x86.1050| msointl.dll.idx_dll| 15.0.4460.1000| 53328| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1050| msointl.rest.idx_dll| 15.0.4859.1000| 1508040| 22-Jan-19| 01:29 \nmsointl.dll.idx_dll.x86.1038| msointl.dll.idx_dll| 15.0.4448.1000| 52800| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1038| msointl.rest.idx_dll| 15.0.4859.1000| 1462984| 22-Jan-19| 01:29 \nmsointl.dll.idx_dll.x86.1057| msointl.dll.idx_dll| 15.0.4469.1000| 52800| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1057| msointl.rest.idx_dll| 15.0.4859.1000| 1493184| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1040| msointl.rest.idx_dll| 15.0.4859.1000| 1454272| 22-Jan-19| 01:28 \nmsointl.rest.idx_dll.x86.1041| msointl.rest.idx_dll| 15.0.4859.1000| 1486024| 22-Jan-19| 01:28 \nmsointl.dll.idx_dll.x86.1087| msointl.dll.idx_dll| 15.0.4460.1000| 52288| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1087| msointl.rest.idx_dll| 15.0.4859.1000| 1472704| 22-Jan-19| 01:29 \nmsointl.dll.idx_dll.x86.1099| msointl.dll.idx_dll| 15.0.4487.1000| 52816| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1099| msointl.rest.idx_dll| 15.0.4853.1000| 1510592| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1042| msointl.rest.idx_dll| 15.0.5007.1000| 1436336| 22-Jan-19| 01:28 \nmsointl.dll.idx_dll.x86.1063| msointl.dll.idx_dll| 15.0.4463.1000| 52800| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1063| msointl.rest.idx_dll| 15.0.4859.1000| 1493696| 22-Jan-19| 01:29 \nmsointl.dll.idx_dll.x86.1062| msointl.dll.idx_dll| 15.0.4463.1000| 53328| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1062| msointl.rest.idx_dll| 15.0.4859.1000| 1495744| 22-Jan-19| 01:29 \nmsointl.dll.idx_dll.x86.1086| msointl.dll.idx_dll| 15.0.4469.1000| 52288| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1086| msointl.rest.idx_dll| 15.0.4859.1000| 1492680| 22-Jan-19| 01:29 \nmsointl.dll.idx_dll.x86.1044| msointl.dll.idx_dll| 15.0.4442.1000| 52352| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1044| msointl.rest.idx_dll| 15.0.4859.1000| 1460936| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1043| msointl.rest.idx_dll| 15.0.4989.1000| 1467048| 22-Jan-19| 01:29 \nmsointl.dll.idx_dll.x86.1045| msointl.dll.idx_dll| 15.0.4442.1000| 52848| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1045| msointl.rest.idx_dll| 15.0.4859.1000| 1482944| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1046| msointl.rest.idx_dll| 15.0.4859.1000| 1510088| 22-Jan-19| 01:29 \nmsointl.dll.idx_dll.x86.2070| msointl.dll.idx_dll| 15.0.4569.1501| 52904| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.2070| msointl.rest.idx_dll| 15.0.4859.1000| 1514688| 22-Jan-19| 01:29 \nmsointl.dll.idx_dll.x86.1048| msointl.dll.idx_dll| 15.0.4448.1000| 52816| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1048| msointl.rest.idx_dll| 15.0.4859.1000| 1476808| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1049| msointl.rest.idx_dll| 15.0.4885.1000| 1469120| 22-Jan-19| 01:29 \nmsointl.dll.idx_dll.x86.1051| msointl.dll.idx_dll| 15.0.4885.1000| 62656| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1051| msointl.rest.idx_dll| 15.0.4859.1000| 1482944| 22-Jan-19| 01:29 \nmsointl.dll.idx_dll.x86.1060| msointl.dll.idx_dll| 15.0.4466.1000| 52816| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1060| msointl.rest.idx_dll| 15.0.4859.1000| 1484488| 22-Jan-19| 01:29 \nmsointl.dll.idx_dll.x86.2074| msointl.dll.idx_dll| 15.0.4460.1000| 53312| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.2074| msointl.rest.idx_dll| 15.0.4945.1000| 1501376| 22-Jan-19| 01:29 \nmsointl.dll.idx_dll.x86.1053| msointl.dll.idx_dll| 15.0.4442.1000| 52352| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1053| msointl.rest.idx_dll| 15.0.5031.1000| 1461936| 22-Jan-19| 01:29 \nmsointl.dll.idx_dll.x86.1054| msointl.dll.idx_dll| 15.0.4448.1000| 52288| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1054| msointl.rest.idx_dll| 15.0.4893.1000| 1450176| 22-Jan-19| 01:29 \nmsointl.dll.idx_dll.x86.1055| msointl.dll.idx_dll| 15.0.4448.1000| 52800| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1055| msointl.rest.idx_dll| 15.0.4859.1000| 1483968| 22-Jan-19| 01:29 \nmsointl.dll.idx_dll.x86.1058| msointl.dll.idx_dll| 15.0.4454.1000| 53312| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1058| msointl.rest.idx_dll| 15.0.4859.1000| 1486016| 22-Jan-19| 01:29 \nmsointl.dll.idx_dll.x86.1066| msointl.dll.idx_dll| 15.0.4481.1000| 52800| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.1066| msointl.rest.idx_dll| 15.0.4859.1000| 1525448| 22-Jan-19| 01:29 \nmsointl.rest.idx_dll.x86.2052| msointl.rest.idx_dll| 15.0.4997.1000| 1464496| 22-Jan-19| 01:28 \nmsointl.rest.idx_dll.x86.1028| msointl.rest.idx_dll| 15.0.4997.1000| 1448112| 22-Jan-19| 01:28 \nfirstrun.veman.xml| firstrun.visualelementsmanifest.xml| | 344| 19-Jan-19| 10:54 \nexcellogo.contrastblack_scale100.png| excellogo.contrast-black_scale-100.png| | 1657| 19-Jan-19| 10:54 \nexcellogo.contrastblack_scale140.png| excellogo.contrast-black_scale-140.png| | 2571| 19-Jan-19| 10:54 \nexcellogo.contrastblack_scale180.png| excellogo.contrast-black_scale-180.png| | 3253| 19-Jan-19| 10:54 \nexcellogo.contrastblack_scale80.png| excellogo.contrast-black_scale-80.png| | 1288| 19-Jan-19| 10:54 \nexcellogo.contrastwhite_scale100.png| excellogo.contrast-white_scale-100.png| | 1649| 19-Jan-19| 10:54 \nexcellogo.contrastwhite_scale140.png| excellogo.contrast-white_scale-140.png| | 2556| 19-Jan-19| 10:54 \nexcellogo.contrastwhite_scale180.png| excellogo.contrast-white_scale-180.png| | 3290| 19-Jan-19| 10:54 \nexcellogo.contrastwhite_scale80.png| excellogo.contrast-white_scale-80.png| | 1303| 19-Jan-19| 10:54 \nexcellogo.scale100.png| excellogo.scale-100.png| | 1706| 19-Jan-19| 10:54 \nexcellogo.scale140.png| excellogo.scale-140.png| | 2511| 19-Jan-19| 10:54 \nexcellogo.scale180.png| excellogo.scale-180.png| | 3120| 19-Jan-19| 10:54 \nexcellogo.scale80.png| excellogo.scale-80.png| | 1402| 19-Jan-19| 10:54 \nexcellogosmall.contrastblack_scale100.png| excellogosmall.contrast-black_scale-100.png| | 1085| 19-Jan-19| 10:54 \nexcellogosmall.contrastblack_scale140.png| excellogosmall.contrast-black_scale-140.png| | 1339| 19-Jan-19| 10:54 \nexcellogosmall.contrastblack_scale180.png| excellogosmall.contrast-black_scale-180.png| | 2028| 19-Jan-19| 10:54 \nexcellogosmall.contrastblack_scale80.png| excellogosmall.contrast-black_scale-80.png| | 811| 19-Jan-19| 10:54 \nexcellogosmall.contrastwhite_scale100.png| excellogosmall.contrast-white_scale-100.png| | 1053| 19-Jan-19| 10:54 \nexcellogosmall.contrastwhite_scale140.png| excellogosmall.contrast-white_scale-140.png| | 1315| 19-Jan-19| 10:54 \nexcellogosmall.contrastwhite_scale180.png| excellogosmall.contrast-white_scale-180.png| | 1927| 19-Jan-19| 10:54 \nexcellogosmall.contrastwhite_scale80.png| excellogosmall.contrast-white_scale-80.png| | 772| 19-Jan-19| 10:54 \nexcellogosmall.scale100.png| excellogosmall.scale-100.png| | 1208| 19-Jan-19| 10:54 \nexcellogosmall.scale140.png| excellogosmall.scale-140.png| | 1454| 19-Jan-19| 10:54 \nexcellogosmall.scale180.png| excellogosmall.scale-180.png| | 2015| 19-Jan-19| 10:54 \nexcellogosmall.scale80.png| excellogosmall.scale-80.png| | 886| 19-Jan-19| 10:54 \nfirstrunlogo.contrastblack_scale100.png| firstrunlogo.contrast-black_scale-100.png| | 1125| 19-Jan-19| 10:54 \nfirstrunlogo.contrastblack_scale140.png| firstrunlogo.contrast-black_scale-140.png| | 1689| 19-Jan-19| 10:54 \nfirstrunlogo.contrastblack_scale180.png| firstrunlogo.contrast-black_scale-180.png| | 2181| 19-Jan-19| 10:54 \nfirstrunlogo.contrastblack_scale80.png| firstrunlogo.contrast-black_scale-80.png| | 850| 19-Jan-19| 10:54 \nfirstrunlogo.contrastwhite_scale100.png| firstrunlogo.contrast-white_scale-100.png| | 1196| 19-Jan-19| 10:54 \nfirstrunlogo.contrastwhite_scale140.png| firstrunlogo.contrast-white_scale-140.png| | 1817| 19-Jan-19| 10:54 \nfirstrunlogo.contrastwhite_scale180.png| firstrunlogo.contrast-white_scale-180.png| | 2352| 19-Jan-19| 10:54 \nfirstrunlogo.contrastwhite_scale80.png| firstrunlogo.contrast-white_scale-80.png| | 901| 19-Jan-19| 10:54 \nfirstrunlogo.scale100.png| firstrunlogo.scale-100.png| | 15557| 19-Jan-19| 10:54 \nfirstrunlogo.scale140.png| firstrunlogo.scale-140.png| | 16184| 19-Jan-19| 10:54 \nfirstrunlogo.scale180.png| firstrunlogo.scale-180.png| | 16534| 19-Jan-19| 10:54 \nfirstrunlogo.scale80.png| firstrunlogo.scale-80.png| | 15298| 19-Jan-19| 10:54 \nfirstrunlogosmall.contrastblack_scale100.png| firstrunlogosmall.contrast-black_scale-100.png| | 682| 19-Jan-19| 10:54 \nfirstrunlogosmall.contrastblack_scale140.png| firstrunlogosmall.contrast-black_scale-140.png| | 932| 19-Jan-19| 10:54 \nfirstrunlogosmall.contrastblack_scale180.png| firstrunlogosmall.contrast-black_scale-180.png| | 1295| 19-Jan-19| 10:54 \nfirstrunlogosmall.contrastblack_scale80.png| firstrunlogosmall.contrast-black_scale-80.png| | 497| 19-Jan-19| 10:54 \nfirstrunlogosmall.contrastwhite_scale100.png| firstrunlogosmall.contrast-white_scale-100.png| | 737| 19-Jan-19| 10:54 \nfirstrunlogosmall.contrastwhite_scale140.png| firstrunlogosmall.contrast-white_scale-140.png| | 981| 19-Jan-19| 10:54 \nfirstrunlogosmall.contrastwhite_scale180.png| firstrunlogosmall.contrast-white_scale-180.png| | 1389| 19-Jan-19| 10:54 \nfirstrunlogosmall.contrastwhite_scale80.png| firstrunlogosmall.contrast-white_scale-80.png| | 523| 19-Jan-19| 10:54 \nfirstrunlogosmall.scale100.png| firstrunlogosmall.scale-100.png| | 15190| 19-Jan-19| 10:54 \nfirstrunlogosmall.scale140.png| firstrunlogosmall.scale-140.png| | 15439| 19-Jan-19| 10:54 \nfirstrunlogosmall.scale180.png| firstrunlogosmall.scale-180.png| | 15888| 19-Jan-19| 10:54 \nfirstrunlogosmall.scale80.png| firstrunlogosmall.scale-80.png| | 15004| 19-Jan-19| 10:54 \ngroovelogo.contrastblack_scale100.png| groovelogo.contrast-black_scale-100.png| | 1609| 19-Jan-19| 10:54 \ngroovelogo.contrastblack_scale140.png| groovelogo.contrast-black_scale-140.png| | 2318| 19-Jan-19| 10:54 \ngroovelogo.contrastblack_scale180.png| groovelogo.contrast-black_scale-180.png| | 3184| 19-Jan-19| 10:54 \ngroovelogo.contrastblack_scale80.png| groovelogo.contrast-black_scale-80.png| | 1200| 19-Jan-19| 10:54 \ngroovelogo.contrastwhite_scale100.png| groovelogo.contrast-white_scale-100.png| | 1640| 19-Jan-19| 10:54 \ngroovelogo.contrastwhite_scale140.png| groovelogo.contrast-white_scale-140.png| | 2483| 19-Jan-19| 10:54 \ngroovelogo.contrastwhite_scale180.png| groovelogo.contrast-white_scale-180.png| | 3384| 19-Jan-19| 10:54 \ngroovelogo.contrastwhite_scale80.png| groovelogo.contrast-white_scale-80.png| | 1237| 19-Jan-19| 10:54 \ngroovelogo.scale100.png| groovelogo.scale-100.png| | 3090| 19-Jan-19| 10:54 \ngroovelogo.scale140.png| groovelogo.scale-140.png| | 4608| 19-Jan-19| 10:54 \ngroovelogo.scale180.png| groovelogo.scale-180.png| | 6574| 19-Jan-19| 10:54 \ngroovelogo.scale80.png| groovelogo.scale-80.png| | 2167| 19-Jan-19| 10:54 \ngroovelogosmall.contrastblack_scale100.png| groovelogosmall.contrast-black_scale-100.png| | 994| 19-Jan-19| 10:54 \ngroovelogosmall.contrastblack_scale140.png| groovelogosmall.contrast-black_scale-140.png| | 1358| 19-Jan-19| 10:54 \ngroovelogosmall.contrastblack_scale180.png| groovelogosmall.contrast-black_scale-180.png| | 1917| 19-Jan-19| 10:54 \ngroovelogosmall.contrastblack_scale80.png| groovelogosmall.contrast-black_scale-80.png| | 650| 19-Jan-19| 10:54 \ngroovelogosmall.contrastwhite_scale100.png| groovelogosmall.contrast-white_scale-100.png| | 974| 19-Jan-19| 10:54 \ngroovelogosmall.contrastwhite_scale140.png| groovelogosmall.contrast-white_scale-140.png| | 1295| 19-Jan-19| 10:54 \ngroovelogosmall.contrastwhite_scale180.png| groovelogosmall.contrast-white_scale-180.png| | 1849| 19-Jan-19| 10:54 \ngroovelogosmall.contrastwhite_scale80.png| groovelogosmall.contrast-white_scale-80.png| | 625| 19-Jan-19| 10:54 \ngroovelogosmall.scale100.png| groovelogosmall.scale-100.png| | 1941| 19-Jan-19| 10:54 \ngroovelogosmall.scale140.png| groovelogosmall.scale-140.png| | 2840| 19-Jan-19| 10:54 \ngroovelogosmall.scale180.png| groovelogosmall.scale-180.png| | 4066| 19-Jan-19| 10:54 \ngroovelogosmall.scale80.png| groovelogosmall.scale-80.png| | 1335| 19-Jan-19| 10:54 \ninfopathlogo.contrastblack_scale100.png| infopathlogo.contrast-black_scale-100.png| | 1552| 19-Jan-19| 10:54 \ninfopathlogo.contrastblack_scale140.png| infopathlogo.contrast-black_scale-140.png| | 2344| 19-Jan-19| 10:54 \ninfopathlogo.contrastblack_scale180.png| infopathlogo.contrast-black_scale-180.png| | 2850| 19-Jan-19| 10:54 \ninfopathlogo.contrastblack_scale80.png| infopathlogo.contrast-black_scale-80.png| | 1233| 19-Jan-19| 10:54 \ninfopathlogo.contrastwhite_scale100.png| infopathlogo.contrast-white_scale-100.png| | 1545| 19-Jan-19| 10:54 \ninfopathlogo.contrastwhite_scale140.png| infopathlogo.contrast-white_scale-140.png| | 2303| 19-Jan-19| 10:54 \ninfopathlogo.contrastwhite_scale180.png| infopathlogo.contrast-white_scale-180.png| | 2812| 19-Jan-19| 10:54 \ninfopathlogo.contrastwhite_scale80.png| infopathlogo.contrast-white_scale-80.png| | 1229| 19-Jan-19| 10:54 \ninfopathlogo.scale100.png| infopathlogo.scale-100.png| | 1602| 19-Jan-19| 10:54 \ninfopathlogo.scale140.png| infopathlogo.scale-140.png| | 2352| 19-Jan-19| 10:54 \ninfopathlogo.scale180.png| infopathlogo.scale-180.png| | 2819| 19-Jan-19| 10:54 \ninfopathlogo.scale80.png| infopathlogo.scale-80.png| | 1295| 19-Jan-19| 10:54 \ninfopathlogosmall.contrastblack_scale100.png| infopathlogosmall.contrast-black_scale-100.png| | 1050| 19-Jan-19| 10:54 \ninfopathlogosmall.contrastblack_scale140.png| infopathlogosmall.contrast-black_scale-140.png| | 1322| 19-Jan-19| 10:54 \ninfopathlogosmall.contrastblack_scale180.png| infopathlogosmall.contrast-black_scale-180.png| | 1942| 19-Jan-19| 10:54 \ninfopathlogosmall.contrastblack_scale80.png| infopathlogosmall.contrast-black_scale-80.png| | 732| 19-Jan-19| 10:54 \ninfopathlogosmall.contrastwhite_scale100.png| infopathlogosmall.contrast-white_scale-100.png| | 1047| 19-Jan-19| 10:54 \ninfopathlogosmall.contrastwhite_scale140.png| infopathlogosmall.contrast-white_scale-140.png| | 1310| 19-Jan-19| 10:54 \ninfopathlogosmall.contrastwhite_scale180.png| infopathlogosmall.contrast-white_scale-180.png| | 1900| 19-Jan-19| 10:54 \ninfopathlogosmall.contrastwhite_scale80.png| infopathlogosmall.contrast-white_scale-80.png| | 725| 19-Jan-19| 10:54 \ninfopathlogosmall.scale100.png| infopathlogosmall.scale-100.png| | 1109| 19-Jan-19| 10:54 \ninfopathlogosmall.scale140.png| infopathlogosmall.scale-140.png| | 1364| 19-Jan-19| 10:54 \ninfopathlogosmall.scale180.png| infopathlogosmall.scale-180.png| | 1927| 19-Jan-19| 10:54 \ninfopathlogosmall.scale80.png| infopathlogosmall.scale-80.png| | 774| 19-Jan-19| 10:54 \nlynclogo.contrastblack_scale100.png| lynclogo.contrast-black_scale-100.png| | 2528| 19-Jan-19| 10:54 \nlynclogo.contrastblack_scale140.png| lynclogo.contrast-black_scale-140.png| | 3857| 19-Jan-19| 10:54 \nlynclogo.contrastblack_scale180.png| lynclogo.contrast-black_scale-180.png| | 5403| 19-Jan-19| 10:54 \nlynclogo.contrastblack_scale80.png| lynclogo.contrast-black_scale-80.png| | 1854| 19-Jan-19| 10:54 \nlynclogo.contrastwhite_scale100.png| lynclogo.contrast-white_scale-100.png| | 2519| 19-Jan-19| 10:54 \nlynclogo.contrastwhite_scale140.png| lynclogo.contrast-white_scale-140.png| | 3845| 19-Jan-19| 10:54 \nlynclogo.contrastwhite_scale180.png| lynclogo.contrast-white_scale-180.png| | 5504| 19-Jan-19| 10:54 \nlynclogo.contrastwhite_scale80.png| lynclogo.contrast-white_scale-80.png| | 1853| 19-Jan-19| 10:54 \nlynclogo.scale100.png| lynclogo.scale-100.png| | 2704| 19-Jan-19| 10:54 \nlynclogo.scale140.png| lynclogo.scale-140.png| | 4055| 19-Jan-19| 10:54 \nlynclogo.scale180.png| lynclogo.scale-180.png| | 5493| 19-Jan-19| 10:54 \nlynclogo.scale80.png| lynclogo.scale-80.png| | 2039| 19-Jan-19| 10:54 \nlynclogosmall.contrastblack_scale100.png| lynclogosmall.contrast-black_scale-100.png| | 1536| 19-Jan-19| 10:54 \nlynclogosmall.contrastblack_scale140.png| lynclogosmall.contrast-black_scale-140.png| | 2138| 19-Jan-19| 10:54 \nlynclogosmall.contrastblack_scale180.png| lynclogosmall.contrast-black_scale-180.png| | 3164| 19-Jan-19| 10:54 \nlynclogosmall.contrastblack_scale80.png| lynclogosmall.contrast-black_scale-80.png| | 1008| 19-Jan-19| 10:54 \nlynclogosmall.contrastwhite_scale100.png| lynclogosmall.contrast-white_scale-100.png| | 1508| 19-Jan-19| 10:54 \nlynclogosmall.contrastwhite_scale140.png| lynclogosmall.contrast-white_scale-140.png| | 2085| 19-Jan-19| 10:54 \nlynclogosmall.contrastwhite_scale180.png| lynclogosmall.contrast-white_scale-180.png| | 3110| 19-Jan-19| 10:54 \nlynclogosmall.contrastwhite_scale80.png| lynclogosmall.contrast-white_scale-80.png| | 1009| 19-Jan-19| 10:54 \nlynclogosmall.scale100.png| lynclogosmall.scale-100.png| | 1796| 19-Jan-19| 10:54 \nlynclogosmall.scale140.png| lynclogosmall.scale-140.png| | 2417| 19-Jan-19| 10:54 \nlynclogosmall.scale180.png| lynclogosmall.scale-180.png| | 3571| 19-Jan-19| 10:54 \nlynclogosmall.scale80.png| lynclogosmall.scale-80.png| | 1203| 19-Jan-19| 10:54 \nmsaccesslogo.contrastblack_scale100.png| msaccesslogo.contrast-black_scale-100.png| | 2435| 19-Jan-19| 10:54 \nmsaccesslogo.contrastblack_scale140.png| msaccesslogo.contrast-black_scale-140.png| | 3298| 19-Jan-19| 10:54 \nmsaccesslogo.contrastblack_scale180.png| msaccesslogo.contrast-black_scale-180.png| | 4701| 19-Jan-19| 10:54 \nmsaccesslogo.contrastblack_scale80.png| msaccesslogo.contrast-black_scale-80.png| | 1871| 19-Jan-19| 10:54 \nmsaccesslogo.contrastwhite_scale100.png| msaccesslogo.contrast-white_scale-100.png| | 2465| 19-Jan-19| 10:54 \nmsaccesslogo.contrastwhite_scale140.png| msaccesslogo.contrast-white_scale-140.png| | 3392| 19-Jan-19| 10:54 \nmsaccesslogo.contrastwhite_scale180.png| msaccesslogo.contrast-white_scale-180.png| | 4810| 19-Jan-19| 10:54 \nmsaccesslogo.contrastwhite_scale80.png| msaccesslogo.contrast-white_scale-80.png| | 1894| 19-Jan-19| 10:54 \nmsaccesslogo.scale100.png| msaccesslogo.scale-100.png| | 2537| 19-Jan-19| 10:54 \nmsaccesslogo.scale140.png| msaccesslogo.scale-140.png| | 3315| 19-Jan-19| 10:54 \nmsaccesslogo.scale180.png| msaccesslogo.scale-180.png| | 4845| 19-Jan-19| 10:54 \nmsaccesslogo.scale80.png| msaccesslogo.scale-80.png| | 2000| 19-Jan-19| 10:54 \nmsaccesslogosmall.contrastblack_scale100.png| msaccesslogosmall.contrast-black_scale-100.png| | 1644| 19-Jan-19| 10:54 \nmsaccesslogosmall.contrastblack_scale140.png| msaccesslogosmall.contrast-black_scale-140.png| | 2116| 19-Jan-19| 10:54 \nmsaccesslogosmall.contrastblack_scale180.png| msaccesslogosmall.contrast-black_scale-180.png| | 2807| 19-Jan-19| 10:54 \nmsaccesslogosmall.contrastblack_scale80.png| msaccesslogosmall.contrast-black_scale-80.png| | 1017| 19-Jan-19| 10:54 \nmsaccesslogosmall.contrastwhite_scale100.png| msaccesslogosmall.contrast-white_scale-100.png| | 1619| 19-Jan-19| 10:54 \nmsaccesslogosmall.contrastwhite_scale140.png| msaccesslogosmall.contrast-white_scale-140.png| | 2108| 19-Jan-19| 10:54 \nmsaccesslogosmall.contrastwhite_scale180.png| msaccesslogosmall.contrast-white_scale-180.png| | 2816| 19-Jan-19| 10:54 \nmsaccesslogosmall.contrastwhite_scale80.png| msaccesslogosmall.contrast-white_scale-80.png| | 1007| 19-Jan-19| 10:54 \nmsaccesslogosmall.scale100.png| msaccesslogosmall.scale-100.png| | 1767| 19-Jan-19| 10:54 \nmsaccesslogosmall.scale140.png| msaccesslogosmall.scale-140.png| | 2252| 19-Jan-19| 10:54 \nmsaccesslogosmall.scale180.png| msaccesslogosmall.scale-180.png| | 2815| 19-Jan-19| 10:54 \nmsaccesslogosmall.scale80.png| msaccesslogosmall.scale-80.png| | 1144| 19-Jan-19| 10:54 \nmspublogo.contrastblack_scale100.png| mspublogo.contrast-black_scale-100.png| | 1537| 19-Jan-19| 10:54 \nmspublogo.contrastblack_scale140.png| mspublogo.contrast-black_scale-140.png| | 2271| 19-Jan-19| 10:54 \nmspublogo.contrastblack_scale180.png| mspublogo.contrast-black_scale-180.png| | 2973| 19-Jan-19| 10:54 \nmspublogo.contrastblack_scale80.png| mspublogo.contrast-black_scale-80.png| | 1238| 19-Jan-19| 10:54 \nmspublogo.contrastwhite_scale100.png| mspublogo.contrast-white_scale-100.png| | 1548| 19-Jan-19| 10:54 \nmspublogo.contrastwhite_scale140.png| mspublogo.contrast-white_scale-140.png| | 2276| 19-Jan-19| 10:54 \nmspublogo.contrastwhite_scale180.png| mspublogo.contrast-white_scale-180.png| | 2969| 19-Jan-19| 10:54 \nmspublogo.contrastwhite_scale80.png| mspublogo.contrast-white_scale-80.png| | 1259| 19-Jan-19| 10:54 \nmspublogo.scale100.png| mspublogo.scale-100.png| | 1571| 19-Jan-19| 10:54 \nmspublogo.scale140.png| mspublogo.scale-140.png| | 2249| 19-Jan-19| 10:54 \nmspublogo.scale180.png| mspublogo.scale-180.png| | 2866| 19-Jan-19| 10:54 \nmspublogo.scale80.png| mspublogo.scale-80.png| | 1288| 19-Jan-19| 10:54 \nmspublogosmall.contrastblack_scale100.png| mspublogosmall.contrast-black_scale-100.png| | 1047| 19-Jan-19| 10:54 \nmspublogosmall.contrastblack_scale140.png| mspublogosmall.contrast-black_scale-140.png| | 1300| 19-Jan-19| 10:54 \nmspublogosmall.contrastblack_scale180.png| mspublogosmall.contrast-black_scale-180.png| | 1859| 19-Jan-19| 10:54 \nmspublogosmall.contrastblack_scale80.png| mspublogosmall.contrast-black_scale-80.png| | 754| 19-Jan-19| 10:54 \nmspublogosmall.contrastwhite_scale100.png| mspublogosmall.contrast-white_scale-100.png| | 1036| 19-Jan-19| 10:54 \nmspublogosmall.contrastwhite_scale140.png| mspublogosmall.contrast-white_scale-140.png| | 1300| 19-Jan-19| 10:54 \nmspublogosmall.contrastwhite_scale180.png| mspublogosmall.contrast-white_scale-180.png| | 1868| 19-Jan-19| 10:54 \nmspublogosmall.contrastwhite_scale80.png| mspublogosmall.contrast-white_scale-80.png| | 749| 19-Jan-19| 10:54 \nmspublogosmall.scale100.png| mspublogosmall.scale-100.png| | 1093| 19-Jan-19| 10:54 \nmspublogosmall.scale140.png| mspublogosmall.scale-140.png| | 1324| 19-Jan-19| 10:54 \nmspublogosmall.scale180.png| mspublogosmall.scale-180.png| | 1797| 19-Jan-19| 10:54 \nmspublogosmall.scale80.png| mspublogosmall.scale-80.png| | 838| 19-Jan-19| 10:54 \nocpubmgrlogo.contrastblack_scale100.png| ocpubmgrlogo.contrast-black_scale-100.png| | 3061| 19-Jan-19| 10:54 \nocpubmgrlogo.contrastblack_scale140.png| ocpubmgrlogo.contrast-black_scale-140.png| | 4800| 19-Jan-19| 10:54 \nocpubmgrlogo.contrastblack_scale180.png| ocpubmgrlogo.contrast-black_scale-180.png| | 6552| 19-Jan-19| 10:54 \nocpubmgrlogo.contrastblack_scale80.png| ocpubmgrlogo.contrast-black_scale-80.png| | 2251| 19-Jan-19| 10:54 \nocpubmgrlogo.contrastwhite_scale100.png| ocpubmgrlogo.contrast-white_scale-100.png| | 3077| 19-Jan-19| 10:54 \nocpubmgrlogo.contrastwhite_scale140.png| ocpubmgrlogo.contrast-white_scale-140.png| | 4736| 19-Jan-19| 10:54 \nocpubmgrlogo.contrastwhite_scale180.png| ocpubmgrlogo.contrast-white_scale-180.png| | 6553| 19-Jan-19| 10:54 \nocpubmgrlogo.contrastwhite_scale80.png| ocpubmgrlogo.contrast-white_scale-80.png| | 2234| 19-Jan-19| 10:54 \nocpubmgrlogo.scale100.png| ocpubmgrlogo.scale-100.png| | 3252| 19-Jan-19| 10:54 \nocpubmgrlogo.scale140.png| ocpubmgrlogo.scale-140.png| | 5038| 19-Jan-19| 10:54 \nocpubmgrlogo.scale180.png| ocpubmgrlogo.scale-180.png| | 6678| 19-Jan-19| 10:54 \nocpubmgrlogo.scale80.png| ocpubmgrlogo.scale-80.png| | 2450| 19-Jan-19| 10:54 \nocpubmgrlogosmall.contrastblack_scale100.png| ocpubmgrlogosmall.contrast-black_scale-100.png| | 1917| 19-Jan-19| 10:54 \nocpubmgrlogosmall.contrastblack_scale140.png| ocpubmgrlogosmall.contrast-black_scale-140.png| | 2666| 19-Jan-19| 10:54 \nocpubmgrlogosmall.contrastblack_scale180.png| ocpubmgrlogosmall.contrast-black_scale-180.png| | 3990| 19-Jan-19| 10:54 \nocpubmgrlogosmall.contrastblack_scale80.png| ocpubmgrlogosmall.contrast-black_scale-80.png| | 1193| 19-Jan-19| 10:54 \nocpubmgrlogosmall.contrastwhite_scale100.png| ocpubmgrlogosmall.contrast-white_scale-100.png| | 1859| 19-Jan-19| 10:54 \nocpubmgrlogosmall.contrastwhite_scale140.png| ocpubmgrlogosmall.contrast-white_scale-140.png| | 2595| 19-Jan-19| 10:54 \nocpubmgrlogosmall.contrastwhite_scale180.png| ocpubmgrlogosmall.contrast-white_scale-180.png| | 3883| 19-Jan-19| 10:54 \nocpubmgrlogosmall.contrastwhite_scale80.png| ocpubmgrlogosmall.contrast-white_scale-80.png| | 1208| 19-Jan-19| 10:54 \nocpubmgrlogosmall.scale100.png| ocpubmgrlogosmall.scale-100.png| | 2206| 19-Jan-19| 10:54 \nocpubmgrlogosmall.scale140.png| ocpubmgrlogosmall.scale-140.png| | 2935| 19-Jan-19| 10:54 \nocpubmgrlogosmall.scale180.png| ocpubmgrlogosmall.scale-180.png| | 4567| 19-Jan-19| 10:54 \nocpubmgrlogosmall.scale80.png| ocpubmgrlogosmall.scale-80.png| | 1389| 19-Jan-19| 10:54 \nonenotelogo.contrastblack_scale100.png| onenotelogo.contrast-black_scale-100.png| | 1566| 19-Jan-19| 10:54 \nonenotelogo.contrastblack_scale140.png| onenotelogo.contrast-black_scale-140.png| | 2183| 19-Jan-19| 10:54 \nonenotelogo.contrastblack_scale180.png| onenotelogo.contrast-black_scale-180.png| | 3150| 19-Jan-19| 10:54 \nonenotelogo.contrastblack_scale80.png| onenotelogo.contrast-black_scale-80.png| | 1362| 19-Jan-19| 10:54 \nonenotelogo.contrastwhite_scale100.png| onenotelogo.contrast-white_scale-100.png| | 1558| 19-Jan-19| 10:54 \nonenotelogo.contrastwhite_scale140.png| onenotelogo.contrast-white_scale-140.png| | 2171| 19-Jan-19| 10:54 \nonenotelogo.contrastwhite_scale180.png| onenotelogo.contrast-white_scale-180.png| | 3162| 19-Jan-19| 10:54 \nonenotelogo.contrastwhite_scale80.png| onenotelogo.contrast-white_scale-80.png| | 1345| 19-Jan-19| 10:54 \nonenotelogo.scale100.png| onenotelogo.scale-100.png| | 1636| 19-Jan-19| 10:54 \nonenotelogo.scale140.png| onenotelogo.scale-140.png| | 2268| 19-Jan-19| 10:54 \nonenotelogo.scale180.png| onenotelogo.scale-180.png| | 2945| 19-Jan-19| 10:54 \nonenotelogo.scale80.png| onenotelogo.scale-80.png| | 1398| 19-Jan-19| 10:54 \nonenotelogosmall.contrastblack_scale100.png| onenotelogosmall.contrast-black_scale-100.png| | 1097| 19-Jan-19| 10:54 \nonenotelogosmall.contrastblack_scale140.png| onenotelogosmall.contrast-black_scale-140.png| | 1311| 19-Jan-19| 10:54 \nonenotelogosmall.contrastblack_scale180.png| onenotelogosmall.contrast-black_scale-180.png| | 1803| 19-Jan-19| 10:54 \nonenotelogosmall.contrastblack_scale80.png| onenotelogosmall.contrast-black_scale-80.png| | 711| 19-Jan-19| 10:54 \nonenotelogosmall.contrastwhite_scale100.png| onenotelogosmall.contrast-white_scale-100.png| | 1099| 19-Jan-19| 10:54 \nonenotelogosmall.contrastwhite_scale140.png| onenotelogosmall.contrast-white_scale-140.png| | 1303| 19-Jan-19| 10:54 \nonenotelogosmall.contrastwhite_scale180.png| onenotelogosmall.contrast-white_scale-180.png| | 1808| 19-Jan-19| 10:54 \nonenotelogosmall.contrastwhite_scale80.png| onenotelogosmall.contrast-white_scale-80.png| | 709| 19-Jan-19| 10:54 \nonenotelogosmall.scale100.png| onenotelogosmall.scale-100.png| | 1196| 19-Jan-19| 10:54 \nonenotelogosmall.scale140.png| onenotelogosmall.scale-140.png| | 1388| 19-Jan-19| 10:54 \nonenotelogosmall.scale180.png| onenotelogosmall.scale-180.png| | 1806| 19-Jan-19| 10:54 \nonenotelogosmall.scale80.png| onenotelogosmall.scale-80.png| | 811| 19-Jan-19| 10:54 \nonenotemlogo.contrastblack_scale100.png| onenotemlogo.contrast-black_scale-100.png| | 2922| 19-Jan-19| 10:54 \nonenotemlogo.contrastblack_scale140.png| onenotemlogo.contrast-black_scale-140.png| | 4102| 19-Jan-19| 10:54 \nonenotemlogo.contrastblack_scale180.png| onenotemlogo.contrast-black_scale-180.png| | 5917| 19-Jan-19| 10:54 \nonenotemlogo.contrastblack_scale80.png| onenotemlogo.contrast-black_scale-80.png| | 2001| 19-Jan-19| 10:54 \nonenotemlogo.contrastwhite_scale100.png| onenotemlogo.contrast-white_scale-100.png| | 2890| 19-Jan-19| 10:54 \nonenotemlogo.contrastwhite_scale140.png| onenotemlogo.contrast-white_scale-140.png| | 4074| 19-Jan-19| 10:54 \nonenotemlogo.contrastwhite_scale180.png| onenotemlogo.contrast-white_scale-180.png| | 5879| 19-Jan-19| 10:54 \nonenotemlogo.contrastwhite_scale80.png| onenotemlogo.contrast-white_scale-80.png| | 2004| 19-Jan-19| 10:54 \nonenotemlogo.scale100.png| onenotemlogo.scale-100.png| | 3005| 19-Jan-19| 10:54 \nonenotemlogo.scale140.png| onenotemlogo.scale-140.png| | 4287| 19-Jan-19| 10:54 \nonenotemlogo.scale180.png| onenotemlogo.scale-180.png| | 5769| 19-Jan-19| 10:54 \nonenotemlogo.scale80.png| onenotemlogo.scale-80.png| | 2156| 19-Jan-19| 10:54 \nonenotemlogosmall.contrastblack_scale100.png| onenotemlogosmall.contrast-black_scale-100.png| | 1801| 19-Jan-19| 10:54 \nonenotemlogosmall.contrastblack_scale140.png| onenotemlogosmall.contrast-black_scale-140.png| | 2602| 19-Jan-19| 10:54 \nonenotemlogosmall.contrastblack_scale180.png| onenotemlogosmall.contrast-black_scale-180.png| | 3594| 19-Jan-19| 10:54 \nonenotemlogosmall.contrastblack_scale80.png| onenotemlogosmall.contrast-black_scale-80.png| | 1130| 19-Jan-19| 10:54 \nonenotemlogosmall.contrastwhite_scale100.png| onenotemlogosmall.contrast-white_scale-100.png| | 1790| 19-Jan-19| 10:54 \nonenotemlogosmall.contrastwhite_scale140.png| onenotemlogosmall.contrast-white_scale-140.png| | 2583| 19-Jan-19| 10:54 \nonenotemlogosmall.contrastwhite_scale180.png| onenotemlogosmall.contrast-white_scale-180.png| | 3554| 19-Jan-19| 10:54 \nonenotemlogosmall.contrastwhite_scale80.png| onenotemlogosmall.contrast-white_scale-80.png| | 1119| 19-Jan-19| 10:54 \nonenotemlogosmall.scale100.png| onenotemlogosmall.scale-100.png| | 1913| 19-Jan-19| 10:54 \nonenotemlogosmall.scale140.png| onenotemlogosmall.scale-140.png| | 2718| 19-Jan-19| 10:54 \nonenotemlogosmall.scale180.png| onenotemlogosmall.scale-180.png| | 3598| 19-Jan-19| 10:54 \nonenotemlogosmall.scale80.png| onenotemlogosmall.scale-80.png| | 1234| 19-Jan-19| 10:54 \noutlooklogo.contrastblack_scale100.png| outlooklogo.contrast-black_scale-100.png| | 1929| 19-Jan-19| 10:54 \noutlooklogo.contrastblack_scale140.png| outlooklogo.contrast-black_scale-140.png| | 3091| 19-Jan-19| 10:54 \noutlooklogo.contrastblack_scale180.png| outlooklogo.contrast-black_scale-180.png| | 4084| 19-Jan-19| 10:54 \noutlooklogo.contrastblack_scale80.png| outlooklogo.contrast-black_scale-80.png| | 1574| 19-Jan-19| 10:54 \noutlooklogo.contrastwhite_scale100.png| outlooklogo.contrast-white_scale-100.png| | 1895| 19-Jan-19| 10:54 \noutlooklogo.contrastwhite_scale140.png| outlooklogo.contrast-white_scale-140.png| | 3096| 19-Jan-19| 10:54 \noutlooklogo.contrastwhite_scale180.png| outlooklogo.contrast-white_scale-180.png| | 4096| 19-Jan-19| 10:54 \noutlooklogo.contrastwhite_scale80.png| outlooklogo.contrast-white_scale-80.png| | 1541| 19-Jan-19| 10:54 \noutlooklogo.scale100.png| outlooklogo.scale-100.png| | 2093| 19-Jan-19| 10:54 \noutlooklogo.scale140.png| outlooklogo.scale-140.png| | 3241| 19-Jan-19| 10:54 \noutlooklogo.scale180.png| outlooklogo.scale-180.png| | 4038| 19-Jan-19| 10:54 \noutlooklogo.scale80.png| outlooklogo.scale-80.png| | 1705| 19-Jan-19| 10:54 \noutlooklogosmall.contrastblack_scale100.png| outlooklogosmall.contrast-black_scale-100.png| | 1270| 19-Jan-19| 10:54 \noutlooklogosmall.contrastblack_scale140.png| outlooklogosmall.contrast-black_scale-140.png| | 1597| 19-Jan-19| 10:54 \noutlooklogosmall.contrastblack_scale180.png| outlooklogosmall.contrast-black_scale-180.png| | 2523| 19-Jan-19| 10:54 \noutlooklogosmall.contrastblack_scale80.png| outlooklogosmall.contrast-black_scale-80.png| | 918| 19-Jan-19| 10:54 \noutlooklogosmall.contrastwhite_scale100.png| outlooklogosmall.contrast-white_scale-100.png| | 1268| 19-Jan-19| 10:54 \noutlooklogosmall.contrastwhite_scale140.png| outlooklogosmall.contrast-white_scale-140.png| | 1547| 19-Jan-19| 10:54 \noutlooklogosmall.contrastwhite_scale180.png| outlooklogosmall.contrast-white_scale-180.png| | 2449| 19-Jan-19| 10:54 \noutlooklogosmall.contrastwhite_scale80.png| outlooklogosmall.contrast-white_scale-80.png| | 902| 19-Jan-19| 10:54 \noutlooklogosmall.scale100.png| outlooklogosmall.scale-100.png| | 1481| 19-Jan-19| 10:54 \noutlooklogosmall.scale140.png| outlooklogosmall.scale-140.png| | 1838| 19-Jan-19| 10:54 \noutlooklogosmall.scale180.png| outlooklogosmall.scale-180.png| | 2731| 19-Jan-19| 10:54 \noutlooklogosmall.scale80.png| outlooklogosmall.scale-80.png| | 1053| 19-Jan-19| 10:54 \npowerpntlogo.contrastblack_scale100.png| powerpntlogo.contrast-black_scale-100.png| | 1654| 19-Jan-19| 10:54 \npowerpntlogo.contrastblack_scale140.png| powerpntlogo.contrast-black_scale-140.png| | 2314| 19-Jan-19| 10:54 \npowerpntlogo.contrastblack_scale180.png| powerpntlogo.contrast-black_scale-180.png| | 3077| 19-Jan-19| 10:54 \npowerpntlogo.contrastblack_scale80.png| powerpntlogo.contrast-black_scale-80.png| | 1280| 19-Jan-19| 10:54 \npowerpntlogo.contrastwhite_scale100.png| powerpntlogo.contrast-white_scale-100.png| | 1650| 19-Jan-19| 10:54 \npowerpntlogo.contrastwhite_scale140.png| powerpntlogo.contrast-white_scale-140.png| | 2348| 19-Jan-19| 10:54 \npowerpntlogo.contrastwhite_scale180.png| powerpntlogo.contrast-white_scale-180.png| | 3059| 19-Jan-19| 10:54 \npowerpntlogo.contrastwhite_scale80.png| powerpntlogo.contrast-white_scale-80.png| | 1259| 19-Jan-19| 10:54 \npowerpntlogo.scale100.png| powerpntlogo.scale-100.png| | 1721| 19-Jan-19| 10:54 \npowerpntlogo.scale140.png| powerpntlogo.scale-140.png| | 2348| 19-Jan-19| 10:54 \npowerpntlogo.scale180.png| powerpntlogo.scale-180.png| | 3023| 19-Jan-19| 10:54 \npowerpntlogo.scale80.png| powerpntlogo.scale-80.png| | 1354| 19-Jan-19| 10:54 \npowerpntlogosmall.contrastblack_scale100.png| powerpntlogosmall.contrast-black_scale-100.png| | 1026| 19-Jan-19| 10:54 \npowerpntlogosmall.contrastblack_scale140.png| powerpntlogosmall.contrast-black_scale-140.png| | 1364| 19-Jan-19| 10:54 \npowerpntlogosmall.contrastblack_scale180.png| powerpntlogosmall.contrast-black_scale-180.png| | 1894| 19-Jan-19| 10:54 \npowerpntlogosmall.contrastblack_scale80.png| powerpntlogosmall.contrast-black_scale-80.png| | 746| 19-Jan-19| 10:54 \npowerpntlogosmall.contrastwhite_scale100.png| powerpntlogosmall.contrast-white_scale-100.png| | 1022| 19-Jan-19| 10:54 \npowerpntlogosmall.contrastwhite_scale140.png| powerpntlogosmall.contrast-white_scale-140.png| | 1307| 19-Jan-19| 10:54 \npowerpntlogosmall.contrastwhite_scale180.png| powerpntlogosmall.contrast-white_scale-180.png| | 1874| 19-Jan-19| 10:54 \npowerpntlogosmall.contrastwhite_scale80.png| powerpntlogosmall.contrast-white_scale-80.png| | 758| 19-Jan-19| 10:54 \npowerpntlogosmall.scale100.png| powerpntlogosmall.scale-100.png| | 1154| 19-Jan-19| 10:54 \npowerpntlogosmall.scale140.png| powerpntlogosmall.scale-140.png| | 1438| 19-Jan-19| 10:54 \npowerpntlogosmall.scale180.png| powerpntlogosmall.scale-180.png| | 1896| 19-Jan-19| 10:54 \npowerpntlogosmall.scale80.png| powerpntlogosmall.scale-80.png| | 874| 19-Jan-19| 10:54 \nspdesignlogo.contrastblack_scale100.png| spdesignlogo.contrast-black_scale-100.png| | 1559| 19-Jan-19| 10:54 \nspdesignlogo.contrastblack_scale140.png| spdesignlogo.contrast-black_scale-140.png| | 2383| 19-Jan-19| 10:54 \nspdesignlogo.contrastblack_scale180.png| spdesignlogo.contrast-black_scale-180.png| | 3497| 19-Jan-19| 10:54 \nspdesignlogo.contrastblack_scale80.png| spdesignlogo.contrast-black_scale-80.png| | 1298| 19-Jan-19| 10:54 \nspdesignlogo.contrastwhite_scale100.png| spdesignlogo.contrast-white_scale-100.png| | 1548| 19-Jan-19| 10:54 \nspdesignlogo.contrastwhite_scale140.png| spdesignlogo.contrast-white_scale-140.png| | 2534| 19-Jan-19| 10:54 \nspdesignlogo.contrastwhite_scale180.png| spdesignlogo.contrast-white_scale-180.png| | 3725| 19-Jan-19| 10:54 \nspdesignlogo.contrastwhite_scale80.png| spdesignlogo.contrast-white_scale-80.png| | 1298| 19-Jan-19| 10:54 \nspdesignlogo.scale100.png| spdesignlogo.scale-100.png| | 2163| 19-Jan-19| 10:54 \nspdesignlogo.scale140.png| spdesignlogo.scale-140.png| | 3058| 19-Jan-19| 10:54 \nspdesignlogo.scale180.png| spdesignlogo.scale-180.png| | 4614| 19-Jan-19| 10:54 \nspdesignlogo.scale80.png| spdesignlogo.scale-80.png| | 1745| 19-Jan-19| 10:54 \nspdesignlogosmall.contrastblack_scale100.png| spdesignlogosmall.contrast-black_scale-100.png| | 1008| 19-Jan-19| 10:54 \nspdesignlogosmall.contrastblack_scale140.png| spdesignlogosmall.contrast-black_scale-140.png| | 1278| 19-Jan-19| 10:54 \nspdesignlogosmall.contrastblack_scale180.png| spdesignlogosmall.contrast-black_scale-180.png| | 1990| 19-Jan-19| 10:54 \nspdesignlogosmall.contrastblack_scale80.png| spdesignlogosmall.contrast-black_scale-80.png| | 617| 19-Jan-19| 10:54 \nspdesignlogosmall.contrastwhite_scale100.png| spdesignlogosmall.contrast-white_scale-100.png| | 977| 19-Jan-19| 10:54 \nspdesignlogosmall.contrastwhite_scale140.png| spdesignlogosmall.contrast-white_scale-140.png| | 1193| 19-Jan-19| 10:54 \nspdesignlogosmall.contrastwhite_scale180.png| spdesignlogosmall.contrast-white_scale-180.png| | 1876| 19-Jan-19| 10:54 \nspdesignlogosmall.contrastwhite_scale80.png| spdesignlogosmall.contrast-white_scale-80.png| | 602| 19-Jan-19| 10:54 \nspdesignlogosmall.scale100.png| spdesignlogosmall.scale-100.png| | 1546| 19-Jan-19| 10:54 \nspdesignlogosmall.scale140.png| spdesignlogosmall.scale-140.png| | 1910| 19-Jan-19| 10:54 \nspdesignlogosmall.scale180.png| spdesignlogosmall.scale-180.png| | 2614| 19-Jan-19| 10:54 \nspdesignlogosmall.scale80.png| spdesignlogosmall.scale-80.png| | 1003| 19-Jan-19| 10:54 \nvisiologo.contrastblack_scale100.png| visiologo.contrast-black_scale-100.png| | 1804| 19-Jan-19| 10:54 \nvisiologo.contrastblack_scale140.png| visiologo.contrast-black_scale-140.png| | 3195| 19-Jan-19| 10:54 \nvisiologo.contrastblack_scale180.png| visiologo.contrast-black_scale-180.png| | 3478| 19-Jan-19| 10:54 \nvisiologo.contrastblack_scale80.png| visiologo.contrast-black_scale-80.png| | 1474| 19-Jan-19| 10:54 \nvisiologo.contrastwhite_scale100.png| visiologo.contrast-white_scale-100.png| | 1801| 19-Jan-19| 10:54 \nvisiologo.contrastwhite_scale140.png| visiologo.contrast-white_scale-140.png| | 3254| 19-Jan-19| 10:54 \nvisiologo.contrastwhite_scale180.png| visiologo.contrast-white_scale-180.png| | 3626| 19-Jan-19| 10:54 \nvisiologo.contrastwhite_scale80.png| visiologo.contrast-white_scale-80.png| | 1447| 19-Jan-19| 10:54 \nvisiologo.scale100.png| visiologo.scale-100.png| | 1872| 19-Jan-19| 10:54 \nvisiologo.scale140.png| visiologo.scale-140.png| | 3262| 19-Jan-19| 10:54 \nvisiologo.scale180.png| visiologo.scale-180.png| | 3403| 19-Jan-19| 10:54 \nvisiologo.scale80.png| visiologo.scale-80.png| | 1526| 19-Jan-19| 10:54 \nvisiologosmall.contrastblack_scale100.png| visiologosmall.contrast-black_scale-100.png| | 1196| 19-Jan-19| 10:54 \nvisiologosmall.contrastblack_scale140.png| visiologosmall.contrast-black_scale-140.png| | 1497| 19-Jan-19| 10:54 \nvisiologosmall.contrastblack_scale180.png| visiologosmall.contrast-black_scale-180.png| | 2675| 19-Jan-19| 10:54 \nvisiologosmall.contrastblack_scale80.png| visiologosmall.contrast-black_scale-80.png| | 848| 19-Jan-19| 10:54 \nvisiologosmall.contrastwhite_scale100.png| visiologosmall.contrast-white_scale-100.png| | 1165| 19-Jan-19| 10:54 \nvisiologosmall.contrastwhite_scale140.png| visiologosmall.contrast-white_scale-140.png| | 1453| 19-Jan-19| 10:54 \nvisiologosmall.contrastwhite_scale180.png| visiologosmall.contrast-white_scale-180.png| | 2618| 19-Jan-19| 10:54 \nvisiologosmall.contrastwhite_scale80.png| visiologosmall.contrast-white_scale-80.png| | 836| 19-Jan-19| 10:54 \nvisiologosmall.scale100.png| visiologosmall.scale-100.png| | 1285| 19-Jan-19| 10:54 \nvisiologosmall.scale140.png| visiologosmall.scale-140.png| | 1597| 19-Jan-19| 10:54 \nvisiologosmall.scale180.png| visiologosmall.scale-180.png| | 2722| 19-Jan-19| 10:54 \nvisiologosmall.scale80.png| visiologosmall.scale-80.png| | 960| 19-Jan-19| 10:54 \nwinprojlogo.contrastblack_scale100.png| winprojlogo.contrast-black_scale-100.png| | 1662| 19-Jan-19| 10:54 \nwinprojlogo.contrastblack_scale140.png| winprojlogo.contrast-black_scale-140.png| | 2705| 19-Jan-19| 10:54 \nwinprojlogo.contrastblack_scale180.png| winprojlogo.contrast-black_scale-180.png| | 3391| 19-Jan-19| 10:54 \nwinprojlogo.contrastblack_scale80.png| winprojlogo.contrast-black_scale-80.png| | 1393| 19-Jan-19| 10:54 \nwinprojlogo.contrastwhite_scale100.png| winprojlogo.contrast-white_scale-100.png| | 1698| 19-Jan-19| 10:54 \nwinprojlogo.contrastwhite_scale140.png| winprojlogo.contrast-white_scale-140.png| | 2737| 19-Jan-19| 10:54 \nwinprojlogo.contrastwhite_scale180.png| winprojlogo.contrast-white_scale-180.png| | 3396| 19-Jan-19| 10:54 \nwinprojlogo.contrastwhite_scale80.png| winprojlogo.contrast-white_scale-80.png| | 1392| 19-Jan-19| 10:54 \nwinprojlogo.scale100.png| winprojlogo.scale-100.png| | 1740| 19-Jan-19| 10:54 \nwinprojlogo.scale140.png| winprojlogo.scale-140.png| | 2642| 19-Jan-19| 10:54 \nwinprojlogo.scale180.png| winprojlogo.scale-180.png| | 3257| 19-Jan-19| 10:54 \nwinprojlogo.scale80.png| winprojlogo.scale-80.png| | 1514| 19-Jan-19| 10:54 \nwinprojlogosmall.contrastblack_scale100.png| winprojlogosmall.contrast-black_scale-100.png| | 1124| 19-Jan-19| 10:54 \nwinprojlogosmall.contrastblack_scale140.png| winprojlogosmall.contrast-black_scale-140.png| | 1430| 19-Jan-19| 10:54 \nwinprojlogosmall.contrastblack_scale180.png| winprojlogosmall.contrast-black_scale-180.png| | 2183| 19-Jan-19| 10:54 \nwinprojlogosmall.contrastblack_scale80.png| winprojlogosmall.contrast-black_scale-80.png| | 721| 19-Jan-19| 10:54 \nwinprojlogosmall.contrastwhite_scale100.png| winprojlogosmall.contrast-white_scale-100.png| | 1119| 19-Jan-19| 10:54 \nwinprojlogosmall.contrastwhite_scale140.png| winprojlogosmall.contrast-white_scale-140.png| | 1380| 19-Jan-19| 10:54 \nwinprojlogosmall.contrastwhite_scale180.png| winprojlogosmall.contrast-white_scale-180.png| | 2148| 19-Jan-19| 10:54 \nwinprojlogosmall.contrastwhite_scale80.png| winprojlogosmall.contrast-white_scale-80.png| | 711| 19-Jan-19| 10:54 \nwinprojlogosmall.scale100.png| winprojlogosmall.scale-100.png| | 1308| 19-Jan-19| 10:54 \nwinprojlogosmall.scale140.png| winprojlogosmall.scale-140.png| | 1461| 19-Jan-19| 10:54 \nwinprojlogosmall.scale180.png| winprojlogosmall.scale-180.png| | 2189| 19-Jan-19| 10:54 \nwinprojlogosmall.scale80.png| winprojlogosmall.scale-80.png| | 855| 19-Jan-19| 10:54 \nwinwordlogo.contrastblack_scale100.png| winwordlogo.contrast-black_scale-100.png| | 1668| 19-Jan-19| 10:54 \nwinwordlogo.contrastblack_scale140.png| winwordlogo.contrast-black_scale-140.png| | 1984| 19-Jan-19| 10:54 \nwinwordlogo.contrastblack_scale180.png| winwordlogo.contrast-black_scale-180.png| | 3061| 19-Jan-19| 10:54 \nwinwordlogo.contrastblack_scale80.png| winwordlogo.contrast-black_scale-80.png| | 1385| 19-Jan-19| 10:54 \nwinwordlogo.contrastwhite_scale100.png| winwordlogo.contrast-white_scale-100.png| | 1663| 19-Jan-19| 10:54 \nwinwordlogo.contrastwhite_scale140.png| winwordlogo.contrast-white_scale-140.png| | 1979| 19-Jan-19| 10:54 \nwinwordlogo.contrastwhite_scale180.png| winwordlogo.contrast-white_scale-180.png| | 3067| 19-Jan-19| 10:54 \nwinwordlogo.contrastwhite_scale80.png| winwordlogo.contrast-white_scale-80.png| | 1386| 19-Jan-19| 10:54 \nwinwordlogo.scale100.png| winwordlogo.scale-100.png| | 1784| 19-Jan-19| 10:54 \nwinwordlogo.scale140.png| winwordlogo.scale-140.png| | 2165| 19-Jan-19| 10:54 \nwinwordlogo.scale180.png| winwordlogo.scale-180.png| | 3187| 19-Jan-19| 10:54 \nwinwordlogo.scale80.png| winwordlogo.scale-80.png| | 1435| 19-Jan-19| 10:54 \nwinwordlogosmall.contrastblack_scale100.png| winwordlogosmall.contrast-black_scale-100.png| | 1152| 19-Jan-19| 10:54 \nwinwordlogosmall.contrastblack_scale140.png| winwordlogosmall.contrast-black_scale-140.png| | 1422| 19-Jan-19| 10:54 \nwinwordlogosmall.contrastblack_scale180.png| winwordlogosmall.contrast-black_scale-180.png| | 1619| 19-Jan-19| 10:54 \nwinwordlogosmall.contrastblack_scale80.png| winwordlogosmall.contrast-black_scale-80.png| | 845| 19-Jan-19| 10:54 \nwinwordlogosmall.contrastwhite_scale100.png| winwordlogosmall.contrast-white_scale-100.png| | 1156| 19-Jan-19| 10:54 \nwinwordlogosmall.contrastwhite_scale140.png| winwordlogosmall.contrast-white_scale-140.png| | 1409| 19-Jan-19| 10:54 \nwinwordlogosmall.contrastwhite_scale180.png| winwordlogosmall.contrast-white_scale-180.png| | 1605| 19-Jan-19| 10:54 \nwinwordlogosmall.contrastwhite_scale80.png| winwordlogosmall.contrast-white_scale-80.png| | 832| 19-Jan-19| 10:54 \nwinwordlogosmall.scale100.png| winwordlogosmall.scale-100.png| | 1219| 19-Jan-19| 10:54 \nwinwordlogosmall.scale140.png| winwordlogosmall.scale-140.png| | 1490| 19-Jan-19| 10:54 \nwinwordlogosmall.scale180.png| winwordlogosmall.scale-180.png| | 1706| 19-Jan-19| 10:54 \nwinwordlogosmall.scale80.png| winwordlogosmall.scale-80.png| | 881| 19-Jan-19| 10:54 \nresources.pri| resources.pri| | 47040| 19-Jan-19| 10:54 \nmso.tpn.txt.arm| mso_third_party_notices.txt| | 1814| 19-Jan-19| 10:54 \nmso.tpn.txt.x64| mso_third_party_notices.txt| | 1814| 19-Jan-19| 10:53 \nmso.tpn.txt.x86| mso_third_party_notices.txt| | 1814| 19-Jan-19| 10:53 \n \n## \n\n__\n\nFor all supported x64-based versions of Office 2013\n\nFile identifier| File name| File version| File size| Date| Time \n---|---|---|---|---|--- \nfirstrun.exe| firstrun.exe| 15.0.5111.1000| 1051944| 19-Jan-19| 11:13 \nmsointl.dll.x64.1025| msointl.dll| 15.0.5111.1000| 4368464| 22-Jan-19| 02:01 \nmsointl.dll.x64.1026| msointl.dll| 15.0.5111.1000| 3268904| 22-Jan-19| 02:01 \nmsointl.dll.x64.1029| msointl.dll| 15.0.5111.1000| 3263776| 22-Jan-19| 02:01 \nmsointl.dll.x64.1030| msointl.dll| 15.0.5111.1000| 3013408| 22-Jan-19| 02:01 \nmsointl.dll.x64.1031| msointl.dll| 15.0.5111.1000| 3208992| 22-Jan-19| 02:00 \nmsointl.dll.x64.1032| msointl.dll| 15.0.5111.1000| 3631392| 22-Jan-19| 02:01 \nmsointl.dll.x64.3082| msointl.dll| 15.0.5111.1000| 3237464| 22-Jan-19| 02:00 \nmsointl.dll.x64.1061| msointl.dll| 15.0.5111.1000| 3026728| 22-Jan-19| 02:01 \nmsointl.dll.x64.1035| msointl.dll| 15.0.5111.1000| 3042088| 22-Jan-19| 02:01 \nmsointl.dll.x64.1036| msointl.dll| 15.0.5111.1000| 3896400| 22-Jan-19| 02:00 \nmsointl.dll.x64.1037| msointl.dll| 15.0.5111.1000| 4156504| 22-Jan-19| 02:01 \nmsointl.dll.x64.1081| msointl.dll| 15.0.5111.1000| 3118160| 22-Jan-19| 02:01 \nmsointl.dll.x64.1050| msointl.dll| 15.0.5111.1000| 3129640| 22-Jan-19| 02:01 \nmsointl.dll.x64.1038| msointl.dll| 15.0.5111.1000| 3320096| 22-Jan-19| 02:01 \nmsointl.dll.x64.1057| msointl.dll| 15.0.5111.1000| 2837792| 22-Jan-19| 02:01 \nmsointl.dll.x64.1040| msointl.dll| 15.0.5111.1000| 3156256| 22-Jan-19| 02:00 \nmsointl.dll.x64.1041| msointl.dll| 15.0.5111.1000| 3118672| 22-Jan-19| 02:00 \nmsointl.dll.x64.1087| msointl.dll| 15.0.5111.1000| 3313752| 22-Jan-19| 02:01 \nmsointl.dll.x64.1042| msointl.dll| 15.0.5111.1000| 3789392| 22-Jan-19| 02:00 \nmsointl.dll.x64.1063| msointl.dll| 15.0.5111.1000| 3270944| 22-Jan-19| 02:01 \nmsointl.dll.x64.1062| msointl.dll| 15.0.5111.1000| 3236432| 22-Jan-19| 02:01 \nmsointl.dll.x64.1086| msointl.dll| 15.0.5111.1000| 2856528| 22-Jan-19| 02:01 \nmsointl.dll.x64.1044| msointl.dll| 15.0.5111.1000| 2963240| 22-Jan-19| 02:01 \nmsointl.dll.x64.1043| msointl.dll| 15.0.5111.1000| 3124304| 22-Jan-19| 02:01 \nmsointl.dll.x64.1045| msointl.dll| 15.0.5111.1000| 3351328| 22-Jan-19| 02:01 \nmsointl.dll.x64.1046| msointl.dll| 15.0.5111.1000| 3156256| 22-Jan-19| 02:01 \nmsointl.dll.x64.2070| msointl.dll| 15.0.5111.1000| 3181136| 22-Jan-19| 02:01 \nmsointl.dll.x64.1048| msointl.dll| 15.0.5111.1000| 3296336| 22-Jan-19| 02:01 \nmsointl.dll.x64.1049| msointl.dll| 15.0.5111.1000| 3311424| 22-Jan-19| 02:01 \nmsointl.dll.x64.1051| msointl.dll| 15.0.5111.1000| 3310672| 22-Jan-19| 02:01 \nmsointl.dll.x64.1060| msointl.dll| 15.0.5111.1000| 3124304| 22-Jan-19| 02:01 \nmsointl.dll.x64.2074| msointl.dll| 15.0.5111.1000| 3166504| 22-Jan-19| 02:01 \nmsointl.dll.x64.1053| msointl.dll| 15.0.5111.1000| 3010648| 22-Jan-19| 02:01 \nmsointl.dll.x64.1054| msointl.dll| 15.0.5111.1000| 2958416| 22-Jan-19| 02:01 \nmsointl.dll.x64.1055| msointl.dll| 15.0.5111.1000| 3180632| 22-Jan-19| 02:01 \nmsointl.dll.x64.1058| msointl.dll| 15.0.5111.1000| 3291216| 22-Jan-19| 02:01 \nmsointl.dll.x64.1066| msointl.dll| 15.0.5111.1000| 3300648| 22-Jan-19| 02:01 \nmsointl.dll.x64.2052| msointl.dll| 15.0.5111.1000| 3135784| 22-Jan-19| 02:00 \nmsointl.dll.x64.1028| msointl.dll| 15.0.5111.1000| 3207768| 22-Jan-19| 02:00 \nmsointl.dll.x64.1033| msointl.dll| 15.0.4897.1000| 3844352| 19-Jan-19| 11:14 \nmso.dll.x64| mso.dll| 15.0.5111.1000| 37553232| 19-Jan-19| 11:12 \nxlsrv.ecs.mso.dll| mso.dll| 15.0.5111.1000| 37553232| 19-Jan-19| 11:12 \nconversion.office.msores.dll| msores.dll| 15.0.4963.1000| 135076608| 19-Jan-19| 11:12 \nmsores.dll| msores.dll| 15.0.4963.1000| 135076608| 19-Jan-19| 11:05 \nppt.conversion.msores.dll| msores.dll| 15.0.4963.1000| 135076608| 19-Jan-19| 11:12 \nppt.edit.msores.dll| msores.dll| 15.0.4963.1000| 135076608| 19-Jan-19| 11:12 \nwac.office.msores.dll| msores.dll| 15.0.4963.1000| 135076608| 19-Jan-19| 11:12 \noffice.dll| office.dll| 15.0.5111.1000| 466728| 19-Jan-19| 11:12 \nacmcompanion.mso.dll| mso.dll| 15.0.5111.1000| 26962520| | \nmso.dll.x86| mso.dll| 15.0.5111.1000| 26962520| 19-Jan-19| 11:05 \nmsores.dll| msores.dll| 15.0.4963.1000| 135076608| 19-Jan-19| 11:05 \nmsores.dll.x86| msores.dll| 15.0.4963.1000| 135076608| 19-Jan-19| 11:17 \nmsosqm.exe| msosqm.exe| 15.0.5111.1000| 668248| 19-Jan-19| 11:12 \nmsointl.rest.idx_dll.x64.1025| msointl.rest.idx_dll| 15.0.4859.1000| 1499840| 22-Jan-19| 02:01 \nmsointl.dll.idx_dll.x64.1026| msointl.dll.idx_dll| 15.0.4460.1000| 53312| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.1026| msointl.rest.idx_dll| 15.0.4859.1000| 1503432| 22-Jan-19| 02:01 \nmsointl.dll.idx_dll.x64.1029| msointl.dll.idx_dll| 15.0.4454.1000| 52800| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.1029| msointl.rest.idx_dll| 15.0.4859.1000| 1468608| 22-Jan-19| 02:01 \nmsointl.dll.idx_dll.x64.1030| msointl.dll.idx_dll| 15.0.4442.1000| 52352| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.1030| msointl.rest.idx_dll| 15.0.5015.1000| 1464504| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.1031| msointl.rest.idx_dll| 15.0.4989.1000| 1470640| 22-Jan-19| 02:00 \nmsointl.dll.idx_dll.x64.1032| msointl.dll.idx_dll| 15.0.4448.1000| 52816| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.1032| msointl.rest.idx_dll| 15.0.4859.1000| 1476288| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.1033| msointl.rest.idx_dll| 15.0.4853.1000| 1493760| 19-Jan-19| 11:14 \nmsointl.rest.idx_dll.x64.3082| msointl.rest.idx_dll| 15.0.4859.1000| 1479368| 22-Jan-19| 02:00 \nmsointl.dll.idx_dll.x64.1061| msointl.dll.idx_dll| 15.0.4463.1000| 52800| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.1061| msointl.rest.idx_dll| 15.0.5007.1000| 1475256| 22-Jan-19| 02:01 \nmsointl.dll.idx_dll.x64.1035| msointl.dll.idx_dll| 15.0.4445.1000| 52800| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.1035| msointl.rest.idx_dll| 15.0.4945.1000| 1465032| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.1036| msointl.rest.idx_dll| 15.0.5015.1000| 1476784| 22-Jan-19| 02:00 \nmsointl.rest.idx_dll.x64.1037| msointl.rest.idx_dll| 15.0.4859.1000| 1483968| 22-Jan-19| 02:01 \nmsointl.dll.idx_dll.x64.1081| msointl.dll.idx_dll| 15.0.4442.1000| 52352| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.1081| msointl.rest.idx_dll| 15.0.4859.1000| 1499328| 22-Jan-19| 02:01 \nmsointl.dll.idx_dll.x64.1050| msointl.dll.idx_dll| 15.0.4460.1000| 53312| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.1050| msointl.rest.idx_dll| 15.0.4859.1000| 1508032| 22-Jan-19| 02:01 \nmsointl.dll.idx_dll.x64.1038| msointl.dll.idx_dll| 15.0.4448.1000| 52816| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.1038| msointl.rest.idx_dll| 15.0.4859.1000| 1462976| 22-Jan-19| 02:01 \nmsointl.dll.idx_dll.x64.1057| msointl.dll.idx_dll| 15.0.4469.1000| 52816| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.1057| msointl.rest.idx_dll| 15.0.4859.1000| 1493192| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.1040| msointl.rest.idx_dll| 15.0.4859.1000| 1454272| 22-Jan-19| 02:00 \nmsointl.rest.idx_dll.x64.1041| msointl.rest.idx_dll| 15.0.4859.1000| 1486016| 22-Jan-19| 02:00 \nmsointl.dll.idx_dll.x64.1087| msointl.dll.idx_dll| 15.0.4460.1000| 52288| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.1087| msointl.rest.idx_dll| 15.0.4859.1000| 1472712| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.1042| msointl.rest.idx_dll| 15.0.5007.1000| 1436336| 22-Jan-19| 02:00 \nmsointl.dll.idx_dll.x64.1063| msointl.dll.idx_dll| 15.0.4463.1000| 52800| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.1063| msointl.rest.idx_dll| 15.0.4859.1000| 1493704| 22-Jan-19| 02:01 \nmsointl.dll.idx_dll.x64.1062| msointl.dll.idx_dll| 15.0.4463.1000| 53312| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.1062| msointl.rest.idx_dll| 15.0.4859.1000| 1495752| 22-Jan-19| 02:01 \nmsointl.dll.idx_dll.x64.1086| msointl.dll.idx_dll| 15.0.4469.1000| 52288| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.1086| msointl.rest.idx_dll| 15.0.4859.1000| 1492672| 22-Jan-19| 02:01 \nmsointl.dll.idx_dll.x64.1044| msointl.dll.idx_dll| 15.0.4442.1000| 52336| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.1044| msointl.rest.idx_dll| 15.0.4859.1000| 1460928| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.1043| msointl.rest.idx_dll| 15.0.4989.1000| 1467056| 22-Jan-19| 02:01 \nmsointl.dll.idx_dll.x64.1045| msointl.dll.idx_dll| 15.0.4442.1000| 52848| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.1045| msointl.rest.idx_dll| 15.0.4859.1000| 1482944| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.1046| msointl.rest.idx_dll| 15.0.4859.1000| 1510080| 22-Jan-19| 02:01 \nmsointl.dll.idx_dll.x64.2070| msointl.dll.idx_dll| 15.0.4569.1501| 52904| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.2070| msointl.rest.idx_dll| 15.0.4859.1000| 1514696| 22-Jan-19| 02:01 \nmsointl.dll.idx_dll.x64.1048| msointl.dll.idx_dll| 15.0.4448.1000| 52800| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.1048| msointl.rest.idx_dll| 15.0.4859.1000| 1476800| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.1049| msointl.rest.idx_dll| 15.0.4885.1000| 1469120| 22-Jan-19| 02:01 \nmsointl.dll.idx_dll.x64.1051| msointl.dll.idx_dll| 15.0.4885.1000| 62656| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.1051| msointl.rest.idx_dll| 15.0.4859.1000| 1482944| 22-Jan-19| 02:01 \nmsointl.dll.idx_dll.x64.1060| msointl.dll.idx_dll| 15.0.4466.1000| 52816| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.1060| msointl.rest.idx_dll| 15.0.4859.1000| 1484488| 22-Jan-19| 02:01 \nmsointl.dll.idx_dll.x64.2074| msointl.dll.idx_dll| 15.0.4460.1000| 53312| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.2074| msointl.rest.idx_dll| 15.0.4945.1000| 1501384| 22-Jan-19| 02:01 \nmsointl.dll.idx_dll.x64.1053| msointl.dll.idx_dll| 15.0.4442.1000| 52336| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.1053| msointl.rest.idx_dll| 15.0.5031.1000| 1461936| 22-Jan-19| 02:01 \nmsointl.dll.idx_dll.x64.1054| msointl.dll.idx_dll| 15.0.4448.1000| 52304| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.1054| msointl.rest.idx_dll| 15.0.4893.1000| 1450176| 22-Jan-19| 02:01 \nmsointl.dll.idx_dll.x64.1055| msointl.dll.idx_dll| 15.0.4448.1000| 52800| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.1055| msointl.rest.idx_dll| 15.0.4859.1000| 1483968| 22-Jan-19| 02:01 \nmsointl.dll.idx_dll.x64.1058| msointl.dll.idx_dll| 15.0.4454.1000| 53312| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.1058| msointl.rest.idx_dll| 15.0.4859.1000| 1486016| 22-Jan-19| 02:01 \nmsointl.dll.idx_dll.x64.1066| msointl.dll.idx_dll| 15.0.4481.1000| 52800| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.1066| msointl.rest.idx_dll| 15.0.4859.1000| 1525448| 22-Jan-19| 02:01 \nmsointl.rest.idx_dll.x64.2052| msointl.rest.idx_dll| 15.0.4997.1000| 1464488| 22-Jan-19| 02:00 \nmsointl.rest.idx_dll.x64.1028| msointl.rest.idx_dll| 15.0.4997.1000| 1448104| 22-Jan-19| 02:00 \nfirstrun.veman.xml| firstrun.visualelementsmanifest.xml| | 344| 19-Jan-19| 10:54 \nexcellogo.contrastblack_scale100.png| excellogo.contrast-black_scale-100.png| | 1657| 19-Jan-19| 10:54 \nexcellogo.contrastblack_scale140.png| excellogo.contrast-black_scale-140.png| | 2571| 19-Jan-19| 10:54 \nexcellogo.contrastblack_scale180.png| excellogo.contrast-black_scale-180.png| | 3253| 19-Jan-19| 10:54 \nexcellogo.contrastblack_scale80.png| excellogo.contrast-black_scale-80.png| | 1288| 19-Jan-19| 10:54 \nexcellogo.contrastwhite_scale100.png| excellogo.contrast-white_scale-100.png| | 1649| 19-Jan-19| 10:54 \nexcellogo.contrastwhite_scale140.png| excellogo.contrast-white_scale-140.png| | 2556| 19-Jan-19| 10:54 \nexcellogo.contrastwhite_scale180.png| excellogo.contrast-white_scale-180.png| | 3290| 19-Jan-19| 10:54 \nexcellogo.contrastwhite_scale80.png| excellogo.contrast-white_scale-80.png| | 1303| 19-Jan-19| 10:54 \nexcellogo.scale100.png| excellogo.scale-100.png| | 1706| 19-Jan-19| 10:54 \nexcellogo.scale140.png| excellogo.scale-140.png| | 2511| 19-Jan-19| 10:54 \nexcellogo.scale180.png| excellogo.scale-180.png| | 3120| 19-Jan-19| 10:54 \nexcellogo.scale80.png| excellogo.scale-80.png| | 1402| 19-Jan-19| 10:54 \nexcellogosmall.contrastblack_scale100.png| excellogosmall.contrast-black_scale-100.png| | 1085| 19-Jan-19| 10:54 \nexcellogosmall.contrastblack_scale140.png| excellogosmall.contrast-black_scale-140.png| | 1339| 19-Jan-19| 10:54 \nexcellogosmall.contrastblack_scale180.png| excellogosmall.contrast-black_scale-180.png| | 2028| 19-Jan-19| 10:54 \nexcellogosmall.contrastblack_scale80.png| excellogosmall.contrast-black_scale-80.png| | 811| 19-Jan-19| 10:54 \nexcellogosmall.contrastwhite_scale100.png| excellogosmall.contrast-white_scale-100.png| | 1053| 19-Jan-19| 10:54 \nexcellogosmall.contrastwhite_scale140.png| excellogosmall.contrast-white_scale-140.png| | 1315| 19-Jan-19| 10:54 \nexcellogosmall.contrastwhite_scale180.png| excellogosmall.contrast-white_scale-180.png| | 1927| 19-Jan-19| 10:54 \nexcellogosmall.contrastwhite_scale80.png| excellogosmall.contrast-white_scale-80.png| | 772| 19-Jan-19| 10:54 \nexcellogosmall.scale100.png| excellogosmall.scale-100.png| | 1208| 19-Jan-19| 10:54 \nexcellogosmall.scale140.png| excellogosmall.scale-140.png| | 1454| 19-Jan-19| 10:54 \nexcellogosmall.scale180.png| excellogosmall.scale-180.png| | 2015| 19-Jan-19| 10:54 \nexcellogosmall.scale80.png| excellogosmall.scale-80.png| | 886| 19-Jan-19| 10:54 \nfirstrunlogo.contrastblack_scale100.png| firstrunlogo.contrast-black_scale-100.png| | 1125| 19-Jan-19| 10:54 \nfirstrunlogo.contrastblack_scale140.png| firstrunlogo.contrast-black_scale-140.png| | 1689| 19-Jan-19| 10:54 \nfirstrunlogo.contrastblack_scale180.png| firstrunlogo.contrast-black_scale-180.png| | 2181| 19-Jan-19| 10:54 \nfirstrunlogo.contrastblack_scale80.png| firstrunlogo.contrast-black_scale-80.png| | 850| 19-Jan-19| 10:54 \nfirstrunlogo.contrastwhite_scale100.png| firstrunlogo.contrast-white_scale-100.png| | 1196| 19-Jan-19| 10:54 \nfirstrunlogo.contrastwhite_scale140.png| firstrunlogo.contrast-white_scale-140.png| | 1817| 19-Jan-19| 10:54 \nfirstrunlogo.contrastwhite_scale180.png| firstrunlogo.contrast-white_scale-180.png| | 2352| 19-Jan-19| 10:54 \nfirstrunlogo.contrastwhite_scale80.png| firstrunlogo.contrast-white_scale-80.png| | 901| 19-Jan-19| 10:54 \nfirstrunlogo.scale100.png| firstrunlogo.scale-100.png| | 15557| 19-Jan-19| 10:54 \nfirstrunlogo.scale140.png| firstrunlogo.scale-140.png| | 16184| 19-Jan-19| 10:54 \nfirstrunlogo.scale180.png| firstrunlogo.scale-180.png| | 16534| 19-Jan-19| 10:54 \nfirstrunlogo.scale80.png| firstrunlogo.scale-80.png| | 15298| 19-Jan-19| 10:54 \nfirstrunlogosmall.contrastblack_scale100.png| firstrunlogosmall.contrast-black_scale-100.png| | 682| 19-Jan-19| 10:54 \nfirstrunlogosmall.contrastblack_scale140.png| firstrunlogosmall.contrast-black_scale-140.png| | 932| 19-Jan-19| 10:54 \nfirstrunlogosmall.contrastblack_scale180.png| firstrunlogosmall.contrast-black_scale-180.png| | 1295| 19-Jan-19| 10:54 \nfirstrunlogosmall.contrastblack_scale80.png| firstrunlogosmall.contrast-black_scale-80.png| | 497| 19-Jan-19| 10:54 \nfirstrunlogosmall.contrastwhite_scale100.png| firstrunlogosmall.contrast-white_scale-100.png| | 737| 19-Jan-19| 10:54 \nfirstrunlogosmall.contrastwhite_scale140.png| firstrunlogosmall.contrast-white_scale-140.png| | 981| 19-Jan-19| 10:54 \nfirstrunlogosmall.contrastwhite_scale180.png| firstrunlogosmall.contrast-white_scale-180.png| | 1389| 19-Jan-19| 10:54 \nfirstrunlogosmall.contrastwhite_scale80.png| firstrunlogosmall.contrast-white_scale-80.png| | 523| 19-Jan-19| 10:54 \nfirstrunlogosmall.scale100.png| firstrunlogosmall.scale-100.png| | 15190| 19-Jan-19| 10:54 \nfirstrunlogosmall.scale140.png| firstrunlogosmall.scale-140.png| | 15439| 19-Jan-19| 10:54 \nfirstrunlogosmall.scale180.png| firstrunlogosmall.scale-180.png| | 15888| 19-Jan-19| 10:54 \nfirstrunlogosmall.scale80.png| firstrunlogosmall.scale-80.png| | 15004| 19-Jan-19| 10:54 \ngroovelogo.contrastblack_scale100.png| groovelogo.contrast-black_scale-100.png| | 1609| 19-Jan-19| 10:54 \ngroovelogo.contrastblack_scale140.png| groovelogo.contrast-black_scale-140.png| | 2318| 19-Jan-19| 10:54 \ngroovelogo.contrastblack_scale180.png| groovelogo.contrast-black_scale-180.png| | 3184| 19-Jan-19| 10:54 \ngroovelogo.contrastblack_scale80.png| groovelogo.contrast-black_scale-80.png| | 1200| 19-Jan-19| 10:54 \ngroovelogo.contrastwhite_scale100.png| groovelogo.contrast-white_scale-100.png| | 1640| 19-Jan-19| 10:54 \ngroovelogo.contrastwhite_scale140.png| groovelogo.contrast-white_scale-140.png| | 2483| 19-Jan-19| 10:54 \ngroovelogo.contrastwhite_scale180.png| groovelogo.contrast-white_scale-180.png| | 3384| 19-Jan-19| 10:54 \ngroovelogo.contrastwhite_scale80.png| groovelogo.contrast-white_scale-80.png| | 1237| 19-Jan-19| 10:54 \ngroovelogo.scale100.png| groovelogo.scale-100.png| | 3090| 19-Jan-19| 10:54 \ngroovelogo.scale140.png| groovelogo.scale-140.png| | 4608| 19-Jan-19| 10:54 \ngroovelogo.scale180.png| groovelogo.scale-180.png| | 6574| 19-Jan-19| 10:54 \ngroovelogo.scale80.png| groovelogo.scale-80.png| | 2167| 19-Jan-19| 10:54 \ngroovelogosmall.contrastblack_scale100.png| groovelogosmall.contrast-black_scale-100.png| | 994| 19-Jan-19| 10:54 \ngroovelogosmall.contrastblack_scale140.png| groovelogosmall.contrast-black_scale-140.png| | 1358| 19-Jan-19| 10:54 \ngroovelogosmall.contrastblack_scale180.png| groovelogosmall.contrast-black_scale-180.png| | 1917| 19-Jan-19| 10:54 \ngroovelogosmall.contrastblack_scale80.png| groovelogosmall.contrast-black_scale-80.png| | 650| 19-Jan-19| 10:54 \ngroovelogosmall.contrastwhite_scale100.png| groovelogosmall.contrast-white_scale-100.png| | 974| 19-Jan-19| 10:54 \ngroovelogosmall.contrastwhite_scale140.png| groovelogosmall.contrast-white_scale-140.png| | 1295| 19-Jan-19| 10:54 \ngroovelogosmall.contrastwhite_scale180.png| groovelogosmall.contrast-white_scale-180.png| | 1849| 19-Jan-19| 10:54 \ngroovelogosmall.contrastwhite_scale80.png| groovelogosmall.contrast-white_scale-80.png| | 625| 19-Jan-19| 10:54 \ngroovelogosmall.scale100.png| groovelogosmall.scale-100.png| | 1941| 19-Jan-19| 10:54 \ngroovelogosmall.scale140.png| groovelogosmall.scale-140.png| | 2840| 19-Jan-19| 10:54 \ngroovelogosmall.scale180.png| groovelogosmall.scale-180.png| | 4066| 19-Jan-19| 10:54 \ngroovelogosmall.scale80.png| groovelogosmall.scale-80.png| | 1335| 19-Jan-19| 10:54 \ninfopathlogo.contrastblack_scale100.png| infopathlogo.contrast-black_scale-100.png| | 1552| 19-Jan-19| 10:54 \ninfopathlogo.contrastblack_scale140.png| infopathlogo.contrast-black_scale-140.png| | 2344| 19-Jan-19| 10:54 \ninfopathlogo.contrastblack_scale180.png| infopathlogo.contrast-black_scale-180.png| | 2850| 19-Jan-19| 10:54 \ninfopathlogo.contrastblack_scale80.png| infopathlogo.contrast-black_scale-80.png| | 1233| 19-Jan-19| 10:54 \ninfopathlogo.contrastwhite_scale100.png| infopathlogo.contrast-white_scale-100.png| | 1545| 19-Jan-19| 10:54 \ninfopathlogo.contrastwhite_scale140.png| infopathlogo.contrast-white_scale-140.png| | 2303| 19-Jan-19| 10:54 \ninfopathlogo.contrastwhite_scale180.png| infopathlogo.contrast-white_scale-180.png| | 2812| 19-Jan-19| 10:54 \ninfopathlogo.contrastwhite_scale80.png| infopathlogo.contrast-white_scale-80.png| | 1229| 19-Jan-19| 10:54 \ninfopathlogo.scale100.png| infopathlogo.scale-100.png| | 1602| 19-Jan-19| 10:54 \ninfopathlogo.scale140.png| infopathlogo.scale-140.png| | 2352| 19-Jan-19| 10:54 \ninfopathlogo.scale180.png| infopathlogo.scale-180.png| | 2819| 19-Jan-19| 10:54 \ninfopathlogo.scale80.png| infopathlogo.scale-80.png| | 1295| 19-Jan-19| 10:54 \ninfopathlogosmall.contrastblack_scale100.png| infopathlogosmall.contrast-black_scale-100.png| | 1050| 19-Jan-19| 10:54 \ninfopathlogosmall.contrastblack_scale140.png| infopathlogosmall.contrast-black_scale-140.png| | 1322| 19-Jan-19| 10:54 \ninfopathlogosmall.contrastblack_scale180.png| infopathlogosmall.contrast-black_scale-180.png| | 1942| 19-Jan-19| 10:54 \ninfopathlogosmall.contrastblack_scale80.png| infopathlogosmall.contrast-black_scale-80.png| | 732| 19-Jan-19| 10:54 \ninfopathlogosmall.contrastwhite_scale100.png| infopathlogosmall.contrast-white_scale-100.png| | 1047| 19-Jan-19| 10:54 \ninfopathlogosmall.contrastwhite_scale140.png| infopathlogosmall.contrast-white_scale-140.png| | 1310| 19-Jan-19| 10:54 \ninfopathlogosmall.contrastwhite_scale180.png| infopathlogosmall.contrast-white_scale-180.png| | 1900| 19-Jan-19| 10:54 \ninfopathlogosmall.contrastwhite_scale80.png| infopathlogosmall.contrast-white_scale-80.png| | 725| 19-Jan-19| 10:54 \ninfopathlogosmall.scale100.png| infopathlogosmall.scale-100.png| | 1109| 19-Jan-19| 10:54 \ninfopathlogosmall.scale140.png| infopathlogosmall.scale-140.png| | 1364| 19-Jan-19| 10:54 \ninfopathlogosmall.scale180.png| infopathlogosmall.scale-180.png| | 1927| 19-Jan-19| 10:54 \ninfopathlogosmall.scale80.png| infopathlogosmall.scale-80.png| | 774| 19-Jan-19| 10:54 \nlynclogo.contrastblack_scale100.png| lynclogo.contrast-black_scale-100.png| | 2528| 19-Jan-19| 10:54 \nlynclogo.contrastblack_scale140.png| lynclogo.contrast-black_scale-140.png| | 3857| 19-Jan-19| 10:54 \nlynclogo.contrastblack_scale180.png| lynclogo.contrast-black_scale-180.png| | 5403| 19-Jan-19| 10:54 \nlynclogo.contrastblack_scale80.png| lynclogo.contrast-black_scale-80.png| | 1854| 19-Jan-19| 10:54 \nlynclogo.contrastwhite_scale100.png| lynclogo.contrast-white_scale-100.png| | 2519| 19-Jan-19| 10:54 \nlynclogo.contrastwhite_scale140.png| lynclogo.contrast-white_scale-140.png| | 3845| 19-Jan-19| 10:54 \nlynclogo.contrastwhite_scale180.png| lynclogo.contrast-white_scale-180.png| | 5504| 19-Jan-19| 10:54 \nlynclogo.contrastwhite_scale80.png| lynclogo.contrast-white_scale-80.png| | 1853| 19-Jan-19| 10:54 \nlynclogo.scale100.png| lynclogo.scale-100.png| | 2704| 19-Jan-19| 10:54 \nlynclogo.scale140.png| lynclogo.scale-140.png| | 4055| 19-Jan-19| 10:54 \nlynclogo.scale180.png| lynclogo.scale-180.png| | 5493| 19-Jan-19| 10:54 \nlynclogo.scale80.png| lynclogo.scale-80.png| | 2039| 19-Jan-19| 10:54 \nlynclogosmall.contrastblack_scale100.png| lynclogosmall.contrast-black_scale-100.png| | 1536| 19-Jan-19| 10:54 \nlynclogosmall.contrastblack_scale140.png| lynclogosmall.contrast-black_scale-140.png| | 2138| 19-Jan-19| 10:54 \nlynclogosmall.contrastblack_scale180.png| lynclogosmall.contrast-black_scale-180.png| | 3164| 19-Jan-19| 10:54 \nlynclogosmall.contrastblack_scale80.png| lynclogosmall.contrast-black_scale-80.png| | 1008| 19-Jan-19| 10:54 \nlynclogosmall.contrastwhite_scale100.png| lynclogosmall.contrast-white_scale-100.png| | 1508| 19-Jan-19| 10:54 \nlynclogosmall.contrastwhite_scale140.png| lynclogosmall.contrast-white_scale-140.png| | 2085| 19-Jan-19| 10:54 \nlynclogosmall.contrastwhite_scale180.png| lynclogosmall.contrast-white_scale-180.png| | 3110| 19-Jan-19| 10:54 \nlynclogosmall.contrastwhite_scale80.png| lynclogosmall.contrast-white_scale-80.png| | 1009| 19-Jan-19| 10:54 \nlynclogosmall.scale100.png| lynclogosmall.scale-100.png| | 1796| 19-Jan-19| 10:54 \nlynclogosmall.scale140.png| lynclogosmall.scale-140.png| | 2417| 19-Jan-19| 10:54 \nlynclogosmall.scale180.png| lynclogosmall.scale-180.png| | 3571| 19-Jan-19| 10:54 \nlynclogosmall.scale80.png| lynclogosmall.scale-80.png| | 1203| 19-Jan-19| 10:54 \nmsaccesslogo.contrastblack_scale100.png| msaccesslogo.contrast-black_scale-100.png| | 2435| 19-Jan-19| 10:54 \nmsaccesslogo.contrastblack_scale140.png| msaccesslogo.contrast-black_scale-140.png| | 3298| 19-Jan-19| 10:54 \nmsaccesslogo.contrastblack_scale180.png| msaccesslogo.contrast-black_scale-180.png| | 4701| 19-Jan-19| 10:54 \nmsaccesslogo.contrastblack_scale80.png| msaccesslogo.contrast-black_scale-80.png| | 1871| 19-Jan-19| 10:54 \nmsaccesslogo.contrastwhite_scale100.png| msaccesslogo.contrast-white_scale-100.png| | 2465| 19-Jan-19| 10:54 \nmsaccesslogo.contrastwhite_scale140.png| msaccesslogo.contrast-white_scale-140.png| | 3392| 19-Jan-19| 10:54 \nmsaccesslogo.contrastwhite_scale180.png| msaccesslogo.contrast-white_scale-180.png| | 4810| 19-Jan-19| 10:54 \nmsaccesslogo.contrastwhite_scale80.png| msaccesslogo.contrast-white_scale-80.png| | 1894| 19-Jan-19| 10:54 \nmsaccesslogo.scale100.png| msaccesslogo.scale-100.png| | 2537| 19-Jan-19| 10:54 \nmsaccesslogo.scale140.png| msaccesslogo.scale-140.png| | 3315| 19-Jan-19| 10:54 \nmsaccesslogo.scale180.png| msaccesslogo.scale-180.png| | 4845| 19-Jan-19| 10:54 \nmsaccesslogo.scale80.png| msaccesslogo.scale-80.png| | 2000| 19-Jan-19| 10:54 \nmsaccesslogosmall.contrastblack_scale100.png| msaccesslogosmall.contrast-black_scale-100.png| | 1644| 19-Jan-19| 10:54 \nmsaccesslogosmall.contrastblack_scale140.png| msaccesslogosmall.contrast-black_scale-140.png| | 2116| 19-Jan-19| 10:54 \nmsaccesslogosmall.contrastblack_scale180.png| msaccesslogosmall.contrast-black_scale-180.png| | 2807| 19-Jan-19| 10:54 \nmsaccesslogosmall.contrastblack_scale80.png| msaccesslogosmall.contrast-black_scale-80.png| | 1017| 19-Jan-19| 10:54 \nmsaccesslogosmall.contrastwhite_scale100.png| msaccesslogosmall.contrast-white_scale-100.png| | 1619| 19-Jan-19| 10:54 \nmsaccesslogosmall.contrastwhite_scale140.png| msaccesslogosmall.contrast-white_scale-140.png| | 2108| 19-Jan-19| 10:54 \nmsaccesslogosmall.contrastwhite_scale180.png| msaccesslogosmall.contrast-white_scale-180.png| | 2816| 19-Jan-19| 10:54 \nmsaccesslogosmall.contrastwhite_scale80.png| msaccesslogosmall.contrast-white_scale-80.png| | 1007| 19-Jan-19| 10:54 \nmsaccesslogosmall.scale100.png| msaccesslogosmall.scale-100.png| | 1767| 19-Jan-19| 10:54 \nmsaccesslogosmall.scale140.png| msaccesslogosmall.scale-140.png| | 2252| 19-Jan-19| 10:54 \nmsaccesslogosmall.scale180.png| msaccesslogosmall.scale-180.png| | 2815| 19-Jan-19| 10:54 \nmsaccesslogosmall.scale80.png| msaccesslogosmall.scale-80.png| | 1144| 19-Jan-19| 10:54 \nmspublogo.contrastblack_scale100.png| mspublogo.contrast-black_scale-100.png| | 1537| 19-Jan-19| 10:54 \nmspublogo.contrastblack_scale140.png| mspublogo.contrast-black_scale-140.png| | 2271| 19-Jan-19| 10:54 \nmspublogo.contrastblack_scale180.png| mspublogo.contrast-black_scale-180.png| | 2973| 19-Jan-19| 10:54 \nmspublogo.contrastblack_scale80.png| mspublogo.contrast-black_scale-80.png| | 1238| 19-Jan-19| 10:54 \nmspublogo.contrastwhite_scale100.png| mspublogo.contrast-white_scale-100.png| | 1548| 19-Jan-19| 10:54 \nmspublogo.contrastwhite_scale140.png| mspublogo.contrast-white_scale-140.png| | 2276| 19-Jan-19| 10:54 \nmspublogo.contrastwhite_scale180.png| mspublogo.contrast-white_scale-180.png| | 2969| 19-Jan-19| 10:54 \nmspublogo.contrastwhite_scale80.png| mspublogo.contrast-white_scale-80.png| | 1259| 19-Jan-19| 10:54 \nmspublogo.scale100.png| mspublogo.scale-100.png| | 1571| 19-Jan-19| 10:54 \nmspublogo.scale140.png| mspublogo.scale-140.png| | 2249| 19-Jan-19| 10:54 \nmspublogo.scale180.png| mspublogo.scale-180.png| | 2866| 19-Jan-19| 10:54 \nmspublogo.scale80.png| mspublogo.scale-80.png| | 1288| 19-Jan-19| 10:54 \nmspublogosmall.contrastblack_scale100.png| mspublogosmall.contrast-black_scale-100.png| | 1047| 19-Jan-19| 10:54 \nmspublogosmall.contrastblack_scale140.png| mspublogosmall.contrast-black_scale-140.png| | 1300| 19-Jan-19| 10:54 \nmspublogosmall.contrastblack_scale180.png| mspublogosmall.contrast-black_scale-180.png| | 1859| 19-Jan-19| 10:54 \nmspublogosmall.contrastblack_scale80.png| mspublogosmall.contrast-black_scale-80.png| | 754| 19-Jan-19| 10:54 \nmspublogosmall.contrastwhite_scale100.png| mspublogosmall.contrast-white_scale-100.png| | 1036| 19-Jan-19| 10:54 \nmspublogosmall.contrastwhite_scale140.png| mspublogosmall.contrast-white_scale-140.png| | 1300| 19-Jan-19| 10:54 \nmspublogosmall.contrastwhite_scale180.png| mspublogosmall.contrast-white_scale-180.png| | 1868| 19-Jan-19| 10:54 \nmspublogosmall.contrastwhite_scale80.png| mspublogosmall.contrast-white_scale-80.png| | 749| 19-Jan-19| 10:54 \nmspublogosmall.scale100.png| mspublogosmall.scale-100.png| | 1093| 19-Jan-19| 10:54 \nmspublogosmall.scale140.png| mspublogosmall.scale-140.png| | 1324| 19-Jan-19| 10:54 \nmspublogosmall.scale180.png| mspublogosmall.scale-180.png| | 1797| 19-Jan-19| 10:54 \nmspublogosmall.scale80.png| mspublogosmall.scale-80.png| | 838| 19-Jan-19| 10:54 \nocpubmgrlogo.contrastblack_scale100.png| ocpubmgrlogo.contrast-black_scale-100.png| | 3061| 19-Jan-19| 10:54 \nocpubmgrlogo.contrastblack_scale140.png| ocpubmgrlogo.contrast-black_scale-140.png| | 4800| 19-Jan-19| 10:54 \nocpubmgrlogo.contrastblack_scale180.png| ocpubmgrlogo.contrast-black_scale-180.png| | 6552| 19-Jan-19| 10:54 \nocpubmgrlogo.contrastblack_scale80.png| ocpubmgrlogo.contrast-black_scale-80.png| | 2251| 19-Jan-19| 10:54 \nocpubmgrlogo.contrastwhite_scale100.png| ocpubmgrlogo.contrast-white_scale-100.png| | 3077| 19-Jan-19| 10:54 \nocpubmgrlogo.contrastwhite_scale140.png| ocpubmgrlogo.contrast-white_scale-140.png| | 4736| 19-Jan-19| 10:54 \nocpubmgrlogo.contrastwhite_scale180.png| ocpubmgrlogo.contrast-white_scale-180.png| | 6553| 19-Jan-19| 10:54 \nocpubmgrlogo.contrastwhite_scale80.png| ocpubmgrlogo.contrast-white_scale-80.png| | 2234| 19-Jan-19| 10:54 \nocpubmgrlogo.scale100.png| ocpubmgrlogo.scale-100.png| | 3252| 19-Jan-19| 10:54 \nocpubmgrlogo.scale140.png| ocpubmgrlogo.scale-140.png| | 5038| 19-Jan-19| 10:54 \nocpubmgrlogo.scale180.png| ocpubmgrlogo.scale-180.png| | 6678| 19-Jan-19| 10:54 \nocpubmgrlogo.scale80.png| ocpubmgrlogo.scale-80.png| | 2450| 19-Jan-19| 10:54 \nocpubmgrlogosmall.contrastblack_scale100.png| ocpubmgrlogosmall.contrast-black_scale-100.png| | 1917| 19-Jan-19| 10:54 \nocpubmgrlogosmall.contrastblack_scale140.png| ocpubmgrlogosmall.contrast-black_scale-140.png| | 2666| 19-Jan-19| 10:54 \nocpubmgrlogosmall.contrastblack_scale180.png| ocpubmgrlogosmall.contrast-black_scale-180.png| | 3990| 19-Jan-19| 10:54 \nocpubmgrlogosmall.contrastblack_scale80.png| ocpubmgrlogosmall.contrast-black_scale-80.png| | 1193| 19-Jan-19| 10:54 \nocpubmgrlogosmall.contrastwhite_scale100.png| ocpubmgrlogosmall.contrast-white_scale-100.png| | 1859| 19-Jan-19| 10:54 \nocpubmgrlogosmall.contrastwhite_scale140.png| ocpubmgrlogosmall.contrast-white_scale-140.png| | 2595| 19-Jan-19| 10:54 \nocpubmgrlogosmall.contrastwhite_scale180.png| ocpubmgrlogosmall.contrast-white_scale-180.png| | 3883| 19-Jan-19| 10:54 \nocpubmgrlogosmall.contrastwhite_scale80.png| ocpubmgrlogosmall.contrast-white_scale-80.png| | 1208| 19-Jan-19| 10:54 \nocpubmgrlogosmall.scale100.png| ocpubmgrlogosmall.scale-100.png| | 2206| 19-Jan-19| 10:54 \nocpubmgrlogosmall.scale140.png| ocpubmgrlogosmall.scale-140.png| | 2935| 19-Jan-19| 10:54 \nocpubmgrlogosmall.scale180.png| ocpubmgrlogosmall.scale-180.png| | 4567| 19-Jan-19| 10:54 \nocpubmgrlogosmall.scale80.png| ocpubmgrlogosmall.scale-80.png| | 1389| 19-Jan-19| 10:54 \nonenotelogo.contrastblack_scale100.png| onenotelogo.contrast-black_scale-100.png| | 1566| 19-Jan-19| 10:54 \nonenotelogo.contrastblack_scale140.png| onenotelogo.contrast-black_scale-140.png| | 2183| 19-Jan-19| 10:54 \nonenotelogo.contrastblack_scale180.png| onenotelogo.contrast-black_scale-180.png| | 3150| 19-Jan-19| 10:54 \nonenotelogo.contrastblack_scale80.png| onenotelogo.contrast-black_scale-80.png| | 1362| 19-Jan-19| 10:54 \nonenotelogo.contrastwhite_scale100.png| onenotelogo.contrast-white_scale-100.png| | 1558| 19-Jan-19| 10:54 \nonenotelogo.contrastwhite_scale140.png| onenotelogo.contrast-white_scale-140.png| | 2171| 19-Jan-19| 10:54 \nonenotelogo.contrastwhite_scale180.png| onenotelogo.contrast-white_scale-180.png| | 3162| 19-Jan-19| 10:54 \nonenotelogo.contrastwhite_scale80.png| onenotelogo.contrast-white_scale-80.png| | 1345| 19-Jan-19| 10:54 \nonenotelogo.scale100.png| onenotelogo.scale-100.png| | 1636| 19-Jan-19| 10:54 \nonenotelogo.scale140.png| onenotelogo.scale-140.png| | 2268| 19-Jan-19| 10:54 \nonenotelogo.scale180.png| onenotelogo.scale-180.png| | 2945| 19-Jan-19| 10:54 \nonenotelogo.scale80.png| onenotelogo.scale-80.png| | 1398| 19-Jan-19| 10:54 \nonenotelogosmall.contrastblack_scale100.png| onenotelogosmall.contrast-black_scale-100.png| | 1097| 19-Jan-19| 10:54 \nonenotelogosmall.contrastblack_scale140.png| onenotelogosmall.contrast-black_scale-140.png| | 1311| 19-Jan-19| 10:54 \nonenotelogosmall.contrastblack_scale180.png| onenotelogosmall.contrast-black_scale-180.png| | 1803| 19-Jan-19| 10:54 \nonenotelogosmall.contrastblack_scale80.png| onenotelogosmall.contrast-black_scale-80.png| | 711| 19-Jan-19| 10:54 \nonenotelogosmall.contrastwhite_scale100.png| onenotelogosmall.contrast-white_scale-100.png| | 1099| 19-Jan-19| 10:54 \nonenotelogosmall.contrastwhite_scale140.png| onenotelogosmall.contrast-white_scale-140.png| | 1303| 19-Jan-19| 10:54 \nonenotelogosmall.contrastwhite_scale180.png| onenotelogosmall.contrast-white_scale-180.png| | 1808| 19-Jan-19| 10:54 \nonenotelogosmall.contrastwhite_scale80.png| onenotelogosmall.contrast-white_scale-80.png| | 709| 19-Jan-19| 10:54 \nonenotelogosmall.scale100.png| onenotelogosmall.scale-100.png| | 1196| 19-Jan-19| 10:54 \nonenotelogosmall.scale140.png| onenotelogosmall.scale-140.png| | 1388| 19-Jan-19| 10:54 \nonenotelogosmall.scale180.png| onenotelogosmall.scale-180.png| | 1806| 19-Jan-19| 10:54 \nonenotelogosmall.scale80.png| onenotelogosmall.scale-80.png| | 811| 19-Jan-19| 10:54 \nonenotemlogo.contrastblack_scale100.png| onenotemlogo.contrast-black_scale-100.png| | 2922| 19-Jan-19| 10:54 \nonenotemlogo.contrastblack_scale140.png| onenotemlogo.contrast-black_scale-140.png| | 4102| 19-Jan-19| 10:54 \nonenotemlogo.contrastblack_scale180.png| onenotemlogo.contrast-black_scale-180.png| | 5917| 19-Jan-19| 10:54 \nonenotemlogo.contrastblack_scale80.png| onenotemlogo.contrast-black_scale-80.png| | 2001| 19-Jan-19| 10:54 \nonenotemlogo.contrastwhite_scale100.png| onenotemlogo.contrast-white_scale-100.png| | 2890| 19-Jan-19| 10:54 \nonenotemlogo.contrastwhite_scale140.png| onenotemlogo.contrast-white_scale-140.png| | 4074| 19-Jan-19| 10:54 \nonenotemlogo.contrastwhite_scale180.png| onenotemlogo.contrast-white_scale-180.png| | 5879| 19-Jan-19| 10:54 \nonenotemlogo.contrastwhite_scale80.png| onenotemlogo.contrast-white_scale-80.png| | 2004| 19-Jan-19| 10:54 \nonenotemlogo.scale100.png| onenotemlogo.scale-100.png| | 3005| 19-Jan-19| 10:54 \nonenotemlogo.scale140.png| onenotemlogo.scale-140.png| | 4287| 19-Jan-19| 10:54 \nonenotemlogo.scale180.png| onenotemlogo.scale-180.png| | 5769| 19-Jan-19| 10:54 \nonenotemlogo.scale80.png| onenotemlogo.scale-80.png| | 2156| 19-Jan-19| 10:54 \nonenotemlogosmall.contrastblack_scale100.png| onenotemlogosmall.contrast-black_scale-100.png| | 1801| 19-Jan-19| 10:54 \nonenotemlogosmall.contrastblack_scale140.png| onenotemlogosmall.contrast-black_scale-140.png| | 2602| 19-Jan-19| 10:54 \nonenotemlogosmall.contrastblack_scale180.png| onenotemlogosmall.contrast-black_scale-180.png| | 3594| 19-Jan-19| 10:54 \nonenotemlogosmall.contrastblack_scale80.png| onenotemlogosmall.contrast-black_scale-80.png| | 1130| 19-Jan-19| 10:54 \nonenotemlogosmall.contrastwhite_scale100.png| onenotemlogosmall.contrast-white_scale-100.png| | 1790| 19-Jan-19| 10:54 \nonenotemlogosmall.contrastwhite_scale140.png| onenotemlogosmall.contrast-white_scale-140.png| | 2583| 19-Jan-19| 10:54 \nonenotemlogosmall.contrastwhite_scale180.png| onenotemlogosmall.contrast-white_scale-180.png| | 3554| 19-Jan-19| 10:54 \nonenotemlogosmall.contrastwhite_scale80.png| onenotemlogosmall.contrast-white_scale-80.png| | 1119| 19-Jan-19| 10:54 \nonenotemlogosmall.scale100.png| onenotemlogosmall.scale-100.png| | 1913| 19-Jan-19| 10:54 \nonenotemlogosmall.scale140.png| onenotemlogosmall.scale-140.png| | 2718| 19-Jan-19| 10:54 \nonenotemlogosmall.scale180.png| onenotemlogosmall.scale-180.png| | 3598| 19-Jan-19| 10:54 \nonenotemlogosmall.scale80.png| onenotemlogosmall.scale-80.png| | 1234| 19-Jan-19| 10:54 \noutlooklogo.contrastblack_scale100.png| outlooklogo.contrast-black_scale-100.png| | 1929| 19-Jan-19| 10:54 \noutlooklogo.contrastblack_scale140.png| outlooklogo.contrast-black_scale-140.png| | 3091| 19-Jan-19| 10:54 \noutlooklogo.contrastblack_scale180.png| outlooklogo.contrast-black_scale-180.png| | 4084| 19-Jan-19| 10:54 \noutlooklogo.contrastblack_scale80.png| outlooklogo.contrast-black_scale-80.png| | 1574| 19-Jan-19| 10:54 \noutlooklogo.contrastwhite_scale100.png| outlooklogo.contrast-white_scale-100.png| | 1895| 19-Jan-19| 10:54 \noutlooklogo.contrastwhite_scale140.png| outlooklogo.contrast-white_scale-140.png| | 3096| 19-Jan-19| 10:54 \noutlooklogo.contrastwhite_scale180.png| outlooklogo.contrast-white_scale-180.png| | 4096| 19-Jan-19| 10:54 \noutlooklogo.contrastwhite_scale80.png| outlooklogo.contrast-white_scale-80.png| | 1541| 19-Jan-19| 10:54 \noutlooklogo.scale100.png| outlooklogo.scale-100.png| | 2093| 19-Jan-19| 10:54 \noutlooklogo.scale140.png| outlooklogo.scale-140.png| | 3241| 19-Jan-19| 10:54 \noutlooklogo.scale180.png| outlooklogo.scale-180.png| | 4038| 19-Jan-19| 10:54 \noutlooklogo.scale80.png| outlooklogo.scale-80.png| | 1705| 19-Jan-19| 10:54 \noutlooklogosmall.contrastblack_scale100.png| outlooklogosmall.contrast-black_scale-100.png| | 1270| 19-Jan-19| 10:54 \noutlooklogosmall.contrastblack_scale140.png| outlooklogosmall.contrast-black_scale-140.png| | 1597| 19-Jan-19| 10:54 \noutlooklogosmall.contrastblack_scale180.png| outlooklogosmall.contrast-black_scale-180.png| | 2523| 19-Jan-19| 10:54 \noutlooklogosmall.contrastblack_scale80.png| outlooklogosmall.contrast-black_scale-80.png| | 918| 19-Jan-19| 10:54 \noutlooklogosmall.contrastwhite_scale100.png| outlooklogosmall.contrast-white_scale-100.png| | 1268| 19-Jan-19| 10:54 \noutlooklogosmall.contrastwhite_scale140.png| outlooklogosmall.contrast-white_scale-140.png| | 1547| 19-Jan-19| 10:54 \noutlooklogosmall.contrastwhite_scale180.png| outlooklogosmall.contrast-white_scale-180.png| | 2449| 19-Jan-19| 10:54 \noutlooklogosmall.contrastwhite_scale80.png| outlooklogosmall.contrast-white_scale-80.png| | 902| 19-Jan-19| 10:54 \noutlooklogosmall.scale100.png| outlooklogosmall.scale-100.png| | 1481| 19-Jan-19| 10:54 \noutlooklogosmall.scale140.png| outlooklogosmall.scale-140.png| | 1838| 19-Jan-19| 10:54 \noutlooklogosmall.scale180.png| outlooklogosmall.scale-180.png| | 2731| 19-Jan-19| 10:54 \noutlooklogosmall.scale80.png| outlooklogosmall.scale-80.png| | 1053| 19-Jan-19| 10:54 \npowerpntlogo.contrastblack_scale100.png| powerpntlogo.contrast-black_scale-100.png| | 1654| 19-Jan-19| 10:54 \npowerpntlogo.contrastblack_scale140.png| powerpntlogo.contrast-black_scale-140.png| | 2314| 19-Jan-19| 10:54 \npowerpntlogo.contrastblack_scale180.png| powerpntlogo.contrast-black_scale-180.png| | 3077| 19-Jan-19| 10:54 \npowerpntlogo.contrastblack_scale80.png| powerpntlogo.contrast-black_scale-80.png| | 1280| 19-Jan-19| 10:54 \npowerpntlogo.contrastwhite_scale100.png| powerpntlogo.contrast-white_scale-100.png| | 1650| 19-Jan-19| 10:54 \npowerpntlogo.contrastwhite_scale140.png| powerpntlogo.contrast-white_scale-140.png| | 2348| 19-Jan-19| 10:54 \npowerpntlogo.contrastwhite_scale180.png| powerpntlogo.contrast-white_scale-180.png| | 3059| 19-Jan-19| 10:54 \npowerpntlogo.contrastwhite_scale80.png| powerpntlogo.contrast-white_scale-80.png| | 1259| 19-Jan-19| 10:54 \npowerpntlogo.scale100.png| powerpntlogo.scale-100.png| | 1721| 19-Jan-19| 10:54 \npowerpntlogo.scale140.png| powerpntlogo.scale-140.png| | 2348| 19-Jan-19| 10:54 \npowerpntlogo.scale180.png| powerpntlogo.scale-180.png| | 3023| 19-Jan-19| 10:54 \npowerpntlogo.scale80.png| powerpntlogo.scale-80.png| | 1354| 19-Jan-19| 10:54 \npowerpntlogosmall.contrastblack_scale100.png| powerpntlogosmall.contrast-black_scale-100.png| | 1026| 19-Jan-19| 10:54 \npowerpntlogosmall.contrastblack_scale140.png| powerpntlogosmall.contrast-black_scale-140.png| | 1364| 19-Jan-19| 10:54 \npowerpntlogosmall.contrastblack_scale180.png| powerpntlogosmall.contrast-black_scale-180.png| | 1894| 19-Jan-19| 10:54 \npowerpntlogosmall.contrastblack_scale80.png| powerpntlogosmall.contrast-black_scale-80.png| | 746| 19-Jan-19| 10:54 \npowerpntlogosmall.contrastwhite_scale100.png| powerpntlogosmall.contrast-white_scale-100.png| | 1022| 19-Jan-19| 10:54 \npowerpntlogosmall.contrastwhite_scale140.png| powerpntlogosmall.contrast-white_scale-140.png| | 1307| 19-Jan-19| 10:54 \npowerpntlogosmall.contrastwhite_scale180.png| powerpntlogosmall.contrast-white_scale-180.png| | 1874| 19-Jan-19| 10:54 \npowerpntlogosmall.contrastwhite_scale80.png| powerpntlogosmall.contrast-white_scale-80.png| | 758| 19-Jan-19| 10:54 \npowerpntlogosmall.scale100.png| powerpntlogosmall.scale-100.png| | 1154| 19-Jan-19| 10:54 \npowerpntlogosmall.scale140.png| powerpntlogosmall.scale-140.png| | 1438| 19-Jan-19| 10:54 \npowerpntlogosmall.scale180.png| powerpntlogosmall.scale-180.png| | 1896| 19-Jan-19| 10:54 \npowerpntlogosmall.scale80.png| powerpntlogosmall.scale-80.png| | 874| 19-Jan-19| 10:54 \nspdesignlogo.contrastblack_scale100.png| spdesignlogo.contrast-black_scale-100.png| | 1559| 19-Jan-19| 10:54 \nspdesignlogo.contrastblack_scale140.png| spdesignlogo.contrast-black_scale-140.png| | 2383| 19-Jan-19| 10:54 \nspdesignlogo.contrastblack_scale180.png| spdesignlogo.contrast-black_scale-180.png| | 3497| 19-Jan-19| 10:54 \nspdesignlogo.contrastblack_scale80.png| spdesignlogo.contrast-black_scale-80.png| | 1298| 19-Jan-19| 10:54 \nspdesignlogo.contrastwhite_scale100.png| spdesignlogo.contrast-white_scale-100.png| | 1548| 19-Jan-19| 10:54 \nspdesignlogo.contrastwhite_scale140.png| spdesignlogo.contrast-white_scale-140.png| | 2534| 19-Jan-19| 10:54 \nspdesignlogo.contrastwhite_scale180.png| spdesignlogo.contrast-white_scale-180.png| | 3725| 19-Jan-19| 10:54 \nspdesignlogo.contrastwhite_scale80.png| spdesignlogo.contrast-white_scale-80.png| | 1298| 19-Jan-19| 10:54 \nspdesignlogo.scale100.png| spdesignlogo.scale-100.png| | 2163| 19-Jan-19| 10:54 \nspdesignlogo.scale140.png| spdesignlogo.scale-140.png| | 3058| 19-Jan-19| 10:54 \nspdesignlogo.scale180.png| spdesignlogo.scale-180.png| | 4614| 19-Jan-19| 10:54 \nspdesignlogo.scale80.png| spdesignlogo.scale-80.png| | 1745| 19-Jan-19| 10:54 \nspdesignlogosmall.contrastblack_scale100.png| spdesignlogosmall.contrast-black_scale-100.png| | 1008| 19-Jan-19| 10:54 \nspdesignlogosmall.contrastblack_scale140.png| spdesignlogosmall.contrast-black_scale-140.png| | 1278| 19-Jan-19| 10:54 \nspdesignlogosmall.contrastblack_scale180.png| spdesignlogosmall.contrast-black_scale-180.png| | 1990| 19-Jan-19| 10:54 \nspdesignlogosmall.contrastblack_scale80.png| spdesignlogosmall.contrast-black_scale-80.png| | 617| 19-Jan-19| 10:54 \nspdesignlogosmall.contrastwhite_scale100.png| spdesignlogosmall.contrast-white_scale-100.png| | 977| 19-Jan-19| 10:54 \nspdesignlogosmall.contrastwhite_scale140.png| spdesignlogosmall.contrast-white_scale-140.png| | 1193| 19-Jan-19| 10:54 \nspdesignlogosmall.contrastwhite_scale180.png| spdesignlogosmall.contrast-white_scale-180.png| | 1876| 19-Jan-19| 10:54 \nspdesignlogosmall.contrastwhite_scale80.png| spdesignlogosmall.contrast-white_scale-80.png| | 602| 19-Jan-19| 10:54 \nspdesignlogosmall.scale100.png| spdesignlogosmall.scale-100.png| | 1546| 19-Jan-19| 10:54 \nspdesignlogosmall.scale140.png| spdesignlogosmall.scale-140.png| | 1910| 19-Jan-19| 10:54 \nspdesignlogosmall.scale180.png| spdesignlogosmall.scale-180.png| | 2614| 19-Jan-19| 10:54 \nspdesignlogosmall.scale80.png| spdesignlogosmall.scale-80.png| | 1003| 19-Jan-19| 10:54 \nvisiologo.contrastblack_scale100.png| visiologo.contrast-black_scale-100.png| | 1804| 19-Jan-19| 10:54 \nvisiologo.contrastblack_scale140.png| visiologo.contrast-black_scale-140.png| | 3195| 19-Jan-19| 10:54 \nvisiologo.contrastblack_scale180.png| visiologo.contrast-black_scale-180.png| | 3478| 19-Jan-19| 10:54 \nvisiologo.contrastblack_scale80.png| visiologo.contrast-black_scale-80.png| | 1474| 19-Jan-19| 10:54 \nvisiologo.contrastwhite_scale100.png| visiologo.contrast-white_scale-100.png| | 1801| 19-Jan-19| 10:54 \nvisiologo.contrastwhite_scale140.png| visiologo.contrast-white_scale-140.png| | 3254| 19-Jan-19| 10:54 \nvisiologo.contrastwhite_scale180.png| visiologo.contrast-white_scale-180.png| | 3626| 19-Jan-19| 10:54 \nvisiologo.contrastwhite_scale80.png| visiologo.contrast-white_scale-80.png| | 1447| 19-Jan-19| 10:54 \nvisiologo.scale100.png| visiologo.scale-100.png| | 1872| 19-Jan-19| 10:54 \nvisiologo.scale140.png| visiologo.scale-140.png| | 3262| 19-Jan-19| 10:54 \nvisiologo.scale180.png| visiologo.scale-180.png| | 3403| 19-Jan-19| 10:54 \nvisiologo.scale80.png| visiologo.scale-80.png| | 1526| 19-Jan-19| 10:54 \nvisiologosmall.contrastblack_scale100.png| visiologosmall.contrast-black_scale-100.png| | 1196| 19-Jan-19| 10:54 \nvisiologosmall.contrastblack_scale140.png| visiologosmall.contrast-black_scale-140.png| | 1497| 19-Jan-19| 10:54 \nvisiologosmall.contrastblack_scale180.png| visiologosmall.contrast-black_scale-180.png| | 2675| 19-Jan-19| 10:54 \nvisiologosmall.contrastblack_scale80.png| visiologosmall.contrast-black_scale-80.png| | 848| 19-Jan-19| 10:54 \nvisiologosmall.contrastwhite_scale100.png| visiologosmall.contrast-white_scale-100.png| | 1165| 19-Jan-19| 10:54 \nvisiologosmall.contrastwhite_scale140.png| visiologosmall.contrast-white_scale-140.png| | 1453| 19-Jan-19| 10:54 \nvisiologosmall.contrastwhite_scale180.png| visiologosmall.contrast-white_scale-180.png| | 2618| 19-Jan-19| 10:54 \nvisiologosmall.contrastwhite_scale80.png| visiologosmall.contrast-white_scale-80.png| | 836| 19-Jan-19| 10:54 \nvisiologosmall.scale100.png| visiologosmall.scale-100.png| | 1285| 19-Jan-19| 10:54 \nvisiologosmall.scale140.png| visiologosmall.scale-140.png| | 1597| 19-Jan-19| 10:54 \nvisiologosmall.scale180.png| visiologosmall.scale-180.png| | 2722| 19-Jan-19| 10:54 \nvisiologosmall.scale80.png| visiologosmall.scale-80.png| | 960| 19-Jan-19| 10:54 \nwinprojlogo.contrastblack_scale100.png| winprojlogo.contrast-black_scale-100.png| | 1662| 19-Jan-19| 10:54 \nwinprojlogo.contrastblack_scale140.png| winprojlogo.contrast-black_scale-140.png| | 2705| 19-Jan-19| 10:54 \nwinprojlogo.contrastblack_scale180.png| winprojlogo.contrast-black_scale-180.png| | 3391| 19-Jan-19| 10:54 \nwinprojlogo.contrastblack_scale80.png| winprojlogo.contrast-black_scale-80.png| | 1393| 19-Jan-19| 10:54 \nwinprojlogo.contrastwhite_scale100.png| winprojlogo.contrast-white_scale-100.png| | 1698| 19-Jan-19| 10:54 \nwinprojlogo.contrastwhite_scale140.png| winprojlogo.contrast-white_scale-140.png| | 2737| 19-Jan-19| 10:54 \nwinprojlogo.contrastwhite_scale180.png| winprojlogo.contrast-white_scale-180.png| | 3396| 19-Jan-19| 10:54 \nwinprojlogo.contrastwhite_scale80.png| winprojlogo.contrast-white_scale-80.png| | 1392| 19-Jan-19| 10:54 \nwinprojlogo.scale100.png| winprojlogo.scale-100.png| | 1740| 19-Jan-19| 10:54 \nwinprojlogo.scale140.png| winprojlogo.scale-140.png| | 2642| 19-Jan-19| 10:54 \nwinprojlogo.scale180.png| winprojlogo.scale-180.png| | 3257| 19-Jan-19| 10:54 \nwinprojlogo.scale80.png| winprojlogo.scale-80.png| | 1514| 19-Jan-19| 10:54 \nwinprojlogosmall.contrastblack_scale100.png| winprojlogosmall.contrast-black_scale-100.png| | 1124| 19-Jan-19| 10:54 \nwinprojlogosmall.contrastblack_scale140.png| winprojlogosmall.contrast-black_scale-140.png| | 1430| 19-Jan-19| 10:54 \nwinprojlogosmall.contrastblack_scale180.png| winprojlogosmall.contrast-black_scale-180.png| | 2183| 19-Jan-19| 10:54 \nwinprojlogosmall.contrastblack_scale80.png| winprojlogosmall.contrast-black_scale-80.png| | 721| 19-Jan-19| 10:54 \nwinprojlogosmall.contrastwhite_scale100.png| winprojlogosmall.contrast-white_scale-100.png| | 1119| 19-Jan-19| 10:54 \nwinprojlogosmall.contrastwhite_scale140.png| winprojlogosmall.contrast-white_scale-140.png| | 1380| 19-Jan-19| 10:54 \nwinprojlogosmall.contrastwhite_scale180.png| winprojlogosmall.contrast-white_scale-180.png| | 2148| 19-Jan-19| 10:54 \nwinprojlogosmall.contrastwhite_scale80.png| winprojlogosmall.contrast-white_scale-80.png| | 711| 19-Jan-19| 10:54 \nwinprojlogosmall.scale100.png| winprojlogosmall.scale-100.png| | 1308| 19-Jan-19| 10:54 \nwinprojlogosmall.scale140.png| winprojlogosmall.scale-140.png| | 1461| 19-Jan-19| 10:54 \nwinprojlogosmall.scale180.png| winprojlogosmall.scale-180.png| | 2189| 19-Jan-19| 10:54 \nwinprojlogosmall.scale80.png| winprojlogosmall.scale-80.png| | 855| 19-Jan-19| 10:54 \nwinwordlogo.contrastblack_scale100.png| winwordlogo.contrast-black_scale-100.png| | 1668| 19-Jan-19| 10:54 \nwinwordlogo.contrastblack_scale140.png| winwordlogo.contrast-black_scale-140.png| | 1984| 19-Jan-19| 10:54 \nwinwordlogo.contrastblack_scale180.png| winwordlogo.contrast-black_scale-180.png| | 3061| 19-Jan-19| 10:54 \nwinwordlogo.contrastblack_scale80.png| winwordlogo.contrast-black_scale-80.png| | 1385| 19-Jan-19| 10:54 \nwinwordlogo.contrastwhite_scale100.png| winwordlogo.contrast-white_scale-100.png| | 1663| 19-Jan-19| 10:54 \nwinwordlogo.contrastwhite_scale140.png| winwordlogo.contrast-white_scale-140.png| | 1979| 19-Jan-19| 10:54 \nwinwordlogo.contrastwhite_scale180.png| winwordlogo.contrast-white_scale-180.png| | 3067| 19-Jan-19| 10:54 \nwinwordlogo.contrastwhite_scale80.png| winwordlogo.contrast-white_scale-80.png| | 1386| 19-Jan-19| 10:54 \nwinwordlogo.scale100.png| winwordlogo.scale-100.png| | 1784| 19-Jan-19| 10:54 \nwinwordlogo.scale140.png| winwordlogo.scale-140.png| | 2165| 19-Jan-19| 10:54 \nwinwordlogo.scale180.png| winwordlogo.scale-180.png| | 3187| 19-Jan-19| 10:54 \nwinwordlogo.scale80.png| winwordlogo.scale-80.png| | 1435| 19-Jan-19| 10:54 \nwinwordlogosmall.contrastblack_scale100.png| winwordlogosmall.contrast-black_scale-100.png| | 1152| 19-Jan-19| 10:54 \nwinwordlogosmall.contrastblack_scale140.png| winwordlogosmall.contrast-black_scale-140.png| | 1422| 19-Jan-19| 10:54 \nwinwordlogosmall.contrastblack_scale180.png| winwordlogosmall.contrast-black_scale-180.png| | 1619| 19-Jan-19| 10:54 \nwinwordlogosmall.contrastblack_scale80.png| winwordlogosmall.contrast-black_scale-80.png| | 845| 19-Jan-19| 10:54 \nwinwordlogosmall.contrastwhite_scale100.png| winwordlogosmall.contrast-white_scale-100.png| | 1156| 19-Jan-19| 10:54 \nwinwordlogosmall.contrastwhite_scale140.png| winwordlogosmall.contrast-white_scale-140.png| | 1409| 19-Jan-19| 10:54 \nwinwordlogosmall.contrastwhite_scale180.png| winwordlogosmall.contrast-white_scale-180.png| | 1605| 19-Jan-19| 10:54 \nwinwordlogosmall.contrastwhite_scale80.png| winwordlogosmall.contrast-white_scale-80.png| | 832| 19-Jan-19| 10:54 \nwinwordlogosmall.scale100.png| winwordlogosmall.scale-100.png| | 1219| 19-Jan-19| 10:54 \nwinwordlogosmall.scale140.png| winwordlogosmall.scale-140.png| | 1490| 19-Jan-19| 10:54 \nwinwordlogosmall.scale180.png| winwordlogosmall.scale-180.png| | 1706| 19-Jan-19| 10:54 \nwinwordlogosmall.scale80.png| winwordlogosmall.scale-80.png| | 881| 19-Jan-19| 10:54 \nresources.pri| resources.pri| | 47040| 19-Jan-19| 10:54 \nmso.tpn.txt.arm| mso_third_party_notices.txt| | 1814| 19-Jan-19| 10:54 \nmso.tpn.txt.x64| mso_third_party_notices.txt| | 1814| 19-Jan-19| 10:53 \nmso.tpn.txt.x86| mso_third_party_notices.txt| | 1814| 19-Jan-19| 10:53 \n \nHow to get help and support for this security updateHelp for installing updates: [Protect yourself online](<https://www.microsoft.com/safety/pc-security/updates.aspx>) \n \nHelp for protecting your Windows-based computer from viruses and malware: [Microsoft Security](<http://support.microsoft.com/contactus/cu_sc_virsec_master>) \n \nLocal support according to your country: [International Support](<https://www.microsoft.com/en-us/locale.aspx>)\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 5.5, "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2019-02-12T08:00:00", "type": "mskb", "title": "Description of the security update for Office 2013: February 12, 2019", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-0540"], "modified": "2019-02-12T08:00:00", "id": "KB4462138", "href": "https://support.microsoft.com/en-us/help/4462138", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2023-05-26T10:22:12", "description": "None\n## Summary\n\nThis security update resolves a security feature bypass vulnerability that exists when Microsoft Office does not validate URLs. To learn more about the vulnerability, see [Microsoft Common Vulnerabilities and Exposures CVE-2019-0540](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0540>). \n \n**Note** To apply this security update, you must have the release version of [Service Pack 2 for Office 2010](<http://support.microsoft.com/kb/2687455>) installed.Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2010. It doesn't apply to the Office 2010 Click-to-Run editions, such as Microsoft Office 365 Home (see [Determining your Office version](<https://blogs.technet.microsoft.com/office_integration__sharepoint/2016/06/23/determining-your-office-version-msi-vs-c2r/>)).\n\n## How to get and install the update\n\n### Method 1: Microsoft Update\n\nThis update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see [Windows Update: FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>).\n\n### Method 2: Microsoft Update Catalog\n\nTo get the standalone package for this update, go to the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/Search.aspx?q=KB4462174>) website.\n\n### Method 3: Microsoft Download Center\n\nYou can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.\n\n * [Download security update KB 4462174 for the 32-bit version of Office 2010](<http://www.microsoft.com/download/details.aspx?familyid=8dabea86-4cf5-4bab-bbd1-da94e2eb2707>)\n * [Download security update KB 4462174 for the 64-bit version of Office 2010](<http://www.microsoft.com/download/details.aspx?familyid=efda83c3-9dbe-4e7a-9a67-16a32b4d4988>)\n\n## More Information\n\n### Security update deployment information\n\nFor deployment information about this update, see [security update deployment information: February 12, 2019](<https://support.microsoft.com/en-us/help/20190212>).\n\n### Security update replacement information\n\nThis security update replaces the previously released security update [4461614](<https://support.microsoft.com/help/4461614>).\n\n### File hash information\n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nmso2010-kb4462174-fullfile-x86-glb.exe| AD7D7F49230CF94496CAA9938E5DA7232C589CCD| 061BED55D44A0901D3E6910C6043415727A539CACB488340B4A07B08797A60F6 \nmso2010-kb4462174-fullfile-x64-glb.exe| 963D9355B3084C51EEB7E9758B7584DC78C58D4D| 27DEEC4BFBEF6BBBDCC08A03BD3F42906D91D534C8AE02D1615DE33D9E2C6EA0 \n \nFile informationThe English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.\n\n## \n\n__\n\nFor all supported x86-based versions of Office 2010\n\nFile identifier| File name| File version| File size| Date| Time \n---|---|---|---|---|--- \nmso.dll.x86| mso.dll| 14.0.7229.5000| 18,476,896| 22-Jan-2019| 08:27 \n \n## \n\n__\n\nFor all supported x64-based versions of Office 2010\n\nFile identifier| File name| File version| File size| Date| Time \n---|---|---|---|---|--- \nmso.dll.x64| mso.dll| 14.0.7229.5000| 24,358,032| 22-Jan-2019| 08:24 \nmso.dll.x86| mso.dll| 14.0.7229.5000| 18,476,896| 22-Jan-2019| 08:27 \n \nHow to get help and support for this security updateHelp for installing updates: [Protect yourself online](<https://www.microsoft.com/safety/pc-security/updates.aspx>) \n \nHelp for protecting your Windows-based computer from viruses and malware: [Microsoft Security](<http://support.microsoft.com/contactus/cu_sc_virsec_master>) \n \nLocal support according to your country: [International Support](<https://www.microsoft.com/en-us/locale.aspx>)\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 5.5, "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2019-02-12T08:00:00", "type": "mskb", "title": "Description of the security update for Office 2010: February 12, 2019", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-0540"], "modified": "2019-02-12T08:00:00", "id": "KB4462174", "href": "https://support.microsoft.com/en-us/help/4462174", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "symantec": [{"lastseen": "2021-06-08T19:04:42", "description": "### Description\n\nMicrosoft Office is prone to a security bypass vulnerability. An attacker can leverage this issue to bypass certain security restrictions; this may aid in launching further attacks.\n\n### Technologies Affected\n\n * Microsoft Excel Viewer \n * Microsoft Office 2010 Service Pack 2 (32-bit editions) \n * Microsoft Office 2010 Service Pack 2 (64-bit editions) \n * Microsoft Office 2013 RT Service Pack 1 \n * Microsoft Office 2013 Service Pack 1 (32-bit editions) \n * Microsoft Office 2013 Service Pack 1 (64-bit editions) \n * Microsoft Office 2016 (32-bit edition) \n * Microsoft Office 2016 (64-bit edition) \n * Microsoft Office 2019 for 32-bit editions \n * Microsoft Office 2019 for 64-bit editions \n * Microsoft Office 365 ProPlus for 32-bit Systems \n * Microsoft Office 365 ProPlus for 64-bit Systems \n * Microsoft Office Compatibility Pack Service Pack 3 \n * Microsoft Office Word Viewer \n * Microsoft PowerPoint Viewer \n\n### Recommendations\n\n**Block external access at the network boundary, unless external parties require service.** \nFilter access to the affected computer at the network boundary if global access isn't required. Restricting access to only trusted computers and networks might greatly reduce the likelihood of exploits.\n\n**Deploy network intrusion detection systems to monitor network traffic for malicious activity.** \nDeploy NIDS to monitor network traffic for anomalous or suspicious activity. Monitor logs generated by NIDS and by the server itself for evidence of attacks against the server. \n\n**Do not accept or execute files from untrusted or unknown sources.** \nTo reduce the likelihood of successful exploits, never handle files that originate from unfamiliar or untrusted sources.\n\n**Permit privileged access for trusted individuals only.** \nPermitting access to vulnerable applications for trusted individuals only can reduce the risk of an exploit.\n\nUpdates are available. Please see the references or vendor advisory for more information.\n", "cvss3": {}, "published": "2019-02-12T00:00:00", "type": "symantec", "title": "Microsoft Office CVE-2019-0540 Security Bypass Vulnerability", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2019-0540"], "modified": "2019-02-12T00:00:00", "id": "SMNTC-106863", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/106863", "cvss": {"score": 0.0, "vector": "NONE"}}], "mscve": [{"lastseen": "2023-06-10T15:25:37", "description": "A security feature bypass vulnerability exists when Microsoft Office does not validate URLs.\n\nAn attacker could send a victim a specially crafted file, which could trick the victim into entering credentials. An attacker who successfully exploited this vulnerability could perform a phishing attack.\n\nThe update addresses the vulnerability by ensuring Microsoft Office properly validates URLs.\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 5.5, "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2019-02-12T08:00:00", "type": "mscve", "title": "Microsoft Office Security Feature Bypass Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-0540"], "modified": "2019-02-12T08:00:00", "id": "MS:CVE-2019-0540", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2019-0540", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "cve": [{"lastseen": "2023-06-10T14:42:24", "description": "A security feature bypass vulnerability exists when Microsoft Office does not validate URLs.An attacker could send a victim a specially crafted file, which could trick the victim into entering credentials, aka 'Microsoft Office Security Feature Bypass Vulnerability'.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 5.5, "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2019-03-05T23:29:00", "type": "cve", "title": "CVE-2019-0540", "cwe": ["CWE-601"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-0540"], "modified": "2020-08-24T17:37:00", "cpe": ["cpe:/a:microsoft:office:2013", "cpe:/a:microsoft:office:2019", "cpe:/a:microsoft:powerpoint_viewer:-", "cpe:/a:microsoft:office:2016", "cpe:/a:microsoft:word_viewer:-", "cpe:/a:microsoft:office_365_proplus:-", "cpe:/a:microsoft:excel_viewer:-", "cpe:/a:microsoft:office:2010"], "id": "CVE-2019-0540", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-0540", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2013:*:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:word_viewer:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel_viewer:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_365_proplus:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:powerpoint_viewer:-:*:*:*:*:*:*:*"]}], "nessus": [{"lastseen": "2023-05-20T14:19:53", "description": "The Microsoft Office Viewers and Compatibility Products are missing security updates. It is, therefore, affected by multiple vulnerabilities :\n\n - A security feature bypass vulnerability exists when Microsoft Office does not validate URLs. An attacker could send a victim a specially crafted file, which could trick the victim into entering credentials. An attacker who successfully exploited this vulnerability could perform a phishing attack. The update addresses the vulnerability by ensuring Microsoft Office properly validates URLs. (CVE-2019-0540)\n\n - An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the users computer or data. (CVE-2019-0669)", "cvss3": {}, "published": "2019-02-19T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Office Viewers And Compatibility Products (February 2019)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-0540", "CVE-2019-0669"], "modified": "2019-10-31T00:00:00", "cpe": ["cpe:/a:microsoft:powerpoint_viewer", "cpe:/a:microsoft:word_viewer", "cpe:/a:microsoft:excel_viewer", "cpe:/a:microsoft:office_compatibility_pack"], "id": "SMB_NT_MS19_FEB_OFFICE_VIEWERS.NASL", "href": "https://www.tenable.com/plugins/nessus/122317", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(122317);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2019/10/31 15:18:52\");\n\n script_cve_id(\"CVE-2019-0540\", \"CVE-2019-0669\");\n script_bugtraq_id(106863, 106897);\n script_xref(name:\"MSKB\", value:\"4092465\");\n script_xref(name:\"MSKB\", value:\"4461607\");\n script_xref(name:\"MSKB\", value:\"4461608\");\n script_xref(name:\"MSKB\", value:\"4462154\");\n script_xref(name:\"MSFT\", value:\"MS19-4092465\");\n script_xref(name:\"MSFT\", value:\"MS19-4461607\");\n script_xref(name:\"MSFT\", value:\"MS19-4461608\");\n script_xref(name:\"MSFT\", value:\"MS19-4462154\");\n\n script_name(english:\"Security Updates for Microsoft Office Viewers And Compatibility Products (February 2019)\");\n script_summary(english:\"Checks for Microsoft security updates.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Office Viewers and Compatibility Products are affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Office Viewers and Compatibility Products are\nmissing security updates. It is, therefore, affected by multiple\nvulnerabilities :\n\n - A security feature bypass vulnerability exists when\n Microsoft Office does not validate URLs. An attacker\n could send a victim a specially crafted file, which\n could trick the victim into entering credentials. An\n attacker who successfully exploited this vulnerability\n could perform a phishing attack. The update addresses\n the vulnerability by ensuring Microsoft Office properly\n validates URLs. (CVE-2019-0540)\n\n - An information disclosure vulnerability exists when\n Microsoft Excel improperly discloses the contents of its\n memory. An attacker who exploited the vulnerability\n could use the information to compromise the users\n computer or data. (CVE-2019-0669)\");\n # https://support.microsoft.com/en-us/help/4461608/description-of-the-security-update-for-excel-viewer-2007-february-12\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?4019ced8\");\n # https://support.microsoft.com/en-us/help/4462154/description-of-the-security-update-for-word-viewer-february-12-2019\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?094bfd39\");\n # https://support.microsoft.com/en-us/help/4461607/description-of-the-security-update-for-microsoft-office-compatibility\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?0efdff5b\");\n # https://support.microsoft.com/en-us/help/4092465/description-of-the-security-update-for-microsoft-office-viewers\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?525bd448\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue: \n - KB4092465\n - KB4461607\n - KB4461608\n - KB4462154\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-0669\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/02/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/02/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/02/19\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:powerpoint_viewer\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:word_viewer\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:excel_viewer\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:office_compatibility_pack\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"office_installed.nasl\", \"microsoft_office_compatibility_pack_installed.nbin\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_reg_query.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"install_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS19-02\";\nkbs = make_list(\n '4092465', # Excel Viewer and PowerPoint Viewer\n '4461607', # Office Compatability Viewer\n '4461608', # Excel Viewer\n '4462154' # Office Word Viewer\n);\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\", exit_code:1);\n\nvuln = FALSE;\nport = kb_smb_transport();\n\n##\n# Excel Viewer\n#\n#\n##\nfunction perform_excel_viewer_checks()\n{\n var prod, path, install, installs, common_path;\n prod = \"Microsoft Excel Viewer\";\n installs = get_kb_list(\"SMB/Office/ExcelViewer/*/ProductPath\");\n\n foreach install (keys(installs))\n {\n common_path = installs[install];\n path = ereg_replace(pattern:\"^([A-Za-z]:.*)\\\\Microsoft Office.*\", replace:\"\\1\\Microsoft Office\\Office12\", string:common_path);\n\n if (\n hotfix_check_fversion(\n file:\"xlview.dll\",\n version:\"12.0.6807.5000\",\n path:path, kb:\"4461608\",\n bulletin:bulletin,\n product:prod\n ) == HCF_OLDER\n ) vuln = TRUE;\n if (\n hotfix_check_fversion(\n file:\"mso.dll\",\n version:\"12.0.6807.5000\",\n path:path, kb:\"4092465\",\n bulletin:bulletin,\n product:prod \n ) == HCF_OLDER\n ) vuln = TRUE;\n }\n}\n\n##\n# Word Viewer\n#\n#\n##\nfunction perform_word_viewer_checks()\n{\n var install, installs, path, prod;\n prod = \"Microsoft Word Viewer\";\n\n installs = get_kb_list(\"SMB/Office/WordViewer/*/ProductPath\");\n foreach install (keys(installs))\n {\n path = installs[install];\n path = ereg_replace(pattern:\"^([A-Za-z]:.*)\\\\[wW]ordview.exe\", replace:\"\\1\", string:path);\n\n if (\n hotfix_check_fversion(\n file:\"wordview.exe\",\n version:\"11.0.8454.0\",\n path:path, kb:\"4462154\",\n bulletin:bulletin,\n product:prod\n ) == HCF_OLDER\n ) vuln = TRUE;\n }\n}\n\n##\n# Office Compatibility Pack\n#\n#\n##\nfunction perform_compatibility_viewer_checks()\n{\n var install, installs, path, prod;\n\n installs = get_kb_list(\"SMB/Office/ExcelCnv/*/ProductPath\");\n foreach install (keys(installs))\n {\n path = installs[install];\n path = ereg_replace(pattern:'^(.+)\\\\\\\\[^\\\\\\\\]+\\\\.exe$', replace:\"\\1\\\", string:path, icase:TRUE);\n if (\n hotfix_check_fversion(\n path:path, file:\"excelcnv.exe\",\n version:\"12.0.6807.5000\",\n kb:\"4461607\",\n bulletin:bulletin,\n min_version:\"12.0.0.0\",\n product:\"Microsoft Office Compatibility Pack\"\n ) == HCF_OLDER\n )\n {\n vuln = TRUE;\n break;\n }\n }\n}\n\n######################################################################\n# MAIN\n######################################################################\nperform_excel_viewer_checks();\nperform_word_viewer_checks();\nperform_compatibility_viewer_checks();\n\nif (vuln)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_warning();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-17T16:31:23", "description": "The Microsoft Office Products are missing security updates. They are, therefore, affected by multiple vulnerabilities:\n\n - A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. (CVE-2019-0538, CVE-2019-0582)\n\n - A security feature bypass vulnerability exists when Microsoft Office does not validate URLs. An attacker could send a victim a specially crafted file, which could trick the victim into entering credentials. An attacker who successfully exploited this vulnerability could perform a phishing attack. (CVE-2019-0540)\n\n - An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user's computer or data. To exploit the vulnerability, an attacker could craft a special document file and then convince the user to open it. An attacker must know the memory address location where the object was created.\n (CVE-2019-0669)\n\n - A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. (CVE-2019-0671, CVE-2019-0672, CVE-2019-0673, CVE-2019-0674, CVE-2019-0675)", "cvss3": {}, "published": "2022-06-10T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Office Products C2R (February 2019)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-0538", "CVE-2019-0540", "CVE-2019-0582", "CVE-2019-0669", "CVE-2019-0671", "CVE-2019-0672", "CVE-2019-0673", "CVE-2019-0674", "CVE-2019-0675"], "modified": "2022-06-10T00:00:00", "cpe": ["cpe:/a:microsoft:office"], "id": "SMB_NT_MS19_FEB_OFFICE_C2R.NASL", "href": "https://www.tenable.com/plugins/nessus/162029", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\ninclude('compat.inc');\n\nif (description)\n{\n script_id(162029);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/06/10\");\n script_cve_id(\n \"CVE-2019-0538\",\n \"CVE-2019-0540\",\n \"CVE-2019-0582\",\n \"CVE-2019-0669\",\n \"CVE-2019-0671\",\n \"CVE-2019-0672\",\n \"CVE-2019-0673\",\n \"CVE-2019-0674\",\n \"CVE-2019-0675\"\n );\n script_bugtraq_id(106419, 106433);\n\n script_name(english:\"Security Updates for Microsoft Office Products C2R (February 2019)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Office Products are affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Office Products are missing security updates. They\nare, therefore, affected by multiple vulnerabilities:\n\n - A remote code execution vulnerability exists when the Windows Jet\n Database Engine improperly handles objects in memory. An attacker\n who successfully exploited this vulnerability could execute\n arbitrary code on a victim system. An attacker could exploit this\n vulnerability by enticing a victim to open a specially crafted\n file. (CVE-2019-0538, CVE-2019-0582)\n\n - A security feature bypass vulnerability exists when Microsoft\n Office does not validate URLs. An attacker could send a victim a\n specially crafted file, which could trick the victim into\n entering credentials. An attacker who successfully exploited this\n vulnerability could perform a phishing attack. (CVE-2019-0540)\n\n - An information disclosure vulnerability exists when Microsoft\n Excel improperly discloses the contents of its memory. An\n attacker who exploited the vulnerability could use the\n information to compromise the user's computer or data. To exploit\n the vulnerability, an attacker could craft a special document\n file and then convince the user to open it. An attacker must know\n the memory address location where the object was created.\n (CVE-2019-0669)\n\n - A remote code execution vulnerability exists when the Microsoft\n Office Access Connectivity Engine improperly handles objects in\n memory. An attacker who successfully exploited this vulnerability\n could execute arbitrary code on a victim system. An attacker\n could exploit this vulnerability by enticing a victim to open a\n specially crafted file. (CVE-2019-0671, CVE-2019-0672, \n CVE-2019-0673, CVE-2019-0674, CVE-2019-0675)\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?fd4508ff\");\n script_set_attribute(attribute:\"solution\", value:\n\"For Office 365, Office 2016 C2R, or Office 2019, ensure automatic\nupdates are enabled or open any office app and manually perform an\nupdate.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-0675\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/02/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/02/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/06/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:office\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_dependencies(\"office_installed.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('vcf_extras_office.inc');\n\nvar bulletin = 'MS19-02';\n\nvar app_info = vcf::microsoft::office::get_app_info(app:'Microsoft Office');\n\nvar constraints = [\n \n {'product':'Microsoft Office 2016','file':'mso.dll','fixed_version':'16.0.8431.2372','channel': 'Deferred'},\n {'product':'Microsoft Office 2016','file':'mso.dll','fixed_version':'16.0.9126.2356','channel': 'Deferred','channel_version': '1803'},\n {'product':'Microsoft Office 2016','file':'mso.dll','fixed_version':'16.0.10730.20280','channel': 'Deferred','channel_version': '1808'},\n {'product':'Microsoft Office 2016','file':'mso.dll','fixed_version':'16.0.10730.20280','channel': 'First Release for Deferred'},\n {'product':'Microsoft Office 2016','file':'mso.dll','fixed_version':'16.0.11231.20164','channel': 'Current'},\n {'product':'Microsoft Office 2019','file':'mso.dll','fixed_version':'16.0.11231.20164','channel': '2019 Retail'},\n {'product':'Microsoft Office 2019','file':'mso.dll','fixed_version':'16.0.10341.20010','channel': '2019 Volume'}\n];\n\nvcf::microsoft::office::check_version_and_report(\n app_info:app_info,\n constraints:constraints,\n severity:SECURITY_HOLE,\n bulletin:bulletin,\n subproduct:\"Office\"\n);", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-20T14:19:49", "description": "The Microsoft Office Products are missing security updates. They are, therefore, affected by multiple vulnerabilities:\n\n - A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. (CVE-2019-0538, CVE-2019-0582)\n\n - A security feature bypass vulnerability exists when Microsoft Office does not validate URLs. An attacker could send a victim a specially crafted file, which could trick the victim into entering credentials. An attacker who successfully exploited this vulnerability could perform a phishing attack. (CVE-2019-0540)\n\n - An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user's computer or data. To exploit the vulnerability, an attacker could craft a special document file and then convince the user to open it. An attacker must know the memory address location where the object was created.\n (CVE-2019-0669)\n\n - A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. (CVE-2019-0671, CVE-2019-0672, CVE-2019-0673, CVE-2019-0674, CVE-2019-0675)", "cvss3": {}, "published": "2019-02-12T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Office Products (February 2019)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-0538", "CVE-2019-0540", "CVE-2019-0582", "CVE-2019-0669", "CVE-2019-0671", "CVE-2019-0672", "CVE-2019-0673", "CVE-2019-0674", "CVE-2019-0675"], "modified": "2022-06-10T00:00:00", "cpe": ["cpe:/a:microsoft:office"], "id": "SMB_NT_MS19_FEB_OFFICE.NASL", "href": "https://www.tenable.com/plugins/nessus/122132", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\ninclude('compat.inc');\n\nif (description)\n{\n script_id(122132);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/06/10\");\n\n script_cve_id(\n \"CVE-2019-0538\",\n \"CVE-2019-0540\",\n \"CVE-2019-0582\",\n \"CVE-2019-0669\",\n \"CVE-2019-0671\",\n \"CVE-2019-0672\",\n \"CVE-2019-0673\",\n \"CVE-2019-0674\",\n \"CVE-2019-0675\"\n );\n script_bugtraq_id(106419, 106433);\n script_xref(name:\"MSKB\", value:\"4018294\");\n script_xref(name:\"MSKB\", value:\"4018300\");\n script_xref(name:\"MSKB\", value:\"4018313\");\n script_xref(name:\"MSKB\", value:\"4462138\");\n script_xref(name:\"MSKB\", value:\"4462146\");\n script_xref(name:\"MSKB\", value:\"4462174\");\n script_xref(name:\"MSKB\", value:\"4462177\");\n script_xref(name:\"MSFT\", value:\"MS19-4018294\");\n script_xref(name:\"MSFT\", value:\"MS19-4018300\");\n script_xref(name:\"MSFT\", value:\"MS19-4018313\");\n script_xref(name:\"MSFT\", value:\"MS19-4462138\");\n script_xref(name:\"MSFT\", value:\"MS19-4462146\");\n script_xref(name:\"MSFT\", value:\"MS19-4462174\");\n script_xref(name:\"MSFT\", value:\"MS19-4462177\");\n\n script_name(english:\"Security Updates for Microsoft Office Products (February 2019)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Office Products are affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Office Products are missing security updates. They\nare, therefore, affected by multiple vulnerabilities:\n\n - A remote code execution vulnerability exists when the Windows Jet\n Database Engine improperly handles objects in memory. An attacker\n who successfully exploited this vulnerability could execute\n arbitrary code on a victim system. An attacker could exploit this\n vulnerability by enticing a victim to open a specially crafted\n file. (CVE-2019-0538, CVE-2019-0582)\n\n - A security feature bypass vulnerability exists when Microsoft\n Office does not validate URLs. An attacker could send a victim a\n specially crafted file, which could trick the victim into\n entering credentials. An attacker who successfully exploited this\n vulnerability could perform a phishing attack. (CVE-2019-0540)\n\n - An information disclosure vulnerability exists when Microsoft\n Excel improperly discloses the contents of its memory. An\n attacker who exploited the vulnerability could use the\n information to compromise the user's computer or data. To exploit\n the vulnerability, an attacker could craft a special document\n file and then convince the user to open it. An attacker must know\n the memory address location where the object was created.\n (CVE-2019-0669)\n\n - A remote code execution vulnerability exists when the Microsoft\n Office Access Connectivity Engine improperly handles objects in\n memory. An attacker who successfully exploited this vulnerability\n could execute arbitrary code on a victim system. An attacker\n could exploit this vulnerability by enticing a victim to open a\n specially crafted file. (CVE-2019-0671, CVE-2019-0672, \n CVE-2019-0673, CVE-2019-0674, CVE-2019-0675)\");\n # https://support.microsoft.com/en-ca/help/4018313/description-of-the-security-update-for-office-2010-february-12-2019\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?ad02bd63\");\n # https://support.microsoft.com/en-ca/help/4462177/description-of-the-security-update-for-office-2010-february-12-2019\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?45c067f4\");\n # https://support.microsoft.com/en-ca/help/4462174/description-of-the-security-update-for-office-2010-february-12-2019\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?1adac12b\");\n # https://support.microsoft.com/en-ca/help/4462138/description-of-the-security-update-for-office-2013-february-12-2019\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?1f96f114\");\n # https://support.microsoft.com/en-ca/help/4018300/description-of-the-security-update-for-office-2013-february-12-2019\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?80eba161\");\n # https://support.microsoft.com/en-ca/help/4462146/description-of-the-security-update-for-office-2016-february-12-2019\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?995b2a7e\");\n # https://support.microsoft.com/en-ca/help/4018294/description-of-the-security-update-for-office-2016-february-12-2019\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?9fd278c9\");\n # https://docs.microsoft.com/en-us/officeupdates/update-history-office365-proplus-by-date\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?c6fc9b1b\");\n # https://docs.microsoft.com/en-us/officeupdates/update-history-office-2019\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?42ab6861\");\n # https://support.office.com/en-us/article/install-office-updates-2ab296f3-7f03-43a2-8e50-46de917611c5\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?7b126882\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue:\n -KB4018294\n -KB4018300\n -KB4018313\n -KB4462138\n -KB4462146\n -KB4462174\n -KB4462177\n\nFor Office 365, Office 2016 C2R, or Office 2019, ensure automatic\nupdates are enabled or open any office app and manually perform an\nupdate.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-0675\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/02/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/02/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/02/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:office\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"office_installed.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_reg_query.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"install_func.inc\");\n\nglobal_var vuln;\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS19-02\";\nkbs = make_list(\n '4018294', # Office 2016\n '4018300', # Office 2013 SP1\n '4018313', # Office 2010 SP2\n '4462138', # Office 2013 SP1\n '4462146', # Office 2016\n '4462174', # Office 2010 SP2\n '4462177' # Office 2010 SP2\n);\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\", exit_code:1);\n\nvuln = FALSE;\nport = kb_smb_transport();\n\noffice_vers = hotfix_check_office_version();\n\n# Office 2010 SP2\nif (office_vers[\"14.0\"])\n{\n office_sp = get_kb_item(\"SMB/Office/2010/SP\");\n if (!isnull(office_sp) && office_sp == 2)\n {\n prod = \"Microsoft Office 2010 SP2\";\n\n path = hotfix_get_officecommonfilesdir(officever:\"14.0\");\n path = hotfix_append_path(path:path, value:\"Microsoft Shared\\Office14\");\n kb = \"4462174\";\n file = \"mso.dll\";\n version = \"14.0.7229.5000\";\n if (hotfix_check_fversion(file:file, version:version, path:path, kb:kb, bulletin:bulletin, product:prod) == HCF_OLDER)\n vuln = TRUE;\n\n path = hotfix_get_officeprogramfilesdir(officever:\"14.0\");\n path = hotfix_append_path(path:path, value:\"Microsoft Office\\Office14\");\n kb = \"4462177\";\n file = \"graph.exe\";\n version = \"14.0.7229.5000\";\n if (hotfix_check_fversion(file:file, version:version, path:path, kb:kb, bulletin:bulletin, product:prod) == HCF_OLDER)\n vuln = TRUE;\n\n\n path = hotfix_get_officecommonfilesdir(officever:\"14.0\");\n path = hotfix_append_path(path:path, value:\"Microsoft Shared\\Office14\");\n kb = \"4018313\";\n file = \"acecore.dll\";\n version = \"14.0.7229.5000\";\n if (hotfix_check_fversion(file:file, version:version, path:path, kb:kb, bulletin:bulletin, product:prod) == HCF_OLDER)\n vuln = TRUE;\n }\n}\n\n# Office 2013 SP1\nif (office_vers[\"15.0\"])\n{\n office_sp = get_kb_item(\"SMB/Office/2013/SP\");\n if (!isnull(office_sp) && office_sp == 1)\n {\n prod = \"Microsoft Office 2013 SP1\";\n\n path = hotfix_get_officecommonfilesdir(officever:\"15.0\");\n path = hotfix_append_path(path:path, value:\"Microsoft Shared\\Office15\");\n kb = \"4462138\";\n file = \"mso.dll\";\n version = \"15.0.5111.1000\";\n if (hotfix_check_fversion(file:file, version:version, path:path, kb:kb, bulletin:bulletin, product:prod) == HCF_OLDER)\n vuln = TRUE;\n\n path = hotfix_get_officecommonfilesdir(officever:\"15.0\");\n path = hotfix_append_path(path:path, value:\"Microsoft Shared\\Office15\");\n kb = \"4018300\";\n file = \"acecore.dll\";\n version = \"15.0.5111.1000\";\n if (hotfix_check_fversion(file:file, version:version, path:path, kb:kb, bulletin:bulletin, product:prod) == HCF_OLDER)\n vuln = TRUE;\n }\n}\n\n# Office 2016\nif (office_vers[\"16.0\"])\n{\n office_sp = get_kb_item(\"SMB/Office/2016/SP\");\n if (!isnull(office_sp) && office_sp == 0)\n {\n prod = \"Microsoft Office 2016\";\n prod2019 = \"Microsoft Office 2019\";\n\n path = hotfix_get_officecommonfilesdir(officever:\"16.0\");\n mso_dll_path = hotfix_append_path(path:path, value:\"Microsoft Shared\\Office16\");\n\n path = hotfix_get_officecommonfilesdir(officever:\"16.0\");\n acecore_dll_path = hotfix_append_path(path:path, value:\"Microsoft Shared\\Office16\");\n\n c2r_path = mso_dll_path;\n\n # MSI acecore.dll\n if (hotfix_check_fversion(file:\"acecore.dll\", version:\"16.0.4810.1000\", channel:\"MSI\", channel_product:\"Office\", path:acecore_dll_path, kb:\"4018294\", bulletin:bulletin, product:prod) == HCF_OLDER)\n vuln = TRUE;\n\n if (\n # MSI mso.dll\n hotfix_check_fversion(file:\"mso.dll\", version:\"16.0.4810.1000\", channel:\"MSI\", channel_product:\"Office\", path:mso_dll_path, kb:\"4462146\", bulletin:bulletin, product:prod) == HCF_OLDER)\n vuln = TRUE;\n }\n}\n\nif (vuln)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}], "kaspersky": [{"lastseen": "2023-06-10T15:44:34", "description": "### *Detect date*:\n02/12/2019\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to bypass security restrictions, spoof user interface, execute arbitrary code, gain privileges.\n\n### *Affected products*:\nMicrosoft Excel 2010 Service Pack 2 (32-bit editions) \nMicrosoft Excel 2010 Service Pack 2 (64-bit editions) \nMicrosoft Excel 2013 RT Service Pack 1 \nMicrosoft Excel 2013 Service Pack 1 (32-bit editions) \nMicrosoft Excel 2013 Service Pack 1 (64-bit editions) \nMicrosoft Excel 2016 (32-bit edition) \nMicrosoft Excel 2016 (64-bit edition) \nMicrosoft Excel Viewer \nMicrosoft Office 2010 Service Pack 2 (32-bit editions) \nMicrosoft Office 2010 Service Pack 2 (64-bit editions) \nMicrosoft Office 2013 RT Service Pack 1 \nMicrosoft Office 2013 Service Pack 1 (32-bit editions) \nMicrosoft Office 2013 Service Pack 1 (64-bit editions) \nMicrosoft Office 2016 (32-bit edition) \nMicrosoft Office 2016 (64-bit edition) \nMicrosoft Office 2016 for Mac \nMicrosoft Office 2019 for 32-bit editions \nMicrosoft Office 2019 for 64-bit editions \nMicrosoft Office 2019 for Mac \nMicrosoft Office Compatibility Pack Service Pack 3 \nMicrosoft Office Word Viewer \nMicrosoft PowerPoint Viewer \nMicrosoft SharePoint Enterprise Server 2013 Service Pack 1 \nMicrosoft SharePoint Enterprise Server 2016 \nMicrosoft SharePoint Foundation 2013 Service Pack 1 \nMicrosoft SharePoint Server 2010 Service Pack 2 \nMicrosoft SharePoint Server 2019 \nOffice 365 ProPlus for 32-bit Systems \nOffice 365 ProPlus for 64-bit Systems\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2019-0540](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0540>) \n[CVE-2019-0670](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0670>) \n[CVE-2019-0675](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0675>) \n[CVE-2019-0668](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0668>) \n[CVE-2019-0673](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0673>) \n[CVE-2019-0604](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0604>) \n[CVE-2019-0669](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0669>) \n[CVE-2019-0672](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0672>) \n[CVE-2019-0674](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0674>) \n[CVE-2019-0594](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0594>) \n[CVE-2019-0671](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0671>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Office Professional Plus 2010](<https://threats.kaspersky.com/en/product/Microsoft-Office-Professional-Plus-2010/>)\n\n### *CVE-IDS*:\n[CVE-2019-0540](<https://vulners.com/cve/CVE-2019-0540>)4.3Warning \n[CVE-2019-0670](<https://vulners.com/cve/CVE-2019-0670>)5.8High \n[CVE-2019-0675](<https://vulners.com/cve/CVE-2019-0675>)9.3Critical \n[CVE-2019-0668](<https://vulners.com/cve/CVE-2019-0668>)6.5High \n[CVE-2019-0673](<https://vulners.com/cve/CVE-2019-0673>)9.3Critical \n[CVE-2019-0604](<https://vulners.com/cve/CVE-2019-0604>)7.5Critical \n[CVE-2019-0669](<https://vulners.com/cve/CVE-2019-0669>)4.3Warning \n[CVE-2019-0672](<https://vulners.com/cve/CVE-2019-0672>)9.3Critical \n[CVE-2019-0674](<https://vulners.com/cve/CVE-2019-0674>)9.3Critical \n[CVE-2019-0594](<https://vulners.com/cve/CVE-2019-0594>)6.5High \n[CVE-2019-0671](<https://vulners.com/cve/CVE-2019-0671>)9.3Critical\n\n### *KB list*:\n[4018313](<http://support.microsoft.com/kb/4018313>) \n[4018300](<http://support.microsoft.com/kb/4018300>) \n[4018294](<http://support.microsoft.com/kb/4018294>) \n[4462174](<http://support.microsoft.com/kb/4462174>) \n[4092465](<http://support.microsoft.com/kb/4092465>) \n[4462138](<http://support.microsoft.com/kb/4462138>) \n[4462146](<http://support.microsoft.com/kb/4462146>) \n[4462154](<http://support.microsoft.com/kb/4462154>) \n[4462143](<http://support.microsoft.com/kb/4462143>) \n[4462139](<http://support.microsoft.com/kb/4462139>) \n[4462155](<http://support.microsoft.com/kb/4462155>) \n[4462171](<http://support.microsoft.com/kb/4462171>) \n[4461630](<http://support.microsoft.com/kb/4461630>) \n[4462115](<http://support.microsoft.com/kb/4462115>) \n[4462177](<http://support.microsoft.com/kb/4462177>) \n[4461597](<http://support.microsoft.com/kb/4461597>) \n[4461608](<http://support.microsoft.com/kb/4461608>) \n[4462186](<http://support.microsoft.com/kb/4462186>) \n[4461607](<http://support.microsoft.com/kb/4461607>) \n[4462199](<http://support.microsoft.com/kb/4462199>) \n[4462184](<http://support.microsoft.com/kb/4462184>) \n[4462202](<http://support.microsoft.com/kb/4462202>) \n[4462211](<http://support.microsoft.com/kb/4462211>)\n\n### *Microsoft official advisories*:\n\n\n### *Exploitation*:\nMalware exists for this vulnerability. Usually such malware is classified as Exploit. [More details](<https://threats.kaspersky.com/en/class/Exploit/>).", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2019-02-12T00:00:00", "type": "kaspersky", "title": "KLA11417 Multiple vulnerabilities in Microsoft Office", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-0540", "CVE-2019-0594", "CVE-2019-0604", "CVE-2019-0668", "CVE-2019-0669", "CVE-2019-0670", "CVE-2019-0671", "CVE-2019-0672", "CVE-2019-0673", "CVE-2019-0674", "CVE-2019-0675"], "modified": "2020-06-18T00:00:00", "id": "KLA11417", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11417/", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "talosblog": [{"lastseen": "2019-03-07T08:34:06", "description": "[](<http://2.bp.blogspot.com/-C9ApwGTNu7M/XGLvRFSNSsI/AAAAAAAAFT4/OR6BvUFDD30mBvNZE70PUde_GycCBeNlACK4BGAYYCw/s1600/recurring%2Bblog%2Bimages_patch%2Btuesday.jpg>) \nMicrosoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday covers 69 vulnerabilities, 20 of which are rated \u201ccritical,\u201d 46 that are considered \u201cimportant\u201d and three that are \u201cmoderate.\u201d This release also includes a critical security advisory regarding a security update to Adobe Flash Player \n \nThis month\u2019s security update covers security issues in a variety of Microsoft\u2019s products, including the Chakra Scripting Engine and the Internet Explorer and Exchange web browsers. For coverage of these vulnerabilities, read the SNORT\u24c7 blog post [here](<https://blog.snort.org/2019/02/snort-rule-update-for-feb-12-2019.html>). \n \n\n\n### Critical vulnerabilities\n\nMicrosoft disclosed 20 critical vulnerabilities this month, 12 of which we will highlight below. \n \n[CVE-2019-0590](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0590>), [CVE-2019-0591](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0591>), [CVE-2019-0593](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0593>), [CVE-2019-0640](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0640>), [CVE-2019-0642](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0642>), [CVE-2019-0644](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0644>), [CVE-2019-0651](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0651>), [CVE-2019-0652](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0652>) and [CVE-2019-0655](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0655>) are all memory corruption vulnerabilities in Microsoft scripting engine. The bugs all lie in the way the engine processes objects in memory in the Microsoft Edge web browser. An attacker could exploit this vulnerability to corrupt the machine\u2019s memory, eventually allowing them to execute code remotely in the context of the current users. A user could trigger this bug by either visiting a malicious web page while using Edge, or by accessing specially crafted content created by the attacker. \n \n[CVE-2019-0606](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0606>) is a memory corruption vulnerability in Microsoft Internet Explorer. The problem lies in the way the web browser accesses objects in memory. An attacker could exploit this vulnerability by tricking a user into visiting a specially crafted website or user-created content in Internet Explorer. Once triggered, the attacker could gain the ability to execute code remotely in the context of the current user. \n \n[CVE-2019-0645](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0645>) and [CVE-2019-0650](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0650>) are memory corruption vulnerabilities that exist in Microsoft Edge when the web browser fails to properly handle objects in memory. An attacker could exploit this vulnerability by tricking a user into visiting a maliciously crafted website in Edge, or clicking on specially crafted content. An attacker could use this bug to gain the ability to execute arbitrary code in the context of the current user. \n \nThese are the other critical vulnerabilities: \n \n\n\n * [CVE-2019-0594](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0594>)\n * [CVE-2019-0604](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0604>)\n * [CVE-2019-0605](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0605>)\n * [CVE-2019-0607](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0607>)\n * [CVE-2019-0618](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0618>)\n * [CVE-2019-0626](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0626>)\n * [CVE-2019-0634](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0634>)\n * [CVE-2019-0662](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0662>)\n \n\n\n### Important vulnerabilities\n\nThis release also contains 46 important vulnerabilities: \n \n\n\n * [CVE-2019-0540](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0540>)\n * [CVE-2019-0595](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0595>)\n * [CVE-2019-0596](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0596>)\n * [CVE-2019-0597](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0597>)\n * [CVE-2019-0598](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0598>)\n * [CVE-2019-0599](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0599>)\n * [CVE-2019-0600](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0600>)\n * [CVE-2019-0601](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0601>)\n * [CVE-2019-0602](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0602>)\n * [CVE-2019-0610](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0610>)\n * [CVE-2019-0613](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0613>)\n * [CVE-2019-0615](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0615>)\n * [CVE-2019-0616](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0616>)\n * [CVE-2019-0619](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0619>)\n * [CVE-2019-0623](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0623>)\n * [CVE-2019-0625](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0625>)\n * [CVE-2019-0627](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0627>)\n * [CVE-2019-0628](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0628>)\n * [CVE-2019-0630](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0630>)\n * [CVE-2019-0631](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0631>)\n * [CVE-2019-0632](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0632>)\n * [CVE-2019-0633](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0633>)\n * [CVE-2019-0635](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0635>)\n * [CVE-2019-0636](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0636>)\n * [CVE-2019-0637](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0637>)\n * [CVE-2019-0648](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0648>)\n * [CVE-2019-0649](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0649>)\n * [CVE-2019-0654](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0654>)\n * [CVE-2019-0656](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0656>)\n * [CVE-2019-0657](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0657>)\n * [CVE-2019-0658](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0658>)\n * [CVE-2019-0659](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0659>)\n * [CVE-2019-0660](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0660>)\n * [CVE-2019-0661](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0661>)\n * [CVE-2019-0664](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0664>)\n * [CVE-2019-0668](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0668>)\n * [CVE-2019-0671](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0671>)\n * [CVE-2019-0672](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0672>)\n * [CVE-2019-0673](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0673>)\n * [CVE-2019-0674](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0674>)\n * [CVE-2019-0675](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0675>)\n * [CVE-2019-0676](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0676>)\n * [CVE-2019-0686](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0686>)\n * [CVE-2019-0728](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0728>)\n\n### Moderate\n\nThere were also three moderate vulnerabilities in this release: [CVE-2019-0641](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0641>), [CVE-2019-0643](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0643>) and [CVE-2019-0670](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0670>). \n\n\n### Coverage \n\nIn response to these vulnerability disclosures, Talos is releasing the following SNORT\u24c7 rules that detect attempts to exploit them. Please note that additional rules may be released at a future date and current rules are subject to change pending additional information. Firepower customers should use the latest update to their ruleset by updating their SRU. Open Source Snort Subscriber Rule Set customers can stay up-to-date by downloading the latest rule pack available for purchase on Snort.org. \n \nSnort rules: [49128 - 49170](<https://snort.org/advisories/talos-rules-2019-02-12>) \n\n\n \n\n\n", "cvss3": {}, "published": "2019-02-12T11:55:00", "type": "talosblog", "title": "Microsoft Patch Tuesday \u2014 February 2019: Vulnerability disclosures and Snort coverage", "bulletinFamily": "blog", "cvss2": {}, "cvelist": ["CVE-2019-0540", "CVE-2019-0590", "CVE-2019-0591", "CVE-2019-0593", "CVE-2019-0594", "CVE-2019-0595", "CVE-2019-0596", "CVE-2019-0597", "CVE-2019-0598", "CVE-2019-0599", "CVE-2019-0600", "CVE-2019-0601", "CVE-2019-0602", "CVE-2019-0604", "CVE-2019-0605", "CVE-2019-0606", "CVE-2019-0607", "CVE-2019-0610", "CVE-2019-0613", "CVE-2019-0615", "CVE-2019-0616", "CVE-2019-0618", "CVE-2019-0619", "CVE-2019-0623", "CVE-2019-0625", "CVE-2019-0626", "CVE-2019-0627", "CVE-2019-0628", "CVE-2019-0630", "CVE-2019-0631", "CVE-2019-0632", "CVE-2019-0633", "CVE-2019-0634", "CVE-2019-0635", "CVE-2019-0636", "CVE-2019-0637", "CVE-2019-0640", "CVE-2019-0641", "CVE-2019-0642", "CVE-2019-0643", "CVE-2019-0644", "CVE-2019-0645", "CVE-2019-0648", "CVE-2019-0649", "CVE-2019-0650", "CVE-2019-0651", "CVE-2019-0652", "CVE-2019-0654", "CVE-2019-0655", "CVE-2019-0656", "CVE-2019-0657", "CVE-2019-0658", "CVE-2019-0659", "CVE-2019-0660", "CVE-2019-0661", "CVE-2019-0662", "CVE-2019-0664", "CVE-2019-0668", "CVE-2019-0670", "CVE-2019-0671", "CVE-2019-0672", "CVE-2019-0673", "CVE-2019-0674", "CVE-2019-0675", "CVE-2019-0676", "CVE-2019-0686", "CVE-2019-0728"], "modified": "2019-02-12T19:55:00", "id": "TALOSBLOG:AB5E63755953149993334997F5123794", "href": "http://feedproxy.google.com/~r/feedburner/Talos/~3/YjaBeKVxw9M/microsoft-patch-tuesday-february-2019.html", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}