Microsoft ha reso oggi disponibili per il download (diretto oppure tramite Windows Update) moltissimi aggiornamenti di sicurezza sia per Windows che gli altri prodotti MS relativi al mese di Ottobre 2010.

Sono in totale, 16 aggiornamenti, 4 classificati come critici, 10 come importanti e 2 come di rilevanza moderata.

Le patch risolvono 49 vulnerabilità individuate in Windows (tutte le versioni attualmente supportate, da Windows XP SP3 a Windows 7) e Office (XP, 2003, 2007 e 2010).

Ecco l’elenco completo degli aggiornamenti:

MS10-071 Cumulative Security Update for Internet Explorer (2360131)

MS10-072 Vulnerability in SafeHTML Could Allow Information Disclosure (2412048)

MS10-073 Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (981957)

MS10-074 Vulnerability in Microsoft Foundation Classes Could Allow Remote Code Execution (2387149)

MS10-075 Vulnerability in Media Player Network Sharing Service Could Cause Remote Code Execution (2281679)

MS10-076 Vulnerability in the Embedded OpenType Font Engine Could Allow Remote Code Execution (982132)

MS10-077 Vulnerability in .NET Framework Could Allow Remote Code Execution (2160841)

MS10-078 Vulnerability in the OpenType Font Format (OTF) Driver Could Allow Elevation of Privilege (2279986)

MS10-079 Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (2293194)

MS10-080 Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2293211)

MS10-081 Vulnerability in Windows Common Control Library Could Allow Remote Code Execution (2296011)

MS10-082 Vulnerability in Windows Media Player Could Allow Remote Code Execution (2378111)

MS10-083 Vulnerability in COM Validation in Windows Shell and WordPad Could Allow Remote Code Execution (2405882)

MS10-084 Vulnerability in Windows Local Procedure Call Could Cause Elevation of Privilege (2360937)

MS10-085 Vulnerabilities in SChannel could allow Denial of Service (2207566)

MS10-086 Vulnerability in Windows Shared Cluster Disks Could Allow Tampering (2294255)

Per maggiori informazioni diamo un’occhiata a questa pagina Web.