New Patch Data Available (2.0.1.5392)

Shavlik Protect 9.2 is now available as an early access release. This release introduces a number of great new features and performance improvements. You can download Protect 9.2 on our downloads page http://www.shavlik.com/support/protect/downloads/. You can view the full release notes on the downloads page for a full list of features, changes, and resolved issues.

XML 2.0.1.5392 Last Modified 10/13/2015

Security

– Added MS15-106: Cumulative Security Update for Internet Explorer (3096441)

– Added CSWU-010(Q3097617): Cumulative update for Windows 10: October 13, 2015

– Added MS15-108: Security Update for JScript and VBScript to Address Remote Code Execution (3089659)

– Added MS15-109: Security Update for Windows Shell to Address Remote Code Execution (3096443)

– Added MS15-110: Security Updates for Microsoft Office to Address Remote Code Execution (3096440)

– Added MS15-111: Security Update for Windows Kernel to Address Elevation of Privilege (3096447)

– Added APSB15-24(QARDC1500920069): Security Updates Available for Adobe Acrobat and Reader

– Added APSB15-25(QAF1900207): Security updates available for Adobe Flash Player

– Added CHROME-150(QGC460249071): Chrome 46.0.2490.71

– Added MSAF-048(Q3099406): Microsoft security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge: October 13, 2015

Non-Security

– Updated MSWU-1527(Q2999226): Modified Update for Windows Vista/2008

New Patch Data Available (2.0.1.3868)

Shavlik Protect 9.2 beta is coming soon! Check out the latest on upcoming features on http://Blog.shavlik.com. To join the beta contact us at Beta@Shavlik.com!

XML 2.0.1.3868 Last Modified 7/14/2015

Security

– Added MS15-058: Vulnerabilities in SQL Server Could Allow Remote Code Execution (3065718)

– Added MS15-065: Security Update for Internet Explorer (3076321)

– Added MS15-066: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution (3072604)

– Added MS15-067: Vulnerability in RDP Could Allow Remote Code Execution (3073094)

– Added MS15-068: Vulnerabilities in Windows Hyper-V Could Allow Remote Code Execution (3072000)

– Added MS15-069: Vulnerabilities in Windows Could Allow Remote Code Execution (3072631)

– Added MS15-070: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (3072620)

– Added MS15-071: Vulnerability in Netlogon Could Allow Elevation of Privilege (3068457)

– Added MS15-072: Vulnerability in Windows Graphics Component Could Allow Elevation of Privilege (3069392)

– Added MS15-073: Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (3070102)

– Added MS15-074: Vulnerability in Windows Installer Service Could Allow Elevation of Privilege (3072630)

– Added MS15-075: Vulnerabilities in OLE Could Allow Elevation of Privilege (3072633)

– Added MS15-076: Vulnerability in Windows Remote Procedure Call Could Allow Elevation of Privilege (3067505)

– Added MS15-077: Vulnerability in ATM Font Driver Could Allow Elevation of Privilege (3077657)

– Added AI15-005(QAI1221): iTunes 12.2.1

– Added APSB15-15(QAR11012): Security Updates Available for Adobe Acrobat and Reader

– Added APSB15-17(QSW1219159): Security update available for Adobe Shockwave Player

– Added APSB15-18(QAF1800209): Security updates available for Adobe Flash Player

– Added CHROME-139(QGC4302357134): Chrome 43.0.2357.134

– Added JAVA8-51(QJAVA8U51): Java 8 Update 51

– Added OPERA-79(QOP3001835125): Opera 30.0.1835.125

Non-Security

– Updated MSWU-953(Q2952664): Compatibility update v12 for Windows 7

– Updated MSWU-1398(Q3065987): Windows Update Client v2 for Windows 7 and Windows Server 2008 R2

– Updated MSWU-1399(Q3065988): Windows Update Client v2 for Windows 8.1 and Windows Server 2012 R2

New Patch Data Available (2.0.1.2792)

Shavlik has released updates for Protect 9.1 and 9.0 customers. Patch 3 is mandatory for all customers. This update resolves an issue which will prevent the console certificate from automatically renewing after it reaches its two year term date, at which time several issues would occur including communication failures, agent check-in failures, and console errors. To download the latest installers go to http://www.shavlik.com/downloads/protect.

XML 2.0.1.2792 Last Modified 5/12/2015

Security

– Added MS15-043: Cumulative Security Update for Internet Explorer (3049563)

– Added MS15-044: Vulnerabilities in Microsoft Font Drivers Could Allow Remote Code Execution (3057110)

– Added MS15-045: Vulnerability in Windows Journal Could Allow Remote Code Execution (3046002)

– Added MS15-046: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (3057181)

– Added MS15-047: Vulnerabilities in Microsoft SharePoint Server Could Allow Remote Code Execution (3058083)

– Added MS15-048: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege (3057134)

– Added MS15-049: Vulnerability in Silverlight Could Allow Elevation of Privilege (3058985)

– Added MS15-050: Vulnerability in Service Control Manager Could Allow Elevation of Privilege (3055642)

– Added MS15-051: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (3057191)

– Added MS15-052: Vulnerability in Windows Kernel Could Allow Security Feature Bypass (3050514)

– Added MS15-053: Vulnerabilities in JScript and VBScript Scripting Engines Could Allow Security Feature Bypass (3057263)

– Added MS15-054: Vulnerability in Microsoft Management Console File Format Could Allow Denial of Service (3051768)

– Added MS15-055: Vulnerability in Schannel Could Allow Information Disclosure (3061518)

– Added APSB15-09(QAF1700172): Security updates available for Adobe Flash Player

– Added APSB15-10(QAR11011): Security Updates available for Adobe Reader and Acrobat

– Added CHROME-133(QGC4202311152): Chrome 42.0.2311.152

– Added FF15-010(QFF38005606): Firefox 38.0

– Added MSAF-041(Q3061904): Microsoft security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer: May 12, 2015

– Added TOMCAT-038(QTOMC6044): Apache Tomcat 6.0.44

New Patch Data Available (2.0.0.8618)

Shavlik is pleased to announce the availability of the Shavlik Protect 9.1 Patch 1.  This patch provides resolutions to 18 customer reported issues identified in Protect 9.1.  The Patch is available for download from http://www.shavlik.com/downloads/protect.  For details on the issues resolved you can view the release notes and version history on the downloads page.

XML Version 2.0.0.8618 Last Modified 9/16/2014

Security

– Added APSB14-20(QAR1109): Security Advisory for Adobe Reader and Acrobat

– Added FF14-009(QFF32015367): FireFox 32.0.1

Non-Security

– Added MSWU-998(Q2959936): You cannot set the breakout key by using a hexadecimal value in Windows Embedded 8.1 Industry

– Added MSWU-1037(Q2961522): Update Rollup 7 for Exchange Server 2010 Service Pack 3

– Added MSWU-1038(Q2989647): September 2014 servicing stack update for Windows 8.1 and Windows Server 2012 R2

– Added TOMCAT-020(QTOMC8012): Apache Tomcat 8.0.12

Revision

– Modified MS14-046(Q2966828): Updated detection logic.

– Modified MS14-053(Q2972207): Updated download URL.

– Modified MS14-055(Q2982385): Microsoft has pulled this bulletin to address a known issue that prevented users from successfully installing security update 2982385 for Microsoft Lync Server 2010.

New Patch Data Available (2.0.0.7398)

Shavlik is pleased to announce the General Availability release of Shavlik Protect 9.1. This release includes a localized version of Protect, improved resolution for IPv6 and FQDN, improved deployment workflow with more machine and patch level statuses, and reports views for 3rd party reporting integration and custom reporting. Go to: http://www.shavlik.com/downloads/protect to get Protect 9.1 today. You can also sign up for our Protect 9.1 launch webinars next week at http://www.shavlik.com/products/protect/#/demos-webinars/.

End-of-Life Notice:

VMware vCenter Protect 8.0, 8.0.1, and 8.0.2 will reach end of service on 5/15/2014. The May Patch Tuesday content update will be the final update for the VMware branded editions of Protect. All customers running on these versions should upgrade to Shavlik Protect 9.1 at the first possible convenience to prevent a service outage.

XML Version 2.0.0.7398 Last Modified 5/13/2014

Security

– Added MS14-022: Vulnerabilities in Microsoft SharePoint Server Could Allow Remote Code Execution (2952166)

– Added MS14-023: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2961037)

– Added MS14-024: Vulnerability in a Microsoft Common Control Could Allow Security Feature Bypass (2961033)

– Added MS14-025: Vulnerability in Group Policy Preferences Could Allow Elevation of Privilege (2962486)

– Added MS14-026: Vulnerability in .NET Framework Could Allow Elevation of Privilege (2958732)

– Added MS14-027: Vulnerability in Windows Shell Handler Could Allow Elevation of Privilege (2962488)

– Added MS14-028: Vulnerability in iSCSI Could Allow Denial of Service (2962485)

– Added MS14-029: Security Update for Internet Explorer (2962482)

– Added APSB14-14(QAF1300214): Security updates available for Adobe Flash Player

– Added APSB14-15(QAR1107): Security updates available for Adobe Reader and Acrobat

– Added CHROME-103(QGC3401847137): Google Chrome 34.0.1847.137

– Added MSAF-025(Q2957151): Microsoft Security Advisory 2755801: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer

– Added OPERA-50(QOP210143267): Opera 21.0.1432.67

– Added SKYPE-47(QSKY6160105): Skype 6.16.0.105

New Patch Data Available (2.0.0.7284)

Shavlik is pleased to announce the General Availability release of Shavlik Protect 9.1.  This release includes a localized version of Protect, improved resolution for IPv6 and FQDN, improved deployment workflow with more machine and patch level statuses, and reports views for 3rd party reporting integration and custom reporting.  Go to: http://www.shavlik.com/downloads/protect to get Protect 9.1 today.  You can also sign up for our Protect 9.1 launch webinars next week at http://www.shavlik.com/products/protect/#/demos-webinars/.

End-of-Life Notice:

VMware vCenter Protect 8.0, 8.0.1, and 8.0.2 will reach end of service on 5/15/2014. The May Patch Tuesday content update will be the final update for the VMware branded editions of Protect. All customers running on these versions should upgrade to Shavlik Protect 9.1 at the first possible convenience to prevent a service outage.

Shavlik has released updated patch XML files for Shavlik Protect.

XML Version 2.0.0.7284 Last Modified 5/1/2014

Security

– Added MS14-021(Q2964358): Security Update for Internet Explorer (2965111)

– Added LIBRE-034(QLIBO416): LibreOffice 4.1.6

Software Distribution

– Added AR11-006(QAR1106N): Adobe Reader 11.0.6

Revision

– Modified HSMH-12(QHP732): Updated download URL.

– Modified MS12-021(Q2645410): Fixed an issue where patch did not show as missing on some systems.

New Patch Data Available (2.0.0.5554)

XML Version 2.0.0.5554  Last Modified 10/8/2013

Security

– Added AFP11-99117(QAF119900117): Security updates available for Adobe Flash Player

– Added APSB13-25(QAA1105): Security updates available for Adobe Reader and Acrobat

– Added OPERA-36(QOP170124145): Opera 17.0.1241.45

– Added MS13-080: Cumulative Security Update for Internet Explorer (2879017)

– Added MS13-081: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2870008)

– Added MS13-082: Vulnerabilities in .NET Framework Could Allow Remote Code Execution (2878890)

– Added MS13-083: Vulnerability in Windows Common Control Library Could Allow Remote Code Execution (2864058)

– Added MS13-084: Vulnerabilities in Microsoft SharePoint Server Could Allow Remote Code Execution (2885089)

– Added MS13-085: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2885080)

– Added MS13-086: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (2885084)

– Added MS13-087: Vulnerability in Silverlight Could Allow Information Disclosure (2890788)

New Patch Data Available (2.0.0.5252)

XML Version 2.0.0.5252   Last Modified 9/10/2013

Security

– Added MS13-067: Vulnerabilities in Microsoft SharePoint Server Could Allow Remote Code Execution (2834052)

– Added MS13-068: Vulnerability in Microsoft Outlook Could Allow Remote Code Execution (2756473)

– Added MS13-069: Cumulative Security Update for Internet Explorer (2870699)

– Added MS13-070: Vulnerability in OLE Could Allow Remote Code Execution (2876217)

– Added MS13-071: Vulnerability in Windows Theme File Could Allow Remote Code Execution (2864063)

– Added MS13-072: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2845537)

– Added MS13-073: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2858300)

– Added MS13-074: Vulnerabilities in Microsoft Access Could Allow Remote Code Execution (2848637)

– Added MS13-075: Vulnerability in Microsoft Office IME (Chinese) Could Allow Elevation of Privilege (2878687)

– Added MS13-076: Vulnerabilities in Kernel-Mode Drivers Could Allow Elevation of Privilege (2876315)

– Added MS13-077: Vulnerability in Windows Service Control Manager Could Allow Elevation of Privilege (2872339)

– Added MS13-078: Vulnerability in FrontPage Could Allow Information Disclosure (2825621)

– Added MS13-079: Vulnerability in Active Directory Could Allow Denial of Service (2853587)

– Added APSB13-21(QAF118800168): Security updates available for Adobe Flash Player

– Added APSB13-22(QAR1104): Security updates available for Adobe Reader and Acrobat

– Added APSB13-23(QSW1204144): Security update available for Adobe Shockwave Player 12.0.4.144

– Added MSAF-014(Q2880289): Microsoft Security Advisory (2755801) Update for Vulnerabilities in Adobe Flash Player in Internet Explorer

New Patch Data Available (2.0.0.4476)

XML Version 2.0.0.4476 Last Modified 6/11/2013

Product

– Added support for SQL Server 2012 Analysis & Reporting Services

Security

– Added MS13-047: Cumulative Security Update for Internet Explorer (2838727)

– Added MS13-048: Vulnerability in Windows Kernel Could Allow Information Disclosure (2839229)

– Added MS13-049: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service (2845690)

– Added MS13-050: Vulnerability in Windows Print Spooler Components Could Allow Elevation of Privilege (2839894)

– Added MS13-051: Vulnerability in Microsoft Office Could Allow Remote Code Execution (2839571)

– Added AI13-003(QAI1104): Apple iTunes 11.0.4.4

– Added APSB13-16(QAF117700224): Security updates available for Adobe Flash Player

– Added MSAF-012(Q2847928): Microsoft Security Advisory: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10: June 11, 2013

– Added TOMCAT-014(QTOMC7041): Apache Tomcat 7.0.41

– Added VLC-207(QVLC207): VLC Player 2.0.7

Non-Security

– Added MSWU-764(Q2803727): Description of Update Rollup 1 for Exchange Server 2010 Service Pack 3

Software Distribution

– Added AR11-002(QAR1103N): Adobe Reader 11.0.3

Revision

– Modified MSWU-659(Q2553272): Fixed an issue where patch does not show as missing on some systems.

– Modified MS12-057(Q2687501): Fixed an issue where patch incorrectly shows as missing on some systems.

– Modified MS12-060(Q983813): Fixed an issue where patch deployment fails on some systems.

– Modified MS12-070(Q2716441): Fixed an issue where patch does not show as missing on some systems.

New Patch Data Available (2.0.0.3108)

XML Data Version 2.0.0.3108 Last Modified 11/29/2012

Security

– Added ATTGNC-006(QATTGNC91): AT&T Global Network Clients 9.1.0

– Added NPPP-015(QNPP622): Notepad ++ 6.2.2

– Added OPERA-23(QOP1211): Opera 12.11

– Added TOMCAT-007(QTOMC7033): Apache Tomcat 7.0.33

Non-Security

– Added MSWU-667(Q2762895): Application Compatibility Update for Windows Server 2008, Windows 7, and Windows Server 2008 R2: November 2012

– Added MSWU-668(Q2764462): Compatibility update is available for Windows 8 and Windows Server 2012

– Added MSWU-669(Q2777294): The Program Compatibility Assistant dialog box appears when you start a desktop app from the “Autoplay” dialog box in Windows 8

Software Distribution

– Added AR11-001(QAR1100): Adobe Reader 11.0.00

– Added MSWM-003(Q2506146): Windows Management Framework Core package (Windows PowerShell 3.0 and WinRM 3.0)

Revision

– Modified MSWU-577(Q2607047): Added Windows 7 and Windows 7 x64 as affected products.

New Patch Data Available (2.0.0.2362)

XML data version = 2.0.0.2362 Last modified on 8/14/2012

Security

– Added MS12-052: Cumulative Security Update for Internet Explorer (2722913)

– Added MS12-053: Vulnerability in Remote Desktop Could Allow Remote Code Execution (2723135)

– Added MS12-054: Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution (2733594)

– Added MS12-055: Vulnerability in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2731847)

– Added MS12-056: Vulnerability in JScript and VBScript Engines Could Allow Remote Code Execution (2706045)

– Added MS12-057: Vulnerability in Microsoft Office Could Allow Remote Code Execution (2731879)

– Added MS12-058: Vulnerabilities in Microsoft Exchange Server WebReady Document Viewing Could Allow Remote Code Execution (2740358)

– Added MS12-059: Vulnerability in Microsoft Visio Could Allow Remote Code Execution (2733918)

– Added MS12-060: Vulnerability in Windows Common Controls Could Allow Remote Code Execution (2720573)

– Added APSB12-16(QAR1014): Security updates available for Adobe Reader and Acrobat

– Added APSB12-17(QSW1166636): Security update available for Adobe Shockwave Player 11.6.6.636

– Added APSB12-18(QAF113300271): Security updates available for Adobe Flash Player

– Added CHROME-52(Q210118077): Google Chrome 21.0.1180.77

Revision

– Modified MS12-043: Bulletin rereleased to offer the security updates for Microsoft XML Core Services 5.0.

New Patch Data Available (2.0.0.1722)

XML data version = 2.0.0.1722 Last modified on 4/10/2012

Security

– Added MS12-023: Cumulative Security Update for Internet Explorer (2675157)

– Added MS12-024: Vulnerability in Windows Could Allow Remote Code Execution (2653956)

– Added MS12-025: Vulnerability in .NET Framework Could Allow Remote Code Execution (2671605)

– Added MS12-027: Vulnerability in Windows Common Controls Could Allow Remote Code Execution (2664258)

– Added MS12-028: Vulnerability in Microsoft Office Could Allow Remote Code Execution (2639185)

– Added CHROME-41(Q1801025152): Google Chrome 18.0.1025.152

– Added APSB12-08(QAR0951): Security updates available for Adobe Reader and Acrobat

Non Security

– Added LIBRE-005(QLIBO352): LibreOffice 3.5.2

– Added MSWU-608(Q2598292): Outlook 2003 Junk Email Filter update: April 10, 2012

Revision

– Modified MSWU-431(Q982726): Updated Outlook 2010 Junk Email Filter.

– Modified APSB12-07(QAF112202228): Fixed an issue where flash 11 x64 showed as missing on some systems.

New Patch Data Available (2.0.0.1260)

XML data version = 2.0.0.1260 Last modified on 12/20/2011

Security

– Added APSB11-30(QAA0947): Security updates available for Adobe Reader and Acrobat

Non-Security

– Added MSWU-575(Q2633952): December 2011 cumulative time zone update for Windows operating systems

– Added MSWU-576(Q2596596): Excel 2007 update: December 13, 2011

Revision

– Modified MS11-089: Added KB2553374 for Visio 2010

New Patch Data Available (2.0.0.888)

XML data version = 2.0.0.888 Last modified on 10/4/2011

Product

– Added support for Adobe Reader MUI 10

Security

– Added CHROME-27(Q140835202): Google Chrome 14.0.835.202

– Added APSB11-24(QARM1011): Adobe Reader MUI 10.1.1

– Added FF11-022(QFF701): Firefox 7.0.1

– Added TB11-701(QTB701): Thunderbird 7.0.1

– Added SM11-2410(QSM2410): SeaMonkey 2.4.1

– Added RP12-009(QRP1201669): Real Player 12.0.1.669

Non Security

– Added MSWU-558(Q2602324): Description of Update Rollup 5 for Exchange Server 2007 Service Pack 3

Revision

– Modified MS10-070(Q2416473): Fixed an issue where patch shows as missing after deployment.