{"id":73004,"date":"2009-02-10T08:19:29","date_gmt":"2009-02-10T08:19:29","guid":{"rendered":"https:\/\/localhost\/wordpress\/?p=73004"},"modified":"2009-02-10T08:19:29","modified_gmt":"2009-02-10T08:19:29","slug":"microsoft-updates-2","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/microsoft-updates-2\/","title":{"rendered":"Microsoft Updates"},"content":{"rendered":"<p>Overview of the February 2009 Microsoft patches and their status. 2 critical and 2 important updates<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/technet\/security\/Bulletin\/MS09-002.mspx\">MS09-002<\/a> Cumulative MSIE patch, adds fixes for multiple vulnerabilities that lead to random code execution with the rights of the logged on user Replaces MS08-073 and MS08-078.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/technet\/security\/Bulletin\/MS09-003.mspx\">MS09-003<\/a> Multiple vulnerabilities allow code execution and DoS. Replaces MS08-039.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/technet\/security\/Bulletin\/MS09-004.mspx\">MS09-004<\/a> An input validation vulnerability in a extended stored procedures leads to random code execution. Replaces MS08-040 and MS08-052.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/technet\/security\/Bulletin\/MS09-005.mspx\">MS09-005<\/a> Multiple vulnerabilities allow random code execution with the rights of the logged on user. Replaces MS08-019.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview of the February 2009 Microsoft patches and their status. 2 critical and 2 important updates MS09-002 Cumulative MSIE patch, adds fixes for multiple vulnerabilities that lead to random code execution with the rights of the logged on user Replaces MS08-073 and MS08-078. MS09-003 Multiple vulnerabilities allow code execution and DoS. Replaces MS08-039. MS09-004 An [&hellip;]<\/p>\n","protected":false},"author":22,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-73004","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/73004"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=73004"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/73004\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=73004"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=73004"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=73004"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}