This release is a content update.
- Content updates include new checks for vulnerabilities, patch verification, and compliance with security policies.
- Product updates include performance improvements, bug fixes, and new features.
Vulnerability checks for October 2010 Patch Tuesday exposures
- NeXpose vulnerability checks have been added to provide up-to-date Microsoft Patch Tuesday scan coverage for October 2010. Use these checks to verify that the latest Microsoft patches have been applied to system assets. Some checks require most recent product update.
List of checks
- MS10-071: Cumulative Security Update for Internet Explorer
- MS10-072: Vulnerabilities in SafeHTML Could Allow Information Disclosure
- MS10-073: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege
- MS10-074: Vulnerability in Microsoft Foundation Classes Could Allow Remote Code Execution
- MS10-075: Vulnerability in Media Player Network Sharing Service Could Allow Remote Code Execution
- MS10-076: Vulnerability in the Embedded OpenType Font Engine Could Allow Remote Code Execution
- MS10-077: Vulnerability in .NET Framework Could Allow Remote Code Execution
- MS10-078: Vulnerabilities in the OpenType Font (OTF) Format Driver Could Allow Elevation of Privilege
- MS10-079: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution
- MS10-080: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution
- MS10-081: Vulnerability in Windows Common Control Library Could Allow Remote Code Execution
- MS10-082: Vulnerability in Windows Media Player Could Allow Remote Code Execution
- MS10-083: Vulnerability in COM Validation in Windows Shell and WordPad Could Allow Remote Code Execution
- MS10-084: Vulnerability in Windows Local Procedure Call Could Cause Elevation of Privilege
- MS10-085: Vulnerability in SChannel Could Allow Denial of Service
- MS10-086: Vulnerability in Windows Shared Cluster Disks Could Allow Tampering