here's the chart of non-MS patches that affect Windows platforms in the
past month.

Patch data provided by:

[image: Ivanti.com] <https://www.ivanti.com/en-US/>

*Technology*

*Products Affected*

*Severity*

*Reference*

*Workaround/ Exploited*

*Vulnerability Info*

Internet Explorer

IE 9, 10, 11

Critical

CVE-2017-8517
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8517>

CVE-2017-8519
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8519>

CVE-2017-8522
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8522>

CVE-2017-8524
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8524>

CVE-2017-8529
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8529>

CVE-2017-8547
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8547>

Workaround: No

Exploited: No

Remote Code Execution

Information Disclosure



Edge

Microsoft Edge

Critical

CVE-2017-8496
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8496>

CVE-2017-8497
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8497>

CVE-2017-8498
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8498>

CVE-2017-8499
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8499>

CVE-2017-8504
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8504>

CVE-2017-8517
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8517>

CVE-2017-8520
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8520>

CVE-2017-8521
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8521>

CVE-2017-8522
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8522>

CVE-2017-8523
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8523>

CVE-2017-8524
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8524>

CVE-2017-8529
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8529>

CVE-2017-8530
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8530>

CVE-2017-8548
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8548>

CVE-2017-8549
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8549>

CVE-2017-8555
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8555>

CVE-2017-0223
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0223>

Workaround: No

Exploited: No

Remote Code Execution

Information Disclosure

Security Feature Bypass

Windows

Windows 10

Windows 8.1

Windows RT 8.1

Windows 7

Server 2008/2008 R2

Sever 2012/2012 R2

Server 2016

Critical

CVE-2017-8473
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8473>

CVE-2017-8474
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8474>

CVE-2017-8475
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8475>

CVE-2017-8553
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8553>

CVE-2017-0282
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0282>

CVE-2017-0283
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0283>

CVE-2017-0284
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0284>

CVE-2017-8477
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8477>

CVE-2017-8478
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8478>

CVE-2017-8479
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8479>

CVE-2017-0285
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0285>

CVE-2017-0286
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0286>

CVE-2017-0287
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0287>

CVE-2017-8480
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8480>

CVE-2017-8481
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8481>

CVE-2017-8482
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8482>

CVE-2017-0288
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0288>

CVE-2017-0289
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0289>

CVE-2017-8483
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8483>

CVE-2017-8484
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8484>

CVE-2017-0291
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0291>

CVE-2017-0292
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0292>

CVE-2017-0294
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0294>

CVE-2017-8485
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8485>

CVE-2017-8488
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8488>

CVE-2017-0295
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0295>

CVE-2017-0296
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0296>

CVE-2017-0297
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0297>

CVE-2017-8489
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8489>

CVE-2017-8490
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8490>

CVE-2017-0298
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0298>

CVE-2017-0299
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0299>

CVE-2017-8491
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8491>

CVE-2017-8492
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8492>

CVE-2017-8493
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8493>

CVE-2017-0300
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0300>

CVE-2017-8460
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8460>

CVE-2017-8462
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8462>

CVE-2017-8494
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8494>

CVE-2017-8515
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8515>

CVE-2017-8527
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8527>

CVE-2017-8528
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8528>

**CVE-2017-8464
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8464>

CVE-2017-8465
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8465>

CVE-2017-8531
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8531>

CVE-2017-8532
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8532>

CVE-2017-8466
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8466>

CVE-2017-8468
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8468>

CVE-2017-8469
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8469>

CVE-2017-8470
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8470>

CVE-2017-8533
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8533>

CVE-2017-8534
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8534>

**CVE-2017-8543
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8543>

CVE-2017-8471
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8471>

CVE-2017-8472
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8472>

CVE-2017-8544
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8544>

CVE-2017-0173
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0173>

CVE-2017-0193
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0193>

CVE-2017-0215
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0215>

CVE-2017-0216
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0216>

CVE-2017-0218
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0218>

CVE-2017-0219
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0219>

CVE-2017-0260
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0260>

CVE-2017-8476
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8476>

CVE-2017-8552
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8552>

Workaround: No

**Exploited: Yes

Remote Code Execution

Denial of Service

Information Disclosure

Elevation of Privilege

Security Feature Bypass

Tampering



Office, Office Services and Web Apps



Office 2010,

2013, 2016

Office Web Apps 2010,

2013

OneNote 2010

Outlook 2007, 2010, 2013, 2016

PowerPoint 2007, 2013, 2016, Mac 2011

SharePoint 2007, 2013, 2016

Word 2007, 2010, 2013, 2016

Skype Business 2016



Critical

CVE-2017-0260
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0260>

CVE-2017-0282
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0282>

CVE-2017-0283
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0283>

CVE-2017-0284
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0284>

CVE-2017-0285
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0285>

CVE-2017-0286
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0286>

CVE-2017-0287
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0287>

CVE-2017-0288
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0288>

CVE-2017-0289
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0289>

CVE-2017-0292
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0292>

CVE-2017-8506
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8506>

CVE-2017-8507
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8507>

CVE-2017-8508
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8508>

CVE-2017-8509
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8509>

CVE-2017-8510
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8510>

CVE-2017-8511
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8511>

CVE-2017-8512
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8512>

CVE-2017-8513
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8513>

CVE-2017-8514
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8514>

CVE-2017-8527
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8527>

CVE-2017-8528
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8528>

CVE-2017-8531
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8531>

CVE-2017-8532
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8532>

CVE-2017-8533
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8533>

CVE-2017-8534
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8534>

CVE-2017-8545
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8545>

CVE-2017-8550
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8550>

CVE-2017-8551
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8551>

Workaround: No

Exploited: No

Remote Code Execution

Elevation of Privilege

Spoofing

Security Feature Bypass

Information Disclosure



Silverlight

Silverlight 5

Critical

CVE-2017-0283
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0283>

CVE-2017-8527
<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8527>

Workaround: No

Exploited: No

Remote Code Execution

Adobe Flash

25.0.0.171 and earlier

Critical

CVE-2017-3075 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-3075>

CVE-2017-3081 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-3081>

CVE-2017-3083 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-3083>

CVE-2017-3084 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-3084>

CVE-2017-3076 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-3076>

CVE-2017-3077 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-3077>

CVE-2017-3078 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-3078>

CVE-2017-3079 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-3079>

CVE-2017-3082 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-3082>

Workaround: No

Exploited: No

Arbitrary Code Execution
-------------------------------------------------
BGA Wiki - Penetration Test Wiki

http://wiki.bgasecurity.com/Kategori:Pentest

-------------------------------------------------

Cevap