Windows Client OS

Windows 98 Second Edition (SE) Patches

Windows 98 Second Edition (SE) Patches

Note: Microsoft has stopped supporting Windows 98 and Windows NT 4.0 Workstation as of June 30, 2003.

Required Patches

Windows 98 SE requires the following security-related patches:

Make sure you read Internet Explorer 5.X and 6.0 Patches and Internet Explorer 6.0 SP1 Patches before you go on.

Sponsored Content

What is “Inside Microsoft Teams”?

“Inside Microsoft Teams” is a webcast series, now in Season 4 for IT pros hosted by Microsoft Product Manager, Stephen Rose. Stephen & his guests comprised of customers, partners, and real-world experts share best practices of planning, deploying, adopting, managing, and securing Teams. You can watch any episode at your convenience, find resources, blogs, reviews of accessories certified for Teams, bonus clips, and information regarding upcoming live broadcasts. Our next episode, “Polaris Inc., and Microsoft Teams- Reinventing how we work and play” will be airing on Oct. 28th from 10-11am PST.

August 2005

MS05-040 : Vulnerability in Telephony Service Could Allow Remote Code Execution (893756)

July 2005

MS05-036 : Vulnerability in Microsoft Color Management Module Could Allow Remote Code Execution (901214)

June 2005

MS05-032 : Vulnerability in Microsoft Agent Could Allow Spoofing (890046)

MS05-030 : Cumulative Security Update in Outlook Express (897715)

MS05-026 : Vulnerability in HTML Help Could Allow Remote Code Execution (896358)

May 2005

MS05-024 : Vulnerability in Web View Could Allow Remote Code Execution (894320)

April 2005

MS05-019 : Vulnerabilities in TCP/IP Could Allow Remote Code Execution and Denial of Service (893066)

MS05-018 : Vulnerability in Windows Kernel Could Allow Elevation of Privilege and Denial of Service (890859)

MS05-017 : Vulnerability in Message Queuing Could Allow Code Execution (892944)

MS05-016 : Vulnerability in Windows Shell that Could Allow Remote Code Execution (893086)

February 2005

MS05-015 : Vulnerability in Hyperlink Object Library Could Allow Remote Code Execution (888113)

MS05-013 : Vulnerability in the DHTML Editing ActiveX Control could allow code execution (891781)

MS05-012 : Vulnerability in OLE and COM Could Allow Remote Code Execution (873333)

MS05-009 : Vulnerability in PNG Processing Could Lead to Buffer Overrun (890261)

January 2005

MS05-002 : Vulnerability in Cursor and Icon Format Handling Could Allow Remote Code Execution (891711)

MS05-001 : Vulnerability in HTML Help Could Allow Code Execution (890175)

December 2004

MS04-041 : Vulnerability in WordPad Could Allow Code Execution (885836)

October 2004

MS04-037 : Vulnerability in Windows Shell Could Allow Remote Code Execution (841356)

MS04-032 : Security Update for Microsoft Windows (840987)

MS04-031 : Vulnerability in NetDDE Could Allow Remote Code Execution (841533)

July 2004

MS04-024 : Vulnerability in Windows Shell Could Allow Remote Code Execution (839645)

MS04-023 : Vulnerability in HTML Help Could Allow Code Execution (840315)

July 2003

MS03-030 : Unchecked Buffer in DirectX Could Enable System Compromise (819696)

MS03-023 : Buffer Overrun In HTML Converter Could Allow Code Execution (823559)

June 2003

MS03-020 : Cumulative Patch for Internet Explorer (818529)

April 2003

MS03-011 : Flaw in Microsoft VM Could Enable System Compromise (816093)

March 2003

MS03-008 : Flaw in Windows Script Engine could allow code execution (814078)

November 2002

MS02-065 : Buffer Overrun in Microsoft Data Access Components Could Lead to Code Execution (329414)

MS02-050 : Certificate Validation Flaw Could Enable Identity Spoofing (328115) (Reposted)

October 2002

MS02-055 : Unchecked Buffer in Windows Help Facility Could Enable Code Execution (323255)

MS02-054 : Unchecked Buffer in File Decompression Functions Could Lead to Code Execution (329048)

September 2002

MS02-053 : Buffer Overrun in SmartHTML Interpreter Could Allow Code Execution (324096)

August 2002

MS02-048 : Flaw in Certificate Enrollment Control Could Allow Deletion of Digital Certificates (323172)

March 2002

MS02-014 : Unchecked Buffer in Windows Shell Could Lead to Code Execution

MS02-013 : 04 March 2002 Cumulative VM Update

February 2002

MS02-006 : Unchecked Buffer in SNMP Service Could Enable Arbitrary Code to be Run

December 2001

MS01-059 : Unchecked Buffer in Universal Plug and Play Can Lead to System Compromise

November 2001

MS01-054 : Invalid Universal Plug and Play Request Can Disrupt System Operation

April 2001

MS01-022 : WebDAV Service Provider Can Allow Scripts to Levy Requests as User

March 2001

MS01-019 : Passwords for Compressed Folders are Recoverable

MS01-017 : Erroneous VeriSign-Issued Digital Certificates Pose Spoofing Hazard

November 2000

MS00-091 : Incomplete TCP/IP Packet Vulnerability

October 2000

MS00-079 : HyperTerminal Buffer Overflow Vulnerability

MS00-074 : WebTV for Windows Denial of Service Vulnerability

MS00-073 : Malformed IPX NMPI Packet Vulnerability

MS00-072 : Share Level Password Vulnerability

August 2000

MS00-059 : Java VM Applet Vulnerability

MS00-054 : Malformed IPX Ping Packet Vulnerability

May 2000

MS00-029 : IP Fragment Reassembly Vulnerability

March 2000

MS00-017 : DOS Device in Path Name Vulnerability

February 2000

MS00-011 : VM File Reading Vulnerability

January 2000

MS00-005 : Malformed RTF Control Word Vulnerability

September 1999

MS99-033 : Malformed Telnet Argument Vulnerability

MS99-034 : Fragmented IGMP Packet Vulnerability

August 1998

MS98-010 : Information on the Back Orifice Program

Related Topics:


Don't have a login but want to join the conversation? Sign up for a Petri Account

Comments (0)

Leave a Reply

External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by: