Cumulative Security Update for Windows 10: July 25, 2015
This security update resolves the following vulnerabilities in Microsoft Windows.
- The vulnerability could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded OpenType fonts. To learn more about the vulnerability, see Microsoft Security Bulletin MS15-078.
- The vulnerability impacts Adobe Flash Player in Internet Explorer. To learn more about the vulnerability, see Microsoft security advisory 2755801 and Adobe Security bulletin APSB15-18.
- The vulnerability could allow elevation of privilege if the Windows Installer service incorrectly runs custom action scripts.
Additionally, this update includes non–security-related changes to enhance the functionality of Windows 10 through new features and improvements.
This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically.Important
If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time and with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.
Note The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.ERROR: PhantomJS timeout occurredt occurredS timeout occurred