0patch Blog
Security Patching Simplified To The Extreme
Wednesday, December 23, 2020
Micropatch is Available for WSUS Spoofing Local Privilege Escalation Vulnerability (CVE-2020-1013)
›
by Mitja Kolsek, the 0patch Team Windows 7 and Server 2008 R2 users without Extended Security Updates have just received a micropatch for...
Tuesday, December 15, 2020
2021 New Year's Resolution: "We Will Spend Less Time and Money on Security Patches"
›
It's been over a year since we had announced our "security adoption" of Windows 7 and Windows Server 2008 R2 after they wou...
Wednesday, November 25, 2020
0day in Windows 7 and Server 2008 R2 Gets a Micropatch
›
by Mitja Kolsek, the 0patch Team [Update 1/22/2021: This vulnerability did not get patched by December 2020 or January 2021 Extended Se...
4 comments:
Thursday, November 5, 2020
0patch Keeps Office 2010 Secured After End-Of-Support
›
by Mitja Kolsek, the 0patch Team [Update April 2021: Microsoft issued further updates for Office 2010 in April 2021. We have updated this ar...
Thursday, September 17, 2020
Micropatch for Zerologon, the "perfect" Windows vulnerability (CVE-2020-1472)
›
by Mitja Kolsek, the 0patch Team The Zerologon vulnerability allows an attacker with network access to a Windows Domain Controller...
Tuesday, August 11, 2020
Micropatch is Available for Windows Task Scheduler Security Feature Bypass (CVE-2020-1113)
›
by Mitja Kolsek, the 0patch Team Windows 7 and Server 2008 R2 users without Extended Security Updates have just received a mi...
Tuesday, August 4, 2020
New 0patch Agent is Released - Version 20.06.18.10800
›
Dear 0patch users, We have just released a new 0patch Agent. We don't do that very often, for two reasons: (1) we like the software we...
‹
›
Home
View web version