An update rollup is available for Internet Explorer for Windows Embedded Compact 2013. This rollup resolves the security issues that are described in the following article:
CVE-2017-0064 | Internet Explorer Security Feature Bypass Vulnerability
Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.
View products that this article applies to.
An update rollup is available for Internet Explorer for Windows Embedded Compact 2013. This rollup resolves the security issues that are described in the following article:
CVE-2017-0064 | Internet Explorer Security Feature Bypass Vulnerability
The Windows Embedded Compact 2013 monthly update for June 2017 is now available from Microsoft. To download this Windows Embedded Compact 2013 monthly update, go to Microsoft OEM Online or MyOEM.
This update is supported only if all previously issued updates for this product have also been installed.
After you apply this update, you must perform a clean build of the whole platform. To do this, use one of the following methods:
You don't have to restart the computer after you apply this software update.
This update doesn't replace any other updates.
File name | File size | Date | Time | Path |
---|---|---|---|---|
Mshtml.dll | 7,380,992 | 19-Jun-2017 | 12:40 | Public\Html\Oak\Target\X86\Checked |
Mshtml.map | 10,085,794 | 19-Jun-2017 | 12:40 | Public\Html\Oak\Target\X86\Checked |
Mshtml.rel | 5,258,966 | 19-Jun-2017 | 12:40 | Public\Html\Oak\Target\X86\Checked |
Mshtml.dll | 3,493,888 | 19-Jun-2017 | 12:42 | Public\Html\Oak\Target\X86\Retail |
Mshtml.map | 3,707,674 | 19-Jun-2017 | 12:42 | Public\Html\Oak\Target\X86\Retail |
Mshtml.rel | 1,933,362 | 19-Jun-2017 | 12:42 | Public\Html\Oak\Target\X86\Retail |
Mshtml.dll | 9,916,416 | 19-Jun-2017 | 12:39 | Public\Html\Oak\Target\X86\Debug |
Mshtml.map | 10,311,945 | 19-Jun-2017 | 12:39 | Public\Html\Oak\Target\X86\Debug |
Mshtml.rel | 5,499,782 | 19-Jun-2017 | 12:39 | Public\Html\Oak\Target\X86\Debug |
Mshtml.dll | 7,163,904 | 19-Jun-2017 | 12:41 | Public\Html\Oak\Target\Armv7\Checked |
Mshtml.map | 22,867,842 | 19-Jun-2017 | 12:41 | Public\Html\Oak\Target\Armv7\Checked |
Mshtml.rel | 3,692,763 | 19-Jun-2017 | 12:41 | Public\Html\Oak\Target\Armv7\Checked |
Mshtml.dll | 3,358,720 | 19-Jun-2017 | 12:40 | Public\Html\Oak\Target\Armv7\Retail |
Mshtml.map | 7,287,924 | 19-Jun-2017 | 12:40 | Public\Html\Oak\Target\Armv7\Retail |
Mshtml.rel | 1,735,640 | 19-Jun-2017 | 12:40 | Public\Html\Oak\Target\Armv7\Retail |
Mshtml.dll | 10,014,720 | 19-Jun-2017 | 12:39 | Public\Html\Oak\Target\Armv7\Debug |
Mshtml.map | 32,324,090 | 19-Jun-2017 | 12:39 | Public\Html\Oak\Target\Armv7\Debug |
Mshtml.rel | 3,616,203 | 19-Jun-2017 | 12:39 | Public\Html\Oak\Target\Armv7\Debug |
Microsoft has confirmed that this is a problem in the Microsoft products that are listed in the "Applies to" section.
Learn about the terminology that Microsoft uses to describe software updates.
Keywords: kbSecurity, kbLangAll, kbMustLoc, ATdownload, KbSECVulnerability, kbExpertiseInter, kbSecReview, kb, kbnofix, kbfix, kbsurveynew, KbSECBulletin