July update - June's testing of patches is deemed complete, and there have been no known issues reported by testing teams relating to any of the Hyland products.
The following is a summary of Microsoft's Security Bulletin Guide for June, 2023. Hyland has downloaded these patches and applied them to our R&D Infrastructure. We will be performing SCR, automated, and regression testing in environments containing these patches over the next month. If no issues have been found or reported, we will deem testing to be complete.
The testing is not all-inclusive; issues may still be found upon implementation. Follow best practices for testing and installing software updates/patches in a development environment before implementing the updates in a production environment. Where applicable, the updates are tested on all supported Windows platforms with the latest OnBase® version.
Tag | CVE | Base Score | CVSS Vector | Exploitability | FAQs? | Workarounds? | Mitigations? |
---|---|---|---|---|---|---|---|
Azure DevOps | CVE-2023-21565 | 7.1 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Azure DevOps | CVE-2023-21569 | 5.5 | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
.NET and Visual Studio | CVE-2023-24895 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Microsoft Dynamics | CVE-2023-24896 | 5.4 | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
.NET and Visual Studio | CVE-2023-24897 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
.NET and Visual Studio | CVE-2023-24936 | 8.1 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Windows CryptoAPI | CVE-2023-24937 | 6.5 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | No | No | No |
Windows CryptoAPI | CVE-2023-24938 | 6.5 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | No | No | No |
Microsoft Exchange Server | CVE-2023-28310 | 8.0 | CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation More Likely | Yes | No | No |
.NET Framework | CVE-2023-29326 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
.NET Core | CVE-2023-29331 | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C | Exploitation Less Likely | No | No | No |
NuGet Client | CVE-2023-29337 | 7.1 | CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Microsoft Edge (Chromium-based) | CVE-2023-29345 | 6.1 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Windows NTFS | CVE-2023-29346 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
SQL Server | CVE-2023-29349 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | Yes |
Windows Group Policy | CVE-2023-29351 | 8.1 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Remote Desktop Client | CVE-2023-29352 | 6.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
SysInternals | CVE-2023-29353 | 5.5 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Windows DHCP Server | CVE-2023-29355 | 5.3 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | Yes |
SQL Server | CVE-2023-29356 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | Yes |
Microsoft Office SharePoint | CVE-2023-29357 | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation More Likely | Yes | No | Yes |
Windows GDI | CVE-2023-29358 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation More Likely | Yes | No | No |
Windows Win32K | CVE-2023-29359 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation More Likely | Yes | No | No |
Windows TPM Device Driver | CVE-2023-29360 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation More Likely | Yes | No | No |
Windows Cloud Files Mini Filter Driver | CVE-2023-29361 | 7.0 | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation More Likely | Yes | No | No |
Remote Desktop Client | CVE-2023-29362 | 8.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Windows PGM | CVE-2023-29363 | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | Yes |
Windows Authentication Methods | CVE-2023-29364 | 7.0 | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Microsoft Windows Codecs Library | CVE-2023-29365 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Windows Geolocation Service | CVE-2023-29366 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Windows OLE | CVE-2023-29367 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Windows Filtering | CVE-2023-29368 | 7.0 | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Windows Remote Procedure Call Runtime | CVE-2023-29369 | 6.5 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | No | No | No |
Microsoft Windows Codecs Library | CVE-2023-29370 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Windows Win32K | CVE-2023-29371 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation More Likely | Yes | No | No |
Microsoft WDAC OLE DB provider for SQL | CVE-2023-29372 | 8.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Windows ODBC Driver | CVE-2023-29373 | 8.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Windows Resilient File System (ReFS) | CVE-2023-32008 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Windows Collaborative Translation Framework | CVE-2023-32009 | 8.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Windows Bus Filter Driver | CVE-2023-32010 | 7.0 | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Windows iSCSI | CVE-2023-32011 | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | No | No | No |
Windows Container Manager Service | CVE-2023-32012 | 6.3 | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Windows Hyper-V | CVE-2023-32013 | 6.5 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Windows PGM | CVE-2023-32014 | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | Yes |
Windows PGM | CVE-2023-32015 | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | Yes |
Windows Installer | CVE-2023-32016 | 5.5 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Microsoft Printer Drivers | CVE-2023-32017 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Windows Hello | CVE-2023-32018 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Windows Kernel | CVE-2023-32019 | 4.7 | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Role: DNS Server | CVE-2023-32020 | 3.7 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Windows SMB | CVE-2023-32021 | 7.1 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | Yes |
Windows Server Service | CVE-2023-32022 | 7.6 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | Yes |
Microsoft Power Apps | CVE-2023-32024 | 3.0 | CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Microsoft Office Excel | CVE-2023-32029 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
.NET and Visual Studio | CVE-2023-32030 | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C | Exploitation Less Likely | No | No | No |
Microsoft Exchange Server | CVE-2023-32031 | 8.8 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation More Likely | Yes | No | No |
.NET and Visual Studio | CVE-2023-32032 | 6.5 | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H/E:P/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
SQL Server | CVE-2023-32025 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
SQL Server | CVE-2023-32026 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
SQL Server | CVE-2023-32027 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
SQL Server | CVE-2023-32028 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
.NET and Visual Studio | CVE-2023-33126 | 7.3 | CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
.NET and Visual Studio | CVE-2023-33128 | 7.3 | CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Microsoft Office SharePoint | CVE-2023-33129 | 6.5 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Microsoft Office SharePoint | CVE-2023-33130 | 7.3 | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Microsoft Office Outlook | CVE-2023-33131 | 8.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Microsoft Office SharePoint | CVE-2023-33132 | 6.3 | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Microsoft Office Excel | CVE-2023-33133 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
.NET and Visual Studio | CVE-2023-33135 | 7.3 | CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Microsoft Office Excel | CVE-2023-33137 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Visual Studio | CVE-2023-33139 | 5.5 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Microsoft Office OneNote | CVE-2023-33140 | 6.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
ASP .NET | CVE-2023-33141 | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C | Exploitation Less Likely | No | No | No |
Microsoft Office SharePoint | CVE-2023-33142 | 6.5 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Microsoft Edge (Chromium-based) | CVE-2023-33143 | 7.5 | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Visual Studio Code | CVE-2023-33144 | 5.0 | CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Microsoft Edge (Chromium-based) | CVE-2023-33145 | 6.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
Microsoft Office | CVE-2023-33146 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C | Exploitation Less Likely | Yes | No | No |
CNA | Tag | CVE | FAQs? | Workarounds? | Mitigations? |
---|---|---|---|---|---|
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-2929 | Yes | No | No |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-2930 | Yes | No | No |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-2931 | Yes | No | No |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-2932 | Yes | No | No |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-2933 | Yes | No | No |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-2934 | Yes | No | No |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-2935 | Yes | No | No |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-2936 | Yes | No | No |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-2937 | Yes | No | No |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-2938 | Yes | No | No |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-2939 | Yes | No | No |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-2940 | Yes | No | No |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-2941 | Yes | No | No |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-3079 | Yes | No | No |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-3214 | Yes | No | No |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-3215 | Yes | No | No |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-3216 | Yes | No | No |
Chrome | Microsoft Edge (Chromium-based) | CVE-2023-3217 | Yes | No | No |
Github | Visual Studio | CVE-2023-25815 | Yes | No | No |
Github | Visual Studio | CVE-2023-25652 | Yes | No | No |
AutoDesk | Visual Studio | CVE-2023-27909 | Yes | No | No |
AutoDesk | Visual Studio | CVE-2023-27910 | Yes | No | No |
AutoDesk | Visual Studio | CVE-2023-27911 | Yes | No | No |
Github | Visual Studio | CVE-2023-29007 | Yes | No | No |
Github | Visual Studio | CVE-2023-29011 | Yes | No | No |
Github | Visual Studio | CVE-2023-29012 | Yes | No | No |
Date | Blog Post |
---|---|
January 11, 2022 | Coming Soon: New Security Update Guide Notification System |
February 9, 2021 | Continuing to Listen: Good News about the Security Update Guide API |
January 13, 2021 | Security Update Guide Supports CVEs Assigned by Industry Partners |
December 8, 2020 | Security Update Guide: Let’s keep the conversation going |
November 9, 2020 | Vulnerability Descriptions in the New Version of the Security Update Guide |
You can see these in more detail from the Deployments tab by selecting Known Issues column in the Edit Columns panel.
For more information about Windows Known Issues, please see Windows message center (links to currently-supported versions of Windows are in the left pane).
KB Article | Applies To |
---|---|
5027215 | Windows 10, version 21H2 and Windows 10, version 22H2 |
5027222 | Windows 10, version 1809, Windows Server 2019 |
5027223 | Windows 11, version 21H2 |
5027225 | Windows Server 2022 |
5027231 | Windows 11, version 22H2 |
5027256 | Windows Server 2008 R2 (Security-only update) |
5027275 | Windows Server 2008 R2 (Monthly Rollup) |
5027277 | Windows Server 2008 (Security-only update) |
5027279 | Windows Server 2008 (Monthly Rollup) |
Hyland Software - Microsoft Updates Statement
Hyland Software is dedicated to ensuring the monthly cumulative updates released by Microsoft® are compatible with OnBase®. On the second Tuesday of each month, the Quality Assurance Department of Hyland Software evaluates the cumulative fixes released and labeled as Critical or Important by Microsoft®. The details of the update provided by Microsoft are reviewed for interaction with OnBase® and installed when appropriate for testing its compatibility with OnBase®.