Microsoft just released 13 different security bulletins. Do you need to panic over any of them? We've gone ahead and done the reading -- and possible panicking -- for you. Long story short: If you're running Windows 7 or Windows 8.1, take these updates seriously.

Microsoft Security Bulletin MS16-044: Security Update for Windows OLE (3146706)

What it does: It fixes a code vulnerability that would let someone remotely execute code after a user has been tricked into downloading a file or program from someone who really wants to get on their machine. (This update fixes only the code, not the social-engineering problem; there is no patch for installing "DO NOT CLICK ON SHADY EMAIL LINKS" in your users.)

Which users it affects: Everyone except Windows 10 users.

MS16-037 - Critical: Cumulative Security Update for Internet Explorer (3148531)

What it does: It fixes a glitch that would have let someone take control of a user's system if a user a) clicked on a shady URL, while b) being logged in as an administrator.

Which users it affects: Internet Explorer 9 and 11 users, this is a critical security update. 

Microsoft Security Bulletin MS16-038 - Critical: Cumulative Security Update for Microsoft Edge (3148532)

What it does: It fixes a glitch that would have let someone take control of a user's system if a user a) clicked on a shady URL, while b) being logged in as an administrator. It does this by modifying how Microsoft Edge handles objects in memory and ensuring that cross-domain policies are properly enforced in Microsoft Edge.

Which users it affects: Windows 10 users who are using Edge.

Microsoft Security Bulletin MS16-040: Security Update for Microsoft XML Core Services (3148541)

What it does: It fixes a code vulnerability that would let someone remotely execute code after a user has been tricked into downloading a file or program from someone who really wants to get on their machine. (This update fixes only the code, not the social-engineering problem; there is no patch for installing "DO NOT CLICK ON SHADY EMAIL LINKS" in your users.) The specific weakness it fixes is correcting how the MSXML parser processes user input.

Which users it affects: Windows 7, Windows 8.1, Windows RT 8.1, Windows Vista, Windows 10

Microsoft Security Bulletin MS16-046: Security Update for Secondary Logon (3148538)

What it does: This fixes how Windows Secondary Logon Service handles requests in memory, presumably reducing the chances of someone getting into a system and running some arbitrary code as an admin.

Which users it affects: Windows 10 users.

Microsoft Security Bulletin MS16-041: Security Update for .NET Framework (3148789)

What it does: This closes a security hole that allowed for remote code execution by altering how .NET validates input on library load.

Which users it affects: Windows 7, Windows Vista.

Microsoft Security Bulletin MS16-047: Security Update for SAM and LSAD Remote Protocols (3148527)

What it does: This reduces the risk of a man-in-the-middle attack  by modifying how the SAM and LSAD remote protocols handle authentication levels.

Which users it affects: Windows 7, Windows Vista, Windows 8, Windows 8.1, Windows 10.

Microsoft Security Bulletin MS16-048: Security Update for CSRSS (3148528)

What it does: This makes it harder for someone to log in, install an app and create a security bypass, all by correcting how Windows manages process tokens in memory. 

Which users it affects: Windows RT 8.1, Windows 8.1, Windows 10.

Microsoft Security Bulletin MS16-042: Security Update for Microsoft Office (3148775)

What it does: This update corrects how Office handles objects in memory, thus closing the loop on a vulnerability that would have allowed attackers to execute some remote code if they had lured a user into opening a specially-crafted Office file. 

Which users it affects: Office 2007, Office 2010, Office 2013, Office 2013 RT, Office 2016, Office for Mac 2011, Office 2016 for Mac, Office Web Apps 2010, Office Web Apps 2013.

Microsoft Security Bulletin MS16-045: Security Update for Windows Hyper-V (3143118)

What it does: "The security update addresses the vulnerabilities by correcting how Hyper-V validates guest operating system user input … This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an authenticated attacker on a guest operating system runs a specially crafted application that causes the Hyper-V host operating system to execute arbitrary code. Customers who have not enabled the Hyper-V role are not affected."

Which users it affects: Windows 8.1, Windows 10.

Microsoft Security Bulletin MS16-039: Microsoft Graphics Component (3148522)

What it does: Makes a whole mess of applications safe, including Microsoft Office, Skype for Business, and Microsoft Lync, by correcting how the Windows font library handles embedded fonts. It also eliminates the same vulnerability in Windows and the .NET framework.

Which users it affects: Windows 7, Windows Vista,  Windows 8.1, Windows 10, Microsoft Office 2007, Microsoft Office 2010, Skype for Business 2016, Microsoft Lync 2013, Microsoft Lync 2010.

Microsoft Security Bulletin MS16-049: Security Update for HTTP.sys (3148795)

What it does: This modifies how the Windows HTTP protocol stack handles HTTP 2.0 requests, reducing the odds of a Denial of Service Attack.

Which users it affects: Windows 10.

Microsoft Security Bulletin MS16-044: Security Update for Adobe Flash Player (3154132)

What it does: "This security update resolves vulnerabilities in Adobe Flash Player when installed on all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, and Windows 10. This security update is rated Critical. The update addresses the vulnerabilities in Adobe Flash Player by updating the affected Adobe Flash libraries contained within Internet Explorer 10, Internet Explorer 11, and Microsoft Edge. For more information, see the Affected Software section."

Which users it affects: Windows 8.1, Windows RT 8.1, Windows 10.