Description
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges, spoof user interface, cause denial of service, bypass security restrictions.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Microsoft Graphics Components can be exploited remotely via specially crafted file to execute arbitrary code.
- An information disclosure vulnerability in Windows KernelStream can be exploited remotely via specially crafted application to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Network Connections Service can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Storage VSP Driver can be exploited remotely via specially crafted application to gain privileges.
- A remote code execution vulnerability in Windows TCP/IP can be exploited remotely via specially crafted to execute arbitrary code.
- A remote code execution vulnerability in Windows Camera Codec Pack can be exploited remotely via specially crafted file to execute arbitrary code.
- An elevation of privilege vulnerability in Group Policy can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Windows iSCSI Target Service can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Windows Backup Service can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Windows Application Compatibility Client Library can be exploited remotely via specially crafted application to gain privileges.
- An information disclosure vulnerability in Windows Enterprise App Management Service can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows – User Profile Service can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Windows Setup can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Error Reporting can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.
- A spoofing vulnerability in Windows can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in Jet Database Engine can be exploited remotely via specially crafted file to execute arbitrary code.
- A denial of service vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to cause denial of service.
- An elevation of privilege vulnerability in Windows Event System can be exploited remotely via specially crafted application to gain privileges.
- A denial of service vulnerability in Windows Remote Desktop Protocol (RDP) can be exploited remotely via specially crafted requests to cause denial of service.
- An elevation of privilege vulnerability in Windows Storage Services can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely via specially crafted application to gain privileges.
- A remote code execution vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Image can be exploited remotely via specially crafted application to gain privileges.
- A remote code execution vulnerability in Windows NAT can be exploited remotely via specially crafted application to execute arbitrary code.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
- An information disclosure vulnerability in Windows Remote Desktop Protocol (RDP) can be exploited remotely via specially crafted requests to obtain sensitive information.
- An information disclosure vulnerability in NetBT can be exploited remotely via specially crafted application to obtain sensitive information.
- A denial of service vulnerability in Windows TCP/IP can be exploited remotely via specially crafted to cause denial of service.
- An elevation of privilege vulnerability in Windows Hyper-V can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows COM Server can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Windows can be exploited remotely via specially crafted application to gain privileges.
- An information disclosure vulnerability in Windows GDI+ can be exploited remotely via specially crafted application to obtain sensitive information.
- A remote code execution vulnerability in GDI+ can be exploited remotely via specially crafted website to execute arbitrary code.
- A security feature bypass vulnerability in Windows can be exploited remotely via specially crafted application to bypass security restrictions.
- A memory corruption vulnerability in Media Foundation can be exploited remotely via specially crafted document to execute arbitrary code.
- An information disclosure vulnerability in Windows Text Services Framework can be exploited remotely via specially crafted file to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Error Reporting Manager can be exploited remotely via specially crafted application to gain privileges.
Original advisories
- CVE-2020-16889
- CVE-2020-16887
- CVE-2020-16902
- CVE-2020-16885
- CVE-2020-16898
- CVE-2020-16968
- CVE-2020-16939
- CVE-2020-16980
- CVE-2020-16972
- CVE-2020-16967
- CVE-2020-16876
- CVE-2020-16919
- CVE-2020-16940
- CVE-2020-16908
- CVE-2020-16909
- CVE-2020-16920
- CVE-2020-16907
- CVE-2020-16922
- CVE-2020-16905
- CVE-2020-16924
- CVE-2020-1243
- CVE-2020-16900
- CVE-2020-16927
- CVE-2020-0764
- CVE-2020-16890
- CVE-2020-16891
- CVE-2020-16892
- CVE-2020-16894
- CVE-2020-16901
- CVE-2020-16896
- CVE-2020-16897
- CVE-2020-16973
- CVE-2020-16899
- CVE-2020-1047
- CVE-2020-16976
- CVE-2020-16975
- CVE-2020-16974
- CVE-2020-16936
- CVE-2020-16935
- CVE-2020-1167
- CVE-2020-16877
- CVE-2020-16912
- CVE-2020-1080
- CVE-2020-16914
- CVE-2020-16916
- CVE-2020-16911
- CVE-2020-16910
- CVE-2020-16913
- CVE-2020-16938
- CVE-2020-16915
- CVE-2020-16921
- CVE-2020-16895
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-8
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
- Windows-RT
- Microsoft-Windows-10
CVE list
- CVE-2020-16923 critical
- CVE-2020-16889 high
- CVE-2020-16887 critical
- CVE-2020-16902 critical
- CVE-2020-16885 critical
- CVE-2020-16898 critical
- CVE-2020-16968 critical
- CVE-2020-16939 critical
- CVE-2020-16980 critical
- CVE-2020-16972 critical
- CVE-2020-16967 critical
- CVE-2020-16876 high
- CVE-2020-16919 high
- CVE-2020-16940 critical
- CVE-2020-16908 critical
- CVE-2020-16909 critical
- CVE-2020-16920 critical
- CVE-2020-16907 critical
- CVE-2020-16922 high
- CVE-2020-16905 high
- CVE-2020-16924 critical
- CVE-2020-1243 critical
- CVE-2020-16900 high
- CVE-2020-16927 critical
- CVE-2020-0764 critical
- CVE-2020-16890 critical
- CVE-2020-16891 critical
- CVE-2020-16892 critical
- CVE-2020-16894 critical
- CVE-2020-16901 warning
- CVE-2020-16896 critical
- CVE-2020-16897 high
- CVE-2020-16973 critical
- CVE-2020-16899 critical
- CVE-2020-1047 critical
- CVE-2020-16976 critical
- CVE-2020-16975 critical
- CVE-2020-16974 critical
- CVE-2020-16936 critical
- CVE-2020-16935 critical
- CVE-2020-1167 critical
- CVE-2020-16877 high
- CVE-2020-16912 critical
- CVE-2020-1080 critical
- CVE-2020-16914 high
- CVE-2020-16916 critical
- CVE-2020-16911 critical
- CVE-2020-16910 high
- CVE-2020-16913 critical
- CVE-2020-16938 high
- CVE-2020-16915 critical
- CVE-2020-16921 high
- CVE-2020-16895 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!