Description
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to obtain sensitive information, gain privileges, execute arbitrary code, cause denial of service, bypass security restrictions.
Below is a complete list of vulnerabilities:
- An information disclosure vulnerability in Windows GDI can be exploited remotely via specially crafted document to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Jet Database Engine can be exploited remotely via specially crafted file to execute arbitrary code.
- A denial of service vulnerability in Windows Hyper-V can be exploited remotely via specially crafted network to cause denial of service.
- An elevation of privilege vulnerability in Windows Background Intelligent Transfer Service can be exploited remotely via specially crafted request to gain privileges.
- A security feature bypass vulnerability in Windows Task Scheduler can be exploited remotely via specially crafted request to bypass security restrictions.
- A remote code execution vulnerability in VBScript can be exploited remotely via specially crafted website to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Windows Remote Access Common Dialog can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Print Spooler can be exploited remotely via specially crafted script to gain privileges.
- A memory corruption vulnerability in Media Foundation can be exploited remotely via specially crafted document to execute arbitrary code.
- An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.
- An information disclosure vulnerability in Windows CSRSS can be exploited remotely via specially crafted application to obtain sensitive information.
- A memory corruption vulnerability in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
- An information disclosure vulnerability in Windows GDI can be exploited remotely via specially crafted application to obtain sensitive information.
- A remote code execution vulnerability in Microsoft Graphics Components can be exploited remotely via specially crafted file to execute arbitrary code.
- A remote code execution vulnerability in Windows can be exploited remotely via specially crafted request to execute arbitrary code.
- A remote code execution vulnerability in MSHTML Engine can be exploited remotely via specially crafted file to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Script Runtime can be exploited remotely via specially crafted website to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Printer Service can be exploited remotely via specially crafted application to gain privileges.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
- An elevation of privilege vulnerability in Microsoft Windows can be exploited remotely via specially crafted application to gain privileges.
Fiches de renseignement originales
- CVE-2020-1078
- CVE-2020-1174
- CVE-2020-1179
- CVE-2020-0909
- CVE-2020-1112
- CVE-2020-1113
- CVE-2020-1176
- CVE-2020-1035
- CVE-2020-1114
- CVE-2020-1154
- CVE-2020-1071
- CVE-2020-1070
- CVE-2020-1150
- CVE-2020-1054
- CVE-2020-1116
- CVE-2020-1058
- CVE-2020-1093
- CVE-2020-1092
- CVE-2020-1051
- CVE-2020-1048
- CVE-2020-1141
- CVE-2020-1153
- CVE-2020-1067
- CVE-2020-1064
- CVE-2020-1062
- CVE-2020-1143
- CVE-2020-1060
- CVE-2020-1061
- CVE-2020-1175
- CVE-2020-1081
- CVE-2020-1072
- CVE-2020-1010
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Produits associés
- Microsoft-Internet-Explorer
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-8
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
- Windows-RT
- Microsoft-Windows-10
Liste CVE
- CVE-2020-1064 critical
- CVE-2020-1062 critical
- CVE-2020-1060 critical
- CVE-2020-1058 critical
- CVE-2020-1093 critical
- CVE-2020-1092 critical
- CVE-2020-1035 critical
- CVE-2020-1048 critical
- CVE-2020-0963 high
- CVE-2020-1112 critical
- CVE-2020-1179 high
- CVE-2020-0909 critical
- CVE-2020-1174 critical
- CVE-2020-1113 critical
- CVE-2020-1176 critical
- CVE-2020-1116 high
- CVE-2020-1114 critical
- CVE-2020-1071 high
- CVE-2020-1070 critical
- CVE-2020-1072 high
- CVE-2020-1078 critical
- CVE-2020-1054 critical
- CVE-2020-1143 critical
- CVE-2020-1067 critical
- CVE-2020-1051 critical
- CVE-2020-1154 critical
- CVE-2020-1153 critical
- CVE-2020-1141 high
- CVE-2020-1061 critical
- CVE-2020-1175 critical
- CVE-2020-1081 critical
- CVE-2020-1010 critical
- CVE-2020-1150 critical
Liste KB
En savoir plus
Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com
Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !