Описание
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, obtain sensitive information.
Below is a complete list of vulnerabilities:
- An elevation of privilege vulnerability in Microsoft Cryptographic Services can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Search Indexer can be exploited remotely via specially crafted application to gain privileges.
- A memory corruption vulnerability in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
- An information disclosure vulnerability in Windows GDI+ can be exploited remotely via specially crafted application to obtain sensitive information.
- An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.
- An information disclosure vulnerability in Win32k can be exploited remotely via specially crafted application to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Windows can be exploited remotely via specially crafted application to gain privileges.
- An information disclosure vulnerability in Remote Desktop Web Access can be exploited remotely to obtain sensitive information.
- An information disclosure vulnerability in Windows Common Log File System Driver can be exploited remotely via specially crafted application to obtain sensitive information.
- A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Microsoft Graphics Components can be exploited remotely via specially crafted file to obtain sensitive information.
Первичный источник обнаружения
- CVE-2020-0620
CVE-2020-0630
CVE-2020-0640
CVE-2020-0643
CVE-2020-0631
CVE-2020-0642
CVE-2020-0626
CVE-2020-0625
CVE-2020-0629
CVE-2020-0627
CVE-2020-0608
CVE-2020-0632
CVE-2020-0634
CVE-2020-0635
CVE-2020-0637
CVE-2020-0639
CVE-2020-0611
CVE-2020-0628
CVE-2020-0607
CVE-2020-0615
Эксплуатация
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
- Microsoft-Internet-Explorer
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-8
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
- Windows-RT
- Microsoft-Windows-10
Список CVE
- CVE-2020-0640 critical
- CVE-2020-0608 warning
- CVE-2020-0625 warning
- CVE-2020-0620 warning
- CVE-2020-0629 warning
- CVE-2020-0628 warning
- CVE-2020-0643 warning
- CVE-2020-0642 high
- CVE-2020-0607 warning
- CVE-2020-0630 warning
- CVE-2020-0631 warning
- CVE-2020-0632 warning
- CVE-2020-0634 high
- CVE-2020-0635 high
- CVE-2020-0637 warning
- CVE-2020-0639 warning
- CVE-2020-0611 high
- CVE-2020-0615 warning
- CVE-2020-0627 warning
- CVE-2020-0626 warning
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!