..
Click anywhere to stop
Click anywhere to stop
Дата обнаружения
|
11/08/2020 |
Уровень угрозы
|
Critical |
Описание
|
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information, spoof user interface. Below is a complete list of vulnerabilities:
|
Эксплуатация
|
Public exploits exist for this vulnerability. Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details. |
Пораженные продукты
|
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) |
Решение
|
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel) |
Первичный источник обнаружения
|
CVE-2020-1379 CVE-2020-1537 CVE-2020-1383 CVE-2020-1475 CVE-2020-1545 CVE-2020-1579 CVE-2020-1470 CVE-2020-1570 CVE-2020-1536 CVE-2020-1577 CVE-2020-1552 CVE-2020-1535 CVE-2020-1473 CVE-2020-1551 CVE-2020-1530 CVE-2020-1474 CVE-2020-1518 CVE-2020-1519 CVE-2020-1516 CVE-2020-1478 CVE-2020-1558 CVE-2020-1515 CVE-2020-1538 CVE-2020-1539 CVE-2020-1557 CVE-2020-1554 CVE-2020-1472 CVE-2020-1517 CVE-2020-1484 CVE-2020-1485 CVE-2020-1486 CVE-2020-1544 CVE-2020-1529 CVE-2020-1584 CVE-2020-1587 CVE-2020-1377 CVE-2020-1477 CVE-2020-1339 CVE-2020-1567 CVE-2020-1337 CVE-2020-1378 CVE-2020-1564 CVE-2020-1562 CVE-2020-1513 CVE-2020-1541 CVE-2020-1540 CVE-2020-1543 CVE-2020-1542 CVE-2020-1534 CVE-2020-1467 CVE-2020-1464 CVE-2020-1546 CVE-2020-1547 CVE-2020-1520 CVE-2020-1489 CVE-2020-1565 CVE-2020-1492 CVE-2020-1488 CVE-2020-1466 CVE-2020-1487 CVE-2020-1509 |
Оказываемое влияние
?
|
ACE
[?]
OSI
[?]
DoS
[?]
SB
[?]
PE
[?]
SUI
[?]
|
Связанные продукты
|
Microsoft Internet Explorer Microsoft Windows Microsoft Windows Server Microsoft Windows Server 2012 Microsoft Windows 7 Microsoft Windows Server 2008 |
CVE-IDS
|
CVE-2020-14887.0High
CVE-2020-13795.5High CVE-2020-15377.8Critical CVE-2020-13835.5High CVE-2020-14757.8Critical CVE-2020-15457.8Critical CVE-2020-15797.8Critical CVE-2020-14707.8Critical CVE-2020-15707.5Critical CVE-2020-15367.8Critical CVE-2020-15777.8Critical CVE-2020-15528.0Critical CVE-2020-15357.8Critical CVE-2020-14737.0High CVE-2020-15517.8Critical CVE-2020-15307.8Critical CVE-2020-14747.8Critical CVE-2020-15187.8Critical CVE-2020-15197.8Critical CVE-2020-15167.8Critical CVE-2020-14787.8Critical CVE-2020-15587.8Critical CVE-2020-15157.8Critical CVE-2020-15387.8Critical CVE-2020-15397.8Critical CVE-2020-15577.3High CVE-2020-15547.8Critical CVE-2020-14725.5High CVE-2020-15177.8Critical CVE-2020-14847.8Critical CVE-2020-14855.5High CVE-2020-14867.8Critical CVE-2020-15447.8Critical CVE-2020-15297.8Critical CVE-2020-15847.8Critical CVE-2020-15877.8Critical CVE-2020-13777.8Critical CVE-2020-14777.0High CVE-2020-13397.8Critical CVE-2020-15674.2Warning CVE-2020-13377.8Critical CVE-2020-13787.5Critical CVE-2020-15647.8Critical CVE-2020-15627.8Critical CVE-2020-15137.8Critical CVE-2020-15417.8Critical CVE-2020-15407.8Critical CVE-2020-15437.8Critical CVE-2020-15427.8Critical CVE-2020-15347.8Critical CVE-2020-14647.8Critical CVE-2020-15467.8Critical CVE-2020-15477.8Critical CVE-2020-15207.8Critical CVE-2020-14897.8Critical CVE-2020-14927.8Critical CVE-2020-14877.8Critical CVE-2020-15657.5Critical CVE-2020-15097.8Critical CVE-2020-14667.8Critical |
KB list
|
4571729 |