Описание
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges, spoof user interface, cause denial of service, bypass security restrictions.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Microsoft Graphics Components can be exploited remotely via specially crafted file to execute arbitrary code.
- An information disclosure vulnerability in Windows KernelStream can be exploited remotely via specially crafted application to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Network Connections Service can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Storage VSP Driver can be exploited remotely via specially crafted application to gain privileges.
- A remote code execution vulnerability in Windows TCP/IP can be exploited remotely via specially crafted to execute arbitrary code.
- A remote code execution vulnerability in Windows Camera Codec Pack can be exploited remotely via specially crafted file to execute arbitrary code.
- An elevation of privilege vulnerability in Group Policy can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Windows iSCSI Target Service can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Windows Backup Service can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Windows Application Compatibility Client Library can be exploited remotely via specially crafted application to gain privileges.
- An information disclosure vulnerability in Windows Enterprise App Management Service can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows — User Profile Service can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Windows Setup can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Error Reporting can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.
- A spoofing vulnerability in Windows can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in Jet Database Engine can be exploited remotely via specially crafted file to execute arbitrary code.
- A denial of service vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to cause denial of service.
- An elevation of privilege vulnerability in Windows Event System can be exploited remotely via specially crafted application to gain privileges.
- A denial of service vulnerability in Windows Remote Desktop Protocol (RDP) can be exploited remotely via specially crafted requests to cause denial of service.
- An elevation of privilege vulnerability in Windows Storage Services can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely via specially crafted application to gain privileges.
- A remote code execution vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Image can be exploited remotely via specially crafted application to gain privileges.
- A remote code execution vulnerability in Windows NAT can be exploited remotely via specially crafted application to execute arbitrary code.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
- An information disclosure vulnerability in Windows Remote Desktop Protocol (RDP) can be exploited remotely via specially crafted requests to obtain sensitive information.
- An information disclosure vulnerability in NetBT can be exploited remotely via specially crafted application to obtain sensitive information.
- A denial of service vulnerability in Windows TCP/IP can be exploited remotely via specially crafted to cause denial of service.
- An elevation of privilege vulnerability in Windows Hyper-V can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows COM Server can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Windows can be exploited remotely via specially crafted application to gain privileges.
- An information disclosure vulnerability in Windows GDI+ can be exploited remotely via specially crafted application to obtain sensitive information.
- A remote code execution vulnerability in GDI+ can be exploited remotely via specially crafted website to execute arbitrary code.
- A security feature bypass vulnerability in Windows can be exploited remotely via specially crafted application to bypass security restrictions.
- A memory corruption vulnerability in Media Foundation can be exploited remotely via specially crafted document to execute arbitrary code.
- An information disclosure vulnerability in Windows Text Services Framework can be exploited remotely via specially crafted file to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Error Reporting Manager can be exploited remotely via specially crafted application to gain privileges.
Первичный источник обнаружения
- CVE-2020-16923
CVE-2020-16889
CVE-2020-16887
CVE-2020-16902
CVE-2020-16885
CVE-2020-16898
CVE-2020-16968
CVE-2020-16939
CVE-2020-16980
CVE-2020-16972
CVE-2020-16967
CVE-2020-16876
CVE-2020-16919
CVE-2020-16940
CVE-2020-16908
CVE-2020-16909
CVE-2020-16920
CVE-2020-16907
CVE-2020-16922
CVE-2020-16905
CVE-2020-16924
CVE-2020-1243
CVE-2020-16900
CVE-2020-16927
CVE-2020-0764
CVE-2020-16890
CVE-2020-16891
CVE-2020-16892
CVE-2020-16894
CVE-2020-16901
CVE-2020-16896
CVE-2020-16897
CVE-2020-16973
CVE-2020-16899
CVE-2020-1047
CVE-2020-16976
CVE-2020-16975
CVE-2020-16974
CVE-2020-16936
CVE-2020-16935
CVE-2020-1167
CVE-2020-16877
CVE-2020-16912
CVE-2020-1080
CVE-2020-16914
CVE-2020-16916
CVE-2020-16911
CVE-2020-16910
CVE-2020-16913
CVE-2020-16938
CVE-2020-16915
CVE-2020-16921
CVE-2020-16895
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-8
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
- Windows-RT
- Microsoft-Windows-10
Список CVE
- CVE-2020-16923 critical
- CVE-2020-16889 high
- CVE-2020-16887 critical
- CVE-2020-16902 critical
- CVE-2020-16885 critical
- CVE-2020-16898 critical
- CVE-2020-16968 critical
- CVE-2020-16939 critical
- CVE-2020-16980 critical
- CVE-2020-16972 critical
- CVE-2020-16967 critical
- CVE-2020-16876 high
- CVE-2020-16919 high
- CVE-2020-16940 critical
- CVE-2020-16908 critical
- CVE-2020-16909 critical
- CVE-2020-16920 critical
- CVE-2020-16907 critical
- CVE-2020-16922 high
- CVE-2020-16905 high
- CVE-2020-16924 critical
- CVE-2020-1243 critical
- CVE-2020-16900 high
- CVE-2020-16927 critical
- CVE-2020-0764 critical
- CVE-2020-16890 critical
- CVE-2020-16891 critical
- CVE-2020-16892 critical
- CVE-2020-16894 critical
- CVE-2020-16901 warning
- CVE-2020-16896 critical
- CVE-2020-16897 high
- CVE-2020-16973 critical
- CVE-2020-16899 critical
- CVE-2020-1047 critical
- CVE-2020-16976 critical
- CVE-2020-16975 critical
- CVE-2020-16974 critical
- CVE-2020-16936 critical
- CVE-2020-16935 critical
- CVE-2020-1167 critical
- CVE-2020-16877 high
- CVE-2020-16912 critical
- CVE-2020-1080 critical
- CVE-2020-16914 high
- CVE-2020-16916 critical
- CVE-2020-16911 critical
- CVE-2020-16910 high
- CVE-2020-16913 critical
- CVE-2020-16938 high
- CVE-2020-16915 critical
- CVE-2020-16921 high
- CVE-2020-16895 critical
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!