Дата обнаружения
|
11/05/2021 |
Уровень угрозы
|
Critical |
Описание
|
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information, spoof user interface. Below is a complete list of vulnerabilities:
|
Эксплуатация
|
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details. |
Пораженные продукты
|
Windows Server, version 1909 (Server Core installation) |
Решение
|
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel) |
Первичный источник обнаружения
|
CVE-2021-28476 CVE-2021-31188 CVE-2021-31186 CVE-2020-24588 CVE-2021-31184 CVE-2021-31182 CVE-2020-26144 CVE-2021-31193 CVE-2021-28455 CVE-2021-31194 CVE-2020-24587 CVE-2021-26419 |
Оказываемое влияние
?
|
ACE
[?]
OSI
[?]
PE
[?]
SUI
[?]
|
Связанные продукты
|
Microsoft Internet Explorer Microsoft Office Microsoft Windows Microsoft Windows Server Microsoft Windows Server 2012 Microsoft Windows 8 Microsoft Windows 7 Microsoft Windows Server 2008 Windows RT Microsoft Windows 10 |
CVE-IDS
|
CVE-2021-284765.0Critical
CVE-2021-311885.0Critical CVE-2021-311865.0Critical CVE-2020-245882.9Warning CVE-2021-311845.0Critical CVE-2021-311825.0Critical CVE-2020-261445.0Critical CVE-2021-311935.0Critical CVE-2021-284555.0Critical CVE-2021-311945.0Critical CVE-2020-245871.8Warning CVE-2021-264195.0Critical |