{"id":2138,"date":"2020-06-12T10:49:29","date_gmt":"2020-06-12T15:49:29","guid":{"rendered":"https:\/\/cert.pa\/?p=2138"},"modified":"2020-06-12T10:49:29","modified_gmt":"2020-06-12T15:49:29","slug":"csirt-panama-aviso-2020-06-12-actualizaciones-de-microsoft-corrigen-129-vulnerabilidades","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=2138","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2020-06-12 Actualizaciones de Microsoft corrigen 129 Vulnerabilidades"},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2020-06-12 Actualizaciones de Microsoft corrigen 129 Vulnerabilidades<br> Gravedad: Alta<br> Fecha de publicaci\u00f3n: Junio 12, 2020<br> \u00daltima revisi\u00f3n: Junio 11, 2020<br> https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/releasenotedetail\/2020-Jun<\/p>\n\n\n\n<p>Sistemas Afectados:<br>\nMicrosoft Windows<br>\nMicrosoft Edge (EdgeHTML-based)<br>\nMicrosoft Edge (Chromium-based) in IE Mode<br>\nMicrosoft ChakraCore<br>\nInternet Explorer<br>\nMicrosoft Office and Microsoft Office Services and Web Apps<br>\nWindows Defender<br>\nMicrosoft Dynamics<br>\nVisual Studio<br>\nAzure DevOps<br>\nHoloLens<br>\nAdobe Flash Player<br>\nMicrosoft Apps for Android<br>\nWindows App Store<br>\nSystem Center<br>\nAndroid App<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>\nMicrosoft ha publicado un aviso de seguridad para abordar 129 vulnerabilidades. Estas estan divididas en 11 criticas, 109 importantes, 7 moderadas y 2 como bajas.<\/p>\n\n\n\n<p>II. Detalle<\/p>\n\n\n\n<table class=\"wp-block-table\"><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>Adobe Flash Player<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV200010\" rel=\"noreferrer noopener\" target=\"_blank\">ADV200010<\/a><\/td><td>June 2020 Adobe Flash Security Update<\/td><td>Critical<\/td><\/tr><tr><td>Android App<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1223\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1223<\/a><\/td><td>Word for Android Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Apps<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1329\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1329<\/a><\/td><td>Microsoft Bing Search Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure DevOps<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1327\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1327<\/a><\/td><td>Azure DevOps Server HTML Injection Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Diagnostics Hub<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1278\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1278<\/a><\/td><td>Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Diagnostics Hub<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1203\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1203<\/a><\/td><td>Diagnostic Hub Standard Collector Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Diagnostics Hub<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1202\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1202<\/a><\/td><td>Diagnostic Hub Standard Collector Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>HoloLens<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1199\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1199<\/a><\/td><td>Windows Feedback Hub Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Internet Explorer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1315\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1315<\/a><\/td><td>Internet Explorer Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Browsers<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1219\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1219<\/a><\/td><td>Microsoft Browser Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Edge<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1242\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1242<\/a><\/td><td>Microsoft Edge Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based) in IE Mode<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1220\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1220<\/a><\/td><td>Microsoft Edge (Chromium-based) in IE Mode Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1207\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1207<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1258\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1258<\/a><\/td><td>DirectX Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1251\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1251<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1160\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1160<\/a><\/td><td>Microsoft Graphics Component Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0915\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0915<\/a><\/td><td>Windows GDI Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1253\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1253<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1348\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1348<\/a><\/td><td>Windows GDI Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0986\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0986<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0916\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0916<\/a><\/td><td>Windows GDI Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1236\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1236<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1208\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1208<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Malware Protection Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1163\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1163<\/a><\/td><td>Microsoft Windows Defender Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Malware Protection Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1170\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1170<\/a><\/td><td>Microsoft Windows Defender Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1226\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1226<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1225\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1225<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1229\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1229<\/a><\/td><td>Microsoft Outlook Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1321\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1321<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1322\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1322<\/a><\/td><td>Microsoft Project Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1289\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1289<\/a><\/td><td>Microsoft SharePoint Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1181\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1181<\/a><\/td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1148\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1148<\/a><\/td><td>Microsoft SharePoint Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1183\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1183<\/a><\/td><td>Microsoft Office SharePoint XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1318\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1318<\/a><\/td><td>Microsoft Office SharePoint XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1295\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1295<\/a><\/td><td>Microsoft SharePoint Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1298\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1298<\/a><\/td><td>Microsoft Office SharePoint XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1323\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1323<\/a><\/td><td>SharePoint Open Redirect Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1297\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1297<\/a><\/td><td>Microsoft Office SharePoint XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1178\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1178<\/a><\/td><td>Microsoft SharePoint Server Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1177\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1177<\/a><\/td><td>Microsoft Office SharePoint XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1320\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1320<\/a><\/td><td>Microsoft Office SharePoint XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1260\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1260<\/a><\/td><td>VBScript Remote Code Execution Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1215\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1215<\/a><\/td><td>VBScript Remote Code Execution Vulnerability<\/td><td>Low<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1230\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1230<\/a><\/td><td>VBScript Remote Code Execution Vulnerability<\/td><td>Low<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1073\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1073<\/a><\/td><td>Scripting Engine Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1214\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1214<\/a><\/td><td>VBScript Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1216\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1216<\/a><\/td><td>VBScript Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1213\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1213<\/a><\/td><td>VBScript Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1324\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1324<\/a><\/td><td>Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1162\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1162<\/a><\/td><td>Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1305\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1305<\/a><\/td><td>Windows State Repository Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1313\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1313<\/a><\/td><td>Windows Update Orchestrator Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1316\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1316<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1309\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1309<\/a><\/td><td>Microsoft Store Runtime Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1312\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1312<\/a><\/td><td>Windows Installer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1306\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1306<\/a><\/td><td>Windows Runtime Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1296\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1296<\/a><\/td><td>Windows Diagnostics &amp; feedback Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1270\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1270<\/a><\/td><td>Windows WLAN Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1255\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1255<\/a><\/td><td>Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1283\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1283<\/a><\/td><td>Windows Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1263\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1263<\/a><\/td><td>Windows Error Reporting Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1259\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1259<\/a><\/td><td>Windows Host Guardian Service Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1268\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1268<\/a><\/td><td>Windows Service Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1290\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1290<\/a><\/td><td>Win32k Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1291\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1291<\/a><\/td><td>Windows Network Connections Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1292\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1292<\/a><\/td><td>OpenSSH for Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1317\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1317<\/a><\/td><td>Group Policy Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1244\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1244<\/a><\/td><td>Connected User Experiences and Telemetry Service Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1241\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1241<\/a><\/td><td>Windows Kernel Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1314\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1314<\/a><\/td><td>Windows Text Service Framework Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1271\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1271<\/a><\/td><td>Windows Backup Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1222\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1222<\/a><\/td><td>Microsoft Store Runtime Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1120\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1120<\/a><\/td><td>Connected User Experiences and Telemetry Service Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1201\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1201<\/a><\/td><td>Windows Now Playing Session Manager Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1233\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1233<\/a><\/td><td>Windows Runtime Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1246\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1246<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1235\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1235<\/a><\/td><td>Windows Runtime Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1234\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1234<\/a><\/td><td>Windows Error Reporting Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1197\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1197<\/a><\/td><td>Windows Error Reporting Manager Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1194\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1194<\/a><\/td><td>Windows Registry Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1231\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1231<\/a><\/td><td>Windows Runtime Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1209\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1209<\/a><\/td><td>Windows Network List Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1204\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1204<\/a><\/td><td>Windows Mobile Device Management Diagnostics Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1307\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1307<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1211\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1211<\/a><\/td><td>Connected Devices Platform Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1196\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1196<\/a><\/td><td>Windows Print Configuration Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1334\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1334<\/a><\/td><td>Windows Runtime Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1217\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1217<\/a><\/td><td>Windows Runtime Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows PDF<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1248\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1248<\/a><\/td><td>GDI+ Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Open Source Software<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1340\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1340<\/a><\/td><td>NuGetGallery Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>System Center<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1331\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1331<\/a><\/td><td>System Center Operations Manager Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1343\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1343<\/a><\/td><td>Visual Studio Code Live Share Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows COM<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1311\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1311<\/a><\/td><td>Component Object Model Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Diagnostic Hub<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1293\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1293<\/a><\/td><td>Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Diagnostic Hub<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1257\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1257<\/a><\/td><td>Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Error Reporting<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1261\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1261<\/a><\/td><td>Windows Error Reporting Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Installer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1272\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1272<\/a><\/td><td>Windows Installer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Installer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1302\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1302<\/a><\/td><td>Windows Installer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Installer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1277\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1277<\/a><\/td><td>Windows Installer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1276\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1276<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1310\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1310<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1273\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1273<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1280\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1280<\/a><\/td><td>Windows Bluetooth Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1275\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1275<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1247\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1247<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1274\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1274<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1262\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1262<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1237\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1237<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1266\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1266<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1269\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1269<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1282\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1282<\/a><\/td><td>Windows Runtime Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1264\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1264<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1265\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1265<\/a><\/td><td>Windows Runtime Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Lock Screen<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1279\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1279<\/a><\/td><td>Windows Lockscreen Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Media<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1238\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1238<\/a><\/td><td>Media Foundation Memory Corruption Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Media<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1304\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1304<\/a><\/td><td>Windows Runtime Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Media Player<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1239\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1239<\/a><\/td><td>Media Foundation Memory Corruption Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Media Player<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1232\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1232<\/a><\/td><td>Media Foundation Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows OLE<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1281\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1281<\/a><\/td><td>Windows OLE Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows OLE<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1212\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1212<\/a><\/td><td>OLE Automation Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Print Spooler Components<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1300\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1300<\/a><\/td><td>Windows Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Shell<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1299\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1299<\/a><\/td><td>LNK Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Shell<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1286\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1286<\/a><\/td><td>Windows Shell Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows SMB<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1206\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1206<\/a><\/td><td>Windows SMBv3 Client\/Server Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows SMB<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1284\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1284<\/a><\/td><td>Windows SMBv3 Client\/Server Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows SMB<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1301\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1301<\/a><\/td><td>Windows SMB Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Update Stack<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1254\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1254<\/a><\/td><td>Windows Modules Installer Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Wallet Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1294\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1294<\/a><\/td><td>Windows WalletService Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Wallet Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1287\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1287<\/a><\/td><td>Windows WalletService Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>\nSe recomienda actualizar en lo posible utilizando Windows Update o herramientas de gestion de actualizaciones.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>\nCSIRT PANAMA<br>\nComputer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>\nE-Mail: info@cert.pa<br>\nPhone: +507 520-CERT (2378)<br>\nWeb: https:\/\/cert.pa<br>\nTwitter: @CSIRTPanama<br>\nFacebook: http:\/\/www.facebook.com\/CSIRTPanama<br>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2020-06-12 Actualizaciones de Microsoft corrigen 129 Vulnerabilidades Gravedad: Alta Fecha de publicaci\u00f3n: Junio 12, 2020 \u00daltima revisi\u00f3n: Junio 11, 2020 https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/releasenotedetail\/2020-Jun Sistemas Afectados: Microsoft Windows Microsoft Edge (EdgeHTML-based) Microsoft Edge (Chromium-based) in&#8230;<\/p>\n","protected":false},"author":4,"featured_media":1847,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[27,72,9,45,94],"class_list":["post-2138","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-adobe-flash-player","tag-avisos-de-seguridad","tag-microsoft","tag-windows","tag-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2138","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2138"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2138\/revisions"}],"predecessor-version":[{"id":2139,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2138\/revisions\/2139"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1847"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2138"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2138"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2138"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}