{"id":2254,"date":"2020-07-15T15:47:38","date_gmt":"2020-07-15T20:47:38","guid":{"rendered":"https:\/\/cert.pa\/?p=2254"},"modified":"2020-07-15T15:47:38","modified_gmt":"2020-07-15T20:47:38","slug":"csirt-panama-aviso-2020-07-15-actualizaciones-de-microsoft-que-corrigen-123-vulnerabilidades","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=2254","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2020-07-15 Actualizaciones de Microsoft que corrigen 123 vulnerabilidades"},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2020-07-15 Actualizaciones de Microsoft que corrigen 123 vulnerabilidades<br>\nGravedad: Alta<br>\nFecha de publicaci\u00f3n: Julio 15, 2020<br>\n\u00daltima revisi\u00f3n: Julio 14, 2020<br>\nhttps:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/releasenotedetail\/2020-Jul<\/p>\n\n\n\n<p>Sistemas Afectados:<br>\nMicrosoft Windows<br>\nMicrosoft Edge (EdgeHTML-based)<br>\nMicrosoft Edge (Chromium-based) in IE Mode<br>\nMicrosoft ChakraCore<br>\nInternet Explorer<br>\nMicrosoft Office and Microsoft Office Services and Web Apps<br>\nWindows Defender<br>\nSkype for Business<br>\nVisual Studio<br>\nMicrosoft OneDrive<br>\nOpen Source Software<br>\n.NET Framework<br>\nAzure DevOps<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>\nCon el lanzamiento de las actualizaciones de seguridad de abril de 2020, Microsoft lanz\u00f3 correcciones para 123 vulnerabilidades en los productos de Microsoft. <br>\nDe estas vulnerabilidades, 18 se clasifican como cr\u00edticas, 105 como importantes.<\/p>\n\n\n\n<p>II. Problemas Conocidos<\/p>\n\n\n\n<table class=\"wp-block-table\"><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>.NET Framework<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1147\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1147<\/a><\/td><td>.NET Framework, SharePoint Server, and Visual Studio Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Azure DevOps<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1326\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1326<\/a><\/td><td>Azure DevOps Server Cross-site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Internet Explorer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1432\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1432<\/a><\/td><td>Skype for Business via Internet Explorer Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1433\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1433<\/a><\/td><td>Microsoft Edge PDF Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1462\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1462<\/a><\/td><td>Skype for Business via Microsoft Edge (EdgeHTML-based) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1355\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1355<\/a><\/td><td>Windows Font Driver Host Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1468\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1468<\/a><\/td><td>Windows GDI Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1351\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1351<\/a><\/td><td>Microsoft Graphics Component Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1436\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1436<\/a><\/td><td>Windows Font Library Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1435\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1435<\/a><\/td><td>GDI+ Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1412\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1412<\/a><\/td><td>Microsoft Graphics Components Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1409\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1409<\/a><\/td><td>DirectWrite Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1408\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1408<\/a><\/td><td>Microsoft Graphics Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1397\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1397<\/a><\/td><td>Windows Imaging Component Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1381\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1381<\/a><\/td><td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1382\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1382<\/a><\/td><td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1407\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1407<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1400\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1400<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1401\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1401<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Malware Protection Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1461\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1461<\/a><\/td><td>Microsoft Defender Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1445\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1445<\/a><\/td><td>Microsoft Office Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1446\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1446<\/a><\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1349\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1349<\/a><\/td><td>Microsoft Outlook Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1439\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1439<\/a><\/td><td>PerformancePoint Services Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1240\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1240<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1458\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1458<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1442\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1442<\/a><\/td><td>Office Web Apps XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1449\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1449<\/a><\/td><td>Microsoft Project Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1447\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1447<\/a><\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1448\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1448<\/a><\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1456\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1456<\/a><\/td><td>Microsoft Office SharePoint XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1454\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1454<\/a><\/td><td>Microsoft SharePoint Reflective XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1342\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1342<\/a><\/td><td>Microsoft Office Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1443\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1443<\/a><\/td><td>Microsoft SharePoint Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1450\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1450<\/a><\/td><td>Microsoft Office SharePoint XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1444\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1444<\/a><\/td><td>Microsoft SharePoint Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1451\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1451<\/a><\/td><td>Microsoft Office SharePoint XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft OneDrive<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1465\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1465<\/a><\/td><td>Microsoft OneDrive Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1403\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1403<\/a><\/td><td>VBScript Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1406\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1406<\/a><\/td><td>Windows Network List Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1410\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1410<\/a><\/td><td>Windows Address Book Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1085\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1085<\/a><\/td><td>Windows Function Discovery Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1402\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1402<\/a><\/td><td>Windows ActiveX Installer Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1330\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1330<\/a><\/td><td>Windows Mobile Device Management Diagnostics Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1431\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1431<\/a><\/td><td>Windows AppX Deployment Extensions Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1405\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1405<\/a><\/td><td>Windows Mobile Device Management Diagnostics Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1404\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1404<\/a><\/td><td>Windows Runtime Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1438\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1438<\/a><\/td><td>Windows Network Connections Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1430\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1430<\/a><\/td><td>Windows UPnP Device Host Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1429\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1429<\/a><\/td><td>Windows Error Reporting Manager Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1463\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1463<\/a><\/td><td>Windows SharedStream Library Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1437\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1437<\/a><\/td><td>Windows Network Location Awareness Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1434\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1434<\/a><\/td><td>Windows Sync Host Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1427\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1427<\/a><\/td><td>Windows Network Connections Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1413\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1413<\/a><\/td><td>Windows Runtime Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1333\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1333<\/a><\/td><td>Group Policy Services Policy Processing Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1428\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1428<\/a><\/td><td>Windows Network Connections Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1249\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1249<\/a><\/td><td>Windows Runtime Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1267\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1267<\/a><\/td><td>Local Security Authority Subsystem Service Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1399\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1399<\/a><\/td><td>Windows Runtime Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1365\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1365<\/a><\/td><td>Windows Event Logging Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1366\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1366<\/a><\/td><td>Windows Print Workflow Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1359\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1359<\/a><\/td><td>Windows CNG Key Isolation Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1363\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1363<\/a><\/td><td>Windows Picker Platform Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1370\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1370<\/a><\/td><td>Windows Runtime Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1373\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1373<\/a><\/td><td>Windows Network Connections Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1374\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1374<\/a><\/td><td>Remote Desktop Client Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1371\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1371<\/a><\/td><td>Windows Event Logging Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1372\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1372<\/a><\/td><td>Windows Mobile Device Management Diagnostics Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1356\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1356<\/a><\/td><td>Windows iSCSI Target Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1420\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1420<\/a><\/td><td>Windows Error Reporting Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1421\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1421<\/a><\/td><td>LNK Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1350\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1350<\/a><\/td><td>Windows DNS Server Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1418\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1418<\/a><\/td><td>Windows Diagnostics Hub Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1422\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1422<\/a><\/td><td>Windows Runtime Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1353\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1353<\/a><\/td><td>Windows Runtime Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1354\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1354<\/a><\/td><td>Windows UPnP Device Host Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1347\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1347<\/a><\/td><td>Windows Storage Services Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1352\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1352<\/a><\/td><td>Windows USO Core Worker Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1375\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1375<\/a><\/td><td>Windows COM Server Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1390\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1390<\/a><\/td><td>Windows Network Connections Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1391\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1391<\/a><\/td><td>Windows Agent Activation Runtime Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1386\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1386<\/a><\/td><td>Connected User Experiences and Telemetry Service Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1387\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1387<\/a><\/td><td>Windows Push Notification Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1395\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1395<\/a><\/td><td>Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1398\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1398<\/a><\/td><td>Windows Lockscreen Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1393\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1393<\/a><\/td><td>Windows Diagnostics Hub Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1394\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1394<\/a><\/td><td>Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1385\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1385<\/a><\/td><td>Windows Credential Picker Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1384\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1384<\/a><\/td><td>Windows CNG Key Isolation Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Open Source Software<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1469\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1469<\/a><\/td><td>Bond Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Skype for Business<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1025\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1025<\/a><\/td><td>Microsoft Office Elevation of Privilege Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1416\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1416<\/a><\/td><td>Visual Studio and Visual Studio Code Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1481\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1481<\/a><\/td><td>Visual Studio Code ESLint Extention Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1041\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1041<\/a><\/td><td>Hyper-V RemoteFX vGPU Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1040\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1040<\/a><\/td><td>Hyper-V RemoteFX vGPU Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1032\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1032<\/a><\/td><td>Hyper-V RemoteFX vGPU Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1036\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1036<\/a><\/td><td>Hyper-V RemoteFX vGPU Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1042\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1042<\/a><\/td><td>Hyper-V RemoteFX vGPU Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1043\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1043<\/a><\/td><td>Hyper-V RemoteFX vGPU Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows IIS<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV200008\" rel=\"noreferrer noopener\" target=\"_blank\">ADV200008<\/a><\/td><td>Microsoft Guidance for Enabling Request Smuggling Filter on IIS Servers<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1367\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1367<\/a><\/td><td>Windows Kernel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1396\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1396<\/a><\/td><td>Windows ALPC Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1336\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1336<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1419\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1419<\/a><\/td><td>Windows Kernel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1426\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1426<\/a><\/td><td>Windows Kernel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1358\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1358<\/a><\/td><td>Windows Resource Policy Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1388\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1388<\/a><\/td><td>Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1389\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1389<\/a><\/td><td>Windows Kernel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1357\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1357<\/a><\/td><td>Windows System Events Broker Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1411\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1411<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Shell<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1415\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1415<\/a><\/td><td>Windows Runtime Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Shell<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1360\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1360<\/a><\/td><td>Windows Profile Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Shell<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1414\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1414<\/a><\/td><td>Windows Runtime Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Shell<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1368\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1368<\/a><\/td><td>Windows Credential Enrollment Manager Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Subsystem for Linux<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1423\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1423<\/a><\/td><td>Windows Subsystem for Linux Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Update Stack<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1392\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1392<\/a><\/td><td>Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Update Stack<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1346\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1346<\/a><\/td><td>Windows Modules Installer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Update Stack<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1424\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1424<\/a><\/td><td>Windows Update Stack Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows WalletService<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1344\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1344<\/a><\/td><td>Windows WalletService Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows WalletService<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1364\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1364<\/a><\/td><td>Windows WalletService Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows WalletService<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1369\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1369<\/a><\/td><td>Windows WalletService Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows WalletService<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1361\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1361<\/a><\/td><td>Windows WalletService Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows WalletService<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1362\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1362<\/a><\/td><td>Windows WalletService Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>\nActualizar utilizando Microsoft Windows Update o herramientas de administracion de actualizaciones centralizadas.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>\nCSIRT PANAMA<br>\nComputer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>\nE-Mail: info@cert.pa<br>\nPhone: +507 520-CERT (2378)<br>\nWeb: https:\/\/cert.pa<br>\nTwitter: @CSIRTPanama<br>\nFacebook: http:\/\/www.facebook.com\/CSIRTPanama<br>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2020-07-15 Actualizaciones de Microsoft que corrigen 123 vulnerabilidades Gravedad: Alta Fecha de publicaci\u00f3n: Julio 15, 2020 \u00daltima revisi\u00f3n: Julio 14, 2020 https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/releasenotedetail\/2020-Jul Sistemas Afectados: Microsoft Windows Microsoft Edge (EdgeHTML-based) Microsoft Edge (Chromium-based)&#8230;<\/p>\n","protected":false},"author":4,"featured_media":1843,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,72,9,98,68],"class_list":["post-2254","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-avisos-de-seguridad","tag-microsoft","tag-patch-tuesday","tag-vulnerabilidades"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2254","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2254"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2254\/revisions"}],"predecessor-version":[{"id":2255,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2254\/revisions\/2255"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1843"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2254"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2254"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2254"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}