{"id":2333,"date":"2020-09-09T15:54:55","date_gmt":"2020-09-09T20:54:55","guid":{"rendered":"https:\/\/cert.pa\/?p=2333"},"modified":"2020-09-09T15:54:55","modified_gmt":"2020-09-09T20:54:55","slug":"csirt-panama-aviso-2020-09-09-microsoft-parches-de-seguridad-septiembre","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=2333","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2020-09-09 Microsoft: Parches de seguridad Septiembre"},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2020-09-09 Microsoft: Parches de seguridad Septiembre<br>\nGravedad: Alta<br>\nFecha de publicaci\u00f3n: Septiembre 9, 2020<br>\n\u00daltima revisi\u00f3n: Septiembre 8, 2020<br>\nhttps:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/releasenotedetail\/2020-Sep<\/p>\n\n\n\n<p>Sistemas Afectados:<br>\nMicrosoft Windows<br>\nMicrosoft Edge (EdgeHTML-based)<br>\nMicrosoft Edge (Chromium-based)<br>\nMicrosoft ChakraCore<br>\nInternet Explorer<br>\nSQL Server<br>\nMicrosoft JET Database Engine<br>\nMicrosoft Office and Microsoft Office Services and Web Apps<br>\nMicrosoft Dynamics<br>\nVisual Studio<br>\nMicrosoft Exchange Server<br>\nSQL Server<br>\nASP.NET<br>\nMicrosoft OneDrive<br>\nAzure DevOps<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>\nMicrosoft ha publicado un aviso de seguridad para abordar 129 vulnerabilidades. Estas estan divididas en 20 cr\u00edticas, 109 importantes.<\/p>\n\n\n\n<p>II. Detalle<\/p>\n\n\n\n<table class=\"wp-block-table\"><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>Active Directory<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0761\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0761<\/a><\/td><td>Active Directory Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Active Directory<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0856\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0856<\/a><\/td><td>Active Directory Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Active Directory<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0718\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0718<\/a><\/td><td>Active Directory Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Active Directory<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0664\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0664<\/a><\/td><td>Active Directory Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Active Directory Federation Services<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0837\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0837<\/a><\/td><td>ADFS Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>ASP.NET<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1045\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1045<\/a><\/td><td>Microsoft ASP.NET Core Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Common Log File System Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1115\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1115<\/a><\/td><td>Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Internet Explorer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1012\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1012<\/a><\/td><td>WinINet API Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Internet Explorer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16884\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16884<\/a><\/td><td>Internet Explorer Browser Helper Object (BHO) Memory Corruption Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Internet Explorer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1506\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1506<\/a><\/td><td>Windows Start-Up Application Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Browsers<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0878\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0878<\/a><\/td><td>Microsoft Browser Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16857\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16857<\/a><\/td><td>Microsoft Dynamics 365 for Finance and Operations (on-premises) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16858\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16858<\/a><\/td><td>Microsoft Dynamics 365 (On-Premise) Cross Site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16860\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16860<\/a><\/td><td>Microsoft Dynamics 365 (on-premises) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16859\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16859<\/a><\/td><td>Microsoft Dynamics 365 (On-Premise) Cross Site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16861\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16861<\/a><\/td><td>Microsoft Dynamics 365 (On-Premise) Cross Site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16872\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16872<\/a><\/td><td>Microsoft Dynamics 365 (On-Premise) Cross Site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16864\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16864<\/a><\/td><td>Microsoft Dynamics 365 (On-Premise) Cross Site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16878\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16878<\/a><\/td><td>Microsoft Dynamics 365 (On-Premise) Cross Site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16862\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16862<\/a><\/td><td>Microsoft Dynamics 365 (on-premises) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16871\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16871<\/a><\/td><td>Microsoft Dynamics 365 (On-Premise) Cross Site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16875\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16875<\/a><\/td><td>Microsoft Exchange Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0921\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0921<\/a><\/td><td>Microsoft Graphics Component Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0998\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0998<\/a><\/td><td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1091\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1091<\/a><\/td><td>Windows Graphics Component Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1152\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1152<\/a><\/td><td>Windows Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1097\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1097<\/a><\/td><td>Windows Graphics Component Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1083\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1083<\/a><\/td><td>Microsoft Graphics Component Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1053\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1053<\/a><\/td><td>DirectX Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1308\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1308<\/a><\/td><td>DirectX Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1245\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1245<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1285\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1285<\/a><\/td><td>GDI+ Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1256\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1256<\/a><\/td><td>Windows GDI Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1250\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1250<\/a><\/td><td>Win32k Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1039\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1039<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1074\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1074<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft NTFS<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0838\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0838<\/a><\/td><td>NTFS Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1594\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1594<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1335\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1335<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16855\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16855<\/a><\/td><td>Microsoft Office Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1338\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1338<\/a><\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1332\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1332<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1224\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1224<\/a><\/td><td>Microsoft Excel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1218\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1218<\/a><\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1193\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1193<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1345\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1345<\/a><\/td><td>Microsoft Office SharePoint XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1205\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1205<\/a><\/td><td>Microsoft SharePoint Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1210\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1210<\/a><\/td><td>Microsoft SharePoint Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1514\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1514<\/a><\/td><td>Microsoft Office SharePoint XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1595\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1595<\/a><\/td><td>Microsoft SharePoint Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1523\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1523<\/a><\/td><td>Microsoft SharePoint Server Tampering Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1440\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1440<\/a><\/td><td>Microsoft SharePoint Server Tampering Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1200\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1200<\/a><\/td><td>Microsoft SharePoint Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1482\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1482<\/a><\/td><td>Microsoft Office SharePoint XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1198\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1198<\/a><\/td><td>Microsoft Office SharePoint XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1227\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1227<\/a><\/td><td>Microsoft Office SharePoint XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1576\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1576<\/a><\/td><td>Microsoft SharePoint Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1452\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1452<\/a><\/td><td>Microsoft SharePoint Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1575\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1575<\/a><\/td><td>Microsoft Office SharePoint XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1453\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1453<\/a><\/td><td>Microsoft SharePoint Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1460\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1460<\/a><\/td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft OneDrive<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16853\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16853<\/a><\/td><td>OneDrive for Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft OneDrive<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16851\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16851<\/a><\/td><td>OneDrive for Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft OneDrive<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16852\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16852<\/a><\/td><td>OneDrive for Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1057\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1057<\/a><\/td><td>Scripting Engine Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1180\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1180<\/a><\/td><td>Scripting Engine Memory Corruption Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1172\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1172<\/a><\/td><td>Scripting Engine Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1596\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1596<\/a><\/td><td>TLS Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1169\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1169<\/a><\/td><td>Windows Runtime Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1593\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1593<\/a><\/td><td>Windows Media Audio Decoder Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1159\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1159<\/a><\/td><td>Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1598\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1598<\/a><\/td><td>Windows UPnP Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0790\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0790<\/a><\/td><td>Microsoft splwow64 Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0922\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0922<\/a><\/td><td>Microsoft COM for Windows Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0782\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0782<\/a><\/td><td>Windows Cryptographic Catalog Services Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0648\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0648<\/a><\/td><td>Windows RSoP Service Application Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0766\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0766<\/a><\/td><td>Microsoft Store Runtime Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1590\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1590<\/a><\/td><td>Connected User Experiences and Telemetry Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1376\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1376<\/a><\/td><td>Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1471\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1471<\/a><\/td><td>Windows CloudExperienceHost Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16879\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16879<\/a><\/td><td>Projected Filesystem Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1013\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1013<\/a><\/td><td>Group Policy Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1532\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1532<\/a><\/td><td>Windows InstallService Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1491\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1491<\/a><\/td><td>Windows Function Discovery Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1303\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1303<\/a><\/td><td>Windows Runtime Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1252\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1252<\/a><\/td><td>Windows Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1559\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1559<\/a><\/td><td>Windows Storage Services Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1507\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1507<\/a><\/td><td>Microsoft COM for Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1508\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1508<\/a><\/td><td>Windows Media Audio Decoder Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0914\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0914<\/a><\/td><td>Windows State Repository Service Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0886\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0886<\/a><\/td><td>Windows Storage Services Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0989\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0989<\/a><\/td><td>Windows Mobile Device Management Diagnostics Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0875\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0875<\/a><\/td><td>Microsoft splwow64 Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0912\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0912<\/a><\/td><td>Windows Function Discovery SSDP Provider Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1038\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1038<\/a><\/td><td>Windows Routing Utilities Denial of Service<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0908\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0908<\/a><\/td><td>Windows Text Service Module Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1052\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1052<\/a><\/td><td>Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0911\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0911<\/a><\/td><td>Windows Modules Installer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0805\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0805<\/a><\/td><td>Projected Filesystem Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1119\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1119<\/a><\/td><td>Windows Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1146\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1146<\/a><\/td><td>Microsoft Store Runtime Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0951\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0951<\/a><\/td><td>Windows Defender Application Control Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1122\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1122<\/a><\/td><td>Windows Language Pack Installer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1098\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1098<\/a><\/td><td>Windows Shell Infrastructure Component Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1319\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1319<\/a><\/td><td>Microsoft Windows Codecs Library Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0997\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0997<\/a><\/td><td>Windows Camera Codec Pack Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1129\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1129<\/a><\/td><td>Microsoft Windows Codecs Library Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows DNS<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0839\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0839<\/a><\/td><td>Windows dnsrslvr.dll Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows DNS<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1228\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1228<\/a><\/td><td>Windows DNS Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows DNS<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0836\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0836<\/a><\/td><td>Windows DNS Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Open Source Software<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16873\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16873<\/a><\/td><td>Xamarin.Forms Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1044\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1044<\/a><\/td><td>SQL Server Reporting Services Security Feature Bypass Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16874\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16874<\/a><\/td><td>Visual Studio Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16856\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16856<\/a><\/td><td>Visual Studio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16881\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16881<\/a><\/td><td>Visual Studio JSON Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DHCP Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1031\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1031<\/a><\/td><td>Windows DHCP Server Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Diagnostic Hub<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1130\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1130<\/a><\/td><td>Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Diagnostic Hub<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1133\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1133<\/a><\/td><td>Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0904\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0904<\/a><\/td><td>Windows Hyper-V Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0890\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0890<\/a><\/td><td>Windows Hyper-V Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0941\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0941<\/a><\/td><td>Win32k Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0928\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0928<\/a><\/td><td>Windows Kernel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16854\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-16854<\/a><\/td><td>Windows Kernel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1034\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1034<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1033\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1033<\/a><\/td><td>Windows Kernel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1589\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1589<\/a><\/td><td>Windows Kernel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1592\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1592<\/a><\/td><td>Windows Kernel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Print Spooler Components<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1030\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1030<\/a><\/td><td>Windows Print Spooler Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Shell<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0870\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0870<\/a><\/td><td>Shell infrastructure component Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>\nSe recomienda actualizar en lo posible utilizando Windows Update o herramientas de gestion de actualizaciones.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>\nCSIRT PANAMA<br>\nComputer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>\nE-Mail: info@cert.pa<br>\nPhone: +507 520-CERT (2378)<br>\nWeb: https:\/\/cert.pa<br>\nTwitter: @CSIRTPanama<br>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2020-09-09 Microsoft: Parches de seguridad Septiembre Gravedad: Alta Fecha de publicaci\u00f3n: Septiembre 9, 2020 \u00daltima revisi\u00f3n: Septiembre 8, 2020 https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/releasenotedetail\/2020-Sep Sistemas Afectados: Microsoft Windows Microsoft Edge (EdgeHTML-based) Microsoft Edge (Chromium-based) Microsoft ChakraCore&#8230;<\/p>\n","protected":false},"author":4,"featured_media":1843,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[74,9,73,98,45,94],"class_list":["post-2333","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-boletines","tag-microsoft","tag-parches","tag-patch-tuesday","tag-windows","tag-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2333","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2333"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2333\/revisions"}],"predecessor-version":[{"id":2334,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2333\/revisions\/2334"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1843"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2333"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2333"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}