Multiple vulnerabilities were found in Microsoft products (Extended Support Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges, cause denial of service.
Below is a complete list of vulnerabilities:
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2020-0968 critical
CVE-2020-0987 warning
CVE-2020-0982 warning
CVE-2020-0889 critical
CVE-2020-0960 critical
CVE-2020-0962 warning
CVE-2020-1007 warning
CVE-2020-0964 critical
CVE-2020-0965 warning
CVE-2020-0988 critical
CVE-2020-0967 critical
CVE-2020-0959 critical
CVE-2020-1015 high
CVE-2020-1014 high
CVE-2020-0946 warning
CVE-2020-1011 high
CVE-2020-1009 high
CVE-2020-0907 critical
CVE-2020-0895 critical
CVE-2020-1094 high
CVE-2020-0687 critical
CVE-2020-0995 critical
CVE-2020-0994 critical
CVE-2020-0993 high
CVE-2020-0992 critical
CVE-2020-0821 warning
CVE-2020-0999 critical
CVE-2020-1000 high
CVE-2020-0953 critical
CVE-2020-0952 warning
CVE-2020-1004 high
CVE-2020-1005 warning
CVE-2020-0957 high
CVE-2020-0956 high
CVE-2020-1008 critical
CVE-2020-0958 high
CVE-2020-1020 high
CVE-2020-1027 high
CVE-2020-0938 high
CVE-2020-0966 critical
CVE-2020-0955 warning
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/4550905
support.microsoft.com/kb/4550951
support.microsoft.com/kb/4550957
support.microsoft.com/kb/4550964
support.microsoft.com/kb/4550965
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0687
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0821
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0889
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0895
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0907
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0938
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0946
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0952
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0953
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0955
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0956
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0957
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0958
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0959
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0960
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0962
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0964
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0965
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0966
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0967
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0968
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0982
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0987
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0988
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0992
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0993
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0994
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0995
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0999
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1000
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1004
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1005
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1007
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1008
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1009
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1011
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1014
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1015
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1020
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1027
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1094
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/