Description
Microsoft PowerPoint Remote Code Execution Vulnerability
Affected Software
Related
{"id": "CVE-2020-17124", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2020-17124", "description": "Microsoft PowerPoint Remote Code Execution Vulnerability", "published": "2020-12-10T00:15:00", "modified": "2021-03-04T18:25:00", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 9.3}, "severity": "HIGH", "exploitabilityScore": 8.6, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17124", "reporter": "secure@microsoft.com", "references": ["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17124"], "cvelist": ["CVE-2020-17124"], "immutableFields": [], "lastseen": "2022-03-23T14:34:58", "viewCount": 81, "enchantments": {"dependencies": {"references": [{"type": "kaspersky", "idList": ["KLA12023"]}, {"type": "mscve", "idList": ["MS:CVE-2020-17124"]}, {"type": "mskb", "idList": ["KB4484372", "KB4484393", "KB4484468"]}, {"type": "nessus", "idList": ["SMB_NT_MS20_DEC_POWERPOINT.NASL"]}, {"type": "rapid7blog", "idList": ["RAPID7BLOG:99D9180FBF3F900ADB0CDC5EF79EC080"]}, {"type": "zdi", "idList": ["ZDI-20-1414"]}], "rev": 4}, "score": {"value": 5.5, "vector": "NONE"}, "backreferences": {"references": [{"type": "kaspersky", "idList": ["KLA12023"]}, {"type": "mscve", "idList": ["MS:CVE-2020-17124"]}, {"type": "mskb", "idList": ["KB4484393"]}, {"type": "rapid7blog", "idList": ["RAPID7BLOG:99D9180FBF3F900ADB0CDC5EF79EC080"]}, {"type": "zdi", "idList": ["ZDI-20-1414"]}]}, "exploitation": null, "vulnersScore": 5.5}, "_state": {"dependencies": 0, "score": 0}, "_internal": {}, "cna_cvss": {"cna": null, "cvss": {}}, "cpe": ["cpe:/a:microsoft:powerpoint:2013", "cpe:/a:microsoft:powerpoint:2010", "cpe:/a:microsoft:365_apps:-", "cpe:/a:microsoft:office:2019", "cpe:/a:microsoft:powerpoint:2016"], "cpe23": ["cpe:2.3:a:microsoft:powerpoint:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:powerpoint:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:macos:*:*", "cpe:2.3:a:microsoft:powerpoint:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:powerpoint:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*"], "cwe": ["NVD-CWE-noinfo"], "affectedSoftware": [{"cpeName": "microsoft:365_apps", "version": "-", "operator": "eq", "name": "microsoft 365 apps"}, {"cpeName": "microsoft:office", "version": "2019", "operator": "eq", "name": "microsoft office"}, {"cpeName": "microsoft:powerpoint", "version": "2010", "operator": "eq", "name": "microsoft powerpoint"}, {"cpeName": "microsoft:powerpoint", "version": "2013", "operator": "eq", "name": "microsoft powerpoint"}, {"cpeName": "microsoft:powerpoint", "version": "2013", "operator": "eq", "name": "microsoft powerpoint"}, {"cpeName": "microsoft:powerpoint", "version": "2016", "operator": "eq", "name": "microsoft powerpoint"}], "affectedConfiguration": [], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:macos:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:microsoft:powerpoint:2010:sp2:*:*:*:*:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:microsoft:powerpoint:2013:sp1:*:*:*:*:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:microsoft:powerpoint:2013:sp1:*:*:rt:*:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:microsoft:powerpoint:2016:*:*:*:*:*:*:*", "cpe_name": []}]}]}, "extraReferences": [{"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17124", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17124", "refsource": "MISC", "tags": ["Patch", "Vendor Advisory"]}]}
{"nessus": [{"lastseen": "2022-06-23T15:16:05", "description": "The Microsoft PowerPoint Products are missing a security update. It is, therefore, affected by the following vulnerability:\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2020-17124)", "cvss3": {"score": 7.8, "vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2020-12-08T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft PowerPoint Products (December 2020)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-17124"], "modified": "2022-06-10T00:00:00", "cpe": ["cpe:/a:microsoft:powerpoint"], "id": "SMB_NT_MS20_DEC_POWERPOINT.NASL", "href": "https://www.tenable.com/plugins/nessus/143567", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(143567);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/06/10\");\n\n script_cve_id(\"CVE-2020-17124\");\n script_xref(name:\"MSKB\", value:\"4484372\");\n script_xref(name:\"MSKB\", value:\"4484468\");\n script_xref(name:\"MSKB\", value:\"4484393\");\n script_xref(name:\"MSFT\", value:\"MS20-4484372\");\n script_xref(name:\"MSFT\", value:\"MS19-4484468\");\n script_xref(name:\"MSFT\", value:\"MS19-4484393\");\n script_xref(name:\"IAVA\", value:\"2020-A-0559-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0017-S\");\n\n script_name(english:\"Security Updates for Microsoft PowerPoint Products (December 2020)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft PowerPoint Products are missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft PowerPoint Products are missing a security\nupdate. It is, therefore, affected by the following\nvulnerability:\n\n - A remote code execution vulnerability. An attacker can\n exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2020-17124)\");\n # https://support.microsoft.com/en-us/help/4484393/security-update-for-powerpoint-2016-december-8-2020\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?e43ae504\");\n # https://support.microsoft.com/en-us/help/4484372/security-update-for-powerpoint-2010-december-8-2020\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?47144f4f\");\n # https://support.microsoft.com/en-us/help/4484468/security-update-for-powerpoint-2013-december-8-2020\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?d5f24dc9\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue: \n -KB4484393\n -KB4484372\n -KB4484468\n\nFor Office 365, Office 2016 C2R, or Office 2019, ensure automatic\nupdates are enabled or open any office app and manually perform an\nupdate.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17124\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:powerpoint\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"office_installed.nasl\", \"microsoft_office_compatibility_pack_installed.nbin\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('audit.inc');\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\ninclude('install_func.inc');\n\nglobal_var vuln;\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS20-12';\nkbs = make_list(\n '4484372', # Powerpoint 2010\n '4484468', # Powerpoint 2013\n '4484393' # Powerpoint 2016\n);\n\nif (get_kb_item('Host/patch_management_checks'))\n hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated', exit_code:1);\n\nport = kb_smb_transport();\n\nchecks = make_array(\n '14.0', make_array('sp', 2, 'version', '14.0.7263.5000', 'kb', '4484372'),\n '15.0', make_array('sp', 1, 'version', '15.0.5301.1000', 'kb', '4484468'),\n '16.0', make_nested_list(make_array('sp', 0, 'version', '16.0.5095.1000', 'channel', 'MSI', 'kb', '4486754')\n )\n);\n\nif (hotfix_check_office_product(product:'PowerPoint', checks:checks, bulletin:bulletin))\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-06-14T17:15:44", "description": "The Microsoft PowerPoint Products are missing a security update. It is, therefore, affected by the following vulnerability:\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2020-17124)", "cvss3": {"score": 7.8, "vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2022-06-10T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft PowerPoint Products C2R (December 2020)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-17124"], "modified": "2022-06-10T00:00:00", "cpe": ["cpe:2.3:a:microsoft:powerpoint:*:*:*:*:*:*:*:*"], "id": "SMB_NT_MS20_DEC_POWERPOINT_C2R.NASL", "href": "https://www.tenable.com/plugins/nessus/162104", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(162104);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/06/10\");\n\n script_cve_id(\"CVE-2020-17124\");\n script_xref(name:\"IAVA\", value:\"2020-A-0559-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0017-S\");\n\n script_name(english:\"Security Updates for Microsoft PowerPoint Products C2R (December 2020)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft PowerPoint Products are missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft PowerPoint Products are missing a security\nupdate. It is, therefore, affected by the following\nvulnerability:\n\n - A remote code execution vulnerability. An attacker can\n exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2020-17124)\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?fd4508ff\");\n script_set_attribute(attribute:\"solution\", value:\n\"For Office 365, Office 2016 C2R, or Office 2019, ensure automatic\nupdates are enabled or open any office app and manually perform an\nupdate.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17124\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/06/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:powerpoint\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_dependencies(\"office_installed.nasl\", \"microsoft_office_compatibility_pack_installed.nbin\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('vcf_extras_office.inc');\n\nvar bulletin = 'MS20-12';\n\nvar constraints = [\n {'fixed_version':'16.0.12527.21416','channel': 'Deferred','channel_version': '2002'},\n {'fixed_version':'16.0.11929.20984','channel': 'Deferred'},\n {'fixed_version':'16.0.13328.20478','channel': 'Enterprise Deferred','channel_version': '2010'},\n {'fixed_version':'16.0.13231.20620','channel': 'Enterprise Deferred'},\n {'fixed_version':'16.0.13127.20910','channel': 'First Release for Deferred'},\n {'fixed_version':'16.0.13426.20332','channel': 'Current'},\n {'fixed_version':'16.0.13426.20332','channel': '2019 Retail'},\n {'fixed_version':'16.0.10369.20032','channel': '2019 Volume'}\n];\n\nvcf::microsoft::office_product::check_version_and_report(\n constraints:constraints,\n severity:SECURITY_HOLE,\n bulletin:bulletin,\n subproduct:'PowerPoint'\n);", "cvss": {"score": 9.3, "vector": "CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-05-19T14:34:46", "description": "The Microsoft Office product installed on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities:\n\n - Microsoft Excel Remote Code Execution Vulnerability (CVE-2020-17123, CVE-2020-17128)\n\n - Microsoft Excel Information Disclosure Vulnerability (CVE-2020-17126)\n\n - Microsoft Outlook Information Disclosure Vulnerability (CVE-2020-17119)\n\n - Microsoft PowerPoint Remote Code Execution Vulnerability (CVE-2020-17124)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {"score": 7.8, "vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2021-01-25T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Office (December 2020) (macOS)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-17119", "CVE-2020-17123", "CVE-2020-17124", "CVE-2020-17126", "CVE-2020-17128"], "modified": "2022-05-18T00:00:00", "cpe": ["cpe:/a:microsoft:office", "cpe:/a:microsoft:excel", "cpe:/a:microsoft:outlook", "cpe:/a:microsoft:powerpoint"], "id": "MACOS_MS20_DEC_OFFICE.NASL", "href": "https://www.tenable.com/plugins/nessus/145269", "sourceData": "##\n# (C) Tenable Network Security, Inc.\n##\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(145269);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/18\");\n\n script_cve_id(\n \"CVE-2020-17119\",\n \"CVE-2020-17123\",\n \"CVE-2020-17124\",\n \"CVE-2020-17126\",\n \"CVE-2020-17128\"\n );\n script_xref(name:\"IAVA\", value:\"2020-A-0556-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0559-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0017-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0558-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0557-S\");\n\n script_name(english:\"Security Updates for Microsoft Office (December 2020) (macOS)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Office product installed on the remote host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Office product installed on the remote host is missing security updates. It is, therefore, affected by\nmultiple vulnerabilities:\n\n - Microsoft Excel Remote Code Execution Vulnerability (CVE-2020-17123, CVE-2020-17128)\n\n - Microsoft Excel Information Disclosure Vulnerability (CVE-2020-17126)\n\n - Microsoft Outlook Information Disclosure Vulnerability (CVE-2020-17119)\n\n - Microsoft PowerPoint Remote Code Execution Vulnerability (CVE-2020-17124)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n # https://docs.microsoft.com/en-us/officeupdates/update-history-office-for-mac\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?43ed1b90\");\n # https://docs.microsoft.com/en-us/officeupdates/release-notes-office-for-mac#december-15-2020\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?97475468\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released a set of patches for Microsoft Office for Mac.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17128\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/12/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/01/25\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:office\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:excel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:outlook\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:powerpoint\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_office_installed.nbin\");\n script_require_keys(\"Host/MacOSX/Version\");\n script_require_ports(\"installed_sw/Microsoft Excel\", \"installed_sw/Microsoft Word\", \"Microsoft PowerPoint\");\n\n exit(0);\n}\n\ninclude('vcf.inc');\n\nos = get_kb_item_or_exit('Host/MacOSX/Version');\napps = make_list(\n 'Microsoft Excel',\n 'Microsoft Outlook',\n 'Microsoft PowerPoint'\n);\nreport = '';\n\n#2019\nmin_ver_19 = '16.17.0';\nfix_ver_19 = '16.44';\nfix_disp_19 = '16.44 (20121301)';\n\nforeach app (apps)\n{\n installs = get_installs(app_name:app);\n if (isnull(installs[1]))\n continue;\n\n foreach install (installs[1])\n {\n version = install['version'];\n\n if (ver_compare(ver:version, minver:min_ver_19, fix:fix_ver_19, strict:FALSE) < 0)\n {\n app_label = app + ' for Mac 2019';\n report +=\n '\\n\\n Product : ' + app_label +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix_disp_19;\n }\n }\n}\nif (empty(report))\n audit(AUDIT_HOST_NOT, 'affected');\n\nif (os =~ \"^Mac OS X 10\\.([0-9]([^0-9]|$)|1[0-3])\")\n report += '\\n Note : Update will require Mac OS X 10.14.0 or later.\\n';\n\nsecurity_report_v4(severity:SECURITY_HOLE, port:0, extra:report);\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "mscve": [{"lastseen": "2021-12-06T18:24:05", "description": "Microsoft PowerPoint Remote Code Execution Vulnerability \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Microsoft PowerPoint Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17124"], "modified": "2020-12-15T08:00:00", "id": "MS:CVE-2020-17124", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17124", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "mskb": [{"lastseen": "2021-12-31T15:26:21", "description": "None\n## Summary\n\nThis security update resolves Microsoft PowerPoint remote code execution vulnerabilities. To learn more about these vulnerabilities, see [Microsoft Common Vulnerabilities and Exposures CVE-2020-17124](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17124>). \n \n**Note** To apply this security update, you must have the release version of [Service Pack 1 for Microsoft Office 2013](<http://support.microsoft.com/kb/2817430>) installed on the computer.Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2013. It doesn't apply to the Office 2013 Click-to-Run editions, such as Microsoft Office 365 Home (see [What version of Office am I using?](<https://support.office.com/article/About-Office-What-version-of-Office-am-I-using-932788B8-A3CE-44BF-BB09-E334518B8B19>)).\n\n## How to get and install the update\n\n### Method 1: Microsoft Update\n\nThis update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see [Windows Update: FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>).\n\n### Method 2: Microsoft Update Catalog\n\nTo get the standalone package for this update, go to the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/Search.aspx?q=KB4484468>) website.\n\n### Method 3: Microsoft Download Center\n\nYou can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.\n\n * [Download security update 4484468 for the 32-bit version of PowerPoint 2013](<http://www.microsoft.com/download/details.aspx?familyid=84e33f37-c4c7-4831-9acc-47d75a708606>)\n * [Download security update 4484468 for the 64-bit version of PowerPoint 2013](<http://www.microsoft.com/download/details.aspx?familyid=d62c0c61-c147-4500-a88c-80227dc33fdf>)\n\n## More information\n\n### Security update deployment information\n\nFor deployment information about this update, see [security update deployment information: December 8, 2020](<https://support.microsoft.com/en-us/help/20201208>).\n\n### Security update replacement information\n\nThis security update replaces previously released security update [4484226](<http://support.microsoft.com/kb/4484226>).\n\n### File hash information\n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \npowerpoint2013-kb4484468-fullfile-x86-glb.exe| AC77D986B01681EC2351C1B3AEBCC647E22158A2| 08AC6BF4B4A93514F8E59761F272F3A8121A2C8EF2E89AF038F4D1CFE6B0076E \npowerpoint2013-kb4484468-fullfile-x64-glb.exe| 4BEDBC4B52B195714FDEA2147DC8404223735AF8| 02377D2FBC8D5CC87368927F1A7D4AF983C62588BE2D13BF190C7806CE198D56 \n \nFile informationThe English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.\n\n## \n\n__\n\nFor all supported x86-based versions of PowerPoint 2013\n\nFile identifier| File name| File version| File size| Date| Time \n---|---|---|---|---|--- \nppintl.dll_1025| ppintl.dll| 15.0.5259.1000| 1252752| 12-Nov-20| 05:57 \nppintl.dll_1026| ppintl.dll| 15.0.5259.1000| 1292184| 12-Nov-20| 05:57 \nppintl.dll_1029| ppintl.dll| 15.0.5259.1000| 1297304| 12-Nov-20| 05:57 \nppintl.dll_1030| ppintl.dll| 15.0.5259.1000| 1244048| 12-Nov-20| 05:57 \nppintl.dll_1031| ppintl.dll| 15.0.5259.1000| 1266568| 12-Nov-20| 05:57 \nppintl.dll_1032| ppintl.dll| 15.0.5259.1000| 1341336| 12-Nov-20| 05:57 \nppintl.dll_3082| ppintl.dll| 15.0.5259.1000| 1260440| 12-Nov-20| 05:57 \nppintl.dll_1061| ppintl.dll| 15.0.5259.1000| 1271176| 12-Nov-20| 05:57 \nppintl.dll_1035| ppintl.dll| 15.0.5259.1000| 1254280| 12-Nov-20| 05:57 \nppintl.dll_1036| ppintl.dll| 15.0.5259.1000| 1324440| 12-Nov-20| 05:57 \nppintl.dll_1037| ppintl.dll| 15.0.5259.1000| 1256848| 12-Nov-20| 05:57 \nppintl.dll_1081| ppintl.dll| 15.0.5259.1000| 1290136| 12-Nov-20| 05:57 \nppintl.dll_1050| ppintl.dll| 15.0.5259.1000| 1282968| 12-Nov-20| 05:57 \nppintl.dll_1038| ppintl.dll| 15.0.5259.1000| 1299864| 12-Nov-20| 05:57 \nppintl.dll_1057| ppintl.dll| 15.0.5259.1000| 1239440| 12-Nov-20| 05:58 \nppintl.dll_1040| ppintl.dll| 15.0.5259.1000| 1258904| 12-Nov-20| 05:58 \nppintl.dll_1041| ppintl.dll| 15.0.5259.1000| 1251736| 12-Nov-20| 05:57 \nppintl.dll_1087| ppintl.dll| 15.0.5259.1000| 1306008| 12-Nov-20| 05:58 \nppintl.dll_1042| ppintl.dll| 15.0.5259.1000| 1240472| 12-Nov-20| 05:58 \nppintl.dll_1063| ppintl.dll| 15.0.5259.1000| 1295256| 12-Nov-20| 05:58 \nppintl.dll_1062| ppintl.dll| 15.0.5259.1000| 1270680| 12-Nov-20| 05:58 \nppintl.dll_1086| ppintl.dll| 15.0.5259.1000| 1243024| 12-Nov-20| 05:58 \nppintl.dll_1044| ppintl.dll| 15.0.5259.1000| 1241480| 12-Nov-20| 05:58 \nppintl.dll_1043| ppintl.dll| 15.0.5259.1000| 1257368| 12-Nov-20| 05:58 \nppintl.dll_1045| ppintl.dll| 15.0.5259.1000| 1312664| 12-Nov-20| 05:58 \nppintl.dll_1046| ppintl.dll| 15.0.5259.1000| 1253784| 12-Nov-20| 05:58 \nppintl.dll_2070| ppintl.dll| 15.0.5259.1000| 1261976| 12-Nov-20| 05:58 \nppintl.dll_1048| ppintl.dll| 15.0.5259.1000| 1308552| 12-Nov-20| 05:58 \nppintl.dll_1049| ppintl.dll| 15.0.5259.1000| 1279896| 12-Nov-20| 05:58 \nppintl.dll_1051| ppintl.dll| 15.0.5259.1000| 1303432| 12-Nov-20| 05:58 \nppintl.dll_1060| ppintl.dll| 15.0.5259.1000| 1292184| 12-Nov-20| 05:58 \nppintl.dll_2074| ppintl.dll| 15.0.5259.1000| 1298328| 12-Nov-20| 05:58 \nppintl.dll_1053| ppintl.dll| 15.0.5259.1000| 1241496| 12-Nov-20| 05:58 \nppintl.dll_1054| ppintl.dll| 15.0.5259.1000| 1259416| 12-Nov-20| 05:58 \nppintl.dll_1055| ppintl.dll| 15.0.5259.1000| 1289624| 12-Nov-20| 05:58 \nppintl.dll_1058| ppintl.dll| 15.0.5259.1000| 1297816| 12-Nov-20| 05:59 \nppintl.dll_1066| ppintl.dll| 15.0.5259.1000| 1316248| 12-Nov-20| 05:59 \nppintl.dll_2052| ppintl.dll| 15.0.5259.1000| 1205136| 12-Nov-20| 05:59 \nppintl.dll_1028| ppintl.dll| 15.0.5259.1000| 1206664| 12-Nov-20| 05:59 \nmssrintl.dll_1025| mssrintl.dll| 15.0.4703.1000| 30880| 12-Nov-20| 05:57 \nmssrintl.dll_1026| mssrintl.dll| 15.0.4703.1000| 31392| 12-Nov-20| 05:57 \nmssrintl.dll_1029| mssrintl.dll| 15.0.4703.1000| 31432| 12-Nov-20| 05:57 \nmssrintl.dll_1030| mssrintl.dll| 15.0.4703.1000| 30904| 12-Nov-20| 05:57 \nmssrintl.dll_1031| mssrintl.dll| 15.0.4703.1000| 31424| 12-Nov-20| 05:57 \nmssrintl.dll_1032| mssrintl.dll| 15.0.4703.1000| 31400| 12-Nov-20| 05:57 \nmssrintl.dll_3082| mssrintl.dll| 15.0.4703.1000| 31448| 12-Nov-20| 05:57 \nmssrintl.dll_1061| mssrintl.dll| 15.0.4703.1000| 30904| 12-Nov-20| 05:57 \nmssrintl.dll_1035| mssrintl.dll| 15.0.4703.1000| 30920| 12-Nov-20| 05:57 \nmssrintl.dll_1036| mssrintl.dll| 15.0.4703.1000| 31432| 12-Nov-20| 05:57 \nmssrintl.dll_1037| mssrintl.dll| 15.0.4703.1000| 30368| 12-Nov-20| 05:57 \nmssrintl.dll_1081| mssrintl.dll| 15.0.4703.1000| 30880| 12-Nov-20| 05:57 \nmssrintl.dll_1050| mssrintl.dll| 15.0.4703.1000| 31440| 12-Nov-20| 05:57 \nmssrintl.dll_1038| mssrintl.dll| 15.0.4703.1000| 30912| 12-Nov-20| 05:57 \nmssrintl.dll_1057| mssrintl.dll| 15.0.4703.1000| 30904| 12-Nov-20| 05:58 \nmssrintl.dll_1040| mssrintl.dll| 15.0.4703.1000| 31456| 12-Nov-20| 05:58 \nmssrintl.dll_1041| mssrintl.dll| 15.0.4703.1000| 29856| 12-Nov-20| 05:57 \nmssrintl.dll_1087| mssrintl.dll| 15.0.4703.1000| 30880| 12-Nov-20| 05:58 \nmssrintl.dll_1042| mssrintl.dll| 15.0.4703.1000| 29888| 12-Nov-20| 05:58 \nmssrintl.dll_1063| mssrintl.dll| 15.0.4703.1000| 31424| 12-Nov-20| 05:58 \nmssrintl.dll_1062| mssrintl.dll| 15.0.4703.1000| 31432| 12-Nov-20| 05:58 \nmssrintl.dll_1086| mssrintl.dll| 15.0.4703.1000| 30904| 12-Nov-20| 05:58 \nmssrintl.dll_1044| mssrintl.dll| 15.0.4703.1000| 30920| 12-Nov-20| 05:58 \nmssrintl.dll_1043| mssrintl.dll| 15.0.4703.1000| 30904| 12-Nov-20| 05:58 \nmssrintl.dll_1045| mssrintl.dll| 15.0.4703.1000| 31448| 12-Nov-20| 05:58 \nmssrintl.dll_1046| mssrintl.dll| 15.0.4703.1000| 31432| 12-Nov-20| 05:58 \nmssrintl.dll_2070| mssrintl.dll| 15.0.4703.1000| 31456| 12-Nov-20| 05:58 \nmssrintl.dll_1048| mssrintl.dll| 15.0.4703.1000| 31432| 12-Nov-20| 05:58 \nmssrintl.dll_1049| mssrintl.dll| 15.0.4703.1000| 30880| 12-Nov-20| 05:58 \nmssrintl.dll_1051| mssrintl.dll| 15.0.4703.1000| 31432| 12-Nov-20| 05:58 \nmssrintl.dll_1060| mssrintl.dll| 15.0.4703.1000| 31424| 12-Nov-20| 05:58 \nmssrintl.dll_2074| mssrintl.dll| 15.0.4703.1000| 31416| 12-Nov-20| 05:58 \nmssrintl.dll_1053| mssrintl.dll| 15.0.4703.1000| 30904| 12-Nov-20| 05:58 \nmssrintl.dll_1054| mssrintl.dll| 15.0.4703.1000| 30912| 12-Nov-20| 05:58 \nmssrintl.dll_1055| mssrintl.dll| 15.0.4703.1000| 30920| 12-Nov-20| 05:58 \nmssrintl.dll_1058| mssrintl.dll| 15.0.4703.1000| 31424| 12-Nov-20| 05:59 \nmssrintl.dll_1066| mssrintl.dll| 15.0.4703.1000| 30888| 12-Nov-20| 05:59 \nmssrintl.dll_2052| mssrintl.dll| 15.0.4703.1000| 29344| 12-Nov-20| 05:59 \nmssrintl.dll_1028| mssrintl.dll| 15.0.4703.1000| 29856| 12-Nov-20| 05:59 \npptico.exe| pptico.exe| 15.0.4553.1000| 3509416| 12-Nov-20| 05:56 \nppintl.dll_1033| ppintl.dll| 15.0.5257.1000| 1244056| 12-Nov-20| 05:56 \npreviewtemplate.potx_1033| previewtemplate.potx| | 284446| 12-Nov-20| 05:56 \npreviewtemplate2.potx_1033| previewtemplate2.potx| | 298302| 12-Nov-20| 05:56 \npptpia.dll| microsoft.office.interop.powerpoint.dll| 15.0.5301.1000| 406424| 12-Nov-20| 05:56 \nmsppt.olb| msppt.olb| | 416456| 12-Nov-20| 05:56 \npowerpnt.exe| powerpnt.exe| 15.0.5301.1000| 1848728| 12-Nov-20| 05:56 \npowerpnt.man| powerpnt.exe.manifest| | 3816| 12-Nov-20| 05:56 \nppcore.dll| ppcore.dll| 15.0.5301.1000| 10485144| 12-Nov-20| 05:56 \nppresources.dll| ppresources.dll| | 1286312| 12-Nov-20| 05:56 \nmssrintl.dll_1033| mssrintl.dll| 15.0.4703.1000| 30912| 12-Nov-20| 05:56 \nmsosrec.exe| msosrec.exe| 15.0.5085.1000| 170784| 12-Nov-20| 05:56 \nppintl.dll.idx_dll_1025| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 05:57 \nppintl.rest.idx_dll_1025| ppintl.rest.idx_dll| 15.0.4989.1000| 161448| 12-Nov-20| 05:57 \nppintl.dll.idx_dll_1026| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 05:57 \nppintl.rest.idx_dll_1026| ppintl.rest.idx_dll| 15.0.4989.1000| 163496| 12-Nov-20| 05:57 \nppintl.dll.idx_dll_1029| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 05:57 \nppintl.rest.idx_dll_1029| ppintl.rest.idx_dll| 15.0.4989.1000| 161968| 12-Nov-20| 05:57 \nppintl.dll.idx_dll_1030| ppintl.dll.idx_dll| 15.0.4442.1000| 17008| 12-Nov-20| 05:57 \nppintl.rest.idx_dll_1030| ppintl.rest.idx_dll| 15.0.4989.1000| 161456| 12-Nov-20| 05:57 \nppintl.dll.idx_dll_1031| ppintl.dll.idx_dll| 15.0.4420.1017| 17024| 12-Nov-20| 05:57 \nppintl.rest.idx_dll_1031| ppintl.rest.idx_dll| 15.0.4989.1000| 161456| 12-Nov-20| 05:57 \nppintl.dll.idx_dll_1032| ppintl.dll.idx_dll| 15.0.4420.1017| 17024| 12-Nov-20| 05:57 \nppintl.rest.idx_dll_1032| ppintl.rest.idx_dll| 15.0.4989.1000| 162480| 12-Nov-20| 05:57 \nppintl.rest.idx_dll_1033| ppintl.rest.idx_dll| 15.0.4741.1000| 154824| 12-Nov-20| 05:56 \nppintl.rest.idx_dll_3082| ppintl.rest.idx_dll| 15.0.4989.1000| 161960| 12-Nov-20| 05:57 \nppintl.dll.idx_dll_1061| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 05:57 \nppintl.rest.idx_dll_1061| ppintl.rest.idx_dll| 15.0.5007.1000| 162480| 12-Nov-20| 05:57 \nppintl.dll.idx_dll_1035| ppintl.dll.idx_dll| 15.0.4442.1000| 17520| 12-Nov-20| 05:57 \nppintl.rest.idx_dll_1035| ppintl.rest.idx_dll| 15.0.4989.1000| 161456| 12-Nov-20| 05:57 \nppintl.rest.idx_dll_1036| ppintl.rest.idx_dll| 15.0.4989.1000| 161960| 12-Nov-20| 05:57 \nppintl.dll.idx_dll_1037| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 05:57 \nppintl.rest.idx_dll_1037| ppintl.rest.idx_dll| 15.0.4989.1000| 162480| 12-Nov-20| 05:57 \nppintl.dll.idx_dll_1081| ppintl.dll.idx_dll| 15.0.4420.1017| 17536| 12-Nov-20| 05:57 \nppintl.rest.idx_dll_1081| ppintl.rest.idx_dll| 15.0.4989.1000| 162472| 12-Nov-20| 05:57 \nppintl.dll.idx_dll_1050| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 05:57 \nppintl.rest.idx_dll_1050| ppintl.rest.idx_dll| 15.0.4989.1000| 162992| 12-Nov-20| 05:57 \nppintl.dll.idx_dll_1038| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 05:57 \nppintl.rest.idx_dll_1038| ppintl.rest.idx_dll| 15.0.4989.1000| 160944| 12-Nov-20| 05:57 \nppintl.dll.idx_dll_1057| ppintl.dll.idx_dll| 15.0.4463.1000| 16960| 12-Nov-20| 05:58 \nppintl.rest.idx_dll_1057| ppintl.rest.idx_dll| 15.0.4989.1000| 162480| 12-Nov-20| 05:58 \nppintl.dll.idx_dll_1040| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 05:58 \nppintl.rest.idx_dll_1040| ppintl.rest.idx_dll| 15.0.4989.1000| 160944| 12-Nov-20| 05:58 \nppintl.rest.idx_dll_1041| ppintl.rest.idx_dll| 15.0.4989.1000| 159400| 12-Nov-20| 05:57 \nppintl.dll.idx_dll_1087| ppintl.dll.idx_dll| 15.0.4454.1000| 17488| 12-Nov-20| 05:58 \nppintl.rest.idx_dll_1087| ppintl.rest.idx_dll| 15.0.4989.1000| 159920| 12-Nov-20| 05:58 \nppintl.dll.idx_dll_1042| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 05:58 \nppintl.rest.idx_dll_1042| ppintl.rest.idx_dll| 15.0.5007.1000| 157872| 12-Nov-20| 05:58 \nppintl.dll.idx_dll_1063| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 05:58 \nppintl.rest.idx_dll_1063| ppintl.rest.idx_dll| 15.0.4989.1000| 162472| 12-Nov-20| 05:58 \nppintl.dll.idx_dll_1062| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 05:58 \nppintl.rest.idx_dll_1062| ppintl.rest.idx_dll| 15.0.4989.1000| 161960| 12-Nov-20| 05:58 \nppintl.dll.idx_dll_1086| ppintl.dll.idx_dll| 15.0.4460.1000| 16976| 12-Nov-20| 05:58 \nppintl.rest.idx_dll_1086| ppintl.rest.idx_dll| 15.0.4989.1000| 161456| 12-Nov-20| 05:58 \nppintl.dll.idx_dll_1044| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 05:58 \nppintl.rest.idx_dll_1044| ppintl.rest.idx_dll| 15.0.4989.1000| 161448| 12-Nov-20| 05:58 \nppintl.dll.idx_dll_1043| ppintl.dll.idx_dll| 15.0.4420.1017| 17024| 12-Nov-20| 05:58 \nppintl.rest.idx_dll_1043| ppintl.rest.idx_dll| 15.0.4989.1000| 161456| 12-Nov-20| 05:58 \nppintl.dll.idx_dll_1045| ppintl.dll.idx_dll| 15.0.4442.1000| 17008| 12-Nov-20| 05:58 \nppintl.rest.idx_dll_1045| ppintl.rest.idx_dll| 15.0.4989.1000| 162992| 12-Nov-20| 05:58 \nppintl.dll.idx_dll_1046| ppintl.dll.idx_dll| 15.0.4420.1017| 17536| 12-Nov-20| 05:58 \nppintl.rest.idx_dll_1046| ppintl.rest.idx_dll| 15.0.4989.1000| 164016| 12-Nov-20| 05:58 \nppintl.dll.idx_dll_2070| ppintl.dll.idx_dll| 15.0.4442.1000| 17024| 12-Nov-20| 05:58 \nppintl.rest.idx_dll_2070| ppintl.rest.idx_dll| 15.0.4989.1000| 163504| 12-Nov-20| 05:58 \nppintl.dll.idx_dll_1048| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 05:58 \nppintl.rest.idx_dll_1048| ppintl.rest.idx_dll| 15.0.4989.1000| 161960| 12-Nov-20| 05:58 \nppintl.dll.idx_dll_1049| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 05:58 \nppintl.rest.idx_dll_1049| ppintl.rest.idx_dll| 15.0.4989.1000| 161448| 12-Nov-20| 05:58 \nppintl.dll.idx_dll_1051| ppintl.dll.idx_dll| 15.0.4466.1000| 16960| 12-Nov-20| 05:58 \nppintl.rest.idx_dll_1051| ppintl.rest.idx_dll| 15.0.4989.1000| 161968| 12-Nov-20| 05:58 \nppintl.dll.idx_dll_1060| ppintl.dll.idx_dll| 15.0.4420.1017| 17024| 12-Nov-20| 05:58 \nppintl.rest.idx_dll_1060| ppintl.rest.idx_dll| 15.0.4989.1000| 162992| 12-Nov-20| 05:58 \nppintl.dll.idx_dll_2074| ppintl.dll.idx_dll| 15.0.4420.1017| 17024| 12-Nov-20| 05:58 \nppintl.rest.idx_dll_2074| ppintl.rest.idx_dll| 15.0.4989.1000| 162992| 12-Nov-20| 05:58 \nppintl.dll.idx_dll_1053| ppintl.dll.idx_dll| 15.0.4420.1017| 17024| 12-Nov-20| 05:58 \nppintl.rest.idx_dll_1053| ppintl.rest.idx_dll| 15.0.4989.1000| 161456| 12-Nov-20| 05:58 \nppintl.dll.idx_dll_1054| ppintl.dll.idx_dll| 15.0.4448.1000| 16960| 12-Nov-20| 05:58 \nppintl.rest.idx_dll_1054| ppintl.rest.idx_dll| 15.0.4989.1000| 160432| 12-Nov-20| 05:58 \nppintl.dll.idx_dll_1055| ppintl.dll.idx_dll| 15.0.4420.1017| 17024| 12-Nov-20| 05:58 \nppintl.rest.idx_dll_1055| ppintl.rest.idx_dll| 15.0.4989.1000| 162992| 12-Nov-20| 05:58 \nppintl.dll.idx_dll_1058| ppintl.dll.idx_dll| 15.0.4420.1017| 17024| 12-Nov-20| 05:59 \nppintl.rest.idx_dll_1058| ppintl.rest.idx_dll| 15.0.4989.1000| 161968| 12-Nov-20| 05:59 \nppintl.dll.idx_dll_1066| ppintl.dll.idx_dll| 15.0.4469.1000| 17472| 12-Nov-20| 05:59 \nppintl.rest.idx_dll_1066| ppintl.rest.idx_dll| 15.0.4989.1000| 164016| 12-Nov-20| 05:59 \nppintl.dll.idx_dll_2052| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 05:59 \nppintl.rest.idx_dll_2052| ppintl.rest.idx_dll| 15.0.4989.1000| 158896| 12-Nov-20| 05:59 \nppintl.dll.idx_dll_1028| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 05:59 \nppintl.rest.idx_dll_1028| ppintl.rest.idx_dll| 15.0.4989.1000| 158888| 12-Nov-20| 05:59 \npreviewtemplate.potx_1025| previewtemplate.potx| | 284149| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1025| previewtemplate2.potx| | 282751| 12-Nov-20| 05:48 \npreviewtemplate.potx_1026| previewtemplate.potx| | 291013| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1026| previewtemplate2.potx| | 304844| 12-Nov-20| 05:48 \npreviewtemplate.potx_1029| previewtemplate.potx| | 284022| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1029| previewtemplate2.potx| | 297886| 12-Nov-20| 05:48 \npreviewtemplate.potx_1030| previewtemplate.potx| | 281964| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1030| previewtemplate2.potx| | 295813| 12-Nov-20| 05:48 \npreviewtemplate.potx_1031| previewtemplate.potx| | 279194| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1031| previewtemplate2.potx| | 296798| 12-Nov-20| 05:48 \npreviewtemplate.potx_1032| previewtemplate.potx| | 288590| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1032| previewtemplate2.potx| | 236177| 12-Nov-20| 05:48 \npreviewtemplate.potx_3082| previewtemplate.potx| | 280532| 12-Nov-20| 05:48 \npreviewtemplate2.potx_3082| previewtemplate2.potx| | 294348| 12-Nov-20| 05:48 \npreviewtemplate.potx_1061| previewtemplate.potx| | 282450| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1061| previewtemplate2.potx| | 282464| 12-Nov-20| 05:48 \npreviewtemplate.potx_1035| previewtemplate.potx| | 288036| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1035| previewtemplate2.potx| | 288029| 12-Nov-20| 05:48 \npreviewtemplate.potx_1036| previewtemplate.potx| | 282886| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1036| previewtemplate2.potx| | 296718| 12-Nov-20| 05:48 \npreviewtemplate.potx_1037| previewtemplate.potx| | 307485| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1037| previewtemplate2.potx| | 309409| 12-Nov-20| 05:48 \npreviewtemplate.potx_1081| previewtemplate.potx| | 282844| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1081| previewtemplate2.potx| | 281452| 12-Nov-20| 05:48 \npreviewtemplate.potx_1050| previewtemplate.potx| | 288631| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1050| previewtemplate2.potx| | 302458| 12-Nov-20| 05:48 \npreviewtemplate.potx_1038| previewtemplate.potx| | 283960| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1038| previewtemplate2.potx| | 297824| 12-Nov-20| 05:48 \npreviewtemplate.potx_1057| previewtemplate.potx| | 284390| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1057| previewtemplate2.potx| | 284384| 12-Nov-20| 05:48 \npreviewtemplate.potx_1040| previewtemplate.potx| | 283264| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1040| previewtemplate2.potx| | 295728| 12-Nov-20| 05:48 \npreviewtemplate.potx_1041| previewtemplate.potx| | 284986| 12-Nov-20| 05:56 \npreviewtemplate2.potx_1041| previewtemplate2.potx| | 283655| 12-Nov-20| 05:56 \npreviewtemplate.potx_1087| previewtemplate.potx| | 290010| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1087| previewtemplate2.potx| | 303805| 12-Nov-20| 05:48 \npreviewtemplate.potx_1042| previewtemplate.potx| | 287903| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1042| previewtemplate2.potx| | 287955| 12-Nov-20| 05:48 \npreviewtemplate.potx_1063| previewtemplate.potx| | 281886| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1063| previewtemplate2.potx| | 281893| 12-Nov-20| 05:48 \npreviewtemplate.potx_1062| previewtemplate.potx| | 281960| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1062| previewtemplate2.potx| | 281968| 12-Nov-20| 05:48 \npreviewtemplate.potx_1086| previewtemplate.potx| | 283148| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1086| previewtemplate2.potx| | 296935| 12-Nov-20| 05:48 \npreviewtemplate.potx_1044| previewtemplate.potx| | 281024| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1044| previewtemplate2.potx| | 296220| 12-Nov-20| 05:48 \npreviewtemplate.potx_1043| previewtemplate.potx| | 283898| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1043| previewtemplate2.potx| | 297762| 12-Nov-20| 05:48 \npreviewtemplate.potx_1045| previewtemplate.potx| | 283992| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1045| previewtemplate2.potx| | 297856| 12-Nov-20| 05:48 \npreviewtemplate.potx_1046| previewtemplate.potx| | 283922| 12-Nov-20| 05:49 \npreviewtemplate2.potx_1046| previewtemplate2.potx| | 297786| 12-Nov-20| 05:49 \npreviewtemplate.potx_2070| previewtemplate.potx| | 283979| 12-Nov-20| 05:49 \npreviewtemplate2.potx_2070| previewtemplate2.potx| | 297843| 12-Nov-20| 05:49 \npreviewtemplate.potx_1048| previewtemplate.potx| | 286565| 12-Nov-20| 05:49 \npreviewtemplate2.potx_1048| previewtemplate2.potx| | 300387| 12-Nov-20| 05:49 \npreviewtemplate.potx_1049| previewtemplate.potx| | 284253| 12-Nov-20| 05:49 \npreviewtemplate2.potx_1049| previewtemplate2.potx| | 298117| 12-Nov-20| 05:49 \npreviewtemplate.potx_1051| previewtemplate.potx| | 283978| 12-Nov-20| 05:49 \npreviewtemplate2.potx_1051| previewtemplate2.potx| | 297842| 12-Nov-20| 05:49 \npreviewtemplate.potx_1060| previewtemplate.potx| | 283927| 12-Nov-20| 05:49 \npreviewtemplate2.potx_1060| previewtemplate2.potx| | 297791| 12-Nov-20| 05:49 \npreviewtemplate.potx_2074| previewtemplate.potx| | 288591| 12-Nov-20| 05:49 \npreviewtemplate2.potx_2074| previewtemplate2.potx| | 302411| 12-Nov-20| 05:49 \npreviewtemplate.potx_1053| previewtemplate.potx| | 282078| 12-Nov-20| 05:49 \npreviewtemplate2.potx_1053| previewtemplate2.potx| | 295924| 12-Nov-20| 05:49 \npreviewtemplate.potx_1054| previewtemplate.potx| | 288407| 12-Nov-20| 05:49 \npreviewtemplate2.potx_1054| previewtemplate2.potx| | 288446| 12-Nov-20| 05:49 \npreviewtemplate.potx_1055| previewtemplate.potx| | 282857| 12-Nov-20| 05:49 \npreviewtemplate2.potx_1055| previewtemplate2.potx| | 282847| 12-Nov-20| 05:49 \npreviewtemplate.potx_1058| previewtemplate.potx| | 289000| 12-Nov-20| 05:49 \npreviewtemplate2.potx_1058| previewtemplate2.potx| | 302818| 12-Nov-20| 05:49 \npreviewtemplate.potx_1066| previewtemplate.potx| | 285066| 12-Nov-20| 05:49 \npreviewtemplate2.potx_1066| previewtemplate2.potx| | 285072| 12-Nov-20| 05:49 \npreviewtemplate.potx_2052| previewtemplate.potx| | 284114| 12-Nov-20| 05:49 \npreviewtemplate2.potx_2052| previewtemplate2.potx| | 284107| 12-Nov-20| 05:49 \npreviewtemplate.potx_1028| previewtemplate.potx| | 283790| 12-Nov-20| 05:49 \npreviewtemplate2.potx_1028| previewtemplate2.potx| | 283797| 12-Nov-20| 05:49 \npowerpnt.veman.xml| powerpnt.visualelementsmanifest.xml| | 344| 12-Nov-20| 05:56 \n \n## \n\n__\n\nFor all supported x64-based versions of PowerPoint 2013\n\nFile identifier| File name| File version| File size| Date| Time \n---|---|---|---|---|--- \nppintl.dll_1025| ppintl.dll| 15.0.5259.1000| 1252760| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1025| ppintl.dll| 15.0.5259.1000| 1252760| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1025| ppintl.dll| 15.0.5259.1000| 1252760| 12-Nov-20| 05:53 \nppintl.dll_1026| ppintl.dll| 15.0.5259.1000| 1292184| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1026| ppintl.dll| 15.0.5259.1000| 1292184| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1026| ppintl.dll| 15.0.5259.1000| 1292184| 12-Nov-20| 05:53 \nppintl.dll_1029| ppintl.dll| 15.0.5259.1000| 1297304| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1029| ppintl.dll| 15.0.5259.1000| 1297304| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1029| ppintl.dll| 15.0.5259.1000| 1297304| 12-Nov-20| 05:53 \nppintl.dll_1030| ppintl.dll| 15.0.5259.1000| 1244056| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1030| ppintl.dll| 15.0.5259.1000| 1244056| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1030| ppintl.dll| 15.0.5259.1000| 1244056| 12-Nov-20| 05:53 \nppintl.dll_1031| ppintl.dll| 15.0.5259.1000| 1266584| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1031| ppintl.dll| 15.0.5259.1000| 1266584| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1031| ppintl.dll| 15.0.5259.1000| 1266584| 12-Nov-20| 05:53 \nppintl.dll_1032| ppintl.dll| 15.0.5259.1000| 1341328| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1032| ppintl.dll| 15.0.5259.1000| 1341328| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1032| ppintl.dll| 15.0.5259.1000| 1341328| 12-Nov-20| 05:53 \nppintl.dll_3082| ppintl.dll| 15.0.5259.1000| 1260432| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_3082| ppintl.dll| 15.0.5259.1000| 1260432| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_3082| ppintl.dll| 15.0.5259.1000| 1260432| 12-Nov-20| 05:53 \nppintl.dll_1061| ppintl.dll| 15.0.5259.1000| 1271192| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1061| ppintl.dll| 15.0.5259.1000| 1271192| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1061| ppintl.dll| 15.0.5259.1000| 1271192| 12-Nov-20| 05:53 \nppintl.dll_1035| ppintl.dll| 15.0.5259.1000| 1254288| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1035| ppintl.dll| 15.0.5259.1000| 1254288| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1035| ppintl.dll| 15.0.5259.1000| 1254288| 12-Nov-20| 05:53 \nppintl.dll_1036| ppintl.dll| 15.0.5259.1000| 1324440| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1036| ppintl.dll| 15.0.5259.1000| 1324440| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1036| ppintl.dll| 15.0.5259.1000| 1324440| 12-Nov-20| 05:53 \nppintl.dll_1037| ppintl.dll| 15.0.5259.1000| 1256856| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1037| ppintl.dll| 15.0.5259.1000| 1256856| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1037| ppintl.dll| 15.0.5259.1000| 1256856| 12-Nov-20| 05:53 \nppintl.dll_1081| ppintl.dll| 15.0.5259.1000| 1290136| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1081| ppintl.dll| 15.0.5259.1000| 1290136| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1081| ppintl.dll| 15.0.5259.1000| 1290136| 12-Nov-20| 05:53 \nppintl.dll_1050| ppintl.dll| 15.0.5259.1000| 1282968| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1050| ppintl.dll| 15.0.5259.1000| 1282968| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1050| ppintl.dll| 15.0.5259.1000| 1282968| 12-Nov-20| 05:53 \nppintl.dll_1038| ppintl.dll| 15.0.5259.1000| 1299864| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1038| ppintl.dll| 15.0.5259.1000| 1299864| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1038| ppintl.dll| 15.0.5259.1000| 1299864| 12-Nov-20| 05:53 \nppintl.dll_1057| ppintl.dll| 15.0.5259.1000| 1239448| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1057| ppintl.dll| 15.0.5259.1000| 1239448| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1057| ppintl.dll| 15.0.5259.1000| 1239448| 12-Nov-20| 05:53 \nppintl.dll_1040| ppintl.dll| 15.0.5259.1000| 1258888| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1040| ppintl.dll| 15.0.5259.1000| 1258888| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1040| ppintl.dll| 15.0.5259.1000| 1258888| 12-Nov-20| 05:53 \nppintl.dll_1041| ppintl.dll| 15.0.5259.1000| 1251728| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1041| ppintl.dll| 15.0.5259.1000| 1251728| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1041| ppintl.dll| 15.0.5259.1000| 1251728| 12-Nov-20| 05:53 \nppintl.dll_1087| ppintl.dll| 15.0.5259.1000| 1306008| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1087| ppintl.dll| 15.0.5259.1000| 1306008| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1087| ppintl.dll| 15.0.5259.1000| 1306008| 12-Nov-20| 05:53 \nppintl.dll_1042| ppintl.dll| 15.0.5259.1000| 1240464| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1042| ppintl.dll| 15.0.5259.1000| 1240464| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1042| ppintl.dll| 15.0.5259.1000| 1240464| 12-Nov-20| 05:53 \nppintl.dll_1063| ppintl.dll| 15.0.5259.1000| 1295256| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1063| ppintl.dll| 15.0.5259.1000| 1295256| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1063| ppintl.dll| 15.0.5259.1000| 1295256| 12-Nov-20| 05:53 \nppintl.dll_1062| ppintl.dll| 15.0.5259.1000| 1270680| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1062| ppintl.dll| 15.0.5259.1000| 1270680| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1062| ppintl.dll| 15.0.5259.1000| 1270680| 12-Nov-20| 05:53 \nppintl.dll_1086| ppintl.dll| 15.0.5259.1000| 1243032| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1086| ppintl.dll| 15.0.5259.1000| 1243032| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1086| ppintl.dll| 15.0.5259.1000| 1243032| 12-Nov-20| 05:53 \nppintl.dll_1044| ppintl.dll| 15.0.5259.1000| 1241496| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1044| ppintl.dll| 15.0.5259.1000| 1241496| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1044| ppintl.dll| 15.0.5259.1000| 1241496| 12-Nov-20| 05:53 \nppintl.dll_1043| ppintl.dll| 15.0.5259.1000| 1257368| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1043| ppintl.dll| 15.0.5259.1000| 1257368| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1043| ppintl.dll| 15.0.5259.1000| 1257368| 12-Nov-20| 05:53 \nppintl.dll_1045| ppintl.dll| 15.0.5259.1000| 1312664| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1045| ppintl.dll| 15.0.5259.1000| 1312664| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1045| ppintl.dll| 15.0.5259.1000| 1312664| 12-Nov-20| 05:53 \nppintl.dll_1046| ppintl.dll| 15.0.5259.1000| 1253768| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1046| ppintl.dll| 15.0.5259.1000| 1253768| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1046| ppintl.dll| 15.0.5259.1000| 1253768| 12-Nov-20| 05:53 \nppintl.dll_2070| ppintl.dll| 15.0.5259.1000| 1261976| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_2070| ppintl.dll| 15.0.5259.1000| 1261976| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_2070| ppintl.dll| 15.0.5259.1000| 1261976| 12-Nov-20| 05:53 \nppintl.dll_1048| ppintl.dll| 15.0.5259.1000| 1308560| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1048| ppintl.dll| 15.0.5259.1000| 1308560| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1048| ppintl.dll| 15.0.5259.1000| 1308560| 12-Nov-20| 05:53 \nppintl.dll_1049| ppintl.dll| 15.0.5259.1000| 1279880| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1049| ppintl.dll| 15.0.5259.1000| 1279880| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1049| ppintl.dll| 15.0.5259.1000| 1279880| 12-Nov-20| 05:53 \nppintl.dll_1051| ppintl.dll| 15.0.5259.1000| 1303432| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1051| ppintl.dll| 15.0.5259.1000| 1303432| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1051| ppintl.dll| 15.0.5259.1000| 1303432| 12-Nov-20| 05:53 \nppintl.dll_1060| ppintl.dll| 15.0.5259.1000| 1292168| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1060| ppintl.dll| 15.0.5259.1000| 1292168| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1060| ppintl.dll| 15.0.5259.1000| 1292168| 12-Nov-20| 05:53 \nppintl.dll_2074| ppintl.dll| 15.0.5259.1000| 1298328| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_2074| ppintl.dll| 15.0.5259.1000| 1298328| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_2074| ppintl.dll| 15.0.5259.1000| 1298328| 12-Nov-20| 05:53 \nppintl.dll_1053| ppintl.dll| 15.0.5259.1000| 1241496| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1053| ppintl.dll| 15.0.5259.1000| 1241496| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1053| ppintl.dll| 15.0.5259.1000| 1241496| 12-Nov-20| 05:53 \nppintl.dll_1054| ppintl.dll| 15.0.5259.1000| 1259416| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1054| ppintl.dll| 15.0.5259.1000| 1259416| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1054| ppintl.dll| 15.0.5259.1000| 1259416| 12-Nov-20| 05:53 \nppintl.dll_1055| ppintl.dll| 15.0.5259.1000| 1289624| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1055| ppintl.dll| 15.0.5259.1000| 1289624| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1055| ppintl.dll| 15.0.5259.1000| 1289624| 12-Nov-20| 05:53 \nppintl.dll_1058| ppintl.dll| 15.0.5259.1000| 1297816| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1058| ppintl.dll| 15.0.5259.1000| 1297816| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1058| ppintl.dll| 15.0.5259.1000| 1297816| 12-Nov-20| 05:53 \nppintl.dll_1066| ppintl.dll| 15.0.5259.1000| 1316248| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1066| ppintl.dll| 15.0.5259.1000| 1316248| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1066| ppintl.dll| 15.0.5259.1000| 1316248| 12-Nov-20| 05:53 \nppintl.dll_2052| ppintl.dll| 15.0.5259.1000| 1205128| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_2052| ppintl.dll| 15.0.5259.1000| 1205128| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_2052| ppintl.dll| 15.0.5259.1000| 1205128| 12-Nov-20| 05:53 \nppintl.dll_1028| ppintl.dll| 15.0.5259.1000| 1206680| 12-Nov-20| 05:53 \nppt.conversion.ppintl.dll_1028| ppintl.dll| 15.0.5259.1000| 1206680| 12-Nov-20| 05:53 \nppt.edit.ppintl.dll_1028| ppintl.dll| 15.0.5259.1000| 1206680| 12-Nov-20| 05:53 \nmssrintl.dll_1025| mssrintl.dll| 15.0.4703.1000| 30888| 12-Nov-20| 06:07 \nmssrintl.dll_1026| mssrintl.dll| 15.0.4703.1000| 31400| 12-Nov-20| 06:07 \nmssrintl.dll_1029| mssrintl.dll| 15.0.4703.1000| 31432| 12-Nov-20| 06:07 \nmssrintl.dll_1030| mssrintl.dll| 15.0.4703.1000| 30912| 12-Nov-20| 06:07 \nmssrintl.dll_1031| mssrintl.dll| 15.0.4703.1000| 31424| 12-Nov-20| 06:07 \nmssrintl.dll_1032| mssrintl.dll| 15.0.4703.1000| 31392| 12-Nov-20| 06:07 \nmssrintl.dll_3082| mssrintl.dll| 15.0.4703.1000| 31440| 12-Nov-20| 06:07 \nmssrintl.dll_1061| mssrintl.dll| 15.0.4703.1000| 30904| 12-Nov-20| 06:07 \nmssrintl.dll_1035| mssrintl.dll| 15.0.4703.1000| 30920| 12-Nov-20| 06:07 \nmssrintl.dll_1036| mssrintl.dll| 15.0.4703.1000| 31424| 12-Nov-20| 06:07 \nmssrintl.dll_1037| mssrintl.dll| 15.0.4703.1000| 30376| 12-Nov-20| 06:07 \nmssrintl.dll_1081| mssrintl.dll| 15.0.4703.1000| 30888| 12-Nov-20| 06:07 \nmssrintl.dll_1050| mssrintl.dll| 15.0.4703.1000| 31448| 12-Nov-20| 06:07 \nmssrintl.dll_1038| mssrintl.dll| 15.0.4703.1000| 30904| 12-Nov-20| 06:07 \nmssrintl.dll_1057| mssrintl.dll| 15.0.4703.1000| 30904| 12-Nov-20| 06:08 \nmssrintl.dll_1040| mssrintl.dll| 15.0.4703.1000| 31456| 12-Nov-20| 06:08 \nmssrintl.dll_1041| mssrintl.dll| 15.0.4703.1000| 29856| 12-Nov-20| 06:07 \nmssrintl.dll_1087| mssrintl.dll| 15.0.4703.1000| 30888| 12-Nov-20| 06:08 \nmssrintl.dll_1042| mssrintl.dll| 15.0.4703.1000| 29888| 12-Nov-20| 06:08 \nmssrintl.dll_1063| mssrintl.dll| 15.0.4703.1000| 31432| 12-Nov-20| 06:08 \nmssrintl.dll_1062| mssrintl.dll| 15.0.4703.1000| 31432| 12-Nov-20| 06:08 \nmssrintl.dll_1086| mssrintl.dll| 15.0.4703.1000| 30904| 12-Nov-20| 06:08 \nmssrintl.dll_1044| mssrintl.dll| 15.0.4703.1000| 30912| 12-Nov-20| 06:08 \nmssrintl.dll_1043| mssrintl.dll| 15.0.4703.1000| 30912| 12-Nov-20| 06:08 \nmssrintl.dll_1045| mssrintl.dll| 15.0.4703.1000| 31456| 12-Nov-20| 06:08 \nmssrintl.dll_1046| mssrintl.dll| 15.0.4703.1000| 31432| 12-Nov-20| 06:08 \nmssrintl.dll_2070| mssrintl.dll| 15.0.4703.1000| 31448| 12-Nov-20| 06:08 \nmssrintl.dll_1048| mssrintl.dll| 15.0.4703.1000| 31440| 12-Nov-20| 06:08 \nmssrintl.dll_1049| mssrintl.dll| 15.0.4703.1000| 30888| 12-Nov-20| 06:08 \nmssrintl.dll_1051| mssrintl.dll| 15.0.4703.1000| 31432| 12-Nov-20| 06:08 \nmssrintl.dll_1060| mssrintl.dll| 15.0.4703.1000| 31432| 12-Nov-20| 06:08 \nmssrintl.dll_2074| mssrintl.dll| 15.0.4703.1000| 31416| 12-Nov-20| 06:08 \nmssrintl.dll_1053| mssrintl.dll| 15.0.4703.1000| 30912| 12-Nov-20| 06:08 \nmssrintl.dll_1054| mssrintl.dll| 15.0.4703.1000| 30920| 12-Nov-20| 06:08 \nmssrintl.dll_1055| mssrintl.dll| 15.0.4703.1000| 30912| 12-Nov-20| 06:08 \nmssrintl.dll_1058| mssrintl.dll| 15.0.4703.1000| 31432| 12-Nov-20| 06:08 \nmssrintl.dll_1066| mssrintl.dll| 15.0.4703.1000| 30880| 12-Nov-20| 06:08 \nmssrintl.dll_2052| mssrintl.dll| 15.0.4703.1000| 29344| 12-Nov-20| 06:09 \nmssrintl.dll_1028| mssrintl.dll| 15.0.4703.1000| 29856| 12-Nov-20| 06:09 \npptico.exe| pptico.exe| 15.0.4553.1000| 3509416| 12-Nov-20| 05:56 \nppintl.dll_1033| ppintl.dll| 15.0.5257.1000| 1244056| 12-Nov-20| 05:56 \nppt.conversion.ppintl.dll_1033| ppintl.dll| 15.0.5257.1000| 1244056| 12-Nov-20| 05:56 \nppt.edit.ppintl.dll_1033| ppintl.dll| 15.0.5257.1000| 1244056| 12-Nov-20| 05:56 \npreviewtemplate.potx_1033| previewtemplate.potx| | 284446| 12-Nov-20| 05:56 \npreviewtemplate2.potx_1033| previewtemplate2.potx| | 298302| 12-Nov-20| 05:56 \npptpia.dll| microsoft.office.interop.powerpoint.dll| 15.0.5301.1000| 406424| 12-Nov-20| 05:56 \nmsppt.olb| msppt.olb| | 416456| 12-Nov-20| 05:56 \npowerpnt.exe| powerpnt.exe| 15.0.5301.1000| 1850264| 12-Nov-20| 05:56 \npowerpnt.man| powerpnt.exe.manifest| | 3816| 12-Nov-20| 05:56 \nppcore.dll| ppcore.dll| 15.0.5301.1000| 16131480| 12-Nov-20| 05:56 \nppresources.dll| ppresources.dll| | 1286304| 12-Nov-20| 05:56 \nmssrintl.dll_1033| mssrintl.dll| 15.0.4703.1000| 30912| 12-Nov-20| 05:56 \nmsosrec.exe| msosrec.exe| 15.0.5085.1000| 232728| 12-Nov-20| 05:56 \nppintl.dll.idx_dll_1025| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 06:07 \nppintl.rest.idx_dll_1025| ppintl.rest.idx_dll| 15.0.4989.1000| 161448| 12-Nov-20| 06:07 \nppintl.dll.idx_dll_1026| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 06:07 \nppintl.rest.idx_dll_1026| ppintl.rest.idx_dll| 15.0.4989.1000| 163496| 12-Nov-20| 06:07 \nppintl.dll.idx_dll_1029| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 06:07 \nppintl.rest.idx_dll_1029| ppintl.rest.idx_dll| 15.0.4989.1000| 161968| 12-Nov-20| 06:07 \nppintl.dll.idx_dll_1030| ppintl.dll.idx_dll| 15.0.4442.1000| 17024| 12-Nov-20| 06:07 \nppintl.rest.idx_dll_1030| ppintl.rest.idx_dll| 15.0.4989.1000| 161456| 12-Nov-20| 06:07 \nppintl.dll.idx_dll_1031| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 06:07 \nppintl.rest.idx_dll_1031| ppintl.rest.idx_dll| 15.0.4989.1000| 161448| 12-Nov-20| 06:07 \nppintl.dll.idx_dll_1032| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 06:07 \nppintl.rest.idx_dll_1032| ppintl.rest.idx_dll| 15.0.4989.1000| 162480| 12-Nov-20| 06:07 \nppintl.rest.idx_dll_1033| ppintl.rest.idx_dll| 15.0.4741.1000| 154824| 12-Nov-20| 05:56 \nppintl.rest.idx_dll_3082| ppintl.rest.idx_dll| 15.0.4989.1000| 161960| 12-Nov-20| 06:07 \nppintl.dll.idx_dll_1061| ppintl.dll.idx_dll| 15.0.4420.1017| 17024| 12-Nov-20| 06:07 \nppintl.rest.idx_dll_1061| ppintl.rest.idx_dll| 15.0.5007.1000| 162480| 12-Nov-20| 06:07 \nppintl.dll.idx_dll_1035| ppintl.dll.idx_dll| 15.0.4442.1000| 17536| 12-Nov-20| 06:07 \nppintl.rest.idx_dll_1035| ppintl.rest.idx_dll| 15.0.4989.1000| 161456| 12-Nov-20| 06:07 \nppintl.rest.idx_dll_1036| ppintl.rest.idx_dll| 15.0.4989.1000| 161960| 12-Nov-20| 06:07 \nppintl.dll.idx_dll_1037| ppintl.dll.idx_dll| 15.0.4420.1017| 17024| 12-Nov-20| 06:07 \nppintl.rest.idx_dll_1037| ppintl.rest.idx_dll| 15.0.4989.1000| 162480| 12-Nov-20| 06:07 \nppintl.dll.idx_dll_1081| ppintl.dll.idx_dll| 15.0.4420.1017| 17536| 12-Nov-20| 06:07 \nppintl.rest.idx_dll_1081| ppintl.rest.idx_dll| 15.0.4989.1000| 162480| 12-Nov-20| 06:07 \nppintl.dll.idx_dll_1050| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 06:07 \nppintl.rest.idx_dll_1050| ppintl.rest.idx_dll| 15.0.4989.1000| 162992| 12-Nov-20| 06:07 \nppintl.dll.idx_dll_1038| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 06:07 \nppintl.rest.idx_dll_1038| ppintl.rest.idx_dll| 15.0.4989.1000| 160944| 12-Nov-20| 06:07 \nppintl.dll.idx_dll_1057| ppintl.dll.idx_dll| 15.0.4463.1000| 16960| 12-Nov-20| 06:08 \nppintl.rest.idx_dll_1057| ppintl.rest.idx_dll| 15.0.4989.1000| 162480| 12-Nov-20| 06:08 \nppintl.dll.idx_dll_1040| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 06:08 \nppintl.rest.idx_dll_1040| ppintl.rest.idx_dll| 15.0.4989.1000| 160944| 12-Nov-20| 06:08 \nppintl.rest.idx_dll_1041| ppintl.rest.idx_dll| 15.0.4989.1000| 159400| 12-Nov-20| 06:07 \nppintl.dll.idx_dll_1087| ppintl.dll.idx_dll| 15.0.4454.1000| 17472| 12-Nov-20| 06:08 \nppintl.rest.idx_dll_1087| ppintl.rest.idx_dll| 15.0.4989.1000| 159920| 12-Nov-20| 06:08 \nppintl.dll.idx_dll_1042| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 06:08 \nppintl.rest.idx_dll_1042| ppintl.rest.idx_dll| 15.0.5007.1000| 157872| 12-Nov-20| 06:08 \nppintl.dll.idx_dll_1063| ppintl.dll.idx_dll| 15.0.4420.1017| 17024| 12-Nov-20| 06:08 \nppintl.rest.idx_dll_1063| ppintl.rest.idx_dll| 15.0.4989.1000| 162472| 12-Nov-20| 06:08 \nppintl.dll.idx_dll_1062| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 06:08 \nppintl.rest.idx_dll_1062| ppintl.rest.idx_dll| 15.0.4989.1000| 161968| 12-Nov-20| 06:08 \nppintl.dll.idx_dll_1086| ppintl.dll.idx_dll| 15.0.4460.1000| 16960| 12-Nov-20| 06:08 \nppintl.rest.idx_dll_1086| ppintl.rest.idx_dll| 15.0.4989.1000| 161456| 12-Nov-20| 06:08 \nppintl.dll.idx_dll_1044| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 06:08 \nppintl.rest.idx_dll_1044| ppintl.rest.idx_dll| 15.0.4989.1000| 161456| 12-Nov-20| 06:08 \nppintl.dll.idx_dll_1043| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 06:08 \nppintl.rest.idx_dll_1043| ppintl.rest.idx_dll| 15.0.4989.1000| 161448| 12-Nov-20| 06:08 \nppintl.dll.idx_dll_1045| ppintl.dll.idx_dll| 15.0.4442.1000| 17008| 12-Nov-20| 06:08 \nppintl.rest.idx_dll_1045| ppintl.rest.idx_dll| 15.0.4989.1000| 162992| 12-Nov-20| 06:08 \nppintl.dll.idx_dll_1046| ppintl.dll.idx_dll| 15.0.4420.1017| 17520| 12-Nov-20| 06:08 \nppintl.rest.idx_dll_1046| ppintl.rest.idx_dll| 15.0.4989.1000| 164016| 12-Nov-20| 06:08 \nppintl.dll.idx_dll_2070| ppintl.dll.idx_dll| 15.0.4442.1000| 17024| 12-Nov-20| 06:08 \nppintl.rest.idx_dll_2070| ppintl.rest.idx_dll| 15.0.4989.1000| 163504| 12-Nov-20| 06:08 \nppintl.dll.idx_dll_1048| ppintl.dll.idx_dll| 15.0.4420.1017| 17024| 12-Nov-20| 06:08 \nppintl.rest.idx_dll_1048| ppintl.rest.idx_dll| 15.0.4989.1000| 161960| 12-Nov-20| 06:08 \nppintl.dll.idx_dll_1049| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 06:08 \nppintl.rest.idx_dll_1049| ppintl.rest.idx_dll| 15.0.4989.1000| 161456| 12-Nov-20| 06:08 \nppintl.dll.idx_dll_1051| ppintl.dll.idx_dll| 15.0.4466.1000| 16960| 12-Nov-20| 06:08 \nppintl.rest.idx_dll_1051| ppintl.rest.idx_dll| 15.0.4989.1000| 161960| 12-Nov-20| 06:08 \nppintl.dll.idx_dll_1060| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 06:08 \nppintl.rest.idx_dll_1060| ppintl.rest.idx_dll| 15.0.4989.1000| 162992| 12-Nov-20| 06:08 \nppintl.dll.idx_dll_2074| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 06:08 \nppintl.rest.idx_dll_2074| ppintl.rest.idx_dll| 15.0.4989.1000| 162984| 12-Nov-20| 06:08 \nppintl.dll.idx_dll_1053| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 06:08 \nppintl.rest.idx_dll_1053| ppintl.rest.idx_dll| 15.0.4989.1000| 161448| 12-Nov-20| 06:08 \nppintl.dll.idx_dll_1054| ppintl.dll.idx_dll| 15.0.4448.1000| 16960| 12-Nov-20| 06:08 \nppintl.rest.idx_dll_1054| ppintl.rest.idx_dll| 15.0.4989.1000| 160432| 12-Nov-20| 06:08 \nppintl.dll.idx_dll_1055| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 06:08 \nppintl.rest.idx_dll_1055| ppintl.rest.idx_dll| 15.0.4989.1000| 162992| 12-Nov-20| 06:08 \nppintl.dll.idx_dll_1058| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 06:08 \nppintl.rest.idx_dll_1058| ppintl.rest.idx_dll| 15.0.4989.1000| 161968| 12-Nov-20| 06:08 \nppintl.dll.idx_dll_1066| ppintl.dll.idx_dll| 15.0.4469.1000| 17488| 12-Nov-20| 06:08 \nppintl.rest.idx_dll_1066| ppintl.rest.idx_dll| 15.0.4989.1000| 164016| 12-Nov-20| 06:08 \nppintl.dll.idx_dll_2052| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 06:09 \nppintl.rest.idx_dll_2052| ppintl.rest.idx_dll| 15.0.4989.1000| 158896| 12-Nov-20| 06:09 \nppintl.dll.idx_dll_1028| ppintl.dll.idx_dll| 15.0.4420.1017| 17008| 12-Nov-20| 06:09 \nppintl.rest.idx_dll_1028| ppintl.rest.idx_dll| 15.0.4989.1000| 158888| 12-Nov-20| 06:09 \npreviewtemplate.potx_1025| previewtemplate.potx| | 284149| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1025| previewtemplate2.potx| | 282751| 12-Nov-20| 05:48 \npreviewtemplate.potx_1026| previewtemplate.potx| | 291013| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1026| previewtemplate2.potx| | 304844| 12-Nov-20| 05:48 \npreviewtemplate.potx_1029| previewtemplate.potx| | 284022| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1029| previewtemplate2.potx| | 297886| 12-Nov-20| 05:48 \npreviewtemplate.potx_1030| previewtemplate.potx| | 281964| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1030| previewtemplate2.potx| | 295813| 12-Nov-20| 05:48 \npreviewtemplate.potx_1031| previewtemplate.potx| | 279194| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1031| previewtemplate2.potx| | 296798| 12-Nov-20| 05:48 \npreviewtemplate.potx_1032| previewtemplate.potx| | 288590| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1032| previewtemplate2.potx| | 236177| 12-Nov-20| 05:48 \npreviewtemplate.potx_3082| previewtemplate.potx| | 280532| 12-Nov-20| 05:48 \npreviewtemplate2.potx_3082| previewtemplate2.potx| | 294348| 12-Nov-20| 05:48 \npreviewtemplate.potx_1061| previewtemplate.potx| | 282450| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1061| previewtemplate2.potx| | 282464| 12-Nov-20| 05:48 \npreviewtemplate.potx_1035| previewtemplate.potx| | 288036| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1035| previewtemplate2.potx| | 288029| 12-Nov-20| 05:48 \npreviewtemplate.potx_1036| previewtemplate.potx| | 282886| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1036| previewtemplate2.potx| | 296718| 12-Nov-20| 05:48 \npreviewtemplate.potx_1037| previewtemplate.potx| | 307485| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1037| previewtemplate2.potx| | 309409| 12-Nov-20| 05:48 \npreviewtemplate.potx_1081| previewtemplate.potx| | 282844| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1081| previewtemplate2.potx| | 281452| 12-Nov-20| 05:48 \npreviewtemplate.potx_1050| previewtemplate.potx| | 288631| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1050| previewtemplate2.potx| | 302458| 12-Nov-20| 05:48 \npreviewtemplate.potx_1038| previewtemplate.potx| | 283960| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1038| previewtemplate2.potx| | 297824| 12-Nov-20| 05:48 \npreviewtemplate.potx_1057| previewtemplate.potx| | 284390| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1057| previewtemplate2.potx| | 284384| 12-Nov-20| 05:48 \npreviewtemplate.potx_1040| previewtemplate.potx| | 283264| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1040| previewtemplate2.potx| | 295728| 12-Nov-20| 05:48 \npreviewtemplate.potx_1041| previewtemplate.potx| | 284986| 12-Nov-20| 05:56 \npreviewtemplate2.potx_1041| previewtemplate2.potx| | 283655| 12-Nov-20| 05:56 \npreviewtemplate.potx_1087| previewtemplate.potx| | 290010| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1087| previewtemplate2.potx| | 303805| 12-Nov-20| 05:48 \npreviewtemplate.potx_1042| previewtemplate.potx| | 287903| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1042| previewtemplate2.potx| | 287955| 12-Nov-20| 05:48 \npreviewtemplate.potx_1063| previewtemplate.potx| | 281886| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1063| previewtemplate2.potx| | 281893| 12-Nov-20| 05:48 \npreviewtemplate.potx_1062| previewtemplate.potx| | 281960| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1062| previewtemplate2.potx| | 281968| 12-Nov-20| 05:48 \npreviewtemplate.potx_1086| previewtemplate.potx| | 283148| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1086| previewtemplate2.potx| | 296935| 12-Nov-20| 05:48 \npreviewtemplate.potx_1044| previewtemplate.potx| | 281024| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1044| previewtemplate2.potx| | 296220| 12-Nov-20| 05:48 \npreviewtemplate.potx_1043| previewtemplate.potx| | 283898| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1043| previewtemplate2.potx| | 297762| 12-Nov-20| 05:48 \npreviewtemplate.potx_1045| previewtemplate.potx| | 283992| 12-Nov-20| 05:48 \npreviewtemplate2.potx_1045| previewtemplate2.potx| | 297856| 12-Nov-20| 05:48 \npreviewtemplate.potx_1046| previewtemplate.potx| | 283922| 12-Nov-20| 05:49 \npreviewtemplate2.potx_1046| previewtemplate2.potx| | 297786| 12-Nov-20| 05:49 \npreviewtemplate.potx_2070| previewtemplate.potx| | 283979| 12-Nov-20| 05:49 \npreviewtemplate2.potx_2070| previewtemplate2.potx| | 297843| 12-Nov-20| 05:49 \npreviewtemplate.potx_1048| previewtemplate.potx| | 286565| 12-Nov-20| 05:49 \npreviewtemplate2.potx_1048| previewtemplate2.potx| | 300387| 12-Nov-20| 05:49 \npreviewtemplate.potx_1049| previewtemplate.potx| | 284253| 12-Nov-20| 05:49 \npreviewtemplate2.potx_1049| previewtemplate2.potx| | 298117| 12-Nov-20| 05:49 \npreviewtemplate.potx_1051| previewtemplate.potx| | 283978| 12-Nov-20| 05:49 \npreviewtemplate2.potx_1051| previewtemplate2.potx| | 297842| 12-Nov-20| 05:49 \npreviewtemplate.potx_1060| previewtemplate.potx| | 283927| 12-Nov-20| 05:49 \npreviewtemplate2.potx_1060| previewtemplate2.potx| | 297791| 12-Nov-20| 05:49 \npreviewtemplate.potx_2074| previewtemplate.potx| | 288591| 12-Nov-20| 05:49 \npreviewtemplate2.potx_2074| previewtemplate2.potx| | 302411| 12-Nov-20| 05:49 \npreviewtemplate.potx_1053| previewtemplate.potx| | 282078| 12-Nov-20| 05:49 \npreviewtemplate2.potx_1053| previewtemplate2.potx| | 295924| 12-Nov-20| 05:49 \npreviewtemplate.potx_1054| previewtemplate.potx| | 288407| 12-Nov-20| 05:49 \npreviewtemplate2.potx_1054| previewtemplate2.potx| | 288446| 12-Nov-20| 05:49 \npreviewtemplate.potx_1055| previewtemplate.potx| | 282857| 12-Nov-20| 05:49 \npreviewtemplate2.potx_1055| previewtemplate2.potx| | 282847| 12-Nov-20| 05:49 \npreviewtemplate.potx_1058| previewtemplate.potx| | 289000| 12-Nov-20| 05:49 \npreviewtemplate2.potx_1058| previewtemplate2.potx| | 302818| 12-Nov-20| 05:49 \npreviewtemplate.potx_1066| previewtemplate.potx| | 285066| 12-Nov-20| 05:49 \npreviewtemplate2.potx_1066| previewtemplate2.potx| | 285072| 12-Nov-20| 05:49 \npreviewtemplate.potx_2052| previewtemplate.potx| | 284114| 12-Nov-20| 05:49 \npreviewtemplate2.potx_2052| previewtemplate2.potx| | 284107| 12-Nov-20| 05:49 \npreviewtemplate.potx_1028| previewtemplate.potx| | 283790| 12-Nov-20| 05:49 \npreviewtemplate2.potx_1028| previewtemplate2.potx| | 283797| 12-Nov-20| 05:49 \npowerpnt.veman.xml| powerpnt.visualelementsmanifest.xml| | 344| 12-Nov-20| 05:56 \n \nInformation about protection and securityProtect yourself online: [Windows Security support](<https://support.microsoft.com/hub/4099151>)Learn how we guard against cyber threats: [Microsoft Security](<https://www.microsoft.com/security>)\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mskb", "title": "Description of the security update for PowerPoint 2013: December 8, 2020", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17124"], "modified": "2020-12-08T08:00:00", "id": "KB4484468", "href": "https://support.microsoft.com/en-us/help/4484468", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-12-31T15:25:15", "description": "None\n## Summary\n\nThis security update resolves Microsoft PowerPoint remote code execution vulnerabilities. To learn more about these vulnerabilities, see [Microsoft Common Vulnerabilities and Exposures CVE-2020-17124](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17124>). \n \n**Note** To apply this security update, you must have the release version of [Service Pack 2 for Office 2010](<http://support.microsoft.com/kb/2687455>) installed on the computer.Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2010. It doesn't apply to the Office 2010 Click-to-Run editions, such as Microsoft Office 2010 Home and Student (see [What version of Office am I using?](<https://support.office.com/article/About-Office-What-version-of-Office-am-I-using-932788B8-A3CE-44BF-BB09-E334518B8B19>)).\n\n## How to get and install the update\n\n### Method 1: Microsoft Update\n\nThis update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see [Windows Update: FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>).\n\n### Method 2: Microsoft Update Catalog\n\nTo get the standalone package for this update, go to the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/Search.aspx?q=KB4484372>) website.\n\n### Method 3: Microsoft Download Center\n\nYou can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.\n\n * [Download security update 4484372 for the 32-bit version of PowerPoint 2010](<http://www.microsoft.com/download/details.aspx?familyid=15757573-9df3-4195-acda-c275854089a1>)\n * [Download security update 4484372 for the 64-bit version of PowerPoint 2010](<http://www.microsoft.com/download/details.aspx?familyid=a95ef44a-6c9d-4819-9c87-9b04070d0e16>)\n\n## More information\n\n### Security update deployment information\n\nFor deployment information about this update, see [security update deployment information: December 8, 2020](<https://support.microsoft.com/en-us/help/20201208>).\n\n### Security update replacement information\n\nThis security update replaces previously released security update [4484235](<http://support.microsoft.com/kb/4484235>).\n\n### File hash information\n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \npowerpoint2010-kb4484372-fullfile-x86-glb.exe| 4BFB6D0990759AECE2ECFF3D98C46CAC39B39DDF| 8A71162AD65A9A7696719691DC545C68389F562F22BB0F242B870EE9A17CB3AD \npowerpoint2010-kb4484372-fullfile-x64-glb.exe| BEC613EE878F0EF573581480110D0D761A7F6449| 85EE85898C1328E37491E9576A70FA445999BA1EAEB2C829AF1046A3565185A1 \n \nFile informationThe English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.\n\n## \n\n__\n\nFor all supported x86-based versions of PowerPoint 2010\n\nFile identifier| File name| File version| File size| Date| Time \n---|---|---|---|---|--- \nmsppt.olb| msppt.olb| 14.0.7162.5000| 403,656| 13-Oct-2015| 07:33 \npowerpnt.exe| powerpnt.exe| 14.0.7162.5000| 2,162,352| 14-Oct-2015| 11:29 \npowerpnt.man| powerpnt.exe.manifest| | 3,504| 05-Nov-2009| 11:40 \nppcore.dll| ppcore.dll| 14.0.7263.5000| 9,772,744| 17-Nov-2020| 08:05 \npptico.exe| pptico.exe| 14.0.7120.5000| 3,793,576| 05-Mar-2014| 07:06 \npptpia.dll| microsoft.office.interop.powerpoint.dll| 14.0.7162.5000| 387,784| 13-Oct-2015| 07:32 \n \n## \n\n__\n\nFor all supported x64-based versions of PowerPoint 2010\n\nFile identifier| File name| File version| File size| Date| Time \n---|---|---|---|---|--- \nmsppt.olb| msppt.olb| 14.0.7162.5000| 403,656| 13-Oct-2015| 07:43 \npowerpnt.exe| powerpnt.exe| 14.0.7162.5000| 2,163,888| 14-Oct-2015| 11:30 \npowerpnt.man| powerpnt.exe.manifest| | 3,506| 05-Nov-2009| 11:55 \nppcore.dll| ppcore.dll| 14.0.7263.5000| 15,420,096| 17-Nov-2020| 08:05 \npptico.exe| pptico.exe| 14.0.7120.5000| 3,793,576| 05-Mar-2014| 07:06 \npptpia.dll| microsoft.office.interop.powerpoint.dll| 14.0.7162.5000| 387,784| 13-Oct-2015| 07:42 \n \nInformation about protection and securityProtect yourself online: [Windows Security support](<https://support.microsoft.com/hub/4099151>)Learn how we guard against cyber threats: [Microsoft Security](<https://www.microsoft.com/security>)\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mskb", "title": "Description of the security update for PowerPoint 2010: December 8, 2020", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17124"], "modified": "2020-12-08T08:00:00", "id": "KB4484372", "href": "https://support.microsoft.com/en-us/help/4484372", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-12-31T15:25:41", "description": "None\n## Summary\n\nThis security update resolves Microsoft PowerPoint remote code execution vulnerabilities. To learn more about these vulnerabilities, see [Microsoft Common Vulnerabilities and Exposures CVE-2020-17124](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17124>). \n \n**Note** To apply this security update, you must have the release version of PowerPoint 2016 installed on the computer.Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2016. It doesn't apply to the Office 2016 Click-to-Run editions, such as Microsoft Office 365 Home (see [What version of Office am I using?](<https://support.office.com/en-us/article/About-Office-What-version-of-Office-am-I-using-932788B8-A3CE-44BF-BB09-E334518B8B19>)).\n\n## Improvements and fixes\n\nThis security update contains the following improvement:\n\n * Adds security enhancements that provide a more secure version of the signature scheme for Visual Basic for Applications (VBA) projects. For more information, see Upgrade signed Office VBA macro projects to V3 signature. \n \n**Note** To enable this improvement, you have to install [KB 4486746](<https://support.microsoft.com/help/4486746>), [KB 4486747](<https://support.microsoft.com/help/4486747>), and [KB 4486716](<https://support.microsoft.com/help/4486716>) together with this update.\n\n## How to get and install the update\n\n### Method 1: Microsoft Update\n\nThis update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see [Windows Update: FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>).\n\n### Method 2: Microsoft Update Catalog\n\nTo get the standalone package for this update, go to the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/Search.aspx?q=KB4484393>) website.\n\n### Method 3: Microsoft Download Center\n\nYou can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.\n\n * [Download security update 4484393 for the 32-bit version of PowerPoint 2016](<http://www.microsoft.com/download/details.aspx?familyid=fed827cf-ec9e-4de0-aa33-e4ec68c1ba88>)\n * [Download security update 4484393 for the 64-bit version of PowerPoint 2016](<http://www.microsoft.com/download/details.aspx?familyid=cfa572f6-01b3-4198-9455-05994a5c44d8>)\n\n## More information\n\n### Security update deployment information\n\nFor deployment information about this update, see [security update deployment information: December 8, 2020](<https://support.microsoft.com/en-us/help/20201208>).\n\n### Security update replacement information\n\nThis security update replaces previously released security update [4484246](<http://support.microsoft.com/kb/4484246>).\n\n### File hash information\n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \npowerpoint2016-kb4484393-fullfile-x86-glb.exe| 46DD26AA04273FBB118DB9A7D710DAB5CE434164| A157930BC49CE5725C835CBA9D3748DB85D6E84C7021FDF33B175043B7C604AA \npowerpoint2016-kb4484393-fullfile-x64-glb.exe| 51A6B118B0CE623D3E2DACB2CED3A5DF18F5C708| 6C1DF9156103AC91C3EBC46DAA8EC1DED68105B359B01134DA8B70103BE9D6FC \n \n### File information\n\nThe English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.\n\n## \n\n__\n\nFor all supported x86-based versions of PowerPoint 2016\n\nFile identifier| File name| File version| File size| Date| Time \n---|---|---|---|---|--- \nppintl.dll_1025| ppintl.dll| 16.0.4978.1000| 1228080| 12-Nov-20| 04:47 \nppintl.dll_1026| ppintl.dll| 16.0.4978.1000| 1238536| 12-Nov-20| 04:47 \nppintl.dll_1029| ppintl.dll| 16.0.4978.1000| 1248056| 12-Nov-20| 04:47 \nppintl.dll_1030| ppintl.dll| 16.0.4978.1000| 1226544| 12-Nov-20| 04:47 \nppintl.dll_1031| ppintl.dll| 16.0.4978.1000| 1252152| 12-Nov-20| 04:47 \nppintl.dll_1032| ppintl.dll| 16.0.4978.1000| 1258296| 12-Nov-20| 04:47 \nppintl.dll_3082| ppintl.dll| 16.0.4978.1000| 1235248| 12-Nov-20| 04:47 \nppintl.dll_1061| ppintl.dll| 16.0.4978.1000| 1221944| 12-Nov-20| 04:47 \nppintl.dll_1035| ppintl.dll| 16.0.4978.1000| 1226040| 12-Nov-20| 04:47 \nppintl.dll_1036| ppintl.dll| 16.0.4978.1000| 1248264| 12-Nov-20| 04:47 \nppintl.dll_1037| ppintl.dll| 16.0.4978.1000| 1208640| 12-Nov-20| 04:47 \nppintl.dll_1081| ppintl.dll| 16.0.4978.1000| 1252392| 12-Nov-20| 04:47 \nppintl.dll_1050| ppintl.dll| 16.0.4978.1000| 1229112| 12-Nov-20| 04:47 \nppintl.dll_1038| ppintl.dll| 16.0.4978.1000| 1247544| 12-Nov-20| 04:47 \nppintl.dll_1057| ppintl.dll| 16.0.4978.1000| 1221944| 12-Nov-20| 04:47 \nppintl.dll_1040| ppintl.dll| 16.0.4978.1000| 1231672| 12-Nov-20| 04:48 \nppintl.dll_1041| ppintl.dll| 16.0.4978.1000| 1243960| 12-Nov-20| 04:47 \nppintl.dll_1087| ppintl.dll| 16.0.4978.1000| 1255224| 12-Nov-20| 04:48 \nppintl.dll_1042| ppintl.dll| 16.0.4978.1000| 1233720| 12-Nov-20| 04:48 \nppintl.dll_1063| ppintl.dll| 16.0.4978.1000| 1234952| 12-Nov-20| 04:48 \nppintl.dll_1062| ppintl.dll| 16.0.4978.1000| 1234224| 12-Nov-20| 04:48 \nppintl.dll_1086| ppintl.dll| 16.0.4978.1000| 1224208| 12-Nov-20| 04:48 \nppintl.dll_1044| ppintl.dll| 16.0.4978.1000| 1222960| 12-Nov-20| 04:48 \nppintl.dll_1043| ppintl.dll| 16.0.4978.1000| 1234440| 12-Nov-20| 04:48 \nppintl.dll_1045| ppintl.dll| 16.0.4978.1000| 1248560| 12-Nov-20| 04:48 \nppintl.dll_1046| ppintl.dll| 16.0.4978.1000| 1234472| 12-Nov-20| 04:48 \nppintl.dll_2070| ppintl.dll| 16.0.4978.1000| 1239560| 12-Nov-20| 04:48 \nppintl.dll_1048| ppintl.dll| 16.0.4978.1000| 1253384| 12-Nov-20| 04:48 \nppintl.dll_1049| ppintl.dll| 16.0.4978.1000| 1237808| 12-Nov-20| 04:48 \nppintl.dll_1051| ppintl.dll| 16.0.4978.1000| 1251632| 12-Nov-20| 04:48 \nppintl.dll_1060| ppintl.dll| 16.0.4978.1000| 1230640| 12-Nov-20| 04:48 \nppintl.dll_2074| ppintl.dll| 16.0.4954.1000| 1233656| 12-Nov-20| 04:48 \nppintl.dll_9242| ppintl.dll| 16.0.4978.1000| 1233200| 12-Nov-20| 04:48 \nppintl.dll_1053| ppintl.dll| 16.0.4978.1000| 1223984| 12-Nov-20| 04:48 \nppintl.dll_1054| ppintl.dll| 16.0.4978.1000| 1238840| 12-Nov-20| 04:48 \nppintl.dll_1055| ppintl.dll| 16.0.4978.1000| 1248560| 12-Nov-20| 04:48 \nppintl.dll_1058| ppintl.dll| 16.0.4978.1000| 1239344| 12-Nov-20| 04:48 \nppintl.dll_1066| ppintl.dll| 16.0.4978.1000| 1262600| 12-Nov-20| 04:48 \nppintl.dll_2052| ppintl.dll| 16.0.4978.1000| 1214256| 12-Nov-20| 04:48 \nppintl.dll_1028| ppintl.dll| 16.0.4978.1000| 1216016| 12-Nov-20| 04:48 \nppintl.dll_1033| ppintl.dll| 16.0.4954.1000| 1216312| 11-Nov-20| 04:00 \nmsppt.olb| msppt.olb| | 428288| 11-Nov-20| 04:00 \npowerpnt.man| powerpnt.exe.manifest| | 4172| 11-Nov-20| 04:00 \nppcore.dll| ppcore.dll| 16.0.5095.1000| 12141360| 13-Nov-20| 12:17 \n \n## \n\n__\n\nFor all supported x64-based versions of PowerPoint 2016\n\nFile identifier| File name| File version| File size| Date| Time \n---|---|---|---|---|--- \nppintl.dll_1025| ppintl.dll| 16.0.4978.1000| 1228088| 12-Nov-20| 04:35 \nppt.conversion.ppintl.dll_1025| ppintl.dll| 16.0.4978.1000| 1228088| 12-Nov-20| 04:35 \nppintl.dll_1026| ppintl.dll| 16.0.4978.1000| 1238328| 12-Nov-20| 04:35 \nppt.conversion.ppintl.dll_1026| ppintl.dll| 16.0.4978.1000| 1238328| 12-Nov-20| 04:35 \nppintl.dll_1029| ppintl.dll| 16.0.4978.1000| 1248048| 12-Nov-20| 04:35 \nppt.conversion.ppintl.dll_1029| ppintl.dll| 16.0.4978.1000| 1248048| 12-Nov-20| 04:35 \nppintl.dll_1030| ppintl.dll| 16.0.4978.1000| 1226544| 12-Nov-20| 04:35 \nppt.conversion.ppintl.dll_1030| ppintl.dll| 16.0.4978.1000| 1226544| 12-Nov-20| 04:35 \nppintl.dll_1031| ppintl.dll| 16.0.4978.1000| 1252592| 12-Nov-20| 04:35 \nppt.conversion.ppintl.dll_1031| ppintl.dll| 16.0.4978.1000| 1252592| 12-Nov-20| 04:35 \nppintl.dll_1032| ppintl.dll| 16.0.4978.1000| 1258736| 12-Nov-20| 04:35 \nppt.conversion.ppintl.dll_1032| ppintl.dll| 16.0.4978.1000| 1258736| 12-Nov-20| 04:35 \nppintl.dll_3082| ppintl.dll| 16.0.4978.1000| 1235248| 12-Nov-20| 04:35 \nppt.conversion.ppintl.dll_3082| ppintl.dll| 16.0.4978.1000| 1235248| 12-Nov-20| 04:35 \nppintl.dll_1061| ppintl.dll| 16.0.4978.1000| 1222360| 12-Nov-20| 04:35 \nppt.conversion.ppintl.dll_1061| ppintl.dll| 16.0.4978.1000| 1222360| 12-Nov-20| 04:35 \nppintl.dll_1035| ppintl.dll| 16.0.4978.1000| 1226040| 12-Nov-20| 04:35 \nppt.conversion.ppintl.dll_1035| ppintl.dll| 16.0.4978.1000| 1226040| 12-Nov-20| 04:35 \nppintl.dll_1036| ppintl.dll| 16.0.4978.1000| 1248048| 12-Nov-20| 04:35 \nppt.conversion.ppintl.dll_1036| ppintl.dll| 16.0.4978.1000| 1248048| 12-Nov-20| 04:35 \nppintl.dll_1037| ppintl.dll| 16.0.4978.1000| 1208640| 12-Nov-20| 04:35 \nppt.conversion.ppintl.dll_1037| ppintl.dll| 16.0.4978.1000| 1208640| 12-Nov-20| 04:35 \nppintl.dll_1081| ppintl.dll| 16.0.4978.1000| 1252144| 12-Nov-20| 04:35 \nppt.conversion.ppintl.dll_1081| ppintl.dll| 16.0.4978.1000| 1252144| 12-Nov-20| 04:35 \nppintl.dll_1050| ppintl.dll| 16.0.4978.1000| 1229112| 12-Nov-20| 04:35 \nppt.conversion.ppintl.dll_1050| ppintl.dll| 16.0.4978.1000| 1229112| 12-Nov-20| 04:35 \nppintl.dll_1038| ppintl.dll| 16.0.4978.1000| 1247536| 12-Nov-20| 04:35 \nppt.conversion.ppintl.dll_1038| ppintl.dll| 16.0.4978.1000| 1247536| 12-Nov-20| 04:35 \nppintl.dll_1057| ppintl.dll| 16.0.4978.1000| 1221944| 12-Nov-20| 04:35 \nppt.conversion.ppintl.dll_1057| ppintl.dll| 16.0.4978.1000| 1221944| 12-Nov-20| 04:35 \nppintl.dll_1040| ppintl.dll| 16.0.4978.1000| 1231664| 12-Nov-20| 04:35 \nppt.conversion.ppintl.dll_1040| ppintl.dll| 16.0.4978.1000| 1231664| 12-Nov-20| 04:35 \nppintl.dll_1041| ppintl.dll| 16.0.4978.1000| 1243952| 12-Nov-20| 04:35 \nppt.conversion.ppintl.dll_1041| ppintl.dll| 16.0.4978.1000| 1243952| 12-Nov-20| 04:35 \nppt.edit.ppintl.dll_1041| ppintl.dll| 16.0.4978.1000| 1243952| | \nppintl.dll_1087| ppintl.dll| 16.0.4978.1000| 1255224| 12-Nov-20| 04:35 \nppt.conversion.ppintl.dll_1087| ppintl.dll| 16.0.4978.1000| 1255224| 12-Nov-20| 04:35 \nppintl.dll_1042| ppintl.dll| 16.0.4978.1000| 1233928| 12-Nov-20| 04:35 \nppt.conversion.ppintl.dll_1042| ppintl.dll| 16.0.4978.1000| 1233928| 12-Nov-20| 04:35 \nppintl.dll_1063| ppintl.dll| 16.0.4978.1000| 1234744| 12-Nov-20| 04:35 \nppt.conversion.ppintl.dll_1063| ppintl.dll| 16.0.4978.1000| 1234744| 12-Nov-20| 04:35 \nppintl.dll_1062| ppintl.dll| 16.0.4978.1000| 1234232| 12-Nov-20| 04:35 \nppt.conversion.ppintl.dll_1062| ppintl.dll| 16.0.4978.1000| 1234232| 12-Nov-20| 04:35 \nppintl.dll_1086| ppintl.dll| 16.0.4978.1000| 1224200| 12-Nov-20| 04:35 \nppt.conversion.ppintl.dll_1086| ppintl.dll| 16.0.4978.1000| 1224200| 12-Nov-20| 04:35 \nppintl.dll_1044| ppintl.dll| 16.0.4978.1000| 1222960| 12-Nov-20| 04:35 \nppt.conversion.ppintl.dll_1044| ppintl.dll| 16.0.4978.1000| 1222960| 12-Nov-20| 04:35 \nppintl.dll_1043| ppintl.dll| 16.0.4978.1000| 1234224| 12-Nov-20| 04:35 \nppt.conversion.ppintl.dll_1043| ppintl.dll| 16.0.4978.1000| 1234224| 12-Nov-20| 04:35 \nppintl.dll_1045| ppintl.dll| 16.0.4978.1000| 1248560| 12-Nov-20| 04:35 \nppt.conversion.ppintl.dll_1045| ppintl.dll| 16.0.4978.1000| 1248560| 12-Nov-20| 04:35 \nppintl.dll_1046| ppintl.dll| 16.0.4978.1000| 1234224| 12-Nov-20| 04:35 \nppt.conversion.ppintl.dll_1046| ppintl.dll| 16.0.4978.1000| 1234224| 12-Nov-20| 04:35 \nppintl.dll_2070| ppintl.dll| 16.0.4978.1000| 1239352| 12-Nov-20| 04:36 \nppt.conversion.ppintl.dll_2070| ppintl.dll| 16.0.4978.1000| 1239352| 12-Nov-20| 04:36 \nppintl.dll_1048| ppintl.dll| 16.0.4978.1000| 1253616| 12-Nov-20| 04:36 \nppt.conversion.ppintl.dll_1048| ppintl.dll| 16.0.4978.1000| 1253616| 12-Nov-20| 04:36 \nppintl.dll_1049| ppintl.dll| 16.0.4978.1000| 1237808| 12-Nov-20| 04:36 \nppt.conversion.ppintl.dll_1049| ppintl.dll| 16.0.4978.1000| 1237808| 12-Nov-20| 04:36 \nppintl.dll_1051| ppintl.dll| 16.0.4978.1000| 1251632| 12-Nov-20| 04:36 \nppt.conversion.ppintl.dll_1051| ppintl.dll| 16.0.4978.1000| 1251632| 12-Nov-20| 04:36 \nppintl.dll_1060| ppintl.dll| 16.0.4978.1000| 1230640| 12-Nov-20| 04:36 \nppt.conversion.ppintl.dll_1060| ppintl.dll| 16.0.4978.1000| 1230640| 12-Nov-20| 04:36 \nppintl.dll_2074| ppintl.dll| 16.0.4954.1000| 1233200| 12-Nov-20| 04:36 \nppt.conversion.ppintl.dll_2074| ppintl.dll| 16.0.4954.1000| 1233200| 12-Nov-20| 04:36 \nppintl.dll_9242| ppintl.dll| 16.0.4978.1000| 1233208| 12-Nov-20| 04:36 \nppt.conversion.ppintl.dll_9242| ppintl.dll| 16.0.4978.1000| 1233208| 12-Nov-20| 04:36 \nppt.edit.ppintl.dll_9242| ppintl.dll| 16.0.4978.1000| 1233208| | \nppintl.dll_1053| ppintl.dll| 16.0.4978.1000| 1223992| 12-Nov-20| 04:36 \nppt.conversion.ppintl.dll_1053| ppintl.dll| 16.0.4978.1000| 1223992| 12-Nov-20| 04:36 \nppintl.dll_1054| ppintl.dll| 16.0.4978.1000| 1238832| 12-Nov-20| 04:36 \nppt.conversion.ppintl.dll_1054| ppintl.dll| 16.0.4978.1000| 1238832| 12-Nov-20| 04:36 \nppintl.dll_1055| ppintl.dll| 16.0.4978.1000| 1248560| 12-Nov-20| 04:36 \nppt.conversion.ppintl.dll_1055| ppintl.dll| 16.0.4978.1000| 1248560| 12-Nov-20| 04:36 \nppintl.dll_1058| ppintl.dll| 16.0.4978.1000| 1239560| 12-Nov-20| 04:36 \nppt.conversion.ppintl.dll_1058| ppintl.dll| 16.0.4978.1000| 1239560| 12-Nov-20| 04:36 \nppintl.dll_1066| ppintl.dll| 16.0.4978.1000| 1262376| 12-Nov-20| 04:36 \nppt.conversion.ppintl.dll_1066| ppintl.dll| 16.0.4978.1000| 1262376| 12-Nov-20| 04:36 \nppintl.dll_2052| ppintl.dll| 16.0.4978.1000| 1214264| 12-Nov-20| 04:36 \nppt.conversion.ppintl.dll_2052| ppintl.dll| 16.0.4978.1000| 1214264| 12-Nov-20| 04:36 \nppintl.dll_1028| ppintl.dll| 16.0.4978.1000| 1215800| 12-Nov-20| 04:36 \nppt.conversion.ppintl.dll_1028| ppintl.dll| 16.0.4978.1000| 1215800| 12-Nov-20| 04:36 \nppintl.dll_1033| ppintl.dll| 16.0.4954.1000| 1216312| 11-Nov-20| 04:05 \nppt.conversion.ppintl.dll_1033| ppintl.dll| 16.0.4954.1000| 1216312| 11-Nov-20| 04:05 \nppt.edit.ppintl.dll_1033| ppintl.dll| 16.0.4954.1000| 1216312| | \nmsppt.olb| msppt.olb| | 428280| 11-Nov-20| 04:10 \npowerpnt.man| powerpnt.exe.manifest| | 4172| 11-Nov-20| 04:10 \nppcore.dll| ppcore.dll| 16.0.5095.1000| 18686792| 13-Nov-20| 12:20 \n \nInformation about protection and securityProtect yourself online: [Windows Security support](<https://support.microsoft.com/hub/4099151>)Learn how we guard against cyber threats: [Microsoft Security](<https://www.microsoft.com/security>)\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mskb", "title": "Description of the security update for PowerPoint 2016: December 8, 2020", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17124"], "modified": "2020-12-08T08:00:00", "id": "KB4484393", "href": "https://support.microsoft.com/en-us/help/4484393", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "zdi": [{"lastseen": "2022-01-31T21:56:31", "description": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft PowerPoint. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of PowerPoint presentation files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-12-09T00:00:00", "type": "zdi", "title": "Microsoft PowerPoint PPTX File Use-After-Free Remote Code Execution Vulnerability", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17124"], "modified": "2020-12-09T00:00:00", "id": "ZDI-20-1414", "href": "https://www.zerodayinitiative.com/advisories/ZDI-20-1414/", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "kaspersky": [{"lastseen": "2021-12-22T23:25:13", "description": "### *Detect date*:\n12/08/2020\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface, obtain sensitive information, bypass security restrictions, gain privileges.\n\n### *Exploitation*:\nMalware exists for this vulnerability. Usually such malware is classified as Exploit. [More details](<https://threats.kaspersky.com/en/class/Exploit/>).\n\n### *Affected products*:\nMicrosoft SharePoint Server 2019 \nMicrosoft PowerPoint 2016 (32-bit edition) \nMicrosoft Excel 2010 Service Pack 2 (32-bit editions) \nMicrosoft PowerPoint 2013 Service Pack 1 (32-bit editions) \nMicrosoft Excel 2016 (64-bit edition) \nOffice Online Server \nMicrosoft Office 2019 for Mac \nMicrosoft Excel 2013 Service Pack 1 (64-bit editions) \nMicrosoft Office 2016 (32-bit edition) \nMicrosoft Office 2019 for 64-bit editions \nMicrosoft Excel 2013 RT Service Pack 1 \nMicrosoft SharePoint Enterprise Server 2016 \nMicrosoft Outlook 2013 Service Pack 1 (32-bit editions) \nMicrosoft Office 2010 Service Pack 2 (64-bit editions) \nMicrosoft PowerPoint 2016 (64-bit edition) \nMicrosoft Excel 2010 Service Pack 2 (64-bit editions) \nMicrosoft Outlook 2010 Service Pack 2 (32-bit editions) \nMicrosoft Office 2019 for 32-bit editions \nMicrosoft Office 2016 (64-bit edition) \nMicrosoft Outlook 2010 Service Pack 2 (64-bit editions) \nMicrosoft PowerPoint 2010 Service Pack 2 (64-bit editions) \nMicrosoft SharePoint Foundation 2010 Service Pack 2 \nMicrosoft Office 2010 Service Pack 2 (32-bit editions) \nMicrosoft SharePoint Server 2010 Service Pack 2 \nMicrosoft Outlook 2013 Service Pack 1 (64-bit editions) \nMicrosoft PowerPoint 2013 RT Service Pack 1 \nMicrosoft Office Web Apps 2010 Service Pack 2 \nMicrosoft Office Web Apps 2013 Service Pack 1 \nMicrosoft Excel 2013 Service Pack 1 (32-bit editions) \nMicrosoft SharePoint Foundation 2013 Service Pack 1 \nMicrosoft 365 Apps for Enterprise for 64-bit Systems \nMicrosoft Excel 2016 (32-bit edition) \nMicrosoft 365 Apps for Enterprise for 32-bit Systems \nMicrosoft PowerPoint 2013 Service Pack 1 (64-bit editions) \nMicrosoft PowerPoint 2010 Service Pack 2 (32-bit editions) \nMicrosoft Office Online Server \nMicrosoft Outlook 2016 (64-bit edition) \nMicrosoft Outlook 2013 RT Service Pack 1 \nMicrosoft Outlook 2016 (32-bit edition)\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2020-17129](<https://nvd.nist.gov/vuln/detail/CVE-2020-17129>) \n[CVE-2020-17128](<https://nvd.nist.gov/vuln/detail/CVE-2020-17128>) \n[CVE-2020-17115](<https://nvd.nist.gov/vuln/detail/CVE-2020-17115>) \n[CVE-2020-17123](<https://nvd.nist.gov/vuln/detail/CVE-2020-17123>) \n[CVE-2020-17122](<https://nvd.nist.gov/vuln/detail/CVE-2020-17122>) \n[CVE-2020-17121](<https://nvd.nist.gov/vuln/detail/CVE-2020-17121>) \n[CVE-2020-17120](<https://nvd.nist.gov/vuln/detail/CVE-2020-17120>) \n[CVE-2020-17130](<https://nvd.nist.gov/vuln/detail/CVE-2020-17130>) \n[CVE-2020-17126](<https://nvd.nist.gov/vuln/detail/CVE-2020-17126>) \n[CVE-2020-17125](<https://nvd.nist.gov/vuln/detail/CVE-2020-17125>) \n[CVE-2020-17124](<https://nvd.nist.gov/vuln/detail/CVE-2020-17124>) \n[CVE-2020-17127](<https://nvd.nist.gov/vuln/detail/CVE-2020-17127>) \n[CVE-2020-17089](<https://nvd.nist.gov/vuln/detail/CVE-2020-17089>) \n[CVE-2020-17118](<https://nvd.nist.gov/vuln/detail/CVE-2020-17118>) \n[CVE-2020-17119](<https://nvd.nist.gov/vuln/detail/CVE-2020-17119>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Office](<https://threats.kaspersky.com/en/product/Microsoft-Office/>)\n\n### *CVE-IDS*:\n[CVE-2020-17129](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17129>)9.3Critical \n[CVE-2020-17128](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17128>)9.3Critical \n[CVE-2020-17115](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17115>)6.0High \n[CVE-2020-17123](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17123>)9.3Critical \n[CVE-2020-17122](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17122>)9.3Critical \n[CVE-2020-17121](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17121>)6.5High \n[CVE-2020-17120](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17120>)4.0Warning \n[CVE-2020-17130](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17130>)6.0High \n[CVE-2020-17126](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17126>)2.1Warning \n[CVE-2020-17125](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17125>)9.3Critical \n[CVE-2020-17124](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17124>)9.3Critical \n[CVE-2020-17127](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17127>)9.3Critical \n[CVE-2020-17089](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17089>)6.0High \n[CVE-2020-17119](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17119>)5.0Critical\n\n### *KB list*:\n[4493139](<http://support.microsoft.com/kb/4493139>) \n[4493138](<http://support.microsoft.com/kb/4493138>) \n[4486732](<http://support.microsoft.com/kb/4486732>) \n[4484468](<http://support.microsoft.com/kb/4484468>) \n[4484372](<http://support.microsoft.com/kb/4484372>) \n[4484393](<http://support.microsoft.com/kb/4484393>) \n[4486750](<http://support.microsoft.com/kb/4486750>) \n[4486753](<http://support.microsoft.com/kb/4486753>) \n[4486752](<http://support.microsoft.com/kb/4486752>) \n[4486754](<http://support.microsoft.com/kb/4486754>) \n[4486757](<http://support.microsoft.com/kb/4486757>) \n[4486698](<http://support.microsoft.com/kb/4486698>) \n[4493140](<http://support.microsoft.com/kb/4493140>) \n[4486748](<http://support.microsoft.com/kb/4486748>) \n[4493148](<http://support.microsoft.com/kb/4493148>) \n[4493149](<http://support.microsoft.com/kb/4493149>) \n[4486696](<http://support.microsoft.com/kb/4486696>) \n[4486697](<http://support.microsoft.com/kb/4486697>) \n[4486721](<http://support.microsoft.com/kb/4486721>) \n[4486742](<http://support.microsoft.com/kb/4486742>) \n[4486704](<http://support.microsoft.com/kb/4486704>) \n[4486760](<http://support.microsoft.com/kb/4486760>) \n[4486751](<http://support.microsoft.com/kb/4486751>)\n\n### *Microsoft official advisories*:", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-12-08T00:00:00", "type": "kaspersky", "title": "KLA12023 Multiple vulnerabilities in Microsoft Office", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17089", "CVE-2020-17115", "CVE-2020-17118", "CVE-2020-17119", "CVE-2020-17120", "CVE-2020-17121", "CVE-2020-17122", "CVE-2020-17123", "CVE-2020-17124", "CVE-2020-17125", "CVE-2020-17126", "CVE-2020-17127", "CVE-2020-17128", "CVE-2020-17129", "CVE-2020-17130"], "modified": "2021-02-16T00:00:00", "id": "KLA12023", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12023/", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "rapid7blog": [{"lastseen": "2020-12-12T10:47:13", "description": "\n\nWe close off our 2020 year of Patch Tuesdays with 58 vulnerabilities being addressed. While it's a higher count than our typical December months (high thirties), it's still a nice breath of fresh air given how the past year has been. We do, however, get to celebrate that none of the reported vulnerabilities covered this month has been publicly exploited nor previously publicly disclosed and only 9 of the 58 vulnerabilities have been marked as Critical by Microsoft.\n\nIn terms of actionables, standard procedures can be followed here in terms of how to prioritize which sets of patches to apply first with two exceptions.\n\n## Microsoft Office vulnerabilities\n\nA fair amount of remote code executions targeting Microsoft Excel are being patched up today and while none of them have the Preview Pane set as an attack vector, the volume of remote code execution vulnerabilities pertaining to Microsoft Office this month may suggest a slight re-jig of priorities. That's our first (minor) exception.\n\nThe next exception is likely the most notable piece behind this December 2020 Patch Tuesday: Microsoft Exchange Server.\n\n## Microsoft Exchange Server vulnerabilities\n\nWhile there are a total of six vulnerabilities from Microsoft Exchange Server this month, two of them garner a CVSS score of 9.1 ([CVE-2020-17132](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17132>), [CVE-2020-17142](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17142>)) and one is noted by Microsoft has having a higher chance of exploitability ([CVE-2020-17144](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17144>)). These three warrant an additional examination and may be grounds for prioritizing patching.\n\nThere is currently suspicion that [CVE-2020-17132](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17132>) helps address the patch bypass of [CVE-2020-16875](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-16875>) (CVSS 8.4) from September 2020. As well, both [CVE-2020-17132](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17132>) and [CVE-2020-17142](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17142>) are remote code execution vulnerabilities occurring due to improper validation of cmdlet arguments that affect all supported (as of writing) versions of Microsoft Exchange. One important note to consider is while these vulnerabilities have received a CVSS score of 9.1 and do not require additional user interaction, an attacker must be in an authenticated role in order to exploit this vulnerability.\n\nIn contrast, [CVE-2020-17144](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17144>) which is another remote code execution vulnerability also stemming from improper validation for cmdlet arguments, this one only affects Exchange Server 2010 SP3 and does require additional user interaction to successfully execute. This is extra interesting as [Microsoft Exchange Server 2010 passed end of life back on October 22, 2020](<https://techcommunity.microsoft.com/t5/exchange-team-blog/microsoft-extending-end-of-support-for-exchange-server-2010-to/ba-p/753591>). The introduction of this post-EOL patch for Microsoft Exchange Server 2010 coupled with Microsoft noting this vulnerability to be more likely exploitable does suggest prioritizing this patch a bit earlier.\n\n## New Summary Tables\n\nIn an attempt to provide a bit more summarizing tables, here are this month's patched vulnerabilities split by the product family.\n\n### Azure Vulnerabilities\n\nCVE | Vulnerability Title | Exploited | Disclosed | CVSS3 | has_faq \n---|---|---|---|---|--- \n[CVE-2020-17160](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17160>) | Azure Sphere Security Feature Bypass Vulnerability | False | False | 7.4 | True \n[CVE-2020-16971](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16971>) | Azure SDK for Java Security Feature Bypass Vulnerability | False | False | 7.4 | False \n \n### Browser Vulnerabilities\n\nCVE | Vulnerability Title | Exploited | Disclosed | CVSS3 | has_faq \n---|---|---|---|---|--- \n[CVE-2020-17153](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17153>) | Microsoft Edge for Android Spoofing Vulnerability | False | False | 4.3 | True \n[CVE-2020-17131](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17131>) | Chakra Scripting Engine Memory Corruption Vulnerability | False | False | 4.2 | False \n \n### Developer Tools Vulnerabilities\n\nCVE | Vulnerability Title | Exploited | Disclosed | CVSS3 | has_faq \n---|---|---|---|---|--- \n[CVE-2020-17148](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17148>) | Visual Studio Code Remote Development Extension Remote Code Execution Vulnerability | False | False | 7.8 | True \n[CVE-2020-17150](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17150>) | Visual Studio Code Remote Code Execution Vulnerability | False | False | 7.8 | False \n[CVE-2020-17156](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17156>) | Visual Studio Remote Code Execution Vulnerability | False | False | 7.8 | True \n[CVE-2020-17159](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17159>) | Visual Studio Code Java Extension Pack Remote Code Execution Vulnerability | False | False | 7.8 | False \n[CVE-2020-17002](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17002>) | Azure SDK for C Security Feature Bypass Vulnerability | False | False | 7.4 | False \n[CVE-2020-17135](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17135>) | Azure DevOps Server Spoofing Vulnerability | False | False | 6.4 | False \n[CVE-2020-17145](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17145>) | Azure DevOps Server and Team Foundation Services Spoofing Vulnerability | False | False | 5.4 | False \n \n### ESU Windows Vulnerabilities\n\nCVE | Vulnerability Title | Exploited | Disclosed | CVSS3 | has_faq \n---|---|---|---|---|--- \n[CVE-2020-17140](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17140>) | Windows SMB Information Disclosure Vulnerability | False | False | 8.1 | True \n[CVE-2020-16958](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16958>) | Windows Backup Engine Elevation of Privilege Vulnerability | False | False | 7.8 | False \n[CVE-2020-16959](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16959>) | Windows Backup Engine Elevation of Privilege Vulnerability | False | False | 7.8 | False \n[CVE-2020-16960](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16960>) | Windows Backup Engine Elevation of Privilege Vulnerability | False | False | 7.8 | False \n[CVE-2020-16961](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16961>) | Windows Backup Engine Elevation of Privilege Vulnerability | False | False | 7.8 | False \n[CVE-2020-16962](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16962>) | Windows Backup Engine Elevation of Privilege Vulnerability | False | False | 7.8 | False \n[CVE-2020-16963](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16963>) | Windows Backup Engine Elevation of Privilege Vulnerability | False | False | 7.8 | False \n[CVE-2020-16964](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16964>) | Windows Backup Engine Elevation of Privilege Vulnerability | False | False | 7.8 | False \n[CVE-2020-17098](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17098>) | Windows GDI+ Information Disclosure Vulnerability | False | False | 5.5 | True \n \n### Exchange Server Vulnerabilities\n\nCVE | Vulnerability Title | Exploited | Disclosed | CVSS3 | has_faq \n---|---|---|---|---|--- \n[CVE-2020-17132](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17132>) | Microsoft Exchange Remote Code Execution Vulnerability | False | False | 9.1 | True \n[CVE-2020-17142](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17142>) | Microsoft Exchange Remote Code Execution Vulnerability | False | False | 9.1 | True \n[CVE-2020-17143](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17143>) | Microsoft Exchange Information Disclosure Vulnerability | False | False | 8.8 | True \n[CVE-2020-17141](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17141>) | Microsoft Exchange Remote Code Execution Vulnerability | False | False | 8.4 | True \n[CVE-2020-17144](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17144>) | Microsoft Exchange Remote Code Execution Vulnerability | False | False | 8.4 | True \n[CVE-2020-17117](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17117>) | Microsoft Exchange Remote Code Execution Vulnerability | False | False | 6.6 | False \n \n### Microsoft Dynamics Vulnerabilities\n\nCVE | Vulnerability Title | Exploited | Disclosed | CVSS3 | has_faq \n---|---|---|---|---|--- \n[CVE-2020-17152](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17152>) | Microsoft Dynamics 365 for Finance and Operations (on-premises) Remote Code Execution Vulnerability | False | False | 8.8 | True \n[CVE-2020-17158](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17158>) | Microsoft Dynamics 365 for Finance and Operations (on-premises) Remote Code Execution Vulnerability | False | False | 8.8 | True \n[CVE-2020-17147](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17147>) | Dynamics CRM Webclient Cross-site Scripting Vulnerability | False | False | 8.7 | True \n[CVE-2020-17133](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17133>) | Microsoft Dynamics Business Central/NAV Information Disclosure | False | False | 6.5 | True \n \n### Microsoft Office Vulnerabilities\n\nCVE | Vulnerability Title | Exploited | Disclosed | CVSS3 | has_faq \n---|---|---|---|---|--- \n[CVE-2020-17121](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17121>) | Microsoft SharePoint Remote Code Execution Vulnerability | False | False | 8.8 | True \n[CVE-2020-17118](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17118>) | Microsoft SharePoint Remote Code Execution Vulnerability | False | False | 8.1 | False \n[CVE-2020-17115](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17115>) | Microsoft SharePoint Spoofing Vulnerability | False | False | 8 | True \n[CVE-2020-17122](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17122>) | Microsoft Excel Remote Code Execution Vulnerability | False | False | 7.8 | True \n[CVE-2020-17123](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17123>) | Microsoft Excel Remote Code Execution Vulnerability | False | False | 7.8 | True \n[CVE-2020-17124](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17124>) | Microsoft PowerPoint Remote Code Execution Vulnerability | False | False | 7.8 | True \n[CVE-2020-17125](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17125>) | Microsoft Excel Remote Code Execution Vulnerability | False | False | 7.8 | True \n[CVE-2020-17127](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17127>) | Microsoft Excel Remote Code Execution Vulnerability | False | False | 7.8 | True \n[CVE-2020-17128](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17128>) | Microsoft Excel Remote Code Execution Vulnerability | False | False | 7.8 | True \n[CVE-2020-17129](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17129>) | Microsoft Excel Remote Code Execution Vulnerability | False | False | 7.8 | True \n[CVE-2020-17089](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17089>) | Microsoft SharePoint Elevation of Privilege Vulnerability | False | False | 7.1 | False \n[CVE-2020-17119](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17119>) | Microsoft Outlook Information Disclosure Vulnerability | False | False | 6.5 | True \n[CVE-2020-17130](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17130>) | Microsoft Excel Security Feature Bypass Vulnerability | False | False | 6.5 | True \n[CVE-2020-17126](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17126>) | Microsoft Excel Information Disclosure Vulnerability | False | False | 5.5 | True \n[CVE-2020-17120](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17120>) | Microsoft SharePoint Information Disclosure Vulnerability | False | False | 5.3 | True \n \n### Windows Vulnerabilities\n\nCVE | Vulnerability Title | Exploited | Disclosed | CVSS3 | has_faq \n---|---|---|---|---|--- \n[CVE-2020-17095](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17095>) | Hyper-V Remote Code Execution Vulnerability | False | False | 8.5 | True \n[CVE-2020-17092](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17092>) | Windows Network Connections Service Elevation of Privilege Vulnerability | False | False | 7.8 | False \n[CVE-2020-17134](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17134>) | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | False | False | 7.8 | False \n[CVE-2020-17136](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17136>) | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | False | False | 7.8 | False \n[CVE-2020-17137](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17137>) | DirectX Graphics Kernel Elevation of Privilege Vulnerability | False | False | 7.8 | False \n[CVE-2020-17139](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17139>) | Windows Overlay Filter Security Feature Bypass Vulnerability | False | False | 7.8 | False \n[CVE-2020-17096](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17096>) | Windows NTFS Remote Code Execution Vulnerability | False | False | 7.5 | True \n[CVE-2020-17103](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17103>) | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | False | False | 7 | False \n[CVE-2020-17099](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17099>) | Windows Lock Screen Security Feature Bypass Vulnerability | False | False | 6.8 | True \n[CVE-2020-16996](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16996>) | Kerberos Security Feature Bypass Vulnerability | False | False | 6.5 | True \n[CVE-2020-17094](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17094>) | Windows Error Reporting Information Disclosure Vulnerability | False | False | 5.5 | True \n[CVE-2020-17138](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17138>) | Windows Error Reporting Information Disclosure Vulnerability | False | False | 5.5 | True \n[CVE-2020-17097](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17097>) | Windows Digital Media Receiver Elevation of Privilege Vulnerability | False | False | 3.3 | False \n \n## Summary Graphs\n\n", "cvss3": {}, "published": "2020-12-08T21:36:27", "type": "rapid7blog", "title": "Patch Tuesday - December 2020", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2020-16875", "CVE-2020-16958", "CVE-2020-16959", "CVE-2020-16960", "CVE-2020-16961", "CVE-2020-16962", "CVE-2020-16963", "CVE-2020-16964", "CVE-2020-16971", "CVE-2020-16996", "CVE-2020-17002", "CVE-2020-17089", "CVE-2020-17092", "CVE-2020-17094", "CVE-2020-17095", "CVE-2020-17096", "CVE-2020-17097", "CVE-2020-17098", "CVE-2020-17099", "CVE-2020-17103", "CVE-2020-17115", "CVE-2020-17117", "CVE-2020-17118", "CVE-2020-17119", "CVE-2020-17120", "CVE-2020-17121", "CVE-2020-17122", "CVE-2020-17123", "CVE-2020-17124", "CVE-2020-17125", "CVE-2020-17126", "CVE-2020-17127", "CVE-2020-17128", "CVE-2020-17129", "CVE-2020-17130", "CVE-2020-17131", "CVE-2020-17132", "CVE-2020-17133", "CVE-2020-17134", "CVE-2020-17135", "CVE-2020-17136", "CVE-2020-17137", "CVE-2020-17138", "CVE-2020-17139", "CVE-2020-17140", "CVE-2020-17141", "CVE-2020-17142", "CVE-2020-17143", "CVE-2020-17144", "CVE-2020-17145", "CVE-2020-17147", "CVE-2020-17148", "CVE-2020-17150", "CVE-2020-17152", "CVE-2020-17153", "CVE-2020-17156", "CVE-2020-17158", "CVE-2020-17159", "CVE-2020-17160"], "modified": "2020-12-08T21:36:27", "id": "RAPID7BLOG:99D9180FBF3F900ADB0CDC5EF79EC080", "href": "https://blog.rapid7.com/2020/12/08/patch-tuesday-december-2020/", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}]}