Description
The Windows installation on the remote host is missing security update 4586781. It is, therefore, affected by multiple vulnerabilities. Please review the vendor advisory for more details.
Related
{"id": "SMB_NT_MS20_NOV_4586845.NASL", "vendorId": null, "type": "nessus", "bulletinFamily": "scanner", "title": "KB4586823: Windows 8.1 and Windows Server 2012 R2 November 2020 Security Update", "description": "The Windows installation on the remote host is missing security update 4586781. It is, therefore, affected by multiple vulnerabilities. Please review the vendor advisory for more details.", "published": "2020-11-10T00:00:00", "modified": "2021-11-30T00:00:00", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cvss2": {}, "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "href": "https://www.tenable.com/plugins/nessus/142686", "reporter": "This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17000", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17038", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17024", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17004", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17055", "https://support.microsoft.com/en-us/help/4586823/windows-8-1-update", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17029", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17044", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17056", "https://support.microsoft.com/en-us/help/4586845/windows-8-1-update", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17051", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17025", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17043", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17036", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17068", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17042", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17033", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17027", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17031", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16997", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1599", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17087", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17040", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17047", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17041", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17088", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17011", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17026", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17069", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17028", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17014", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17049", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17032", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17052", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17001", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17034", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17045"], "cvelist": ["CVE-2020-1599", "CVE-2020-16997", "CVE-2020-17000", "CVE-2020-17001", "CVE-2020-17004", "CVE-2020-17011", "CVE-2020-17014", "CVE-2020-17024", "CVE-2020-17025", "CVE-2020-17026", "CVE-2020-17027", "CVE-2020-17028", "CVE-2020-17029", "CVE-2020-17031", "CVE-2020-17032", "CVE-2020-17033", "CVE-2020-17034", "CVE-2020-17036", "CVE-2020-17038", "CVE-2020-17040", "CVE-2020-17041", "CVE-2020-17042", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17045", "CVE-2020-17047", "CVE-2020-17049", "CVE-2020-17051", "CVE-2020-17052", "CVE-2020-17055", "CVE-2020-17056", "CVE-2020-17068", "CVE-2020-17069", "CVE-2020-17087", "CVE-2020-17088"], "immutableFields": [], "lastseen": "2022-06-23T15:12:32", "viewCount": 207, "enchantments": {"dependencies": {"references": [{"type": "attackerkb", "idList": ["AKB:B72B19ED-8E0B-4C11-9C2D-95A25BCC42A6", "AKB:C6F99915-AA1F-419E-A866-FCD1140D6667", "AKB:D354FE9E-B72A-4328-93DD-28578E160D9B", "AKB:EA1619FD-B064-40D9-A0DE-4DBAE0B53132"]}, {"type": "avleonov", "idList": ["AVLEONOV:28E47C69DA4A069031694EB4C2C931BA"]}, {"type": "checkpoint_advisories", "idList": ["CPAI-2020-1158", "CPAI-2020-1163", "CPAI-2020-1165", "CPAI-2020-1175", "CPAI-2020-1176", "CPAI-2020-1177", "CPAI-2020-1188"]}, {"type": "cve", "idList": ["CVE-2020-1599", "CVE-2020-16997", "CVE-2020-17000", "CVE-2020-17001", "CVE-2020-17004", "CVE-2020-17010", "CVE-2020-17011", "CVE-2020-17014", "CVE-2020-17024", "CVE-2020-17025", "CVE-2020-17026", "CVE-2020-17027", "CVE-2020-17028", "CVE-2020-17029", "CVE-2020-17031", "CVE-2020-17032", "CVE-2020-17033", "CVE-2020-17034", "CVE-2020-17036", "CVE-2020-17038", "CVE-2020-17040", "CVE-2020-17041", "CVE-2020-17042", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17045", "CVE-2020-17047", "CVE-2020-17049", "CVE-2020-17051", "CVE-2020-17052", "CVE-2020-17055", "CVE-2020-17056", "CVE-2020-17068", "CVE-2020-17069", "CVE-2020-17087", "CVE-2020-17088"]}, {"type": "githubexploit", "idList": ["D1090FCA-95F0-58E7-AD3C-CF926A704D6B"]}, {"type": "googleprojectzero", "idList": ["GOOGLEPROJECTZERO:7659E73B419D190E6DA39B1523454604"]}, {"type": "kaspersky", "idList": ["KLA11997", "KLA12003", "KLA12004"]}, {"type": "krebs", "idList": ["KREBS:613A537780BD40A6F8E0047CE8D3E6EC"]}, {"type": "mmpc", "idList": ["MMPC:09220892135E7E193EF91FBCABAA3370"]}, {"type": "mscve", "idList": ["MS:CVE-2020-1599", "MS:CVE-2020-16997", "MS:CVE-2020-17000", "MS:CVE-2020-17001", "MS:CVE-2020-17004", "MS:CVE-2020-17010", "MS:CVE-2020-17011", "MS:CVE-2020-17014", "MS:CVE-2020-17024", "MS:CVE-2020-17025", "MS:CVE-2020-17026", "MS:CVE-2020-17027", "MS:CVE-2020-17028", "MS:CVE-2020-17029", "MS:CVE-2020-17031", "MS:CVE-2020-17032", "MS:CVE-2020-17033", "MS:CVE-2020-17034", "MS:CVE-2020-17036", "MS:CVE-2020-17038", "MS:CVE-2020-17040", "MS:CVE-2020-17041", "MS:CVE-2020-17042", "MS:CVE-2020-17043", "MS:CVE-2020-17044", "MS:CVE-2020-17045", "MS:CVE-2020-17047", "MS:CVE-2020-17049", "MS:CVE-2020-17051", "MS:CVE-2020-17052", "MS:CVE-2020-17055", "MS:CVE-2020-17056", "MS:CVE-2020-17068", "MS:CVE-2020-17069", "MS:CVE-2020-17087", "MS:CVE-2020-17088"]}, {"type": "mskb", "idList": ["KB4586768", "KB4586781", "KB4586786", "KB4586787", "KB4586793", "KB4586805", "KB4586807", "KB4586808", "KB4586817", "KB4586823", "KB4586827", "KB4586830", "KB4586834", "KB4586845", "KB4598243", "KB4598278", "KB4598279", "KB4598285", "KB4598288", "KB5000803", "KB5000840", "KB5000841", "KB5000844", "KB5000847", "KB5000848", "KB5000851", "KB5000853", "KB5000856", "KB5001330", "KB5001337", "KB5001342", "KB5001347", "KB5004237", "KB5004238", "KB5004244", "KB5004285", "KB5004289", "KB5004294", "KB5004298", "KB5004299", "KB5004302", "KB5004305", "KB5004307", "KB5014677"]}, {"type": "mssecure", "idList": ["MSSECURE:09220892135E7E193EF91FBCABAA3370"]}, {"type": "nessus", "idList": ["SMB_NT_MS20_NOV_4586781.NASL", "SMB_NT_MS20_NOV_4586785.NASL", "SMB_NT_MS20_NOV_4586786.NASL", "SMB_NT_MS20_NOV_4586787.NASL", "SMB_NT_MS20_NOV_4586793.NASL", "SMB_NT_MS20_NOV_4586817.NASL", "SMB_NT_MS20_NOV_4586827.NASL", "SMB_NT_MS20_NOV_4586830.NASL", "SMB_NT_MS20_NOV_4586834.NASL", "SMB_NT_MS20_NOV_INTERNET_EXPLORER.NASL", "SMB_NT_MS21_JAN_4598278.NASL"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:160028"]}, {"type": "qualysblog", "idList": ["QUALYSBLOG:0082A77BD8EFFF48B406D107FEFD0DD3", "QUALYSBLOG:448FF9823134BB757F9B4F865B148EBC", "QUALYSBLOG:84DFCF34CC23A9FDDFBD73DEF70C8C04"]}, {"type": "rapid7blog", "idList": ["RAPID7BLOG:5C1C01CE46935D3FDB62B946B79E9801", "RAPID7BLOG:5CDF95FB2AC31414FD390E0E0A47E057"]}, {"type": "redhatcve", "idList": ["RH:CVE-2020-17049"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2021:3647-1"]}, {"type": "thn", "idList": ["THN:7AD5261E90CC5E52D9933B8F13139A3E", "THN:89153A67BADBEDB4D309DCACBFF2EA7F", "THN:955CBC4C8C3F414A1ED3D5F7CAA08A9F", "THN:DAE548E4C591A2718BC3A3D2C9440FB1"]}, {"type": "threatpost", "idList": ["THREATPOST:2AAD8D184B893593E4E3B11FE31F97B3", "THREATPOST:D48D061BB27415A9A171838BA457EB0E"]}, {"type": "zdi", "idList": ["ZDI-20-1366"]}, {"type": "zdt", "idList": ["1337DAY-ID-35222"]}]}, "score": {"value": 0.3, "vector": "NONE"}, "backreferences": {"references": [{"type": "attackerkb", "idList": ["AKB:B72B19ED-8E0B-4C11-9C2D-95A25BCC42A6", "AKB:C6F99915-AA1F-419E-A866-FCD1140D6667", "AKB:D354FE9E-B72A-4328-93DD-28578E160D9B"]}, {"type": "avleonov", "idList": ["AVLEONOV:28E47C69DA4A069031694EB4C2C931BA"]}, {"type": "checkpoint_advisories", "idList": ["CPAI-2020-1158", "CPAI-2020-1163", "CPAI-2020-1165", "CPAI-2020-1175", "CPAI-2020-1176", "CPAI-2020-1177", "CPAI-2020-1188"]}, {"type": "cve", "idList": ["CVE-2020-1599", "CVE-2020-16997", "CVE-2020-17000", "CVE-2020-17001", "CVE-2020-17004", "CVE-2020-17011", "CVE-2020-17014", "CVE-2020-17024", "CVE-2020-17025", "CVE-2020-17026", "CVE-2020-17027", "CVE-2020-17028", "CVE-2020-17029", "CVE-2020-17031", "CVE-2020-17032", "CVE-2020-17033", "CVE-2020-17034", "CVE-2020-17036", "CVE-2020-17038", "CVE-2020-17040", "CVE-2020-17041", "CVE-2020-17042", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17045", "CVE-2020-17047", "CVE-2020-17049", "CVE-2020-17051", "CVE-2020-17052", "CVE-2020-17055", "CVE-2020-17056", "CVE-2020-17068", "CVE-2020-17069", "CVE-2020-17087", "CVE-2020-17088"]}, {"type": "githubexploit", "idList": ["D1090FCA-95F0-58E7-AD3C-CF926A704D6B"]}, {"type": "googleprojectzero", "idList": ["GOOGLEPROJECTZERO:7659E73B419D190E6DA39B1523454604"]}, {"type": "kaspersky", "idList": ["KLA12004"]}, {"type": "krebs", "idList": ["KREBS:613A537780BD40A6F8E0047CE8D3E6EC"]}, {"type": "metasploit", "idList": ["MSF:ILITIES/MSFT-CVE-2020-17014/", "MSF:ILITIES/MSFT-CVE-2020-17024/"]}, {"type": "mscve", "idList": ["MS:CVE-2020-1599", "MS:CVE-2020-16997", "MS:CVE-2020-17000", "MS:CVE-2020-17001", "MS:CVE-2020-17004", "MS:CVE-2020-17011", "MS:CVE-2020-17014", "MS:CVE-2020-17024", "MS:CVE-2020-17025", "MS:CVE-2020-17026", "MS:CVE-2020-17027", "MS:CVE-2020-17028", "MS:CVE-2020-17029", "MS:CVE-2020-17031", "MS:CVE-2020-17032", "MS:CVE-2020-17033", "MS:CVE-2020-17034", "MS:CVE-2020-17036", "MS:CVE-2020-17038", "MS:CVE-2020-17040", "MS:CVE-2020-17041", "MS:CVE-2020-17042", "MS:CVE-2020-17043", "MS:CVE-2020-17044", "MS:CVE-2020-17045", "MS:CVE-2020-17047", "MS:CVE-2020-17049", "MS:CVE-2020-17051", "MS:CVE-2020-17052", "MS:CVE-2020-17055", "MS:CVE-2020-17056", "MS:CVE-2020-17068", "MS:CVE-2020-17069", "MS:CVE-2020-17087", "MS:CVE-2020-17088"]}, {"type": "mskb", "idList": ["KB4586793", "KB4586830"]}, {"type": "nessus", "idList": ["SMB_HOTFIXES.NASL", "SMB_NT_MS20_NOV_INTERNET_EXPLORER.NASL", "SMB_NT_MS21_JAN_4598278.NASL"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:160028"]}, {"type": "qualysblog", "idList": ["QUALYSBLOG:448FF9823134BB757F9B4F865B148EBC", "QUALYSBLOG:84DFCF34CC23A9FDDFBD73DEF70C8C04"]}, {"type": "rapid7blog", "idList": ["RAPID7BLOG:5C1C01CE46935D3FDB62B946B79E9801"]}, {"type": "redhatcve", "idList": ["RH:CVE-2020-17049"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2021:3647-1"]}, {"type": "thn", "idList": ["THN:7AD5261E90CC5E52D9933B8F13139A3E", "THN:89153A67BADBEDB4D309DCACBFF2EA7F"]}, {"type": "threatpost", "idList": ["THREATPOST:2AAD8D184B893593E4E3B11FE31F97B3", "THREATPOST:D48D061BB27415A9A171838BA457EB0E"]}, {"type": "zdi", "idList": ["ZDI-20-1366"]}, {"type": "zdt", "idList": ["1337DAY-ID-35222"]}]}, "exploitation": null, "vulnersScore": 0.3}, "_state": {"dependencies": 1659988328, "score": 1659887192}, "_internal": {"score_hash": "982737ad87acf631bcca7132d4ef5234"}, "pluginID": "142686", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(142686);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/11/30\");\n\n script_cve_id(\n \"CVE-2020-1599\",\n \"CVE-2020-16997\",\n \"CVE-2020-17000\",\n \"CVE-2020-17001\",\n \"CVE-2020-17004\",\n \"CVE-2020-17011\",\n \"CVE-2020-17014\",\n \"CVE-2020-17024\",\n \"CVE-2020-17025\",\n \"CVE-2020-17026\",\n \"CVE-2020-17027\",\n \"CVE-2020-17028\",\n \"CVE-2020-17029\",\n \"CVE-2020-17031\",\n \"CVE-2020-17032\",\n \"CVE-2020-17033\",\n \"CVE-2020-17034\",\n \"CVE-2020-17036\",\n \"CVE-2020-17038\",\n \"CVE-2020-17040\",\n \"CVE-2020-17041\",\n \"CVE-2020-17042\",\n \"CVE-2020-17043\",\n \"CVE-2020-17044\",\n \"CVE-2020-17045\",\n \"CVE-2020-17047\",\n \"CVE-2020-17049\",\n \"CVE-2020-17051\",\n \"CVE-2020-17052\",\n \"CVE-2020-17055\",\n \"CVE-2020-17056\",\n \"CVE-2020-17068\",\n \"CVE-2020-17069\",\n \"CVE-2020-17087\",\n \"CVE-2020-17088\"\n );\n script_xref(name:\"MSKB\", value:\"4586823\");\n script_xref(name:\"MSKB\", value:\"4586845\");\n script_xref(name:\"MSFT\", value:\"MS20-4586823\");\n script_xref(name:\"MSFT\", value:\"MS20-4586845\");\n script_xref(name:\"IAVA\", value:\"2020-A-0513-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0518-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0521-S\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/05/03\");\n\n script_name(english:\"KB4586823: Windows 8.1 and Windows Server 2012 R2 November 2020 Security Update\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Windows installation on the remote host is missing security update 4586781. It is, therefore,\n affected by multiple vulnerabilities. Please review the vendor advisory for more details.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/4586823/windows-8-1-update\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/4586845/windows-8-1-update\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Only update KB4586823 or Cumulative Update KB4586845.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17051\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/11/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/11/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/11/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS20-11\";\nkbs = make_list('4586823', '4586845');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win81:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\n# Windows 8 EOL\nproductname = get_kb_item_or_exit(\"SMB/ProductName\", exit_code:1);\nif (\"Windows 8\" >< productname && \"8.1\" >!< productname)\n audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:\"6.3\",\n sp:0,\n rollup_date:\"11_2020\",\n bulletin:bulletin,\n rollup_kb_list:[4586823, 4586845])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "naslFamily": "Windows : Microsoft Bulletins", "cpe": ["cpe:/o:microsoft:windows"], "solution": "Apply Security Only update KB4586823 or Cumulative Update KB4586845.", "nessusSeverity": "Critical", "cvssScoreSource": "CVE-2020-17051", "vpr": {"risk factor": "Critical", "score": "9.6"}, "exploitAvailable": true, "exploitEase": "Exploits are available", "patchPublicationDate": "2020-11-10T00:00:00", "vulnerabilityPublicationDate": "2020-11-10T00:00:00", "exploitableWith": []}
{"kaspersky": [{"lastseen": "2022-01-19T18:03:04", "description": "### *Detect date*:\n11/10/2020\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, execute arbitrary code, cause denial of service, spoof user interface, bypass security restrictions.\n\n### *Exploitation*:\nMalware exists for this vulnerability. Usually such malware is classified as Exploit. [More details](<https://threats.kaspersky.com/en/class/Exploit/>).\n\n### *Affected products*:\nWindows 10 Version 1909 for ARM64-based Systems \nWindows Server 2019 \nWindows 10 Version 1903 for ARM64-based Systems \nWindows 8.1 for x64-based systems \nWindows Server, version 1903 (Server Core installation) \nWindows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) \nWindows 10 Version 1809 for ARM64-based Systems \nWindows 10 Version 1803 for 32-bit Systems \nWindows Server 2012 R2 (Server Core installation) \nWindows 10 Version 1607 for x64-based Systems \nWindows Server 2019 (Server Core installation) \nWindows 10 Version 1809 for 32-bit Systems \nWindows Server, version 1909 (Server Core installation) \nWindows 10 Version 20H2 for x64-based Systems \nWindows Server 2008 for x64-based Systems Service Pack 2 \nWindows Server 2008 for 32-bit Systems Service Pack 2 \nWindows 10 for 32-bit Systems \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 \nWindows 10 Version 2004 for ARM64-based Systems \nWindows 10 Version 20H2 for 32-bit Systems \nWindows 10 Version 1909 for x64-based Systems \nWindows RT 8.1 \nWindows 10 Version 1803 for ARM64-based Systems \nWindows Server, version 20H2 (Server Core Installation) \nWindows 10 Version 1607 for 32-bit Systems \nWindows 10 Version 1809 for x64-based Systems \nWindows Server 2012 (Server Core installation) \nWindows 10 Version 2004 for x64-based Systems \nWindows 10 Version 2004 for 32-bit Systems \nWindows 10 Version 1903 for x64-based Systems \nWindows 10 Version 1803 for x64-based Systems \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) \nWindows 10 for x64-based Systems \nWindows Server 2012 \nWindows Server 2016 (Server Core installation) \nWindows 7 for x64-based Systems Service Pack 1 \nWindows 8.1 for 32-bit systems \nWindows Server 2012 R2 \nWindows 10 Version 1903 for 32-bit Systems \nWindows Server 2016 \nWindows 10 Version 20H2 for ARM64-based Systems \nWindows 10 Version 1909 for 32-bit Systems \nWindows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) \nWindows Server, version 2004 (Server Core installation) \nWindows 7 for 32-bit Systems Service Pack 1\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2020-17043](<https://nvd.nist.gov/vuln/detail/CVE-2020-17043>) \n[CVE-2020-17069](<https://nvd.nist.gov/vuln/detail/CVE-2020-17069>) \n[CVE-2020-17087](<https://nvd.nist.gov/vuln/detail/CVE-2020-17087>) \n[CVE-2020-17088](<https://nvd.nist.gov/vuln/detail/CVE-2020-17088>) \n[CVE-2020-17045](<https://nvd.nist.gov/vuln/detail/CVE-2020-17045>) \n[CVE-2020-17051](<https://nvd.nist.gov/vuln/detail/CVE-2020-17051>) \n[CVE-2020-17047](<https://nvd.nist.gov/vuln/detail/CVE-2020-17047>) \n[CVE-2020-17042](<https://nvd.nist.gov/vuln/detail/CVE-2020-17042>) \n[CVE-2020-1599](<https://nvd.nist.gov/vuln/detail/CVE-2020-1599>) \n[CVE-2020-17044](<https://nvd.nist.gov/vuln/detail/CVE-2020-17044>) \n[CVE-2020-16997](<https://nvd.nist.gov/vuln/detail/CVE-2020-16997>) \n[CVE-2020-17014](<https://nvd.nist.gov/vuln/detail/CVE-2020-17014>) \n[CVE-2020-17038](<https://nvd.nist.gov/vuln/detail/CVE-2020-17038>) \n[CVE-2020-17011](<https://nvd.nist.gov/vuln/detail/CVE-2020-17011>) \n[CVE-2020-17029](<https://nvd.nist.gov/vuln/detail/CVE-2020-17029>) \n[CVE-2020-17000](<https://nvd.nist.gov/vuln/detail/CVE-2020-17000>) \n[CVE-2020-17001](<https://nvd.nist.gov/vuln/detail/CVE-2020-17001>) \n[CVE-2020-17068](<https://nvd.nist.gov/vuln/detail/CVE-2020-17068>) \n[CVE-2020-17036](<https://nvd.nist.gov/vuln/detail/CVE-2020-17036>) \n[CVE-2020-17004](<https://nvd.nist.gov/vuln/detail/CVE-2020-17004>) \n[CVE-2020-17049](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-17049>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Windows](<https://threats.kaspersky.com/en/product/Microsoft-Windows/>)\n\n### *CVE-IDS*:\n[CVE-2020-17043](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17043>)6.8High \n[CVE-2020-17069](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17069>)2.1Warning \n[CVE-2020-17087](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17087>)7.2High \n[CVE-2020-17088](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17088>)4.6Warning \n[CVE-2020-17045](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17045>)4.9Warning \n[CVE-2020-17047](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17047>)7.8Critical \n[CVE-2020-17042](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17042>)9.3Critical \n[CVE-2020-1599](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1599>)2.1Warning \n[CVE-2020-17044](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17044>)6.8High \n[CVE-2020-16997](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16997>)4.0Warning \n[CVE-2020-17014](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17014>)6.6High \n[CVE-2020-17038](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17038>)7.2High \n[CVE-2020-17011](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17011>)7.2High \n[CVE-2020-17029](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17029>)4.9Warning \n[CVE-2020-17000](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17000>)2.1Warning \n[CVE-2020-17001](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17001>)4.6Warning \n[CVE-2020-17068](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17068>)7.2High \n[CVE-2020-17036](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17036>)4.9Warning \n[CVE-2020-17004](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17004>)2.1Warning \n[CVE-2020-17049](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17049>)9.0Critical\n\n### *KB list*:\n[4586827](<http://support.microsoft.com/kb/4586827>) \n[4586817](<http://support.microsoft.com/kb/4586817>) \n[4586805](<http://support.microsoft.com/kb/4586805>) \n[4586807](<http://support.microsoft.com/kb/4586807>) \n[5004289](<http://support.microsoft.com/kb/5004289>) \n[5004307](<http://support.microsoft.com/kb/5004307>) \n[5004299](<http://support.microsoft.com/kb/5004299>) \n[5004305](<http://support.microsoft.com/kb/5004305>)\n\n### *Microsoft official advisories*:", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-11-10T00:00:00", "type": "kaspersky", "title": "KLA12003 Multiple vulnerabilities in Microsoft Products (ESU)", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-1599", "CVE-2020-16997", "CVE-2020-17000", "CVE-2020-17001", "CVE-2020-17004", "CVE-2020-17011", "CVE-2020-17014", "CVE-2020-17029", "CVE-2020-17036", "CVE-2020-17038", "CVE-2020-17042", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17045", "CVE-2020-17047", "CVE-2020-17049", "CVE-2020-17051", "CVE-2020-17068", "CVE-2020-17069", "CVE-2020-17087", "CVE-2020-17088"], "modified": "2022-01-18T00:00:00", "id": "KLA12003", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12003/", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-01-19T18:03:01", "description": "### *Detect date*:\n11/10/2020\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, gain privileges, bypass security restrictions, cause denial of service, spoof user interface.\n\n### *Exploitation*:\nMalware exists for this vulnerability. Usually such malware is classified as Exploit. [More details](<https://threats.kaspersky.com/en/class/Exploit/>).\n\n### *Affected products*:\nWindows 10 Version 1909 for ARM64-based Systems \nWindows Server 2019 \nWindows 10 Version 1903 for ARM64-based Systems \nWindows 8.1 for x64-based systems \nWindows Server, version 1903 (Server Core installation) \nRaw Image Extension \nWindows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) \nWindows 10 Version 1809 for ARM64-based Systems \nWindows 10 Version 1803 for 32-bit Systems \nWindows Server 2012 R2 (Server Core installation) \nWindows 10 Version 1607 for x64-based Systems \nWindows Server 2019 (Server Core installation) \nWindows 10 Version 1809 for 32-bit Systems \nWindows Server, version 1909 (Server Core installation) \nWindows 10 Version 20H2 for x64-based Systems \nWindows Server 2008 for x64-based Systems Service Pack 2 \nWindows Server 2008 for 32-bit Systems Service Pack 2 \nWindows 10 for 32-bit Systems \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 \nWindows 10 Version 2004 for ARM64-based Systems \nAV1 Video Extension \nWindows 10 Version 20H2 for 32-bit Systems \nWindows 10 Version 1909 for x64-based Systems \nWindows RT 8.1 \nWebP Image Extension \nWindows 10 Version 1803 for ARM64-based Systems \nWindows Server, version 20H2 (Server Core Installation) \nWindows 10 Version 1607 for 32-bit Systems \nWindows 10 Version 1809 for x64-based Systems \nWindows Server 2012 (Server Core installation) \nWindows 10 Version 2004 for x64-based Systems \nWindows 10 Version 2004 for 32-bit Systems \nWindows 10 Version 1903 for x64-based Systems \nWindows 10 Version 1803 for x64-based Systems \nHEVC Video Extensions \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) \nWindows 10 for x64-based Systems \nWindows Server 2012 \nHEIF Image Extension \nWindows Server 2016 (Server Core installation) \nWindows 7 for x64-based Systems Service Pack 1 \nWindows 8.1 for 32-bit systems \nWindows Server 2012 R2 \nWindows 10 Version 1903 for 32-bit Systems \nWindows Server 2016 \nWindows 10 Version 20H2 for ARM64-based Systems \nWindows 10 Version 1909 for 32-bit Systems \nWindows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) \nWindows Server, version 2004 (Server Core installation) \nWindows 7 for 32-bit Systems Service Pack 1\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2020-17081](<https://nvd.nist.gov/vuln/detail/CVE-2020-17081>) \n[CVE-2020-17082](<https://nvd.nist.gov/vuln/detail/CVE-2020-17082>) \n[CVE-2020-17075](<https://nvd.nist.gov/vuln/detail/CVE-2020-17075>) \n[CVE-2020-17049](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-17049>) \n[CVE-2020-17086](<https://nvd.nist.gov/vuln/detail/CVE-2020-17086>) \n[CVE-2020-17087](<https://nvd.nist.gov/vuln/detail/CVE-2020-17087>) \n[CVE-2020-17088](<https://nvd.nist.gov/vuln/detail/CVE-2020-17088>) \n[CVE-2020-17045](<https://nvd.nist.gov/vuln/detail/CVE-2020-17045>) \n[CVE-2020-17046](<https://nvd.nist.gov/vuln/detail/CVE-2020-17046>) \n[CVE-2020-17047](<https://nvd.nist.gov/vuln/detail/CVE-2020-17047>) \n[CVE-2020-17040](<https://nvd.nist.gov/vuln/detail/CVE-2020-17040>) \n[CVE-2020-17041](<https://nvd.nist.gov/vuln/detail/CVE-2020-17041>) \n[CVE-2020-17042](<https://nvd.nist.gov/vuln/detail/CVE-2020-17042>) \n[CVE-2020-17043](<https://nvd.nist.gov/vuln/detail/CVE-2020-17043>) \n[CVE-2020-17101](<https://nvd.nist.gov/vuln/detail/CVE-2020-17101>) \n[CVE-2020-17026](<https://nvd.nist.gov/vuln/detail/CVE-2020-17026>) \n[CVE-2020-17102](<https://nvd.nist.gov/vuln/detail/CVE-2020-17102>) \n[CVE-2020-17106](<https://nvd.nist.gov/vuln/detail/CVE-2020-17106>) \n[CVE-2020-17028](<https://nvd.nist.gov/vuln/detail/CVE-2020-17028>) \n[CVE-2020-17029](<https://nvd.nist.gov/vuln/detail/CVE-2020-17029>) \n[CVE-2020-17000](<https://nvd.nist.gov/vuln/detail/CVE-2020-17000>) \n[CVE-2020-17001](<https://nvd.nist.gov/vuln/detail/CVE-2020-17001>) \n[CVE-2020-17024](<https://nvd.nist.gov/vuln/detail/CVE-2020-17024>) \n[CVE-2020-17025](<https://nvd.nist.gov/vuln/detail/CVE-2020-17025>) \n[CVE-2020-17004](<https://nvd.nist.gov/vuln/detail/CVE-2020-17004>) \n[CVE-2020-17068](<https://nvd.nist.gov/vuln/detail/CVE-2020-17068>) \n[CVE-2020-17007](<https://nvd.nist.gov/vuln/detail/CVE-2020-17007>) \n[CVE-2020-17069](<https://nvd.nist.gov/vuln/detail/CVE-2020-17069>) \n[CVE-2020-16999](<https://nvd.nist.gov/vuln/detail/CVE-2020-16999>) \n[CVE-2020-17038](<https://nvd.nist.gov/vuln/detail/CVE-2020-17038>) \n[CVE-2020-17034](<https://nvd.nist.gov/vuln/detail/CVE-2020-17034>) \n[CVE-2020-1599](<https://nvd.nist.gov/vuln/detail/CVE-2020-1599>) \n[CVE-2020-17044](<https://nvd.nist.gov/vuln/detail/CVE-2020-17044>) \n[CVE-2020-17109](<https://nvd.nist.gov/vuln/detail/CVE-2020-17109>) \n[CVE-2020-17033](<https://nvd.nist.gov/vuln/detail/CVE-2020-17033>) \n[CVE-2020-17090](<https://nvd.nist.gov/vuln/detail/CVE-2020-17090>) \n[CVE-2020-17027](<https://nvd.nist.gov/vuln/detail/CVE-2020-17027>) \n[CVE-2020-17030](<https://nvd.nist.gov/vuln/detail/CVE-2020-17030>) \n[CVE-2020-17051](<https://nvd.nist.gov/vuln/detail/CVE-2020-17051>) \n[CVE-2020-17057](<https://nvd.nist.gov/vuln/detail/CVE-2020-17057>) \n[CVE-2020-17056](<https://nvd.nist.gov/vuln/detail/CVE-2020-17056>) \n[CVE-2020-17055](<https://nvd.nist.gov/vuln/detail/CVE-2020-17055>) \n[CVE-2020-17108](<https://nvd.nist.gov/vuln/detail/CVE-2020-17108>) \n[CVE-2020-17070](<https://nvd.nist.gov/vuln/detail/CVE-2020-17070>) \n[CVE-2020-17073](<https://nvd.nist.gov/vuln/detail/CVE-2020-17073>) \n[CVE-2020-17014](<https://nvd.nist.gov/vuln/detail/CVE-2020-17014>) \n[CVE-2020-17013](<https://nvd.nist.gov/vuln/detail/CVE-2020-17013>) \n[CVE-2020-17074](<https://nvd.nist.gov/vuln/detail/CVE-2020-17074>) \n[CVE-2020-17011](<https://nvd.nist.gov/vuln/detail/CVE-2020-17011>) \n[CVE-2020-17010](<https://nvd.nist.gov/vuln/detail/CVE-2020-17010>) \n[CVE-2020-17035](<https://nvd.nist.gov/vuln/detail/CVE-2020-17035>) \n[CVE-2020-17078](<https://nvd.nist.gov/vuln/detail/CVE-2020-17078>) \n[CVE-2020-17037](<https://nvd.nist.gov/vuln/detail/CVE-2020-17037>) \n[CVE-2020-17036](<https://nvd.nist.gov/vuln/detail/CVE-2020-17036>) \n[CVE-2020-17031](<https://nvd.nist.gov/vuln/detail/CVE-2020-17031>) \n[CVE-2020-16998](<https://nvd.nist.gov/vuln/detail/CVE-2020-16998>) \n[CVE-2020-17076](<https://nvd.nist.gov/vuln/detail/CVE-2020-17076>) \n[CVE-2020-17032](<https://nvd.nist.gov/vuln/detail/CVE-2020-17032>) \n[CVE-2020-16997](<https://nvd.nist.gov/vuln/detail/CVE-2020-16997>) \n[CVE-2020-17071](<https://nvd.nist.gov/vuln/detail/CVE-2020-17071>) \n[CVE-2020-17113](<https://nvd.nist.gov/vuln/detail/CVE-2020-17113>) \n[CVE-2020-17077](<https://nvd.nist.gov/vuln/detail/CVE-2020-17077>) \n[CVE-2020-17110](<https://nvd.nist.gov/vuln/detail/CVE-2020-17110>) \n[CVE-2020-17107](<https://nvd.nist.gov/vuln/detail/CVE-2020-17107>) \n[CVE-2020-17105](<https://nvd.nist.gov/vuln/detail/CVE-2020-17105>) \n[CVE-2020-17079](<https://nvd.nist.gov/vuln/detail/CVE-2020-17079>) \n[CVE-2020-17012](<https://nvd.nist.gov/vuln/detail/CVE-2020-17012>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Windows Server 2012](<https://threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/>)\n\n### *CVE-IDS*:\n[CVE-2020-17043](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17043>)6.8High \n[CVE-2020-17069](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17069>)2.1Warning \n[CVE-2020-17087](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17087>)7.2High \n[CVE-2020-17088](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17088>)4.6Warning \n[CVE-2020-17045](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17045>)4.9Warning \n[CVE-2020-17047](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17047>)7.8Critical \n[CVE-2020-17042](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17042>)9.3Critical \n[CVE-2020-1599](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1599>)2.1Warning \n[CVE-2020-17044](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17044>)6.8High \n[CVE-2020-16997](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16997>)4.0Warning \n[CVE-2020-17014](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17014>)6.6High \n[CVE-2020-17038](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17038>)7.2High \n[CVE-2020-17011](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17011>)7.2High \n[CVE-2020-17029](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17029>)4.9Warning \n[CVE-2020-17000](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17000>)2.1Warning \n[CVE-2020-17001](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17001>)4.6Warning \n[CVE-2020-17068](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17068>)7.2High \n[CVE-2020-17036](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17036>)4.9Warning \n[CVE-2020-17004](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17004>)2.1Warning \n[CVE-2020-17081](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17081>)5.0Critical \n[CVE-2020-17082](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17082>)7.5Critical \n[CVE-2020-17075](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17075>)4.6Warning \n[CVE-2020-17049](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17049>)9.0Critical \n[CVE-2020-17086](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17086>)7.5Critical \n[CVE-2020-17046](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17046>)4.9Warning \n[CVE-2020-17040](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17040>)7.5Critical \n[CVE-2020-17041](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17041>)7.2High \n[CVE-2020-17101](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17101>)4.6Warning \n[CVE-2020-17026](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17026>)4.6Warning \n[CVE-2020-17102](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17102>)2.1Warning \n[CVE-2020-17106](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17106>)9.3Critical \n[CVE-2020-17028](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17028>)4.6Warning \n[CVE-2020-17024](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17024>)7.2High \n[CVE-2020-17025](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17025>)4.6Warning \n[CVE-2020-17007](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17007>)4.6Warning \n[CVE-2020-16999](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16999>)2.1Warning \n[CVE-2020-17034](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17034>)4.6Warning \n[CVE-2020-17109](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17109>)9.3Critical \n[CVE-2020-17033](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17033>)4.6Warning \n[CVE-2020-17090](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17090>)7.5Critical \n[CVE-2020-17027](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17027>)4.6Warning \n[CVE-2020-17030](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17030>)4.9Warning \n[CVE-2020-17057](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17057>)7.2High \n[CVE-2020-17056](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17056>)2.1Warning \n[CVE-2020-17055](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17055>)6.8High \n[CVE-2020-17108](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17108>)9.3Critical \n[CVE-2020-17070](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17070>)7.2High \n[CVE-2020-17073](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17073>)4.6Warning \n[CVE-2020-17013](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17013>)2.1Warning \n[CVE-2020-17074](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17074>)7.2High \n[CVE-2020-17010](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17010>)7.2High \n[CVE-2020-17035](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17035>)7.2High \n[CVE-2020-17078](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17078>)7.5Critical \n[CVE-2020-17037](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17037>)7.2High \n[CVE-2020-17031](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17031>)4.6Warning \n[CVE-2020-16998](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16998>)4.6Warning \n[CVE-2020-17076](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17076>)7.2High \n[CVE-2020-17032](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17032>)4.6Warning \n[CVE-2020-17071](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17071>)2.1Warning \n[CVE-2020-17113](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17113>)2.1Warning \n[CVE-2020-17077](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17077>)7.2High \n[CVE-2020-17110](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17110>)9.3Critical \n[CVE-2020-17107](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17107>)9.3Critical \n[CVE-2020-17079](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17079>)7.5Critical \n[CVE-2020-17012](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17012>)4.6Warning\n\n### *KB list*:\n[4586785](<http://support.microsoft.com/kb/4586785>) \n[4586793](<http://support.microsoft.com/kb/4586793>) \n[4586787](<http://support.microsoft.com/kb/4586787>) \n[4586786](<http://support.microsoft.com/kb/4586786>) \n[4586781](<http://support.microsoft.com/kb/4586781>) \n[4586834](<http://support.microsoft.com/kb/4586834>) \n[4586830](<http://support.microsoft.com/kb/4586830>) \n[4586845](<http://support.microsoft.com/kb/4586845>) \n[4586808](<http://support.microsoft.com/kb/4586808>) \n[4586823](<http://support.microsoft.com/kb/4586823>) \n[4592449](<http://support.microsoft.com/kb/4592449>) \n[4598278](<http://support.microsoft.com/kb/4598278>) \n[4598297](<http://support.microsoft.com/kb/4598297>) \n[5001337](<http://support.microsoft.com/kb/5001337>) \n[5004238](<http://support.microsoft.com/kb/5004238>) \n[5004302](<http://support.microsoft.com/kb/5004302>) \n[5004294](<http://support.microsoft.com/kb/5004294>) \n[5004237](<http://support.microsoft.com/kb/5004237>) \n[5004244](<http://support.microsoft.com/kb/5004244>) \n[5004298](<http://support.microsoft.com/kb/5004298>) \n[5004285](<http://support.microsoft.com/kb/5004285>)\n\n### *Microsoft official advisories*:", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-11-10T00:00:00", "type": "kaspersky", "title": "KLA12004 Multiple vulnerabilities in Microsoft Windows", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-1599", "CVE-2020-16997", "CVE-2020-16998", "CVE-2020-16999", "CVE-2020-17000", "CVE-2020-17001", "CVE-2020-17004", "CVE-2020-17007", "CVE-2020-17010", "CVE-2020-17011", "CVE-2020-17012", "CVE-2020-17013", "CVE-2020-17014", "CVE-2020-17024", "CVE-2020-17025", "CVE-2020-17026", "CVE-2020-17027", "CVE-2020-17028", "CVE-2020-17029", "CVE-2020-17030", "CVE-2020-17031", "CVE-2020-17032", "CVE-2020-17033", "CVE-2020-17034", "CVE-2020-17035", "CVE-2020-17036", "CVE-2020-17037", "CVE-2020-17038", "CVE-2020-17040", "CVE-2020-17041", "CVE-2020-17042", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17045", "CVE-2020-17046", "CVE-2020-17047", "CVE-2020-17049", "CVE-2020-17051", "CVE-2020-17055", "CVE-2020-17056", "CVE-2020-17057", "CVE-2020-17068", "CVE-2020-17069", "CVE-2020-17070", "CVE-2020-17071", "CVE-2020-17073", "CVE-2020-17074", "CVE-2020-17075", "CVE-2020-17076", "CVE-2020-17077", "CVE-2020-17078", "CVE-2020-17079", "CVE-2020-17081", "CVE-2020-17082", "CVE-2020-17086", "CVE-2020-17087", "CVE-2020-17088", "CVE-2020-17090", "CVE-2020-17101", "CVE-2020-17102", "CVE-2020-17105", "CVE-2020-17106", "CVE-2020-17107", "CVE-2020-17108", "CVE-2020-17109", "CVE-2020-17110", "CVE-2020-17113"], "modified": "2022-01-18T00:00:00", "id": "KLA12004", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12004/", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-08-18T10:59:50", "description": "### *Detect date*:\n11/10/2020\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code.\n\n### *Exploitation*:\nMalware exists for this vulnerability. Usually such malware is classified as Exploit. [More details](<https://threats.kaspersky.com/en/class/Exploit/>).\n\n### *Affected products*:\nInternet Explorer 11 \nChakraCore \nMicrosoft Edge (EdgeHTML-based)\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel) and follow additional recommendations for CVE-2020-17052.\n\n### *Original advisories*:\n[CVE-2020-17053](<https://nvd.nist.gov/vuln/detail/CVE-2020-17053>) \n[CVE-2020-17052](<https://nvd.nist.gov/vuln/detail/CVE-2020-17052>) \n[CVE-2020-17058](<https://nvd.nist.gov/vuln/detail/CVE-2020-17058>) \n[CVE-2020-17048](<https://nvd.nist.gov/vuln/detail/CVE-2020-17048>) \n[CVE-2020-17054](<https://nvd.nist.gov/vuln/detail/CVE-2020-17054>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Internet Explorer](<https://threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/>)\n\n### *CVE-IDS*:\n[CVE-2020-17053](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17053>)7.6Critical \n[CVE-2020-17052](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17052>)6.8High \n[CVE-2020-17058](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17058>)7.6Critical \n[CVE-2020-17048](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17048>)6.8High \n[CVE-2020-17054](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17054>)7.6Critical\n\n### *KB list*:\n[4586785](<http://support.microsoft.com/kb/4586785>) \n[4586793](<http://support.microsoft.com/kb/4586793>) \n[4586787](<http://support.microsoft.com/kb/4586787>) \n[4586786](<http://support.microsoft.com/kb/4586786>) \n[4586781](<http://support.microsoft.com/kb/4586781>) \n[4586827](<http://support.microsoft.com/kb/4586827>) \n[4586768](<http://support.microsoft.com/kb/4586768>) \n[4586834](<http://support.microsoft.com/kb/4586834>) \n[4586830](<http://support.microsoft.com/kb/4586830>) \n[4586845](<http://support.microsoft.com/kb/4586845>)\n\n### *Microsoft official advisories*:", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-11-10T00:00:00", "type": "kaspersky", "title": "KLA11997 Multiple vulnerabilities in Microsoft Browser", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.6, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17048", "CVE-2020-17052", "CVE-2020-17053", "CVE-2020-17054", "CVE-2020-17058"], "modified": "2021-07-27T00:00:00", "id": "KLA11997", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11997/", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2022-06-23T15:11:23", "description": "The Windows installation on the remote host is missing security update 4586781. It is, therefore, affected by multiple vulnerabilities. Please review the vendor advisory for more details.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-11-10T00:00:00", "type": "nessus", "title": "KB4586805: Windows 7 and Windows Server 2008 R2 November 2020 Security Update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-1599", "CVE-2020-16997", "CVE-2020-17000", "CVE-2020-17001", "CVE-2020-17004", "CVE-2020-17011", "CVE-2020-17014", "CVE-2020-17029", "CVE-2020-17036", "CVE-2020-17038", "CVE-2020-17042", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17045", "CVE-2020-17047", "CVE-2020-17051", "CVE-2020-17052", "CVE-2020-17068", "CVE-2020-17069", "CVE-2020-17087", "CVE-2020-17088"], "modified": "2021-11-30T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS20_NOV_4586827.NASL", "href": "https://www.tenable.com/plugins/nessus/142683", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(142683);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/11/30\");\n\n script_cve_id(\n \"CVE-2020-1599\",\n \"CVE-2020-16997\",\n \"CVE-2020-17000\",\n \"CVE-2020-17001\",\n \"CVE-2020-17004\",\n \"CVE-2020-17011\",\n \"CVE-2020-17014\",\n \"CVE-2020-17029\",\n \"CVE-2020-17036\",\n \"CVE-2020-17038\",\n \"CVE-2020-17042\",\n \"CVE-2020-17043\",\n \"CVE-2020-17044\",\n \"CVE-2020-17045\",\n \"CVE-2020-17047\",\n \"CVE-2020-17051\",\n \"CVE-2020-17052\",\n \"CVE-2020-17068\",\n \"CVE-2020-17069\",\n \"CVE-2020-17087\",\n \"CVE-2020-17088\"\n );\n script_xref(name:\"MSKB\", value:\"4586827\");\n script_xref(name:\"MSKB\", value:\"4586805\");\n script_xref(name:\"MSFT\", value:\"MS20-4586827\");\n script_xref(name:\"MSFT\", value:\"MS20-4586805\");\n script_xref(name:\"IAVA\", value:\"2020-A-0513-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0518-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0521-S\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/05/03\");\n\n script_name(english:\"KB4586805: Windows 7 and Windows Server 2008 R2 November 2020 Security Update\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Windows installation on the remote host is missing security update 4586781. It is, therefore,\n affected by multiple vulnerabilities. Please review the vendor advisory for more details.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/4586827/windows-7-update\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/4586805/windows-7-update\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Only update KB4586805 or Cumulative Update KB4586827.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17051\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/11/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/11/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/11/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS20-11\";\nkbs = make_list('4586827', '4586805');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win7:'1') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:\"6.1\",\n sp:1,\n rollup_date:\"11_2020\",\n bulletin:bulletin,\n rollup_kb_list:[4586827, 4586805])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-06-23T15:11:47", "description": "The Windows installation on the remote host is missing security update 4586781. It is, therefore, affected by multiple vulnerabilities. Please review the vendor advisory for more details.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-11-10T00:00:00", "type": "nessus", "title": "KB4586808: Windows Server 2012 November 2020 Security Update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-1599", "CVE-2020-16997", "CVE-2020-17000", "CVE-2020-17001", "CVE-2020-17004", "CVE-2020-17011", "CVE-2020-17014", "CVE-2020-17024", "CVE-2020-17029", "CVE-2020-17036", "CVE-2020-17038", "CVE-2020-17041", "CVE-2020-17042", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17045", "CVE-2020-17047", "CVE-2020-17049", "CVE-2020-17051", "CVE-2020-17052", "CVE-2020-17056", "CVE-2020-17068", "CVE-2020-17069", "CVE-2020-17088"], "modified": "2021-06-03T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS20_NOV_4586834.NASL", "href": "https://www.tenable.com/plugins/nessus/142687", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(142687);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/06/03\");\n\n script_cve_id(\n \"CVE-2020-1599\",\n \"CVE-2020-16997\",\n \"CVE-2020-17000\",\n \"CVE-2020-17001\",\n \"CVE-2020-17004\",\n \"CVE-2020-17011\",\n \"CVE-2020-17014\",\n \"CVE-2020-17024\",\n \"CVE-2020-17029\",\n \"CVE-2020-17036\",\n \"CVE-2020-17038\",\n \"CVE-2020-17041\",\n \"CVE-2020-17042\",\n \"CVE-2020-17043\",\n \"CVE-2020-17044\",\n \"CVE-2020-17045\",\n \"CVE-2020-17047\",\n \"CVE-2020-17049\",\n \"CVE-2020-17051\",\n \"CVE-2020-17052\",\n \"CVE-2020-17056\",\n \"CVE-2020-17068\",\n \"CVE-2020-17069\",\n \"CVE-2020-17088\"\n );\n script_xref(name:\"MSKB\", value:\"4586808\");\n script_xref(name:\"MSKB\", value:\"4586834\");\n script_xref(name:\"MSFT\", value:\"MS20-4586808\");\n script_xref(name:\"MSFT\", value:\"MS20-4586834\");\n script_xref(name:\"IAVA\", value:\"2020-A-0513-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0518-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0521-S\");\n\n script_name(english:\"KB4586808: Windows Server 2012 November 2020 Security Update\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Windows installation on the remote host is missing security update 4586781. It is, therefore,\n affected by multiple vulnerabilities. Please review the vendor advisory for more details.\");\n # https://support.microsoft.com/en-us/help/4586808/windows-server-2012-update\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?d0d6d9b2\");\n # https://support.microsoft.com/en-us/help/4586834/windows-server-2012-update\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?82b0555c\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Only update KB4586808 or Cumulative Update KB4586834.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17051\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/11/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/11/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/11/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS20-11\";\nkbs = make_list('4586808', '4586834');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win8:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\n# Windows 8 EOL\nproductname = get_kb_item_or_exit(\"SMB/ProductName\", exit_code:1);\nif (\"Windows 8\" >< productname) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:\"6.2\",\n sp:0,\n rollup_date:\"11_2020\",\n bulletin:bulletin,\n rollup_kb_list:[4586808, 4586834])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-06-23T15:13:09", "description": "The Windows installation on the remote host is missing security update 4586781. It is, therefore, affected by multiple vulnerabilities. Please review the vendor advisory for more details.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-11-10T00:00:00", "type": "nessus", "title": "KB4586817: Windows Server 2008 November 2020 Security Update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-1599", "CVE-2020-17001", "CVE-2020-17004", "CVE-2020-17011", "CVE-2020-17014", "CVE-2020-17036", "CVE-2020-17042", "CVE-2020-17043", "CVE-2020-17045", "CVE-2020-17051", "CVE-2020-17068", "CVE-2020-17069", "CVE-2020-17087", "CVE-2020-17088"], "modified": "2021-11-30T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS20_NOV_4586817.NASL", "href": "https://www.tenable.com/plugins/nessus/142679", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(142679);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/11/30\");\n\n script_cve_id(\n \"CVE-2020-1599\",\n \"CVE-2020-17001\",\n \"CVE-2020-17004\",\n \"CVE-2020-17011\",\n \"CVE-2020-17014\",\n \"CVE-2020-17036\",\n \"CVE-2020-17042\",\n \"CVE-2020-17043\",\n \"CVE-2020-17045\",\n \"CVE-2020-17051\",\n \"CVE-2020-17068\",\n \"CVE-2020-17069\",\n \"CVE-2020-17087\",\n \"CVE-2020-17088\"\n );\n script_xref(name:\"MSKB\", value:\"4586817\");\n script_xref(name:\"MSKB\", value:\"4586807\");\n script_xref(name:\"MSFT\", value:\"MS20-4586817\");\n script_xref(name:\"MSFT\", value:\"MS20-4586807\");\n script_xref(name:\"IAVA\", value:\"2020-A-0513-S\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/05/03\");\n\n script_name(english:\"KB4586817: Windows Server 2008 November 2020 Security Update\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Windows installation on the remote host is missing security update 4586781. It is, therefore,\n affected by multiple vulnerabilities. Please review the vendor advisory for more details.\");\n # https://support.microsoft.com/en-us/help/4586817/windows-server-2008-update\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?49b35330\");\n # https://support.microsoft.com/en-us/help/4586807/windows-server-2008-update\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?a85048a0\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Only update KB4586817 or Cumulative Update KB4586807.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17051\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/11/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/11/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/11/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS20-11\";\nkbs = make_list('4586817', '4586807');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(vista:'2') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:\"6.0\",\n sp:2,\n rollup_date:\"11_2020\",\n bulletin:bulletin,\n rollup_kb_list:[4586817, 4586807])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-06-23T15:13:10", "description": "The Microsoft 4586787 Product is missing security updates.\n\n - Remote Desktop Protocol Server Information Disclosure Vulnerability (CVE-2020-16997)\n\n - DirectX Elevation of Privilege Vulnerability (CVE-2020-16998)\n\n - Windows WalletService Information Disclosure Vulnerability (CVE-2020-16999)\n\n - Remote Desktop Protocol Client Information Disclosure Vulnerability (CVE-2020-17000)\n\n - Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17014.\n (CVE-2020-17001)\n\n - Windows Graphics Component Information Disclosure Vulnerability (CVE-2020-17004)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044. (CVE-2020-17055)\n\n - Windows Network File System Information Disclosure Vulnerability (CVE-2020-17056)\n\n - Windows GDI+ Remote Code Execution Vulnerability (CVE-2020-17068)\n\n - Windows NDIS Information Disclosure Vulnerability (CVE-2020-17069)\n\n - Windows Delivery Optimization Information Disclosure Vulnerability (CVE-2020-17071)\n\n - Windows USO Core Worker Elevation of Privilege Vulnerability (CVE-2020-17075)\n\n - Windows Kernel Local Elevation of Privilege Vulnerability (CVE-2020-17087)\n\n - Windows Common Log File System Driver Elevation of Privilege Vulnerability (CVE-2020-17088)\n\n - Windows Camera Codec Information Disclosure Vulnerability (CVE-2020-17113)\n\n - Windows Spoofing Vulnerability (CVE-2020-1599)\n\n - Windows Error Reporting Elevation of Privilege Vulnerability (CVE-2020-17007)\n\n - Windows Port Class Library Elevation of Privilege Vulnerability (CVE-2020-17011)\n\n - Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17001.\n (CVE-2020-17014)\n\n - Windows Client Side Rendering Print Provider Elevation of Privilege Vulnerability (CVE-2020-17024)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17025)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17026)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17027)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17028)\n\n - Windows Canonical Display Driver Information Disclosure Vulnerability (CVE-2020-17029)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17031)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17032)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17033)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17034)\n\n - Windows Function Discovery SSDP Provider Information Disclosure Vulnerability (CVE-2020-17036)\n\n - Windows WalletService Elevation of Privilege Vulnerability (CVE-2020-17037)\n\n - Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17010. (CVE-2020-17038)\n\n - Windows Hyper-V Security Feature Bypass Vulnerability (CVE-2020-17040)\n\n - Windows Print Configuration Elevation of Privilege Vulnerability (CVE-2020-17041)\n\n - Windows Print Spooler Remote Code Execution Vulnerability (CVE-2020-17042)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17043)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17055. (CVE-2020-17044)\n\n - Windows KernelStream Information Disclosure Vulnerability (CVE-2020-17045)\n\n - Windows Error Reporting Denial of Service Vulnerability (CVE-2020-17046)\n\n - Windows Network File System Denial of Service Vulnerability (CVE-2020-17047)\n\n - Scripting Engine Memory Corruption Vulnerability (CVE-2020-17052)\n\n - Chakra Scripting Engine Memory Corruption Vulnerability This CVE ID is unique from CVE-2020-17048.\n (CVE-2020-17054)\n\n - Microsoft Browser Memory Corruption Vulnerability (CVE-2020-17058)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-11-10T00:00:00", "type": "nessus", "title": "KB4586787: Windows 10 November 2020 Security Update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-1599", "CVE-2020-16997", "CVE-2020-16998", "CVE-2020-16999", "CVE-2020-17000", "CVE-2020-17001", "CVE-2020-17004", "CVE-2020-17007", "CVE-2020-17010", "CVE-2020-17011", "CVE-2020-17014", "CVE-2020-17024", "CVE-2020-17025", "CVE-2020-17026", "CVE-2020-17027", "CVE-2020-17028", "CVE-2020-17029", "CVE-2020-17031", "CVE-2020-17032", "CVE-2020-17033", "CVE-2020-17034", "CVE-2020-17036", "CVE-2020-17037", "CVE-2020-17038", "CVE-2020-17040", "CVE-2020-17041", "CVE-2020-17042", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17045", "CVE-2020-17046", "CVE-2020-17047", "CVE-2020-17048", "CVE-2020-17052", "CVE-2020-17054", "CVE-2020-17055", "CVE-2020-17056", "CVE-2020-17058", "CVE-2020-17068", "CVE-2020-17069", "CVE-2020-17071", "CVE-2020-17075", "CVE-2020-17087", "CVE-2020-17088", "CVE-2020-17113"], "modified": "2022-05-11T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS20_NOV_4586787.NASL", "href": "https://www.tenable.com/plugins/nessus/142681", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(142681);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/11\");\n\n script_cve_id(\n \"CVE-2020-1599\",\n \"CVE-2020-16997\",\n \"CVE-2020-16998\",\n \"CVE-2020-16999\",\n \"CVE-2020-17000\",\n \"CVE-2020-17001\",\n \"CVE-2020-17004\",\n \"CVE-2020-17007\",\n \"CVE-2020-17011\",\n \"CVE-2020-17014\",\n \"CVE-2020-17024\",\n \"CVE-2020-17025\",\n \"CVE-2020-17026\",\n \"CVE-2020-17027\",\n \"CVE-2020-17028\",\n \"CVE-2020-17029\",\n \"CVE-2020-17031\",\n \"CVE-2020-17032\",\n \"CVE-2020-17033\",\n \"CVE-2020-17034\",\n \"CVE-2020-17036\",\n \"CVE-2020-17037\",\n \"CVE-2020-17038\",\n \"CVE-2020-17040\",\n \"CVE-2020-17041\",\n \"CVE-2020-17042\",\n \"CVE-2020-17043\",\n \"CVE-2020-17044\",\n \"CVE-2020-17045\",\n \"CVE-2020-17046\",\n \"CVE-2020-17047\",\n \"CVE-2020-17052\",\n \"CVE-2020-17054\",\n \"CVE-2020-17055\",\n \"CVE-2020-17056\",\n \"CVE-2020-17058\",\n \"CVE-2020-17068\",\n \"CVE-2020-17069\",\n \"CVE-2020-17071\",\n \"CVE-2020-17075\",\n \"CVE-2020-17087\",\n \"CVE-2020-17088\",\n \"CVE-2020-17113\"\n );\n script_xref(name:\"MSKB\", value:\"4586787\");\n script_xref(name:\"MSFT\", value:\"MS20-4586787\");\n script_xref(name:\"IAVA\", value:\"2020-A-0512-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0518-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0521-S\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/05/03\");\n\n script_name(english:\"KB4586787: Windows 10 November 2020 Security Update\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft 4586787 Product is missing security updates.\n\n - Remote Desktop Protocol Server Information Disclosure Vulnerability (CVE-2020-16997)\n\n - DirectX Elevation of Privilege Vulnerability (CVE-2020-16998)\n\n - Windows WalletService Information Disclosure Vulnerability (CVE-2020-16999)\n\n - Remote Desktop Protocol Client Information Disclosure Vulnerability (CVE-2020-17000)\n\n - Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17014.\n (CVE-2020-17001)\n\n - Windows Graphics Component Information Disclosure Vulnerability (CVE-2020-17004)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025,\n CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033,\n CVE-2020-17034, CVE-2020-17043, CVE-2020-17044. (CVE-2020-17055)\n\n - Windows Network File System Information Disclosure Vulnerability (CVE-2020-17056)\n\n - Windows GDI+ Remote Code Execution Vulnerability (CVE-2020-17068)\n\n - Windows NDIS Information Disclosure Vulnerability (CVE-2020-17069)\n\n - Windows Delivery Optimization Information Disclosure Vulnerability (CVE-2020-17071)\n\n - Windows USO Core Worker Elevation of Privilege Vulnerability (CVE-2020-17075)\n\n - Windows Kernel Local Elevation of Privilege Vulnerability (CVE-2020-17087)\n\n - Windows Common Log File System Driver Elevation of Privilege Vulnerability (CVE-2020-17088)\n\n - Windows Camera Codec Information Disclosure Vulnerability (CVE-2020-17113)\n\n - Windows Spoofing Vulnerability (CVE-2020-1599)\n\n - Windows Error Reporting Elevation of Privilege Vulnerability (CVE-2020-17007)\n\n - Windows Port Class Library Elevation of Privilege Vulnerability (CVE-2020-17011)\n\n - Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17001.\n (CVE-2020-17014)\n\n - Windows Client Side Rendering Print Provider Elevation of Privilege Vulnerability (CVE-2020-17024)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17026,\n CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034,\n CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17025)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025,\n CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034,\n CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17026)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025,\n CVE-2020-17026, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034,\n CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17027)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025,\n CVE-2020-17026, CVE-2020-17027, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034,\n CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17028)\n\n - Windows Canonical Display Driver Information Disclosure Vulnerability (CVE-2020-17029)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025,\n CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034,\n CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17031)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025,\n CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17033, CVE-2020-17034,\n CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17032)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025,\n CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17034,\n CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17033)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025,\n CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033,\n CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17034)\n\n - Windows Function Discovery SSDP Provider Information Disclosure Vulnerability (CVE-2020-17036)\n\n - Windows WalletService Elevation of Privilege Vulnerability (CVE-2020-17037)\n\n - Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17010. (CVE-2020-17038)\n\n - Windows Hyper-V Security Feature Bypass Vulnerability (CVE-2020-17040)\n\n - Windows Print Configuration Elevation of Privilege Vulnerability (CVE-2020-17041)\n\n - Windows Print Spooler Remote Code Execution Vulnerability (CVE-2020-17042)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025,\n CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033,\n CVE-2020-17034, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17043)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025,\n CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033,\n CVE-2020-17034, CVE-2020-17043, CVE-2020-17055. (CVE-2020-17044)\n\n - Windows KernelStream Information Disclosure Vulnerability (CVE-2020-17045)\n\n - Windows Error Reporting Denial of Service Vulnerability (CVE-2020-17046)\n\n - Windows Network File System Denial of Service Vulnerability (CVE-2020-17047)\n\n - Scripting Engine Memory Corruption Vulnerability (CVE-2020-17052)\n\n - Chakra Scripting Engine Memory Corruption Vulnerability This CVE ID is unique from CVE-2020-17048.\n (CVE-2020-17054)\n\n - Microsoft Browser Memory Corruption Vulnerability (CVE-2020-17058)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n # https://support.microsoft.com/en-us/help/4586787/windows-10-update-kb4586787\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?05343312\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Cumulative Update KB4586787.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17042\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2020-17040\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/11/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/11/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/11/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS20-11\";\nkbs = make_list('4586787');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:\"10\",\n sp:0,\n os_build:\"10240\",\n rollup_date:\"11_2020\",\n bulletin:bulletin,\n rollup_kb_list:[4586787])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-06-23T15:13:10", "description": "The Windows installation on the remote host is missing security update 4586781. It is, therefore, affected by multiple vulnerabilities. Please review the vendor advisory for more details.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-11-10T00:00:00", "type": "nessus", "title": "KB4586793: Windows 10 Version 1809 and Windows Server 2019 November 2020 Security Update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-1599", "CVE-2020-16997", "CVE-2020-16998", "CVE-2020-17000", "CVE-2020-17001", "CVE-2020-17004", "CVE-2020-17007", "CVE-2020-17011", "CVE-2020-17013", "CVE-2020-17014", "CVE-2020-17024", "CVE-2020-17025", "CVE-2020-17026", "CVE-2020-17027", "CVE-2020-17028", "CVE-2020-17029", "CVE-2020-17030", "CVE-2020-17031", "CVE-2020-17032", "CVE-2020-17033", "CVE-2020-17034", "CVE-2020-17035", "CVE-2020-17036", "CVE-2020-17038", "CVE-2020-17040", "CVE-2020-17041", "CVE-2020-17042", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17045", "CVE-2020-17046", "CVE-2020-17047", "CVE-2020-17049", "CVE-2020-17051", "CVE-2020-17052", "CVE-2020-17053", "CVE-2020-17055", "CVE-2020-17056", "CVE-2020-17057", "CVE-2020-17058", "CVE-2020-17068", "CVE-2020-17069", "CVE-2020-17070", "CVE-2020-17071", "CVE-2020-17075", "CVE-2020-17077", "CVE-2020-17087", "CVE-2020-17088", "CVE-2020-17090"], "modified": "2021-11-30T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS20_NOV_4586793.NASL", "href": "https://www.tenable.com/plugins/nessus/142693", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(142693);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/11/30\");\n\n script_cve_id(\n \"CVE-2020-1599\",\n \"CVE-2020-16997\",\n \"CVE-2020-16998\",\n \"CVE-2020-17000\",\n \"CVE-2020-17001\",\n \"CVE-2020-17004\",\n \"CVE-2020-17007\",\n \"CVE-2020-17011\",\n \"CVE-2020-17013\",\n \"CVE-2020-17014\",\n \"CVE-2020-17024\",\n \"CVE-2020-17025\",\n \"CVE-2020-17026\",\n \"CVE-2020-17027\",\n \"CVE-2020-17028\",\n \"CVE-2020-17029\",\n \"CVE-2020-17030\",\n \"CVE-2020-17031\",\n \"CVE-2020-17032\",\n \"CVE-2020-17033\",\n \"CVE-2020-17034\",\n \"CVE-2020-17035\",\n \"CVE-2020-17036\",\n \"CVE-2020-17038\",\n \"CVE-2020-17040\",\n \"CVE-2020-17041\",\n \"CVE-2020-17042\",\n \"CVE-2020-17043\",\n \"CVE-2020-17044\",\n \"CVE-2020-17045\",\n \"CVE-2020-17046\",\n \"CVE-2020-17047\",\n \"CVE-2020-17049\",\n \"CVE-2020-17051\",\n \"CVE-2020-17052\",\n \"CVE-2020-17053\",\n \"CVE-2020-17055\",\n \"CVE-2020-17056\",\n \"CVE-2020-17057\",\n \"CVE-2020-17058\",\n \"CVE-2020-17068\",\n \"CVE-2020-17069\",\n \"CVE-2020-17070\",\n \"CVE-2020-17071\",\n \"CVE-2020-17075\",\n \"CVE-2020-17077\",\n \"CVE-2020-17087\",\n \"CVE-2020-17088\",\n \"CVE-2020-17090\"\n );\n script_xref(name:\"MSKB\", value:\"4586793\");\n script_xref(name:\"MSFT\", value:\"MS20-4586793\");\n script_xref(name:\"IAVA\", value:\"2020-A-0512-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0513-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0518-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0521-S\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/05/03\");\n\n script_name(english:\"KB4586793: Windows 10 Version 1809 and Windows Server 2019 November 2020 Security Update\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Windows installation on the remote host is missing security update 4586781. It is, therefore,\n affected by multiple vulnerabilities. Please review the vendor advisory for more details.\");\n # https://support.microsoft.com/en-us/help/4586793/windows-10-update-kb4586793\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?92d059c3\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Cumulative Update KB4586793.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17051\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/11/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/11/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/11/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS20-11\";\nkbs = make_list('4586793');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:\"10\",\n sp:0,\n os_build:\"17763\",\n rollup_date:\"11_2020\",\n bulletin:bulletin,\n rollup_kb_list:[4586793])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-06-23T15:13:14", "description": "The Microsoft 4586830 Product is missing security updates.\n\n - Remote Desktop Protocol Server Information Disclosure Vulnerability (CVE-2020-16997)\n\n - DirectX Elevation of Privilege Vulnerability (CVE-2020-16998)\n\n - Windows WalletService Information Disclosure Vulnerability (CVE-2020-16999)\n\n - Remote Desktop Protocol Client Information Disclosure Vulnerability (CVE-2020-17000)\n\n - Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17014.\n (CVE-2020-17001)\n\n - Windows Graphics Component Information Disclosure Vulnerability (CVE-2020-17004)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044. (CVE-2020-17055)\n\n - Windows Network File System Information Disclosure Vulnerability (CVE-2020-17056)\n\n - Windows Win32k Elevation of Privilege Vulnerability (CVE-2020-17057)\n\n - Windows GDI+ Remote Code Execution Vulnerability (CVE-2020-17068)\n\n - Windows NDIS Information Disclosure Vulnerability (CVE-2020-17069)\n\n - Windows Delivery Optimization Information Disclosure Vulnerability (CVE-2020-17071)\n\n - Windows USO Core Worker Elevation of Privilege Vulnerability (CVE-2020-17075)\n\n - Windows Kernel Local Elevation of Privilege Vulnerability (CVE-2020-17087)\n\n - Windows Common Log File System Driver Elevation of Privilege Vulnerability (CVE-2020-17088)\n\n - Windows Camera Codec Information Disclosure Vulnerability (CVE-2020-17113)\n\n - Windows Spoofing Vulnerability (CVE-2020-1599)\n\n - Windows Error Reporting Elevation of Privilege Vulnerability (CVE-2020-17007)\n\n - Windows Port Class Library Elevation of Privilege Vulnerability (CVE-2020-17011)\n\n - Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17001.\n (CVE-2020-17014)\n\n - Windows Client Side Rendering Print Provider Elevation of Privilege Vulnerability (CVE-2020-17024)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17025)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17026)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17027)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17028)\n\n - Windows Canonical Display Driver Information Disclosure Vulnerability (CVE-2020-17029)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17031)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17032)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17033)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17034)\n\n - Windows Kernel Elevation of Privilege Vulnerability (CVE-2020-17035)\n\n - Windows Function Discovery SSDP Provider Information Disclosure Vulnerability (CVE-2020-17036)\n\n - Windows WalletService Elevation of Privilege Vulnerability (CVE-2020-17037)\n\n - Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17010. (CVE-2020-17038)\n\n - Windows Hyper-V Security Feature Bypass Vulnerability (CVE-2020-17040)\n\n - Windows Print Configuration Elevation of Privilege Vulnerability (CVE-2020-17041)\n\n - Windows Print Spooler Remote Code Execution Vulnerability (CVE-2020-17042)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17043)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17055. (CVE-2020-17044)\n\n - Windows KernelStream Information Disclosure Vulnerability (CVE-2020-17045)\n\n - Windows Error Reporting Denial of Service Vulnerability (CVE-2020-17046)\n\n - Windows Network File System Denial of Service Vulnerability (CVE-2020-17047)\n\n - Chakra Scripting Engine Memory Corruption Vulnerability This CVE ID is unique from CVE-2020-17054.\n (CVE-2020-17048)\n\n - Kerberos Security Feature Bypass Vulnerability (CVE-2020-17049)\n\n - Windows Network File System Remote Code Execution Vulnerability (CVE-2020-17051)\n\n - Scripting Engine Memory Corruption Vulnerability (CVE-2020-17052)\n\n - Chakra Scripting Engine Memory Corruption Vulnerability This CVE ID is unique from CVE-2020-17048.\n (CVE-2020-17054)\n\n - Microsoft Browser Memory Corruption Vulnerability (CVE-2020-17058)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-11-10T00:00:00", "type": "nessus", "title": "KB4586830: Windows 10 Version 1607 and Windows Server 2016 November 2020 Security Update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-1599", "CVE-2020-16997", "CVE-2020-16998", "CVE-2020-16999", "CVE-2020-17000", "CVE-2020-17001", "CVE-2020-17004", "CVE-2020-17007", "CVE-2020-17010", "CVE-2020-17011", "CVE-2020-17014", "CVE-2020-17024", "CVE-2020-17025", "CVE-2020-17026", "CVE-2020-17027", "CVE-2020-17028", "CVE-2020-17029", "CVE-2020-17031", "CVE-2020-17032", "CVE-2020-17033", "CVE-2020-17034", "CVE-2020-17035", "CVE-2020-17036", "CVE-2020-17037", "CVE-2020-17038", "CVE-2020-17040", "CVE-2020-17041", "CVE-2020-17042", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17045", "CVE-2020-17046", "CVE-2020-17047", "CVE-2020-17048", "CVE-2020-17049", "CVE-2020-17051", "CVE-2020-17052", "CVE-2020-17054", "CVE-2020-17055", "CVE-2020-17056", "CVE-2020-17057", "CVE-2020-17058", "CVE-2020-17068", "CVE-2020-17069", "CVE-2020-17071", "CVE-2020-17075", "CVE-2020-17087", "CVE-2020-17088", "CVE-2020-17113"], "modified": "2021-11-30T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS20_NOV_4586830.NASL", "href": "https://www.tenable.com/plugins/nessus/142690", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(142690);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/11/30\");\n\n script_cve_id(\n \"CVE-2020-1599\",\n \"CVE-2020-16997\",\n \"CVE-2020-16998\",\n \"CVE-2020-16999\",\n \"CVE-2020-17000\",\n \"CVE-2020-17001\",\n \"CVE-2020-17004\",\n \"CVE-2020-17007\",\n \"CVE-2020-17011\",\n \"CVE-2020-17014\",\n \"CVE-2020-17024\",\n \"CVE-2020-17025\",\n \"CVE-2020-17026\",\n \"CVE-2020-17027\",\n \"CVE-2020-17028\",\n \"CVE-2020-17029\",\n \"CVE-2020-17031\",\n \"CVE-2020-17032\",\n \"CVE-2020-17033\",\n \"CVE-2020-17034\",\n \"CVE-2020-17035\",\n \"CVE-2020-17036\",\n \"CVE-2020-17037\",\n \"CVE-2020-17038\",\n \"CVE-2020-17040\",\n \"CVE-2020-17041\",\n \"CVE-2020-17042\",\n \"CVE-2020-17043\",\n \"CVE-2020-17044\",\n \"CVE-2020-17045\",\n \"CVE-2020-17046\",\n \"CVE-2020-17047\",\n \"CVE-2020-17048\",\n \"CVE-2020-17049\",\n \"CVE-2020-17051\",\n \"CVE-2020-17052\",\n \"CVE-2020-17054\",\n \"CVE-2020-17055\",\n \"CVE-2020-17056\",\n \"CVE-2020-17057\",\n \"CVE-2020-17058\",\n \"CVE-2020-17068\",\n \"CVE-2020-17069\",\n \"CVE-2020-17071\",\n \"CVE-2020-17075\",\n \"CVE-2020-17087\",\n \"CVE-2020-17088\",\n \"CVE-2020-17113\"\n );\n script_xref(name:\"MSKB\", value:\"4586830\");\n script_xref(name:\"MSFT\", value:\"MS20-4586830\");\n script_xref(name:\"IAVA\", value:\"2020-A-0512-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0513-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0518-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0521-S\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/05/03\");\n\n script_name(english:\"KB4586830: Windows 10 Version 1607 and Windows Server 2016 November 2020 Security Update\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft 4586830 Product is missing security updates.\n\n - Remote Desktop Protocol Server Information Disclosure Vulnerability (CVE-2020-16997)\n\n - DirectX Elevation of Privilege Vulnerability (CVE-2020-16998)\n\n - Windows WalletService Information Disclosure Vulnerability (CVE-2020-16999)\n\n - Remote Desktop Protocol Client Information Disclosure Vulnerability (CVE-2020-17000)\n\n - Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17014.\n (CVE-2020-17001)\n\n - Windows Graphics Component Information Disclosure Vulnerability (CVE-2020-17004)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025,\n CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033,\n CVE-2020-17034, CVE-2020-17043, CVE-2020-17044. (CVE-2020-17055)\n\n - Windows Network File System Information Disclosure Vulnerability (CVE-2020-17056)\n\n - Windows Win32k Elevation of Privilege Vulnerability (CVE-2020-17057)\n\n - Windows GDI+ Remote Code Execution Vulnerability (CVE-2020-17068)\n\n - Windows NDIS Information Disclosure Vulnerability (CVE-2020-17069)\n\n - Windows Delivery Optimization Information Disclosure Vulnerability (CVE-2020-17071)\n\n - Windows USO Core Worker Elevation of Privilege Vulnerability (CVE-2020-17075)\n\n - Windows Kernel Local Elevation of Privilege Vulnerability (CVE-2020-17087)\n\n - Windows Common Log File System Driver Elevation of Privilege Vulnerability (CVE-2020-17088)\n\n - Windows Camera Codec Information Disclosure Vulnerability (CVE-2020-17113)\n\n - Windows Spoofing Vulnerability (CVE-2020-1599)\n\n - Windows Error Reporting Elevation of Privilege Vulnerability (CVE-2020-17007)\n\n - Windows Port Class Library Elevation of Privilege Vulnerability (CVE-2020-17011)\n\n - Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17001.\n (CVE-2020-17014)\n\n - Windows Client Side Rendering Print Provider Elevation of Privilege Vulnerability (CVE-2020-17024)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17026,\n CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034,\n CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17025)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025,\n CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034,\n CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17026)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025,\n CVE-2020-17026, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034,\n CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17027)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025,\n CVE-2020-17026, CVE-2020-17027, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034,\n CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17028)\n\n - Windows Canonical Display Driver Information Disclosure Vulnerability (CVE-2020-17029)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025,\n CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034,\n CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17031)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025,\n CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17033, CVE-2020-17034,\n CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17032)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025,\n CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17034,\n CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17033)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025,\n CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033,\n CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17034)\n\n - Windows Kernel Elevation of Privilege Vulnerability (CVE-2020-17035)\n\n - Windows Function Discovery SSDP Provider Information Disclosure Vulnerability (CVE-2020-17036)\n\n - Windows WalletService Elevation of Privilege Vulnerability (CVE-2020-17037)\n\n - Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17010. (CVE-2020-17038)\n\n - Windows Hyper-V Security Feature Bypass Vulnerability (CVE-2020-17040)\n\n - Windows Print Configuration Elevation of Privilege Vulnerability (CVE-2020-17041)\n\n - Windows Print Spooler Remote Code Execution Vulnerability (CVE-2020-17042)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025,\n CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033,\n CVE-2020-17034, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17043)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025,\n CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033,\n CVE-2020-17034, CVE-2020-17043, CVE-2020-17055. (CVE-2020-17044)\n\n - Windows KernelStream Information Disclosure Vulnerability (CVE-2020-17045)\n\n - Windows Error Reporting Denial of Service Vulnerability (CVE-2020-17046)\n\n - Windows Network File System Denial of Service Vulnerability (CVE-2020-17047)\n\n - Chakra Scripting Engine Memory Corruption Vulnerability This CVE ID is unique from CVE-2020-17054.\n (CVE-2020-17048)\n\n - Kerberos Security Feature Bypass Vulnerability (CVE-2020-17049)\n\n - Windows Network File System Remote Code Execution Vulnerability (CVE-2020-17051)\n\n - Scripting Engine Memory Corruption Vulnerability (CVE-2020-17052)\n\n - Chakra Scripting Engine Memory Corruption Vulnerability This CVE ID is unique from CVE-2020-17048.\n (CVE-2020-17054)\n\n - Microsoft Browser Memory Corruption Vulnerability (CVE-2020-17058)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n # https://support.microsoft.com/en-us/help/4586830/windows-10-update-kb4586830\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?f8c32243\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Cumulative Update KB4586830.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17051\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/11/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/11/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/11/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS20-11\";\nkbs = make_list('4586830');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:\"10\",\n sp:0,\n os_build:\"14393\",\n rollup_date:\"11_2020\",\n bulletin:bulletin,\n rollup_kb_list:[4586830])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-06-23T15:11:46", "description": "The Microsoft 4586785 Product is missing security updates.\n\n - Remote Desktop Protocol Server Information Disclosure Vulnerability (CVE-2020-16997)\n\n - DirectX Elevation of Privilege Vulnerability (CVE-2020-16998)\n\n - Windows WalletService Information Disclosure Vulnerability (CVE-2020-16999)\n\n - Remote Desktop Protocol Client Information Disclosure Vulnerability (CVE-2020-17000)\n\n - Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17014.\n (CVE-2020-17001)\n\n - Windows Graphics Component Information Disclosure Vulnerability (CVE-2020-17004)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044. (CVE-2020-17055)\n\n - Windows Network File System Information Disclosure Vulnerability (CVE-2020-17056)\n\n - Windows Win32k Elevation of Privilege Vulnerability (CVE-2020-17057)\n\n - Windows GDI+ Remote Code Execution Vulnerability (CVE-2020-17068)\n\n - Windows NDIS Information Disclosure Vulnerability (CVE-2020-17069)\n\n - Windows Update Medic Service Elevation of Privilege Vulnerability (CVE-2020-17070)\n\n - Windows Delivery Optimization Information Disclosure Vulnerability (CVE-2020-17071)\n\n - Windows USO Core Worker Elevation of Privilege Vulnerability (CVE-2020-17075)\n\n - Windows Update Stack Elevation of Privilege Vulnerability (CVE-2020-17077)\n\n - Windows Kernel Local Elevation of Privilege Vulnerability (CVE-2020-17087)\n\n - Windows Common Log File System Driver Elevation of Privilege Vulnerability (CVE-2020-17088)\n\n - Microsoft Defender for Endpoint Security Feature Bypass Vulnerability (CVE-2020-17090)\n\n - Windows Camera Codec Information Disclosure Vulnerability (CVE-2020-17113)\n\n - Windows Spoofing Vulnerability (CVE-2020-1599)\n\n - Windows Error Reporting Elevation of Privilege Vulnerability (CVE-2020-17007)\n\n - Windows Port Class Library Elevation of Privilege Vulnerability (CVE-2020-17011)\n\n - Windows Bind Filter Driver Elevation of Privilege Vulnerability (CVE-2020-17012)\n\n - Win32k Information Disclosure Vulnerability (CVE-2020-17013)\n\n - Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17001.\n (CVE-2020-17014)\n\n - Windows Client Side Rendering Print Provider Elevation of Privilege Vulnerability (CVE-2020-17024)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17025)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17026)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17027)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17028)\n\n - Windows Canonical Display Driver Information Disclosure Vulnerability (CVE-2020-17029)\n\n - Windows MSCTF Server Information Disclosure Vulnerability (CVE-2020-17030)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17031)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17032)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17033)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17034)\n\n - Windows Kernel Elevation of Privilege Vulnerability (CVE-2020-17035)\n\n - Windows Function Discovery SSDP Provider Information Disclosure Vulnerability (CVE-2020-17036)\n\n - Windows WalletService Elevation of Privilege Vulnerability (CVE-2020-17037)\n\n - Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17010. (CVE-2020-17038)\n\n - Windows Hyper-V Security Feature Bypass Vulnerability (CVE-2020-17040)\n\n - Windows Print Configuration Elevation of Privilege Vulnerability (CVE-2020-17041)\n\n - Windows Print Spooler Remote Code Execution Vulnerability (CVE-2020-17042)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17043)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17055. (CVE-2020-17044)\n\n - Windows KernelStream Information Disclosure Vulnerability (CVE-2020-17045)\n\n - Windows Error Reporting Denial of Service Vulnerability (CVE-2020-17046)\n\n - Windows Network File System Denial of Service Vulnerability (CVE-2020-17047)\n\n - Chakra Scripting Engine Memory Corruption Vulnerability This CVE ID is unique from CVE-2020-17054.\n (CVE-2020-17048)\n\n - Scripting Engine Memory Corruption Vulnerability (CVE-2020-17052)\n\n - Internet Explorer Memory Corruption Vulnerability (CVE-2020-17053)\n\n - Chakra Scripting Engine Memory Corruption Vulnerability This CVE ID is unique from CVE-2020-17048.\n (CVE-2020-17054)\n\n - Microsoft Browser Memory Corruption Vulnerability (CVE-2020-17058)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-11-10T00:00:00", "type": "nessus", "title": "KB4586785: Windows 10 Version 1803 November 2020 Security Update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-1599", "CVE-2020-16997", "CVE-2020-16998", "CVE-2020-16999", "CVE-2020-17000", "CVE-2020-17001", "CVE-2020-17004", "CVE-2020-17007", "CVE-2020-17010", "CVE-2020-17011", "CVE-2020-17012", "CVE-2020-17013", "CVE-2020-17014", "CVE-2020-17024", "CVE-2020-17025", "CVE-2020-17026", "CVE-2020-17027", "CVE-2020-17028", "CVE-2020-17029", "CVE-2020-17030", "CVE-2020-17031", "CVE-2020-17032", "CVE-2020-17033", "CVE-2020-17034", "CVE-2020-17035", "CVE-2020-17036", "CVE-2020-17037", "CVE-2020-17038", "CVE-2020-17040", "CVE-2020-17041", "CVE-2020-17042", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17045", "CVE-2020-17046", "CVE-2020-17047", "CVE-2020-17048", "CVE-2020-17052", "CVE-2020-17053", "CVE-2020-17054", "CVE-2020-17055", "CVE-2020-17056", "CVE-2020-17057", "CVE-2020-17058", "CVE-2020-17068", "CVE-2020-17069", "CVE-2020-17070", "CVE-2020-17071", "CVE-2020-17075", "CVE-2020-17077", "CVE-2020-17087", "CVE-2020-17088", "CVE-2020-17090", "CVE-2020-17113"], "modified": "2022-05-11T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS20_NOV_4586785.NASL", "href": "https://www.tenable.com/plugins/nessus/142682", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(142682);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/11\");\n\n script_cve_id(\n \"CVE-2020-1599\",\n \"CVE-2020-16997\",\n \"CVE-2020-16998\",\n \"CVE-2020-16999\",\n \"CVE-2020-17000\",\n \"CVE-2020-17001\",\n \"CVE-2020-17004\",\n \"CVE-2020-17007\",\n \"CVE-2020-17011\",\n \"CVE-2020-17012\",\n \"CVE-2020-17013\",\n \"CVE-2020-17014\",\n \"CVE-2020-17024\",\n \"CVE-2020-17025\",\n \"CVE-2020-17026\",\n \"CVE-2020-17027\",\n \"CVE-2020-17028\",\n \"CVE-2020-17029\",\n \"CVE-2020-17030\",\n \"CVE-2020-17031\",\n \"CVE-2020-17032\",\n \"CVE-2020-17033\",\n \"CVE-2020-17034\",\n \"CVE-2020-17035\",\n \"CVE-2020-17036\",\n \"CVE-2020-17037\",\n \"CVE-2020-17038\",\n \"CVE-2020-17040\",\n \"CVE-2020-17041\",\n \"CVE-2020-17042\",\n \"CVE-2020-17043\",\n \"CVE-2020-17044\",\n \"CVE-2020-17045\",\n \"CVE-2020-17046\",\n \"CVE-2020-17047\",\n \"CVE-2020-17048\",\n \"CVE-2020-17052\",\n \"CVE-2020-17053\",\n \"CVE-2020-17054\",\n \"CVE-2020-17055\",\n \"CVE-2020-17056\",\n \"CVE-2020-17057\",\n \"CVE-2020-17058\",\n \"CVE-2020-17068\",\n \"CVE-2020-17069\",\n \"CVE-2020-17070\",\n \"CVE-2020-17071\",\n \"CVE-2020-17075\",\n \"CVE-2020-17077\",\n \"CVE-2020-17087\",\n \"CVE-2020-17088\",\n \"CVE-2020-17090\",\n \"CVE-2020-17113\"\n );\n script_xref(name:\"MSKB\", value:\"4586785\");\n script_xref(name:\"MSFT\", value:\"MS20-4586785\");\n script_xref(name:\"IAVA\", value:\"2020-A-0512-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0518-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0521-S\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/05/03\");\n\n script_name(english:\"KB4586785: Windows 10 Version 1803 November 2020 Security Update\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft 4586785 Product is missing security updates.\n\n - Remote Desktop Protocol Server Information Disclosure Vulnerability (CVE-2020-16997)\n\n - DirectX Elevation of Privilege Vulnerability (CVE-2020-16998)\n\n - Windows WalletService Information Disclosure Vulnerability (CVE-2020-16999)\n\n - Remote Desktop Protocol Client Information Disclosure Vulnerability (CVE-2020-17000)\n\n - Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17014.\n (CVE-2020-17001)\n\n - Windows Graphics Component Information Disclosure Vulnerability (CVE-2020-17004)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025,\n CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033,\n CVE-2020-17034, CVE-2020-17043, CVE-2020-17044. (CVE-2020-17055)\n\n - Windows Network File System Information Disclosure Vulnerability (CVE-2020-17056)\n\n - Windows Win32k Elevation of Privilege Vulnerability (CVE-2020-17057)\n\n - Windows GDI+ Remote Code Execution Vulnerability (CVE-2020-17068)\n\n - Windows NDIS Information Disclosure Vulnerability (CVE-2020-17069)\n\n - Windows Update Medic Service Elevation of Privilege Vulnerability (CVE-2020-17070)\n\n - Windows Delivery Optimization Information Disclosure Vulnerability (CVE-2020-17071)\n\n - Windows USO Core Worker Elevation of Privilege Vulnerability (CVE-2020-17075)\n\n - Windows Update Stack Elevation of Privilege Vulnerability (CVE-2020-17077)\n\n - Windows Kernel Local Elevation of Privilege Vulnerability (CVE-2020-17087)\n\n - Windows Common Log File System Driver Elevation of Privilege Vulnerability (CVE-2020-17088)\n\n - Microsoft Defender for Endpoint Security Feature Bypass Vulnerability (CVE-2020-17090)\n\n - Windows Camera Codec Information Disclosure Vulnerability (CVE-2020-17113)\n\n - Windows Spoofing Vulnerability (CVE-2020-1599)\n\n - Windows Error Reporting Elevation of Privilege Vulnerability (CVE-2020-17007)\n\n - Windows Port Class Library Elevation of Privilege Vulnerability (CVE-2020-17011)\n\n - Windows Bind Filter Driver Elevation of Privilege Vulnerability (CVE-2020-17012)\n\n - Win32k Information Disclosure Vulnerability (CVE-2020-17013)\n\n - Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17001.\n (CVE-2020-17014)\n\n - Windows Client Side Rendering Print Provider Elevation of Privilege Vulnerability (CVE-2020-17024)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17026,\n CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034,\n CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17025)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025,\n CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034,\n CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17026)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025,\n CVE-2020-17026, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034,\n CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17027)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025,\n CVE-2020-17026, CVE-2020-17027, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034,\n CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17028)\n\n - Windows Canonical Display Driver Information Disclosure Vulnerability (CVE-2020-17029)\n\n - Windows MSCTF Server Information Disclosure Vulnerability (CVE-2020-17030)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025,\n CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034,\n CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17031)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025,\n CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17033, CVE-2020-17034,\n CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17032)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025,\n CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17034,\n CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17033)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025,\n CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033,\n CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17034)\n\n - Windows Kernel Elevation of Privilege Vulnerability (CVE-2020-17035)\n\n - Windows Function Discovery SSDP Provider Information Disclosure Vulnerability (CVE-2020-17036)\n\n - Windows WalletService Elevation of Privilege Vulnerability (CVE-2020-17037)\n\n - Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17010. (CVE-2020-17038)\n\n - Windows Hyper-V Security Feature Bypass Vulnerability (CVE-2020-17040)\n\n - Windows Print Configuration Elevation of Privilege Vulnerability (CVE-2020-17041)\n\n - Windows Print Spooler Remote Code Execution Vulnerability (CVE-2020-17042)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025,\n CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033,\n CVE-2020-17034, CVE-2020-17044, CVE-2020-17055. (CVE-2020-17043)\n\n - Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025,\n CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033,\n CVE-2020-17034, CVE-2020-17043, CVE-2020-17055. (CVE-2020-17044)\n\n - Windows KernelStream Information Disclosure Vulnerability (CVE-2020-17045)\n\n - Windows Error Reporting Denial of Service Vulnerability (CVE-2020-17046)\n\n - Windows Network File System Denial of Service Vulnerability (CVE-2020-17047)\n\n - Chakra Scripting Engine Memory Corruption Vulnerability This CVE ID is unique from CVE-2020-17054.\n (CVE-2020-17048)\n\n - Scripting Engine Memory Corruption Vulnerability (CVE-2020-17052)\n\n - Internet Explorer Memory Corruption Vulnerability (CVE-2020-17053)\n\n - Chakra Scripting Engine Memory Corruption Vulnerability This CVE ID is unique from CVE-2020-17048.\n (CVE-2020-17054)\n\n - Microsoft Browser Memory Corruption Vulnerability (CVE-2020-17058)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n # https://support.microsoft.com/en-us/help/4586785/windows-10-update-kb4586785\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?e7865164\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Cumulative Update KB4586785.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17042\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2020-17090\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/11/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/11/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/11/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS20-11\";\nkbs = make_list('4586785');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:\"10\",\n sp:0,\n os_build:\"17134\",\n rollup_date:\"11_2020\",\n bulletin:bulletin,\n rollup_kb_list:[4586785])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-06-23T15:12:33", "description": "The Windows installation on the remote host is missing security update 4586781. It is, therefore, affected by multiple vulnerabilities. Please review the vendor advisory for more details.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-11-10T00:00:00", "type": "nessus", "title": "KB4586781: Windows 10 Version 2004 November 2020 Security Update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-1599", "CVE-2020-16997", "CVE-2020-16998", "CVE-2020-16999", "CVE-2020-17000", "CVE-2020-17001", "CVE-2020-17004", "CVE-2020-17007", "CVE-2020-17010", "CVE-2020-17011", "CVE-2020-17013", "CVE-2020-17014", "CVE-2020-17024", "CVE-2020-17025", "CVE-2020-17026", "CVE-2020-17027", "CVE-2020-17028", "CVE-2020-17029", "CVE-2020-17030", "CVE-2020-17031", "CVE-2020-17032", "CVE-2020-17033", "CVE-2020-17034", "CVE-2020-17035", "CVE-2020-17036", "CVE-2020-17037", "CVE-2020-17038", "CVE-2020-17040", "CVE-2020-17041", "CVE-2020-17042", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17045", "CVE-2020-17046", "CVE-2020-17047", "CVE-2020-17048", "CVE-2020-17051", "CVE-2020-17052", "CVE-2020-17053", "CVE-2020-17054", "CVE-2020-17055", "CVE-2020-17056", "CVE-2020-17057", "CVE-2020-17058", "CVE-2020-17068", "CVE-2020-17069", "CVE-2020-17070", "CVE-2020-17071", "CVE-2020-17073", "CVE-2020-17074", "CVE-2020-17075", "CVE-2020-17076", "CVE-2020-17077", "CVE-2020-17087", "CVE-2020-17088", "CVE-2020-17090", "CVE-2020-17113"], "modified": "2021-11-30T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS20_NOV_4586781.NASL", "href": "https://www.tenable.com/plugins/nessus/142684", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(142684);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/11/30\");\n\n script_cve_id(\n \"CVE-2020-1599\",\n \"CVE-2020-16997\",\n \"CVE-2020-16998\",\n \"CVE-2020-16999\",\n \"CVE-2020-17000\",\n \"CVE-2020-17001\",\n \"CVE-2020-17004\",\n \"CVE-2020-17007\",\n \"CVE-2020-17010\",\n \"CVE-2020-17011\",\n \"CVE-2020-17013\",\n \"CVE-2020-17014\",\n \"CVE-2020-17024\",\n \"CVE-2020-17025\",\n \"CVE-2020-17026\",\n \"CVE-2020-17027\",\n \"CVE-2020-17028\",\n \"CVE-2020-17029\",\n \"CVE-2020-17030\",\n \"CVE-2020-17031\",\n \"CVE-2020-17032\",\n \"CVE-2020-17033\",\n \"CVE-2020-17034\",\n \"CVE-2020-17035\",\n \"CVE-2020-17036\",\n \"CVE-2020-17037\",\n \"CVE-2020-17038\",\n \"CVE-2020-17040\",\n \"CVE-2020-17041\",\n \"CVE-2020-17042\",\n \"CVE-2020-17043\",\n \"CVE-2020-17044\",\n \"CVE-2020-17045\",\n \"CVE-2020-17046\",\n \"CVE-2020-17047\",\n \"CVE-2020-17048\",\n \"CVE-2020-17051\",\n \"CVE-2020-17052\",\n \"CVE-2020-17053\",\n \"CVE-2020-17054\",\n \"CVE-2020-17055\",\n \"CVE-2020-17056\",\n \"CVE-2020-17057\",\n \"CVE-2020-17058\",\n \"CVE-2020-17068\",\n \"CVE-2020-17069\",\n \"CVE-2020-17070\",\n \"CVE-2020-17071\",\n \"CVE-2020-17073\",\n \"CVE-2020-17074\",\n \"CVE-2020-17075\",\n \"CVE-2020-17076\",\n \"CVE-2020-17077\",\n \"CVE-2020-17087\",\n \"CVE-2020-17088\",\n \"CVE-2020-17090\",\n \"CVE-2020-17113\"\n );\n script_xref(name:\"MSKB\", value:\"4586781\");\n script_xref(name:\"MSFT\", value:\"MS20-4586781\");\n script_xref(name:\"IAVA\", value:\"2020-A-0512-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0518-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0521-S\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/05/03\");\n\n script_name(english:\"KB4586781: Windows 10 Version 2004 November 2020 Security Update\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Windows installation on the remote host is missing security update 4586781. It is, therefore,\n affected by multiple vulnerabilities. Please review the vendor advisory for more details.\");\n # https://support.microsoft.com/en-us/help/4586781/windows-10-update-kb4586781\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?bdf4d2e0\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Cumulative Update KB4586781.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17051\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/11/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/11/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/11/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS20-11\";\nkbs = make_list('4586781');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:\"10\",\n sp:0,\n os_build:\"19041\",\n rollup_date:\"11_2020\",\n bulletin:bulletin,\n rollup_kb_list:[4586781])\n||\n smb_check_rollup(os:\"10\",\n sp:0,\n os_build:\"19042\",\n rollup_date:\"11_2020\",\n bulletin:bulletin,\n rollup_kb_list:[4586781])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-06-23T15:12:40", "description": "The Windows installation on the remote host is missing security update 4586781. It is, therefore, affected by multiple vulnerabilities. Please review the vendor advisory for more details.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-11-10T00:00:00", "type": "nessus", "title": "KB4586786: Windows 10 Version 1903 and Windows 10 Version 1909 November 2020 Security Update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-1599", "CVE-2020-16997", "CVE-2020-16998", "CVE-2020-16999", "CVE-2020-17000", "CVE-2020-17001", "CVE-2020-17004", "CVE-2020-17007", "CVE-2020-17010", "CVE-2020-17011", "CVE-2020-17012", "CVE-2020-17013", "CVE-2020-17014", "CVE-2020-17024", "CVE-2020-17025", "CVE-2020-17026", "CVE-2020-17027", "CVE-2020-17028", "CVE-2020-17029", "CVE-2020-17030", "CVE-2020-17031", "CVE-2020-17032", "CVE-2020-17033", "CVE-2020-17034", "CVE-2020-17035", "CVE-2020-17036", "CVE-2020-17037", "CVE-2020-17038", "CVE-2020-17040", "CVE-2020-17041", "CVE-2020-17042", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17045", "CVE-2020-17046", "CVE-2020-17047", "CVE-2020-17051", "CVE-2020-17052", "CVE-2020-17053", "CVE-2020-17055", "CVE-2020-17056", "CVE-2020-17057", "CVE-2020-17058", "CVE-2020-17068", "CVE-2020-17069", "CVE-2020-17070", "CVE-2020-17071", "CVE-2020-17073", "CVE-2020-17074", "CVE-2020-17075", "CVE-2020-17076", "CVE-2020-17077", "CVE-2020-17087", "CVE-2020-17088", "CVE-2020-17090", "CVE-2020-17113"], "modified": "2021-11-30T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS20_NOV_4586786.NASL", "href": "https://www.tenable.com/plugins/nessus/142680", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(142680);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/11/30\");\n\n script_cve_id(\n \"CVE-2020-1599\",\n \"CVE-2020-16997\",\n \"CVE-2020-16998\",\n \"CVE-2020-16999\",\n \"CVE-2020-17000\",\n \"CVE-2020-17001\",\n \"CVE-2020-17004\",\n \"CVE-2020-17007\",\n \"CVE-2020-17010\",\n \"CVE-2020-17011\",\n \"CVE-2020-17012\",\n \"CVE-2020-17013\",\n \"CVE-2020-17014\",\n \"CVE-2020-17024\",\n \"CVE-2020-17025\",\n \"CVE-2020-17026\",\n \"CVE-2020-17027\",\n \"CVE-2020-17028\",\n \"CVE-2020-17029\",\n \"CVE-2020-17030\",\n \"CVE-2020-17031\",\n \"CVE-2020-17032\",\n \"CVE-2020-17033\",\n \"CVE-2020-17034\",\n \"CVE-2020-17035\",\n \"CVE-2020-17036\",\n \"CVE-2020-17037\",\n \"CVE-2020-17038\",\n \"CVE-2020-17040\",\n \"CVE-2020-17041\",\n \"CVE-2020-17042\",\n \"CVE-2020-17043\",\n \"CVE-2020-17044\",\n \"CVE-2020-17045\",\n \"CVE-2020-17046\",\n \"CVE-2020-17047\",\n \"CVE-2020-17051\",\n \"CVE-2020-17052\",\n \"CVE-2020-17053\",\n \"CVE-2020-17055\",\n \"CVE-2020-17056\",\n \"CVE-2020-17057\",\n \"CVE-2020-17058\",\n \"CVE-2020-17068\",\n \"CVE-2020-17069\",\n \"CVE-2020-17070\",\n \"CVE-2020-17071\",\n \"CVE-2020-17073\",\n \"CVE-2020-17074\",\n \"CVE-2020-17075\",\n \"CVE-2020-17076\",\n \"CVE-2020-17077\",\n \"CVE-2020-17087\",\n \"CVE-2020-17088\",\n \"CVE-2020-17090\",\n \"CVE-2020-17113\"\n );\n script_xref(name:\"MSKB\", value:\"4586786\");\n script_xref(name:\"MSFT\", value:\"MS20-4586786\");\n script_xref(name:\"IAVA\", value:\"2020-A-0512-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0518-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0521-S\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/05/03\");\n\n script_name(english:\"KB4586786: Windows 10 Version 1903 and Windows 10 Version 1909 November 2020 Security Update\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Windows installation on the remote host is missing security update 4586781. It is, therefore,\n affected by multiple vulnerabilities. Please review the vendor advisory for more details.\");\n # https://support.microsoft.com/en-us/help/4586786/windows-10-update-kb4586786\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?e7e34577\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Cumulative Update KB4586786.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17051\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/11/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/11/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/11/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS20-11\";\nkbs = make_list('4586786');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:\"10\",\n sp:0,\n os_build:\"18362\",\n rollup_date:\"11_2020\",\n bulletin:bulletin,\n rollup_kb_list:[4586786])\n || \n smb_check_rollup(os:\"10\",\n sp:0,\n os_build:\"18363\",\n rollup_date:\"11_2020\",\n bulletin:bulletin,\n rollup_kb_list:[4586786])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-06-23T15:11:47", "description": "The Internet Explorer installation on the remote host is missing a security update. It is, therefore, affected by the following vulnerability :\n\n - A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. (CVE-2020-17052)", "cvss3": {"score": 7.5, "vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2020-11-10T00:00:00", "type": "nessus", "title": "Security Updates for Internet Explorer (November 2020)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-17052"], "modified": "2021-06-03T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS20_NOV_INTERNET_EXPLORER.NASL", "href": "https://www.tenable.com/plugins/nessus/142691", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(142691);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/06/03\");\n\n script_cve_id(\"CVE-2020-17052\");\n script_xref(name:\"MSKB\", value:\"4586827\");\n script_xref(name:\"MSKB\", value:\"4586845\");\n script_xref(name:\"MSKB\", value:\"4586768\");\n script_xref(name:\"MSFT\", value:\"MS20-4586827\");\n script_xref(name:\"MSFT\", value:\"MS20-4586845\");\n script_xref(name:\"MSFT\", value:\"MS20-4586768\");\n script_xref(name:\"IAVA\", value:\"2020-A-0518-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0521-S\");\n\n script_name(english:\"Security Updates for Internet Explorer (November 2020)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Internet Explorer installation on the remote host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Internet Explorer installation on the remote host is\nmissing a security update. It is, therefore, affected by the\nfollowing vulnerability :\n\n - A remote code execution vulnerability exists in the way\n that Microsoft browsers access objects in memory. The\n vulnerability could corrupt memory in a way that could\n allow an attacker to execute arbitrary code in the\n context of the current user. An attacker who\n successfully exploited the vulnerability could gain the\n same user rights as the current user. (CVE-2020-17052)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/4586827/windows-7-update\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/4586845/windows-8-1-update\");\n # https://support.microsoft.com/en-us/help/4586834/windows-server-2012-update\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?82b0555c\");\n # https://support.microsoft.com/en-us/help/4586768/cumulative-security-update-for-internet-explorer\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?f87d3078\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue: \n -KB4586827\n -KB4586845\n -KB4586768\n -KB4586834\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"manual\");\n script_set_attribute(attribute:\"cvss_score_rationale\", value:\"Score based on analysis of the vendor advisory.\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/11/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/11/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/11/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = 'MS20-11';\nkbs = make_list(\n '4586768',\n '4586845',\n '4586834',\n '4586827'\n);\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nos = get_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win7:'1', win8:'0', win81:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nproductname = get_kb_item_or_exit(\"SMB/ProductName\", exit_code:1);\nif (\"Windows 8\" >< productname && \"8.1\" >!< productname)\n audit(AUDIT_OS_SP_NOT_VULN);\n\nif (hotfix_check_server_core() == 1) audit(AUDIT_WIN_SERVER_CORE);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n # Windows 8.1 / Windows Server 2012 R2\n # Internet Explorer 11\n hotfix_is_vulnerable(os:\"6.3\", sp:0, file:\"mshtml.dll\", version:\"11.0.9600.19867\", min_version:\"11.0.9600.16000\", dir:\"\\system32\", bulletin:bulletin, kb:\"4586768\") ||\n\n # Windows Server 2012\n # Internet Explorer 11\n hotfix_is_vulnerable(os:\"6.2\", sp:0, file:\"mshtml.dll\", version:\"11.0.9600.19867\", min_version:\"11.0.9600.16000\", dir:\"\\system32\", bulletin:bulletin, kb:\"4586768\") ||\n\n # Windows 7 / Server 2008 R2\n # Internet Explorer 11\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"mshtml.dll\", version:\"11.0.9600.19867\", min_version:\"11.0.9600.16000\", dir:\"\\system32\", bulletin:bulletin, kb:\"4586768\")\n)\n{\n report = '\\nNote: The fix for this issue is available in either of the following updates:\\n';\n report += ' - KB4586768 : Cumulative Security Update for Internet Explorer\\n';\n\n if(os == \"6.3\")\n {\n report += ' - KB4586845 : Windows 8.1 / Server 2012 R2 Monthly Rollup\\n';\n hotfix_add_report(bulletin:'MS20-11', kb:'4586845', report);\n }\n else if(os == \"6.2\")\n {\n report += ' - KB4586834 : Windows Server 2012 Monthly Rollup\\n';\n hotfix_add_report(bulletin:'MS20-11', kb:'4586834', report);\n }\n else if(os == \"6.1\")\n {\n report += ' - KB4586827 : Windows 7 / Server 2008 R2 Monthly Rollup\\n';\n hotfix_add_report(bulletin:'MS20-11', kb:'4586827', report);\n }\n\n set_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n\n port = kb_smb_transport();\n replace_kb_item(name:'www/' + port + '/XSS', value:TRUE);\n\n hotfix_security_hole();\n hotfix_check_fversion_end();\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n\n", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-06-16T14:52:07", "description": "The remote Windows host is missing security update 4598297 or cumulative update 4598278. It is, therefore, affected by multiple vulnerabilities :\n\n - An elevation of privilege vulnerability. An attacker can exploit this to gain elevated privileges.\n (CVE-2020-17087, CVE-2021-1648, CVE-2021-1649, CVE-2021-1650, CVE-2021-1652, CVE-2021-1653, CVE-2021-1654, CVE-2021-1655, CVE-2021-1659, CVE-2021-1661, CVE-2021-1688, CVE-2021-1693, CVE-2021-1694, CVE-2021-1695, CVE-2021-1702, CVE-2021-1704, CVE-2021-1706, CVE-2021-1709)\n\n - A denial of service (DoS) vulnerability. An attacker can exploit this issue to cause the affected component to deny system or application services. (CVE-2021-1679)\n\n - A security feature bypass vulnerability exists. An attacker can exploit this and bypass the security feature and perform unauthorized actions compromising the integrity of the system/application. (CVE-2021-1674, CVE-2021-1678)\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive information. (CVE-2021-1656, CVE-2021-1676, CVE-2021-1696, CVE-2021-1699, CVE-2021-1708)\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2021-1657, CVE-2021-1658, CVE-2021-1660, CVE-2021-1664, CVE-2021-1665, CVE-2021-1666, CVE-2021-1667, CVE-2021-1668, CVE-2021-1671, CVE-2021-1673, CVE-2021-1700, CVE-2021-1701, CVE-2021-1710)", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2021-01-12T00:00:00", "type": "nessus", "title": "KB4598297: Windows Server 2012 January 2021 Security Update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-17087", "CVE-2021-1648", "CVE-2021-1649", "CVE-2021-1650", "CVE-2021-1652", "CVE-2021-1653", "CVE-2021-1654", "CVE-2021-1655", "CVE-2021-1656", "CVE-2021-1657", "CVE-2021-1658", "CVE-2021-1659", "CVE-2021-1660", "CVE-2021-1661", "CVE-2021-1664", "CVE-2021-1665", "CVE-2021-1666", "CVE-2021-1667", "CVE-2021-1668", "CVE-2021-1671", "CVE-2021-1673", "CVE-2021-1674", "CVE-2021-1676", "CVE-2021-1678", "CVE-2021-1679", "CVE-2021-1688", "CVE-2021-1693", "CVE-2021-1694", "CVE-2021-1695", "CVE-2021-1696", "CVE-2021-1699", "CVE-2021-1700", "CVE-2021-1701", "CVE-2021-1702", "CVE-2021-1704", "CVE-2021-1706", "CVE-2021-1708", "CVE-2021-1709", "CVE-2021-1710"], "modified": "2022-05-11T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS21_JAN_4598278.NASL", "href": "https://www.tenable.com/plugins/nessus/144881", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(144881);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/11\");\n\n script_cve_id(\n \"CVE-2020-17087\",\n \"CVE-2021-1648\",\n \"CVE-2021-1649\",\n \"CVE-2021-1650\",\n \"CVE-2021-1652\",\n \"CVE-2021-1653\",\n \"CVE-2021-1654\",\n \"CVE-2021-1655\",\n \"CVE-2021-1656\",\n \"CVE-2021-1657\",\n \"CVE-2021-1658\",\n \"CVE-2021-1659\",\n \"CVE-2021-1660\",\n \"CVE-2021-1661\",\n \"CVE-2021-1664\",\n \"CVE-2021-1665\",\n \"CVE-2021-1666\",\n \"CVE-2021-1667\",\n \"CVE-2021-1668\",\n \"CVE-2021-1671\",\n \"CVE-2021-1673\",\n \"CVE-2021-1674\",\n \"CVE-2021-1676\",\n \"CVE-2021-1678\",\n \"CVE-2021-1679\",\n \"CVE-2021-1688\",\n \"CVE-2021-1693\",\n \"CVE-2021-1694\",\n \"CVE-2021-1695\",\n \"CVE-2021-1696\",\n \"CVE-2021-1699\",\n \"CVE-2021-1700\",\n \"CVE-2021-1701\",\n \"CVE-2021-1702\",\n \"CVE-2021-1704\",\n \"CVE-2021-1706\",\n \"CVE-2021-1708\",\n \"CVE-2021-1709\",\n \"CVE-2021-1710\"\n );\n script_xref(name:\"MSKB\", value:\"4598278\");\n script_xref(name:\"MSKB\", value:\"4598297\");\n script_xref(name:\"MSFT\", value:\"MS21-4598278\");\n script_xref(name:\"MSFT\", value:\"MS21-4598297\");\n script_xref(name:\"IAVA\", value:\"2021-A-0023-S\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/05/03\");\n\n script_name(english:\"KB4598297: Windows Server 2012 January 2021 Security Update\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 4598297\nor cumulative update 4598278. It is, therefore, affected by\nmultiple vulnerabilities :\n\n - An elevation of privilege vulnerability. An attacker can\n exploit this to gain elevated privileges.\n (CVE-2020-17087, CVE-2021-1648, CVE-2021-1649, \n CVE-2021-1650, CVE-2021-1652, CVE-2021-1653, \n CVE-2021-1654, CVE-2021-1655, CVE-2021-1659, \n CVE-2021-1661, CVE-2021-1688, CVE-2021-1693, \n CVE-2021-1694, CVE-2021-1695, CVE-2021-1702, \n CVE-2021-1704, CVE-2021-1706, CVE-2021-1709)\n\n - A denial of service (DoS) vulnerability. An attacker can\n exploit this issue to cause the affected component to\n deny system or application services. (CVE-2021-1679)\n\n - A security feature bypass vulnerability exists. An\n attacker can exploit this and bypass the security\n feature and perform unauthorized actions compromising\n the integrity of the system/application. (CVE-2021-1674,\n CVE-2021-1678)\n\n - An information disclosure vulnerability. An attacker can\n exploit this to disclose potentially sensitive\n information. (CVE-2021-1656, CVE-2021-1676,\n CVE-2021-1696, CVE-2021-1699, CVE-2021-1708)\n\n - A remote code execution vulnerability. An attacker can\n exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2021-1657,\n CVE-2021-1658, CVE-2021-1660, CVE-2021-1664,\n CVE-2021-1665, CVE-2021-1666, CVE-2021-1667,\n CVE-2021-1668, CVE-2021-1671, CVE-2021-1673,\n CVE-2021-1700, CVE-2021-1701, CVE-2021-1710)\");\n # https://support.microsoft.com/en-us/help/4598278/windows-server-2012-update\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?bbb76f59\");\n # https://support.microsoft.com/en-us/help/4598297/windows-server-2012-update\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?b71d9485\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Only update KB4598297 or Cumulative Update KB4598278.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-1668\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-1694\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/01/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/01/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/01/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS21-01\";\nkbs = make_list('4598278', '4598297'); # changed by manual execution of PT scriptsautomation\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win8:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\n# Windows 8 EOL\nproductname = get_kb_item_or_exit(\"SMB/ProductName\", exit_code:1);\nif (\"Windows 8\" >< productname) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:\"6.2\",\n sp:0,\n rollup_date:\"01_2021\",\n bulletin:bulletin,\n rollup_kb_list:[4598297, 4598278])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "mscve": [{"lastseen": "2022-03-17T17:51:09", "description": "Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Windows Remote Access Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17025", "CVE-2020-17026", "CVE-2020-17027", "CVE-2020-17028", "CVE-2020-17031", "CVE-2020-17032", "CVE-2020-17033", "CVE-2020-17034", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17055"], "modified": "2020-11-10T08:00:00", "id": "MS:CVE-2020-17028", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17028", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-03-17T17:51:09", "description": "Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Windows Remote Access Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17025", "CVE-2020-17026", "CVE-2020-17027", "CVE-2020-17028", "CVE-2020-17031", "CVE-2020-17032", "CVE-2020-17033", "CVE-2020-17034", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17055"], "modified": "2020-11-10T08:00:00", "id": "MS:CVE-2020-17032", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17032", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-03-17T17:51:10", "description": "Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Windows Remote Access Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17025", "CVE-2020-17026", "CVE-2020-17027", "CVE-2020-17028", "CVE-2020-17031", "CVE-2020-17032", "CVE-2020-17033", "CVE-2020-17034", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17055"], "modified": "2020-11-10T08:00:00", "id": "MS:CVE-2020-17026", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17026", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-03-17T17:51:09", "description": "Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Windows Remote Access Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17025", "CVE-2020-17026", "CVE-2020-17027", "CVE-2020-17028", "CVE-2020-17031", "CVE-2020-17032", "CVE-2020-17033", "CVE-2020-17034", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17055"], "modified": "2020-11-10T08:00:00", "id": "MS:CVE-2020-17033", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17033", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-03-17T17:51:08", "description": "Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Windows Remote Access Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17025", "CVE-2020-17026", "CVE-2020-17027", "CVE-2020-17028", "CVE-2020-17031", "CVE-2020-17032", "CVE-2020-17033", "CVE-2020-17034", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17055"], "modified": "2020-11-10T08:00:00", "id": "MS:CVE-2020-17034", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17034", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-03-17T17:51:06", "description": "Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17044, CVE-2020-17055. \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Windows Remote Access Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17025", "CVE-2020-17026", "CVE-2020-17027", "CVE-2020-17028", "CVE-2020-17031", "CVE-2020-17032", "CVE-2020-17033", "CVE-2020-17034", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17055"], "modified": "2020-11-10T08:00:00", "id": "MS:CVE-2020-17043", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17043", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-03-17T17:51:09", "description": "Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Windows Remote Access Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17025", "CVE-2020-17026", "CVE-2020-17027", "CVE-2020-17028", "CVE-2020-17031", "CVE-2020-17032", "CVE-2020-17033", "CVE-2020-17034", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17055"], "modified": "2020-11-10T08:00:00", "id": "MS:CVE-2020-17031", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17031", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-03-17T17:51:11", "description": "Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Windows Remote Access Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17025", "CVE-2020-17026", "CVE-2020-17027", "CVE-2020-17028", "CVE-2020-17031", "CVE-2020-17032", "CVE-2020-17033", "CVE-2020-17034", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17055"], "modified": "2020-11-10T08:00:00", "id": "MS:CVE-2020-17025", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17025", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-03-17T17:51:05", "description": "Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17055. \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Windows Remote Access Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17025", "CVE-2020-17026", "CVE-2020-17027", "CVE-2020-17028", "CVE-2020-17031", "CVE-2020-17032", "CVE-2020-17033", "CVE-2020-17034", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17055"], "modified": "2020-11-10T08:00:00", "id": "MS:CVE-2020-17044", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17044", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-03-17T17:51:24", "description": "Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044. \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Windows Remote Access Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17025", "CVE-2020-17026", "CVE-2020-17027", "CVE-2020-17028", "CVE-2020-17031", "CVE-2020-17032", "CVE-2020-17033", "CVE-2020-17034", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17055"], "modified": "2020-11-10T08:00:00", "id": "MS:CVE-2020-17055", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17055", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-03-17T17:51:10", "description": "Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Windows Remote Access Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17025", "CVE-2020-17026", "CVE-2020-17027", "CVE-2020-17028", "CVE-2020-17031", "CVE-2020-17032", "CVE-2020-17033", "CVE-2020-17034", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17055"], "modified": "2020-11-10T08:00:00", "id": "MS:CVE-2020-17027", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17027", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-03-17T17:51:13", "description": "Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17001. \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.1, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.2}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Windows Print Spooler Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 6.6, "vectorString": "AV:L/AC:L/Au:N/C:N/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 9.2, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17001", "CVE-2020-17014"], "modified": "2020-11-10T08:00:00", "id": "MS:CVE-2020-17014", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17014", "cvss": {"score": 6.6, "vector": "AV:L/AC:L/Au:N/C:N/I:C/A:C"}}, {"lastseen": "2022-03-17T17:51:24", "description": "Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17014. \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Windows Print Spooler Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17001", "CVE-2020-17014"], "modified": "2020-11-10T08:00:00", "id": "MS:CVE-2020-17001", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17001", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-06T18:24:31", "description": "Windows Network File System Denial of Service Vulnerability \n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.6}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Windows Network File System Denial of Service Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17047"], "modified": "2020-11-10T08:00:00", "id": "MS:CVE-2020-17047", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17047", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-12-06T18:25:05", "description": "Windows Graphics Component Information Disclosure Vulnerability \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.5, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.6}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Windows Graphics Component Information Disclosure Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17004"], "modified": "2020-11-10T08:00:00", "id": "MS:CVE-2020-17004", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17004", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-12-06T18:24:36", "description": "Windows Function Discovery SSDP Provider Information Disclosure Vulnerability \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.5, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.6}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Windows Function Discovery SSDP Provider Information Disclosure Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.9, "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17036"], "modified": "2020-11-10T08:00:00", "id": "MS:CVE-2020-17036", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17036", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2021-12-06T18:24:40", "description": "Windows Canonical Display Driver Information Disclosure Vulnerability \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.5, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.6}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Windows Canonical Display Driver Information Disclosure Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.9, "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17029"], "modified": "2020-11-10T08:00:00", "id": "MS:CVE-2020-17029", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17029", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2021-12-06T18:25:02", "description": "Windows NDIS Information Disclosure Vulnerability \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.5, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.6}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Windows NDIS Information Disclosure Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17069"], "modified": "2020-11-10T08:00:00", "id": "MS:CVE-2020-17069", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17069", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-12-06T18:25:02", "description": "Windows GDI+ Remote Code Execution Vulnerability \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Windows GDI+ Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17068"], "modified": "2020-11-10T08:00:00", "id": "MS:CVE-2020-17068", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17068", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-12-06T18:24:34", "description": "Windows Hyper-V Security Feature Bypass Vulnerability \n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Windows Hyper-V Security Feature Bypass Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17040"], "modified": "2020-11-11T08:00:00", "id": "MS:CVE-2020-17040", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17040", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-06T18:24:30", "description": "Windows Network File System Remote Code Execution Vulnerability \n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Windows Network File System Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17051"], "modified": "2020-11-16T08:00:00", "id": "MS:CVE-2020-17051", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17051", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-12-06T18:24:58", "description": "Windows Common Log File System Driver Elevation of Privilege Vulnerability \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Windows Common Log File System Driver Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17088"], "modified": "2020-11-10T08:00:00", "id": "MS:CVE-2020-17088", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17088", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-06T18:24:31", "description": "A security feature bypass vulnerability exists in the way Key Distribution Center (KDC) determines if a service ticket can be used for delegation via Kerberos Constrained Delegation (KCD).\n\nTo exploit the vulnerability, a compromised service that is configured to use KCD could tamper with a service ticket that is not valid for delegation to force the KDC to accept it.\n\nThe update addresses this vulnerability by changing how the KDC validates service tickets used with KCD.\n", "cvss3": {"exploitabilityScore": 1.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.2, "privilegesRequired": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Kerberos KDC Security Feature Bypass Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17049"], "modified": "2021-07-13T07:00:00", "id": "MS:CVE-2020-17049", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17049", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2021-12-06T18:25:06", "description": "Remote Desktop Protocol Client Information Disclosure Vulnerability \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.5, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.6}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Remote Desktop Protocol Client Information Disclosure Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17000"], "modified": "2020-11-10T08:00:00", "id": "MS:CVE-2020-17000", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17000", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-12-06T18:25:07", "description": "Remote Desktop Protocol Server Information Disclosure Vulnerability \n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 6.5, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.6}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Remote Desktop Protocol Server Information Disclosure Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16997"], "modified": "2020-11-10T08:00:00", "id": "MS:CVE-2020-16997", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-16997", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}}, {"lastseen": "2021-12-06T18:24:34", "description": "Windows Print Configuration Elevation of Privilege Vulnerability \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Windows Print Configuration Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17041"], "modified": "2020-11-10T08:00:00", "id": "MS:CVE-2020-17041", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17041", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-12-06T18:24:32", "description": "Windows KernelStream Information Disclosure Vulnerability \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.5, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.6}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Windows KernelStream Information Disclosure Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.9, "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17045"], "modified": "2020-11-10T08:00:00", "id": "MS:CVE-2020-17045", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17045", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2021-12-06T18:24:54", "description": "Windows Spoofing Vulnerability \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "baseScore": 5.5, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.6}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Windows Spoofing Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-1599"], "modified": "2020-11-10T08:00:00", "id": "MS:CVE-2020-1599", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1599", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-12-06T18:24:34", "description": "Windows Print Spooler Remote Code Execution Vulnerability \n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Windows Print Spooler Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17042"], "modified": "2020-11-10T08:00:00", "id": "MS:CVE-2020-17042", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17042", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-12-06T18:24:58", "description": "Windows Kernel Local Elevation of Privilege Vulnerability \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Windows Kernel Local Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17087"], "modified": "2021-01-12T08:00:00", "id": "MS:CVE-2020-17087", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17087", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-12-06T18:24:42", "description": "Windows Client Side Rendering Print Provider Elevation of Privilege Vulnerability \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Windows Client Side Rendering Print Provider Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17024"], "modified": "2020-11-10T08:00:00", "id": "MS:CVE-2020-17024", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17024", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-12-06T18:24:47", "description": "Windows Port Class Library Elevation of Privilege Vulnerability \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Windows Port Class Library Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17011"], "modified": "2020-11-10T08:00:00", "id": "MS:CVE-2020-17011", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17011", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-12-06T18:25:04", "description": "Windows Network File System Information Disclosure Vulnerability \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.5, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.6}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Windows Network File System Information Disclosure Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17056"], "modified": "2020-11-10T08:00:00", "id": "MS:CVE-2020-17056", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17056", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-12-06T18:24:30", "description": "Scripting Engine Memory Corruption Vulnerability \n", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Scripting Engine Memory Corruption Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17052"], "modified": "2020-11-10T08:00:00", "id": "MS:CVE-2020-17052", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17052", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-03-17T17:51:13", "description": "Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17038. \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Win32k Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17010", "CVE-2020-17038"], "modified": "2020-11-10T08:00:00", "id": "MS:CVE-2020-17010", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17010", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-03-17T17:51:07", "description": "Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17010. \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mscve", "title": "Win32k Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17010", "CVE-2020-17038"], "modified": "2020-11-10T08:00:00", "id": "MS:CVE-2020-17038", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17038", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "cve": [{"lastseen": "2022-03-23T14:29:50", "description": "Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17025", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17025", "CVE-2020-17026", "CVE-2020-17027", "CVE-2020-17028", "CVE-2020-17031", "CVE-2020-17032", "CVE-2020-17033", "CVE-2020-17034", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17055"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2016:1903", "cpe:/o:microsoft:windows_10:-"], "id": "CVE-2020-17025", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17025", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T14:29:53", "description": "Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17027", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17025", "CVE-2020-17026", "CVE-2020-17027", "CVE-2020-17028", "CVE-2020-17031", "CVE-2020-17032", "CVE-2020-17033", "CVE-2020-17034", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17055"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2016:1903", "cpe:/o:microsoft:windows_10:-"], "id": "CVE-2020-17027", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17027", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T14:29:56", "description": "Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17028", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17025", "CVE-2020-17026", "CVE-2020-17027", "CVE-2020-17028", "CVE-2020-17031", "CVE-2020-17032", "CVE-2020-17033", "CVE-2020-17034", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17055"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2016:1903", "cpe:/o:microsoft:windows_10:-"], "id": "CVE-2020-17028", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17028", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T14:29:55", "description": "Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17026", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17025", "CVE-2020-17026", "CVE-2020-17027", "CVE-2020-17028", "CVE-2020-17031", "CVE-2020-17032", "CVE-2020-17033", "CVE-2020-17034", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17055"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2016:1903", "cpe:/o:microsoft:windows_10:-"], "id": "CVE-2020-17026", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17026", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T14:30:02", "description": "Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17031", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17025", "CVE-2020-17026", "CVE-2020-17027", "CVE-2020-17028", "CVE-2020-17031", "CVE-2020-17032", "CVE-2020-17033", "CVE-2020-17034", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17055"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2016:1903", "cpe:/o:microsoft:windows_10:-"], "id": "CVE-2020-17031", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17031", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T14:30:05", "description": "Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17032", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17025", "CVE-2020-17026", "CVE-2020-17027", "CVE-2020-17028", "CVE-2020-17031", "CVE-2020-17032", "CVE-2020-17033", "CVE-2020-17034", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17055"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2016:1903", "cpe:/o:microsoft:windows_10:-"], "id": "CVE-2020-17032", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17032", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T14:30:10", "description": "Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17033", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17025", "CVE-2020-17026", "CVE-2020-17027", "CVE-2020-17028", "CVE-2020-17031", "CVE-2020-17032", "CVE-2020-17033", "CVE-2020-17034", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17055"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2016:1903", "cpe:/o:microsoft:windows_10:-"], "id": "CVE-2020-17033", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17033", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T14:30:15", "description": "Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17034", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17025", "CVE-2020-17026", "CVE-2020-17027", "CVE-2020-17028", "CVE-2020-17031", "CVE-2020-17032", "CVE-2020-17033", "CVE-2020-17034", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17055"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2016:1903", "cpe:/o:microsoft:windows_10:-"], "id": "CVE-2020-17034", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17034", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T14:31:04", "description": "Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17044, CVE-2020-17055.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17043", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17025", "CVE-2020-17026", "CVE-2020-17027", "CVE-2020-17028", "CVE-2020-17031", "CVE-2020-17032", "CVE-2020-17033", "CVE-2020-17034", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17055"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_7:-", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2016:1903"], "id": "CVE-2020-17043", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17043", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T14:31:06", "description": "Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17055.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17044", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17025", "CVE-2020-17026", "CVE-2020-17027", "CVE-2020-17028", "CVE-2020-17031", "CVE-2020-17032", "CVE-2020-17033", "CVE-2020-17034", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17055"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_7:-", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1709", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2016:1903"], "id": "CVE-2020-17044", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17044", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T14:32:43", "description": "Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17055", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17025", "CVE-2020-17026", "CVE-2020-17027", "CVE-2020-17028", "CVE-2020-17031", "CVE-2020-17032", "CVE-2020-17033", "CVE-2020-17034", "CVE-2020-17043", "CVE-2020-17044", "CVE-2020-17055"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1709", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2016:1903"], "id": "CVE-2020-17055", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17055", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T14:29:27", "description": "Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17001.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.1, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17014", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 6.6, "vectorString": "AV:L/AC:L/Au:N/C:N/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 9.2, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17001", "CVE-2020-17014"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_7:sp1", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2016:1903"], "id": "CVE-2020-17014", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17014", "cvss": {"score": 6.6, "vector": "AV:L/AC:L/Au:N/C:N/I:C/A:C"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:sp1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*"]}, {"lastseen": "2022-03-23T14:29:00", "description": "Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17014.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17001", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17001", "CVE-2020-17014"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_7:sp1", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2016:1903"], "id": "CVE-2020-17001", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17001", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:sp1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*"]}, {"lastseen": "2022-03-23T14:31:17", "description": "Windows Network File System Denial of Service Vulnerability", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17047", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17047"], "modified": "2020-11-19T17:50:00", "cpe": ["cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_7:-", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1709", "cpe:/o:microsoft:windows_server_2012:*", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2016:1903"], "id": "CVE-2020-17047", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17047", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T14:29:09", "description": "Windows Graphics Component Information Disclosure Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17004", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17004"], "modified": "2020-11-18T17:14:00", "cpe": ["cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_7:sp1", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2016:1903"], "id": "CVE-2020-17004", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17004", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:sp1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*"]}, {"lastseen": "2022-03-23T14:30:21", "description": "Windows Function Discovery SSDP Provider Information Disclosure Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17036", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.9, "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17036"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_7:-", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_server_2012:*", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2016:1903"], "id": "CVE-2020-17036", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17036", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T14:29:58", "description": "Windows Canonical Display Driver Information Disclosure Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17029", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.9, "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17029"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_7:-", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_server_2012:*", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2016:1903"], "id": "CVE-2020-17029", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17029", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T14:33:24", "description": "Windows NDIS Information Disclosure Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17069", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17069"], "modified": "2020-11-16T18:14:00", "cpe": ["cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_7:-", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2016:1903"], "id": "CVE-2020-17069", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17069", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*"]}, {"lastseen": "2022-03-23T14:33:21", "description": "Windows GDI+ Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17068", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17068"], "modified": "2020-11-23T20:32:00", "cpe": ["cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_7:-", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2016:1903"], "id": "CVE-2020-17068", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17068", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*"]}, {"lastseen": "2022-03-23T14:32:23", "description": "Windows Hyper-V Security Feature Bypass Vulnerability", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17040", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17040"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2016:1903", "cpe:/o:microsoft:windows_10:-"], "id": "CVE-2020-17040", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17040", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T14:31:59", "description": "Windows Network File System Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17051", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17051"], "modified": "2020-11-23T13:57:00", "cpe": ["cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_server_2012:*", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_server_2016:1903"], "id": "CVE-2020-17051", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17051", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T14:34:07", "description": "Windows Common Log File System Driver Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17088", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17088"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_7:-", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2016:1903"], "id": "CVE-2020-17088", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17088", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T14:31:25", "description": "Kerberos Security Feature Bypass Vulnerability", "cvss3": {"exploitabilityScore": 1.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 7.2, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17049", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17049"], "modified": "2021-11-30T22:22:00", "cpe": ["cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_server_2012:*", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2016:1903"], "id": "CVE-2020-17049", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17049", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T14:29:00", "description": "Remote Desktop Protocol Client Information Disclosure Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17000", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17000"], "modified": "2020-11-18T15:30:00", "cpe": ["cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_7:sp1", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_10:-"], "id": "CVE-2020-17000", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17000", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:sp1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T14:28:52", "description": "Remote Desktop Protocol Server Information Disclosure Vulnerability", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 6.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-16997", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16997"], "modified": "2020-11-19T20:07:00", "cpe": ["cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_7:sp1", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2016:1903"], "id": "CVE-2020-16997", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16997", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:sp1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*"]}, {"lastseen": "2022-03-23T14:30:58", "description": "Windows Print Configuration Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17041", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17041"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2012:*", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2016:1903", "cpe:/o:microsoft:windows_10:-"], "id": "CVE-2020-17041", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17041", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T14:31:09", "description": "Windows KernelStream Information Disclosure Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17045", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.9, "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17045"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_7:-", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_server_2012:*", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2016:1903"], "id": "CVE-2020-17045", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17045", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T14:05:55", "description": "Windows Spoofing Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-1599", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-1599"], "modified": "2020-11-24T20:58:00", "cpe": ["cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_7:-", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2016:1903"], "id": "CVE-2020-1599", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1599", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*"]}, {"lastseen": "2022-03-23T14:31:01", "description": "Windows Print Spooler Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17042", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17042"], "modified": "2020-11-19T17:29:00", "cpe": ["cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_7:-", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_server_2012:*", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2016:1903"], "id": "CVE-2020-17042", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17042", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*"]}, {"lastseen": "2022-07-13T16:00:11", "description": "Windows Kernel Local Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17087", "cwe": ["CWE-681"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17087"], "modified": "2022-07-12T17:42:00", "cpe": ["cpe:/o:microsoft:windows_server_2016:1903", "cpe:/o:microsoft:windows_7:-", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_server_2019:-"], "id": "CVE-2020-17087", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17087", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp2:*:*:*:*:x64:*"]}, {"lastseen": "2022-03-23T14:29:49", "description": "Windows Client Side Rendering Print Provider Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17024", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17024"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2012:*", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2016:1903", "cpe:/o:microsoft:windows_10:-"], "id": "CVE-2020-17024", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17024", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T14:29:17", "description": "Windows Port Class Library Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17011", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17011"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_7:sp1", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2016:1903"], "id": "CVE-2020-17011", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17011", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:sp1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*"]}, {"lastseen": "2022-03-23T14:32:45", "description": "Windows Network File System Information Disclosure Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17056", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17056"], "modified": "2020-11-18T16:40:00", "cpe": ["cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2016:1903", "cpe:/o:microsoft:windows_10:-"], "id": "CVE-2020-17056", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17056", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T14:32:38", "description": "Scripting Engine Memory Corruption Vulnerability", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.1, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17052", "cwe": ["CWE-787"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17052"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/a:microsoft:edge:-", "cpe:/a:microsoft:internet_explorer:11"], "id": "CVE-2020-17052", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17052", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"]}, {"lastseen": "2022-04-26T20:16:59", "description": "Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17038.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17010", "cwe": ["CWE-78"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17010", "CVE-2020-17038"], "modified": "2022-04-26T16:33:00", "cpe": ["cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_server_2016:1903", "cpe:/o:microsoft:windows_10:1909"], "id": "CVE-2020-17010", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17010", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T14:30:44", "description": "Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17010.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-11-11T07:15:00", "type": "cve", "title": "CVE-2020-17038", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17010", "CVE-2020-17038"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_7:-", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_server_2012:*", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2016:1903"], "id": "CVE-2020-17038", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17038", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*"]}], "mskb": [{"lastseen": "2021-12-31T15:44:23", "description": "None\n**IMPORTANT** Windows 8.1 and Windows Server 2012 R2 have reached the end of mainstream support and are now in extended support. Starting in July 2020, there will no longer be optional, non-security releases (known as \"C\" releases) for this operating system. Operating systems in extended support have only cumulative monthly security updates (known as the \"B\" or Update Tuesday release).\n\n**NEW 11/10/20** \nFor more information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following [article](<https://support.microsoft.com/help/824684>). To view other notes and messages, see the Windows 8.1 and Windows Server 2012 R2 update history [home page](<https://support.microsoft.com/help/4009470>).\n\n## Improvements and fixes\n\nThis security update includes quality improvements. Key changes include:\n\n * Corrects the DST start date for the Fiji Islands to December 20, 2020.\n * Addresses a security vulnerability by preventing applications that run as a SYSTEM account from printing to local ports that point to a file. Failing print jobs log error 50, \u201cThe request is not supported.\u201d in event ID 372 in the PrintService\\Admin event log. To address this issue going forward, make sure your applications or services run as a specific user or service account.\n * Security updates to Windows Graphics, Windows Silicon Platform, Windows Authentication, Windows Core Networking, Windows Peripherals, Windows Network Security and Containers, Windows Hybrid Storage Services, and Windows Remote Desktop.\nFor more information about the resolved security vulnerabilities, please refer to the new [Security Update Guide](<https://msrc.microsoft.com/update-guide>) website.\n\n## Known issues in this update\n\n**Symptom**| **Workaround** \n---|--- \nCertain operations, such as **rename**, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \u201cSTATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\u201d. This occurs when you perform the operation on a CSV owner node from a process that doesn\u2019t have administrator privilege.| Do one of the following:\n\n * Perform the operation from a process that has administrator privilege.\n * Perform the operation from a node that doesn\u2019t have CSV ownership.\nMicrosoft is working on a resolution and will provide an update in an upcoming release. \nAfter installing this update on domain controllers (DCs) and read-only domain controllers (RODCs) in your environment, you might encounter Kerberos authentication and ticket renewal issues. This is caused by an issue in how [CVE-2020-17049](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17049>) was addressed in these updates.For specific symptoms and behaviors related to this issue, please see the [Windows release health](<https://docs.microsoft.com/windows/release-information/status-windows-8.1-and-windows-server-2012-r2#1522msgdesc>) page. **Note **This issue only affects Windows Servers, Windows 10 devices and applications in enterprise environments.| This issue is resolved in KB4594439. \n \n## How to get this update\n\n**Before installing this update**We strongly recommend that you install the latest servicing stack update (SSU) for your operating system before you install the latest Rollup. SSUs improve the reliability of the update process to mitigate potential issues while installing the Rollup and applying Microsoft security fixes. For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/en-us/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/help/4535697>).If you use Windows Update, the latest SSU ([KB4566425](<https://support.microsoft.com/help/4566425>)) will be offered to you automatically. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). \n\n**REMINDER** If you are using Security-only updates, you will also need to install all previous Security-only updates and the latest cumulative update for Internet Explorer ([KB4586768](<https://support.microsoft.com/help/4586768>)).\n\n**Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| No| See the other options below. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB4586823>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows 8.1, Windows Server 2012 R2, Windows Embedded 8.1 Industry Enterprise, Windows Embedded 8.1 Industry Pro**Classification**: Security Updates \n**File information**For a list of the files that are provided in this update, download the [file information for update 4586823](<https://download.microsoft.com/download/f/a/9/fa9ab938-dc38-44c6-84de-f5a964c3d8b2/4586823.csv>). \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mskb", "title": "November 10, 2020\u2014KB4586823 (Security-only update)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17049", "CVE-2020-17088"], "modified": "2020-11-10T08:00:00", "id": "KB4586823", "href": "https://support.microsoft.com/en-us/help/4586823", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2021-12-31T15:44:21", "description": "None\n**IMPORTANT** Windows Server 2012 has reached the end of mainstream support and is now in extended support. Starting in July 2020, there will no longer be optional releases (known as \"C\" or \"D\" releases) for this operating system. Operating systems in extended support have only cumulative monthly security updates (known as the \"B\" or Update Tuesday release).\n\n**NEW 11/10/20** \nFor more information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following [article](<https://support.microsoft.com/help/824684>). To view other notes and messages, see the Windows Server 2012 update history [home page](<https://support.microsoft.com/help/4009471>).\n\n## Improvements and fixes\n\nThis security update includes quality improvements. Key changes include:\n\n * Corrects the DST start date for the Fiji Islands to December 20, 2020.\n * Addresses a security vulnerability by preventing applications that run as a SYSTEM account from printing to local ports that point to a file. Failing print jobs log error 50, \u201cThe request is not supported.\u201d in event ID 372 in the PrintService\\Admin event log. To address this issue going forward, make sure your applications or services run as a specific user or service account.\n * Security updates to Windows Graphics, Windows Silicon Platform, Windows Authentication, Windows Core Networking, Windows Peripherals, Windows Network Security and Containers, Windows Hybrid Storage Services, and Windows Remote Desktop.\nFor more information about the resolved security vulnerabilities, please refer to the [Security Update Guide](<https://portal.msrc.microsoft.com/security-guidance>).\n\n## Known issues in this update\n\n**Symptom**| **Workaround** \n---|--- \nCertain operations, such as **rename**, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \u201cSTATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\u201d. This occurs when you perform the operation on a CSV owner node from a process that doesn\u2019t have administrator privilege.| Do one of the following:\n\n * Perform the operation from a process that has administrator privilege.\n * Perform the operation from a node that doesn\u2019t have CSV ownership.\nMicrosoft is working on a resolution and will provide an update in an upcoming release. \nAfter installing this update on domain controllers (DCs) and read-only domain controllers (RODCs) in your environment, you might encounter Kerberos authentication and ticket renewal issues. This is caused by an issue in how [CVE-2020-17049](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17049>) was addressed in these updates.For specific symptoms and behaviors related to this issue, please see the [Windows release health](<https://docs.microsoft.com/windows/release-information/status-windows-server-2012#1522msgdesc>) page. **Note **This issue only affects Windows Servers, Windows 10 devices and applications in enterprise environments.| This issue is resolved in KB4594438. \n \n## How to get this update\n\n**Before installing this update**We strongly recommend that you install the latest servicing stack update (SSU) for your operating system before installing the latest Rollup. SSUs improve the reliability of the update process to mitigate potential issues while installing the Rollup and applying Microsoft security fixes. For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/en-us/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/help/4535697>).If you use Windows Update, the latest SSU ([KB4566426](<https://support.microsoft.com/help/4566426>)) will be offered to you automatically. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). \n\n**REMINDER** If you are using Security-only updates, you will also need to install all previous Security-only updates and the latest cumulative update for Internet Explorer ([KB4586768](<https://support.microsoft.com/help/4586768>)).\n\n**Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| No| See the other options below. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB4586808>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows Server 2012, Windows Embedded 8 Standard**Classification**: Security Update \n**File information**For a list of the files that are provided in this update, download the [file information for cumulative update 4586808](<https://download.microsoft.com/download/7/6/6/766e60b6-effb-432b-93ef-d280852cafe1/4586808.csv>).\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mskb", "title": "November 10, 2020\u2014KB4586808 (Security-only update)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17049", "CVE-2020-17088"], "modified": "2020-11-10T08:00:00", "id": "KB4586808", "href": "https://support.microsoft.com/en-us/help/4586808", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2022-08-10T14:05:45", "description": "None\n**NEW 8/5/21 \nEXPIRATION NOTICE****IMPORTANT **As of 8/5/2021, this KB is no longer available from Windows Update, the Microsoft Update Catalog, or other release channels. We recommend that you update your devices to the latest security quality update. \n\n**NEW 11/10/20 \nIMPORTANT** Because of minimal operations during the holidays and the upcoming Western new year, there won\u2019t be a preview release (known as a \u201cC\u201d release) for the month of December 2020. There will be a monthly security release (known as a \u201cB\u201d release) for December 2020. Normal monthly servicing for both B and C releases will resume in January 2021.\n\n**Note **This release also contains updates for Microsoft HoloLens (OS Build 17763.1577) released November 10, 2020. Microsoft will release an update directly to the Windows Update Client to improve Windows Update reliability on Microsoft HoloLens that have not updated to this most recent OS Build.\n\n**UPDATED 11/10/20** \nFor more information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following [article](<https://support.microsoft.com/en-us/help/824684/description-of-the-standard-terminology-that-is-used-to-describe-micro>). To view other notes and messages, see the Windows 10, version 1809 update history home page.\n\n## Highlights\n\n * Updates to improve security when using Microsoft Office products.\n * Updates to improve security when using input devices such as a mouse, keyboard, or pen.\n * Updates to improve security when Windows performs basic operations.\n * Updates the 2020 DST start date for the Fiji Islands to December 20, 2020.\n\n## Improvements and fixes\n\nThis security update includes quality improvements. Key changes include:\n\n * Updates the 2020 DST start date for the Fiji Islands to December 20, 2020.\n * Addresses a security vulnerability by preventing applications that run as a SYSTEM account from printing to local ports that point to a file. Failing print jobs log error 50, \u201cThe request is not supported.\u201d in event ID 372 in the PrintService\\Admin event log. To address this issue in the future, make sure your applications or services run as a specific user or service account.\n * Security updates to the Microsoft Scripting Engine, Microsoft Graphics Component, Windows Input and Composition, the Windows Wallet Service, Windows Fundamentals, and the Windows Kernel.\nIf you installed earlier updates, only the new fixes contained in this package will be downloaded and installed on your device.For more information about the resolved security vulnerabilities, please refer to the new [Security Update Guide](<https://msrc.microsoft.com/update-guide>) website.\n\n**Windows Update Improvements**Microsoft has released an update directly to the Windows Update client to improve reliability. Any device running Windows 10 configured to receive updates automatically from Windows Update, including Enterprise and Pro editions, will be offered the latest Windows 10 feature update based on device compatibility and Windows Update for Business deferral policy. This doesn't apply to long-term servicing editions.\n\n## Known issues in this update\n\n**Symptom**| **Workaround** \n---|--- \nAfter installing KB4493509, devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.\"| \n\n 1. Uninstall and reinstall any recently added language packs. For instructions, see Manage the input and display language settings in Windows 10.\n 2. Select **Check for Updates** and install the April 2019 Cumulative Update. For instructions, see Update Windows 10.\n**Note** If reinstalling the language pack does not mitigate the issue, reset your PC as follows:\n\n 1. Go to the **Settings **app > **Recovery**.\n 2. Select **Get Started** under the **Reset this PC** recovery option.\n 3. Select **Keep my Files**.\nMicrosoft is working on a resolution and will provide an update in an upcoming release. \nAfter installing this update on domain controllers (DCs) and read-only domain controllers (RODCs) in your environment, you might encounter Kerberos authentication and ticket renewal issues. This is caused by an issue in how [CVE-2020-17049](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17049>) was addressed in these updates.For specific symptoms and behaviors related to this issue, please see the [Windows release health](<https://docs.microsoft.com/windows/release-information/status-windows-10-1809-and-windows-server-2019#1522msgdesc>) page. **Note **This issue only affects Windows Servers, Windows 10 devices and applications in enterprise environments.| This issue is resolved in KB4594442. \n \n## How to get this update\n\n**Before installing this update**Microsoft strongly recommends you install the latest servicing stack update (SSU) for your operating system before installing the latest cumulative update (LCU). SSUs improve the reliability of the update process to mitigate potential issues while installing the LCU and applying Microsoft security fixes. For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/en-us/windows/deployment/update/servicing-stack-updates>) and Servicing Stack Updates (SSU): Frequently Asked Questions.If you are using Windows Update, the latest SSU (KB4587735) will be offered to you automatically. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>).**Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB4586793>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows 10**Classification**: Security Updates \n**File information**For a list of the files that are provided in this update, download the [file information for cumulative update 4586793](<https://download.microsoft.com/download/a/e/e/aeef4e7a-b08d-4da9-b19f-62054aca9811/4586793.csv>).**Note** Some files erroneously have \u201cNot applicable\u201d in the \u201cFile version\u201d column of the CSV file. This might lead to false positives or false negatives when using some third-party scan detection tools to validate the build.\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mskb", "title": "November 10, 2020\u2014KB4586793 (OS Build 17763.1577) - EXPIRED", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17049", "CVE-2020-17087"], "modified": "2020-11-10T08:00:00", "id": "KB4586793", "href": "https://support.microsoft.com/en-us/help/4586793", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2022-08-10T14:05:43", "description": "None\n**NEW 11/10/20 \nIMPORTANT** Because of minimal operations during the holidays and the upcoming Western new year, there won\u2019t be a preview release (known as a \u201cC\u201d release) for the month of December 2020. There will be a monthly security release (known as a \u201cB\u201d release) for December 2020. Normal monthly servicing for both B and C releases will resume in January 2021.\n\n**UPDATED 11/10/20** \nFor more information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following article. To view other notes and messages, see the Windows 10, version 2004 update history home page.**Note **Follow [@WindowsUpdate](<https://twitter.com/windowsupdate>) to find out when new content is published to the release information dashboard.\n\n## Highlights\n\n * Updates to improve security when using input devices such as a mouse, keyboard, or pen.\n * Updates to improve security when using Microsoft Office products.\n * Updates to improve security when Windows performs basic operations.\n * Updates the 2020 DST start date for the Fiji Islands to December 20, 2020.\n\n## Improvements and fixes\n\n## \n\n__\n\nWindows 10, version 20H2\n\nThis security update includes quality improvements. Key changes include:\n\n * This build includes all the improvements from Windows 10, version 2004.\n * No additional issues were documented for this release.\n\n## \n\n__\n\nWindows 10, version 2004\n\n**Note **This release also contains updates for Microsoft HoloLens (OS Build 19041.1128) released November 10, 2020. Microsoft will release an update directly to the Windows Update Client to improve Windows Update reliability on Microsoft HoloLens that have not updated to this most recent OS Build.\n\nThis security update includes quality improvements. Key changes include:\n\n * Updates the 2020 DST start date for the Fiji Islands to December 20, 2020.\n * Addresses a security vulnerability by preventing applications that run as a SYSTEM account from printing to local ports that point to a file. Failing print jobs log error 50, \u201cThe request is not supported.\u201d in event ID 372 in the PrintService\\Admin event log. To address this issue in the future, make sure your applications or services run as a specific user or service account.\n * Security updates to the Microsoft Scripting Engine, Windows Input and Composition, Microsoft Graphics Component, the Windows Wallet Service, Windows Fundamentals, and the Windows Kernel.\nIf you installed earlier updates, only the new fixes contained in this package will be downloaded and installed on your device.For more information about the resolved security vulnerabilities, please refer to the new [Security Update Guide](<https://msrc.microsoft.com/update-guide>) website.\n\n**Windows Update Improvements**Microsoft has released an update directly to the Windows Update client to improve reliability. Any device running Windows 10 configured to receive updates automatically from Windows Update, including Enterprise and Pro editions, will be offered the latest Windows 10 feature update based on device compatibility and Windows Update for Business deferral policy. This doesn't apply to long-term servicing editions.\n\n## Known issues in this update\n\n**Symptom**| **Workaround** \n---|--- \nUsers of the Microsoft Input Method Editor (IME) for Japanese or Chinese languages might experience issues when attempting various tasks. You might have issues with input, receive unexpected results, or might not be able to enter text.| All IME issues listed in KB4564002 were resolved in KB4586853. \nSystem and user certificates might be lost when updating a device from Windows 10, version 1809 or later to a later version of Windows 10. Devices will only be impacted if they have already installed any Latest cumulative update (LCU) released September 16, 2020 or later and then proceed to update to a later version of Windows 10 from media or an installation source which does not have an LCU released October 13, 2020 or later integrated. This primarily happens when managed devices are updated using outdated bundles or media through an update management tool such as Windows Server Update Services (WSUS) or Microsoft Endpoint Configuration Manager. This might also happen when using outdated physical media or ISO images that do not have the latest updates integrated.**Note **Devices using Windows Update for Business or that connect directly to Windows Update are not impacted. Any device connecting to Windows Update should always receive the latest versions of the feature update, including the latest LCU, without any extra steps.| This issue is resolved in KB4592438. \nAfter installing this update on domain controllers (DCs) and read-only domain controllers (RODCs) in your environment, you might encounter Kerberos authentication and ticket renewal issues. This is caused by an issue in how [CVE-2020-17049](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17049>) was addressed in these updates.For specific symptoms and behaviors related to this issue, please see the Windows release health page for [Windows Server, version 20H2](<https://docs.microsoft.com/windows/release-information/status-windows-10-20h2#1522msgdesc>) or [Windows Server, version 2004](<https://docs.microsoft.com/windows/release-information/status-windows-10-2004#1522msgdesc>) . **Note **This issue only affects Windows Servers, Windows 10 devices and applications in enterprise environments.| This issue is resolved in KB4594440. \nWhen using the Microsoft Japanese Input Method Editor (IME) to enter Kanji characters in an app that automatically allows the input of Furigana characters, you might not get the correct Furigana characters. You might need to enter the Furigana characters manually.**Note** The affected apps are using the **ImmGetCompositionString()** function.| This issue is resolved in KB5005101. \n \n## How to get this update\n\n**Before installing this update**Microsoft strongly recommends you install the latest servicing stack update (SSU) for your operating system before installing the latest cumulative update (LCU). SSUs improve the reliability of the update process to mitigate potential issues while installing the LCU and applying Microsoft security fixes. For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/en-us/windows/deployment/update/servicing-stack-updates>) and Servicing Stack Updates (SSU): Frequently Asked Questions.If you are using Windows Update, the latest SSU (KB4586864) will be offered to you automatically. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>).**Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB4586781>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows 10, version 1903 and later**Classification**: Security Updates \n**File information**For a list of the files that are provided in this update, download the [file information for cumulative update 4586781](<https://download.microsoft.com/download/9/0/c/90c20c3f-2cae-4cbb-93ab-ef00942e46d2/4586781.csv>). **Note** Some files erroneously have \u201cNot applicable\u201d in the \u201cFile version\u201d column of the CSV file. This might lead to false positives or false negatives when using some third-party scan detection tools to validate the build.\n", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.1, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mskb", "title": "November 10, 2020\u2014KB4586781 (OS Builds 19041.630 and 19042.630)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17049", "CVE-2020-17052"], "modified": "2020-11-10T08:00:00", "id": "KB4586781", "href": "https://support.microsoft.com/en-us/help/4586781", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2022-08-10T14:05:51", "description": "None\n**IMPORTANT** Windows Server 2012 has reached the end of mainstream support and is now in extended support. Starting in July 2020, there will no longer be optional releases (known as \"C\" or \"D\" releases) for this operating system. Operating systems in extended support have only cumulative monthly security updates (known as the \"B\" or Update Tuesday release).\n\n**NEW 11/10/20** \nFor more information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following [article](<https://support.microsoft.com/help/824684>). To view other notes and messages, see the Windows Server 2012 update history [home page](<https://support.microsoft.com/help/4009471>).\n\n## Improvements and fixes\n\nThis security update includes improvements and fixes that were a part of update [KB4580382](<https://support.microsoft.com/help/4580382>) (released October 13, 2020) and addresses the following issues:\n\n * Corrects the DST start date for the Fiji Islands to December 20, 2020.\n * Addresses a security vulnerability by preventing applications that run as a SYSTEM account from printing to local ports that point to a file. Failing print jobs log error 50, \u201cThe request is not supported.\u201d in event ID 372 in the PrintService\\Admin event log. To address this issue going forward, make sure your applications or services run as a specific user or service account.\n * Security updates to Windows Graphics, Windows Silicon Platform, Windows Authentication, Windows Core Networking, Windows Peripherals, Windows Network Security and Containers, Windows Hybrid Storage Services, and Windows Remote Desktop.\nFor more information about the resolved security vulnerabilities, please refer to the new [Security Update Guide](<https://msrc.microsoft.com/update-guide>) website.\n\n## Known issues in this update\n\n**Symptom**| **Workaround** \n---|--- \nCertain operations, such as **rename**, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \u201cSTATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\u201d. This occurs when you perform the operation on a CSV owner node from a process that doesn\u2019t have administrator privilege.| Do one of the following:\n\n * Perform the operation from a process that has administrator privilege.\n * Perform the operation from a node that doesn\u2019t have CSV ownership.\nMicrosoft is working on a resolution and will provide an update in an upcoming release. \nAfter installing this update on domain controllers (DCs) and read-only domain controllers (RODCs) in your environment, you might encounter Kerberos authentication and ticket renewal issues. This is caused by an issue in how [CVE-2020-17049](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17049>) was addressed in these updates.For specific symptoms and behaviors related to this issue, please see the [Windows release health](<https://docs.microsoft.com/windows/release-information/status-windows-server-2012#1522msgdesc>) page. **Note **This issue only affects Windows Servers, Windows 10 devices and applications in enterprise environments.| This issue is resolved in KB4594438. \n \n## How to get this update\n\n**Before installing this update**We strongly recommend that you install the latest servicing stack update (SSU) for your operating system before installing the latest Rollup. SSUs improve the reliability of the update process to mitigate potential issues while installing the Rollup and applying Microsoft security fixes. For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/en-us/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/help/4535697>).If you use Windows Update, the latest SSU ([KB4566426](<https://support.microsoft.com/help/4566426>)) will be offered to you automatically. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). **Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB4586834>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows Server 2012, Windows Embedded 8 Standard**Classification**: Security Updates \n**File information**For a list of the files that are provided in this update, download the [file information for update 4586834](<https://download.microsoft.com/download/3/7/5/37555c0d-b338-4516-8c2d-e3cab16c2829/4586834.csv>). \n", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.1, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mskb", "title": "November 10, 2020\u2014KB4586834 (Monthly Rollup)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17049", "CVE-2020-17052"], "modified": "2020-11-10T08:00:00", "id": "KB4586834", "href": "https://support.microsoft.com/en-us/help/4586834", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2022-08-10T14:05:51", "description": "None\n**IMPORTANT** Windows 8.1 and Windows Server 2012 R2 have reached the end of mainstream support and are now in extended support. Starting in July 2020, there will no longer be optional, non-security releases (known as \"C\" releases) for this operating system. Operating systems in extended support have only cumulative monthly security updates (known as the \"B\" or Update Tuesday release).\n\n**NEW 11/10/20** \nFor more information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following [article](<https://support.microsoft.com/help/824684>). To view other notes and messages, see the Windows 8.1 and Windows Server 2012 R2 update history [home page](<https://support.microsoft.com/help/4009470>).\n\n## Improvements and fixes\n\nThis security update includes improvements and fixes that were a part of update [KB4580347](<https://support.microsoft.com/help/4580347>) (released October 13, 2020) and addresses the following issues:\n\n * Corrects the DST start date for the Fiji Islands to December 20, 2020.\n * Allows administrators to enable \"Save target as\" through Group Policy for users in Microsoft Edge IE mode.\n * Addresses a security vulnerability by preventing applications that run as a SYSTEM account from printing to local ports that point to a file. Failing print jobs log error 50, \u201cThe request is not supported.\u201d in event ID 372 in the PrintService\\Admin event log. To address this issue going forward, make sure your applications or services run as a specific user or service account.\n * Security updates to Windows Graphics, Windows Silicon Platform, Windows Authentication, Windows Core Networking, Windows Peripherals, Windows Network Security and Containers, Windows Hybrid Storage Services, Windows Remote Desktop, and Microsoft Scripting Engine.\nFor more information about the resolved security vulnerabilities, please refer to the new [Security Update Guide](<https://msrc.microsoft.com/update-guide>) website.\n\n## Known issues in this update\n\n**Symptom**| **Workaround** \n---|--- \nCertain operations, such as **rename**, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \u201cSTATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\u201d. This occurs when you perform the operation on a CSV owner node from a process that doesn\u2019t have administrator privilege.| Do one of the following:\n\n * Perform the operation from a process that has administrator privilege.\n * Perform the operation from a node that doesn\u2019t have CSV ownership.\nMicrosoft is working on a resolution and will provide an update in an upcoming release. \nAfter installing this update on domain controllers (DCs) and read-only domain controllers (RODCs) in your environment, you might encounter Kerberos authentication and ticket renewal issues. This is caused by an issue in how [CVE-2020-17049](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17049>) was addressed in these updates.For specific symptoms and behaviors related to this issue, please see the [Windows release health](<https://docs.microsoft.com/windows/release-information/status-windows-8.1-and-windows-server-2012-r2#1522msgdesc>) page. **Note **This issue only affects Windows Servers, Windows 10 devices and applications in enterprise environments.| This issue is resolved in [KB4594439](<https://support.microsoft.com/help/4594439>). \n \n## How to get this update\n\n**Before installing this update**We strongly recommend that you install the latest servicing stack update (SSU) for your operating system before you install the latest Rollup. SSUs improve the reliability of the update process to mitigate potential issues while installing the Rollup and applying Microsoft security fixes. For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/en-us/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/help/4535697>).If you use Windows Update, the latest SSU ([KB4566425](<https://support.microsoft.com/help/4566425>)) will be offered to you automatically. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). **Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB4586845>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows 8.1, Windows Server 2012 R2, Windows Embedded 8.1 Industry Enterprise, Windows Embedded 8.1 Industry Pro**Classification**: Security Updates \n**File information**For a list of the files that are provided in this update, download the [file information for update 4586845](<https://download.microsoft.com/download/3/9/b/39bf949e-bdf1-45bd-aa1d-0a7568d0e3f2/4586845.csv>). \n", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.1, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mskb", "title": "November 10, 2020\u2014KB4586845 (Monthly Rollup)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17049", "CVE-2020-17052"], "modified": "2020-11-10T08:00:00", "id": "KB4586845", "href": "https://support.microsoft.com/en-us/help/4586845", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2022-06-15T16:07:16", "description": "None\n**NEW 8/5/21 \nEXPIRATION NOTICE****IMPORTANT **As of 8/5/2021, this KB is no longer available from Windows Update, the Microsoft Update Catalog, or other release channels. We recommend that you update your devices to the latest security quality update. \n\n**NEW 11/10/20 \nIMPORTANT** Because of minimal operations during the holidays and the upcoming Western new year, there won\u2019t be a preview release (known as a \u201cC\u201d release) for the month of December 2020. There will be a monthly security release (known as a \u201cB\u201d release) for December 2020. Normal monthly servicing for both B and C releases will resume in January 2021.\n\n**UPDATED 11/10/20** \nFor more information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following article. To view other notes and messages, see the Windows 10, version 1903 update history home page.**Note **Follow [@WindowsUpdate](<https://twitter.com/windowsupdate>) to find out when new content is published to the release information dashboard.\n\n## Highlights\n\n * Updates the 2020 DST start date for the Fiji Islands to December 20, 2020.\n * Updates to improve security when using Microsoft Office products.\n * Updates to improve security when using input devices such as a mouse, keyboard, or pen.\n * Updates to improve security when Windows performs basic operations.\n\n## Improvements and fixes\n\n## \n\n__\n\nWindows 10, version 1909\n\nThis security update includes quality improvements. Key changes include:\n\n * This build includes all the improvements from Windows 10, version 1903.\n * No additional issues were documented for this release.\n\n## \n\n__\n\nWindows 10, version 1903\n\n**Note **This release also contains updates for Microsoft HoloLens (OS Build 18362.1085) released November 10, 2020. Microsoft will release an update directly to the Windows Update Client to improve Windows Update reliability on Microsoft HoloLens that have not updated to this most recent OS Build.\n\nThis security update includes quality improvements. Key changes include:\n\n * Updates the 2020 DST start date for the Fiji Islands to December 20, 2020.\n * Addresses an issue with the package frame launcher (PSF) that passes a malformed parameter to a shim.\n * Addresses a security vulnerability by preventing applications that run as a SYSTEM account from printing to local ports that point to a file. Failing print jobs log error 50, \u201cThe request is not supported.\u201d in event ID 372 in the PrintService\\Admin event log. To address this issue in the future, make sure your applications or services run as a specific user or service account.\n * Security updates to the Microsoft Scripting Engine, the Microsoft Graphics Component, Windows Input and Composition, the Windows Wallet Service, Windows Fundamentals, and the Windows Kernel.\nIf you installed earlier updates, only the new fixes contained in this package will be downloaded and installed on your device.For more information about the resolved security vulnerabilities, please refer to the new [Security Update Guide](<https://msrc.microsoft.com/update-guide>) website.\n\n**Windows Update Improvements**Microsoft has released an update directly to the Windows Update client to improve reliability. Any device running Windows 10 configured to receive updates automatically from Windows Update, including Enterprise and Pro editions, will be offered the latest Windows 10 feature update based on device compatibility and Windows Update for Business deferral policy. This doesn't apply to long-term servicing editions.\n\n## Known issues in this update\n\n**Symptom**| **Workaround** \n---|--- \nSystem and user certificates might be lost when updating a device from Windows 10, version 1809 or later to a later version of Windows 10. Devices will only be impacted if they have already installed any Latest cumulative update (LCU) released September 16, 2020 or later and then proceed to update to a later version of Windows 10 from media or an installation source which does not have an LCU released October 13, 2020 or later integrated. This primarily happens when managed devices are updated using outdated bundles or media through an update management tool such as Windows Server Update Services (WSUS) or Microsoft Endpoint Configuration Manager. This might also happen when using outdated physical media or ISO images that do not have the latest updates integrated.**Note **Devices using Windows Update for Business or that connect directly to Windows Update are not impacted. Any device connecting to Windows Update should always receive the latest versions of the feature update, including the latest LCU, without any extra steps.| This issue is resolved in KB4592449. \nAfter installing this update on domain controllers (DCs) and read-only domain controllers (RODCs) in your environment, you might encounter Kerberos authentication and ticket renewal issues. This is caused by an issue in how [CVE-2020-17049](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17049>) was addressed in these updates.For specific symptoms and behaviors related to this issue, please see the Windows release health page for [Windows Server, version 1909](<https://docs.microsoft.com/windows/release-information/status-windows-10-1909#1522msgdesc>) or [Windows Server, version 1903](<https://docs.microsoft.com/windows/release-information/status-windows-10-1903#1522msgdesc>). **Note **This issue only affects Windows Servers, Windows 10 devices and applications in enterprise environments.| This issue is resolved in KB4594443. \n \n## How to get this update\n\n**Before installing this update**Microsoft strongly recommends you install the latest servicing stack update (SSU) for your operating system before installing the latest cumulative update (LCU). SSUs improve the reliability of the update process to mitigate potential issues while installing the LCU and applying Microsoft security fixes. For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/en-us/windows/deployment/update/servicing-stack-updates>) and Servicing Stack Updates (SSU): Frequently Asked Questions.If you are using Windows Update, the latest SSU (KB4586863) will be offered to you automatically. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>).**Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB4586786>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows 10, version 1903 and later**Classification**: Security Updates \n**File information**For a list of the files that are provided in this update, download the [file information for cumulative update 4586786](<https://download.microsoft.com/download/b/f/d/bfd14412-228d-4d32-9445-baa32275c0d5/4586786.csv>). **Note** Some files erroneously have \u201cNot applicable\u201d in the \u201cFile version\u201d column of the CSV file. This might lead to false positives or false negatives when using some third-party scan detection tools to validate the build.\n", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.1, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mskb", "title": "November 10, 2020\u2014KB4586786 (OS Builds 18362.1198 and 18363.1198) - EXPIRED", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17049", "CVE-2020-17052"], "modified": "2020-11-10T08:00:00", "id": "KB4586786", "href": "https://support.microsoft.com/en-us/help/4586786", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2022-08-10T14:05:51", "description": "None\n**NEW 8/5/21 \nEXPIRATION NOTICE****IMPORTANT **As of 8/5/2021, this KB is no longer available from Windows Update, the Microsoft Update Catalog, or other release channels. We recommend that you update your devices to the latest security quality update. \n\n**UPDATED 11/10/20** \nFor more information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following article. To view other notes and messages, see the Windows 10, version 1607 update history home page.\n\n## Highlights\n\n * Updates the 2020 DST start date for the Fiji Islands to December 20, 2020.\n * Updates to improve security when using Microsoft Office products.\n * Updates to improve security when Windows performs basic operations.\n\n## Improvements and fixes\n\nThis security update includes quality improvements. Key changes include:\n\n * Allows administrators to use a Group Policy to enable Save Target As for users in Microsoft Edge IE Mode.\n * Allows you to restrict the JScript Scripting Engine to a process.\n * Address an issue that causes an application to stop working if the app uses a hook.\n * Addresses an issue that causes the Microsoft Management Console (MMC) Group Policy application to stop working when you are editing the Group Policy Security settings. The error message is, \u201cMMC cannot initialize the snap-in.\u201d\n * Addresses an issue with devices on which Credential Guard is enabled; if these devices use a Machine Bound certificate, authentication requests might fail. This occurs because Windows 2016 and Windows 2019 domain controllers add duplicate KeyID values to the **msDS-KeyCredentialLink** attribute of these devices.\n * Addresses an issue that might cause stop error 7E in **nfssvr.sys** on servers running the Network File System (NFS) service.\n * Addresses an issue with Remote Desktop Session Host (RDSH) connection brokers that prevents users from connecting to a Remote Desktop in collections. This issue occurs because of an access violation in **tssdis.exe**.\n * Addresses an issue that causes the Windows Management Instrumentation (WMI) Provider Host (**WmiPrvSE.exe**) to leak registry key handles when querying **Win32_RDCentralPublishedDeploymentSettings**.\n * Updates the 2020 DST start date for the Fiji Islands to December 20, 2020.\n * Addresses an issue that might cause Windows 10 devices that enable Credential Guard to fail authentication requests when they use the machine certificate.\n * Addresses an issue with incorrect Canonical Display Driver (CDD) buffer flushing, which degrades performance in Remote Desktop Protocol (RDP) Windows 2000 Display Driver Model (XDDM) scenarios. This issue affects applications that use graphics processing units (GPU) to operate, such as Microsoft Teams, Microsoft Office, and web browsers.\n * Addresses a security vulnerability by preventing applications that run as a SYSTEM account from printing to local ports that point to a file. Failing print jobs log error 50, \u201cThe request is not supported.\u201d in event ID 372 in the PrintService\\Admin event log. To address this issue in the future, make sure your applications or services run as a specific user or service account.\n * Addresses an issue with remote procedure call (RPC) runtime that might cause memory to leak. As a result, performance degrades, which causes high CPU usage, slowness, or resource depletion.\n * Security updates to the Microsoft Scripting Engine, the Microsoft Graphics Component, the Windows Wallet Service, Windows Fundamentals, the Windows Kernel, and Windows Virtualization.\nIf you installed earlier updates, only the new fixes contained in this package will be downloaded and installed on your device.For more information about the resolved security vulnerabilities, please refer to the new [Security Update Guide](<https://msrc.microsoft.com/update-guide>) website.\n\n**Windows Update Improvements**Microsoft has released an update directly to the Windows Update client to improve reliability. Any device running Windows 10 configured to receive updates automatically from Windows Update, including Enterprise and Pro editions, will be offered the latest Windows 10 feature update based on device compatibility and Windows Update for Business deferral policy. This doesn't apply to long-term servicing editions.\n\n## Known issues in this update\n\n**Symptom**| **Workaround** \n---|--- \nAfter installing KB4467684, the cluster service may fail to start with the error \u201c2245 (NERR_PasswordTooShort)\u201d if the group policy \u201cMinimum Password Length\u201d is configured with greater than 14 characters.| Set the domain default \"Minimum Password Length\" policy to less than or equal to 14 characters.Microsoft is working on a resolution and will provide an update in an upcoming release. \nAfter installing this update on domain controllers (DCs) and read-only domain controllers (RODCs) in your environment, you might encounter Kerberos authentication and ticket renewal issues. This is caused by an issue in how [CVE-2020-17049](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17049>) was addressed in these updates.For specific symptoms and behaviors related to this issue, please see the [Windows release health](<https://docs.microsoft.com/windows/release-information/status-windows-10-1607-and-windows-server-2016#1522msgdesc>) page. **Note **This issue only affects Windows Servers, Windows 10 devices and applications in enterprise environments.| This issue is resolved in KB4594441. \n \n## How to get this update\n\n**Before installing this update**Microsoft strongly recommends you install the latest servicing stack update (SSU) for your operating system before installing the latest cumulative update (LCU). SSUs improve the reliability of the update process to mitigate potential issues while installing the LCU and applying Microsoft security fixes. For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/en-us/windows/deployment/update/servicing-stack-updates>) and Servicing Stack Updates (SSU): Frequently Asked Questions.If you are using Windows Update, the latest SSU (KB4576750) will be offered to you automatically. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). **Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB4586830>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows 10**Classification**: Security Updates \n**File information**For a list of the files that are provided in this update, download the [file information for cumulative update 4586830](<https://download.microsoft.com/download/4/5/a/45ab9419-b92c-4a5f-812a-a9bcbff58398/4586830.csv>).\n", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.1, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mskb", "title": "November 10, 2020\u2014KB4586830 (OS Build 14393.4046) - EXPIRED", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17049", "CVE-2020-17052"], "modified": "2020-11-10T08:00:00", "id": "KB4586830", "href": "https://support.microsoft.com/en-us/help/4586830", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2021-12-31T15:44:23", "description": "None\n**IMPORTANT **Verify that you have installed the required updates listed in the **How to get this update** section _before_ installing this update. \n\n**NEW 11/10/20** \nFor more information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following [article](<https://support.microsoft.com/help/824684>). To view other notes and messages, see the Windows Server 2008 Service Pack 2 update history [home page](<https://support.microsoft.com/help/4343218>).\n\n## Improvements and fixes\n\nThis security update includes quality improvements. Key changes include:\n\n * Corrects the DST start date for the Fiji Islands to December 20, 2020.\n * Addresses a security vulnerability by preventing applications that run as a SYSTEM account from printing to local ports that point to a file. Failing print jobs log error 50, \u201cThe request is not supported.\u201d in event ID 372 in the PrintService\\Admin event log. To address this issue going forward, make sure your applications or services run as a specific user or service account.\n * Security updates to Windows Graphics, Windows Silicon Platform, Windows Authentication, Windows Core Networking, Windows Peripherals, Windows Network Security and Containers, and Windows Hybrid Storage Services.\nFor more information about the resolved security vulnerabilities, please refer to the new [Security Update Guide](<https://msrc.microsoft.com/update-guide>) website.\n\n## Known issues in this update\n\n**Symptom**| **Workaround** \n---|--- \nAfter installing this update and restarting your device, you might receive the error, \u201cFailure to configure Windows updates. Reverting Changes. Do not turn off your computer\u201d, and the update might show as **Failed** in **Update History**.| This is expected in the following circumstances:\n\n * If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>).\n * If you do not have an ESU MAK add-on key installed and activated.\nIf you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this [blog](<https://aka.ms/Windows7ESU>) post. For information on the prerequisites, see the \"How to get this update\" section of this article. \nCertain operations, such as **rename**, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \u201cSTATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\u201d. This occurs when you perform the operation on a CSV owner node from a process that doesn\u2019t have administrator privilege.| Do one of the following:\n\n * Perform the operation from a process that has administrator privilege.\n * Perform the operation from a node that doesn\u2019t have CSV ownership.\nMicrosoft is working on a resolution and will provide an update in an upcoming release. \n \n## How to get this update\n\n**Before installing this update****IMPORTANT** Customers who have purchased the Extended Security Update (ESU) for on-premises versions of these operating systems must follow the procedures in [KB4522133](<https://support.microsoft.com/help/4522133>) to continue receiving security updates after extended support ends on January 14, 2020.For more information about ESU and which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>).**Prerequisite:**You must install the updates listed below and **_restart your device_** before installing the latest Rollup. Installing these updates improves the reliability of the update process and mitigates potential issues while installing the Rollup and applying Microsoft security fixes.\n\n 1. The April 9, 2019 servicing stack update (SSU) ([KB4493730](<https://support.microsoft.com/help/4493730>)). To get the standalone package for this SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). This update is required to install updates that are only SHA-2 signed.\n 2. The latest SHA-2 update ([KB4474419](<https://support.microsoft.com/help/4474419>)) released October 8, 2019. If you are using Windows Update, the latest SHA-2 update will be offered to you automatically. This update is required to install updates that are only SHA-2 signed. For more information on SHA-2 updates, see [2019 SHA-2 Code Signing Support requirement for Windows and WSUS](<https://support.microsoft.com/help/4472027>).\n 3. The August 11, 2020 SSU ([KB4572374](<https://support.microsoft.com/help/4572374>)) or later. To get the standalone package for this SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>).\n 4. The Extended Security Updates (ESU) Licensing Preparation Package ([KB4538484](<https://support.microsoft.com/help/4538484>)) released February 11, 2020. The ESU licensing preparation package will be offered to you from WSUS. To get the standalone package for ESU licensing preparation package, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>).\nAfter installing the items above, we strongly recommend that you install the _latest_ SSU ([KB4580971](<https://support.microsoft.com/help/4580971>)). If you are using Windows Update, the latest SSU will be offered to you automatically if you are an ESU customer. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/en-us/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/help/4535697>).\n\n**REMINDER** If you are using Security-only updates, you will also need to install all previous Security-only updates and the latest cumulative update for Internet Explorer ([KB4586768](<https://support.microsoft.com/help/4586768>)).\n\n**Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| No| See the other options below. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB4586817>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows Server 2008 Service Pack 2**Classification**: Security Updates \n**File information**For a list of the files that are provided in this update, download the [file information for cumulative update 4586817](<https://download.microsoft.com/download/9/1/4/9143faf7-d55c-40e0-9dfd-f0cd6e37f7d8/4586817.csv>).\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mskb", "title": "November 10, 2020\u2014KB4586817 (Security-only update)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17088"], "modified": "2020-11-10T08:00:00", "id": "KB4586817", "href": "https://support.microsoft.com/en-us/help/4586817", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-12-31T15:44:18", "description": "None\n**IMPORTANT **Verify that you have installed the required updates listed in the **How to get this update** section _before_ installing this update. \n\n**NEW 11/10/20** \nFor more information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following [article](<https://support.microsoft.com/help/824684>). To view other notes and messages, see the Windows 7 SP1 and Windows Server 2008 R2 SP1 update history [home page](<https://support.microsoft.com/help/4009469>).\n\n## Improvements and fixes\n\nThis security update includes quality improvements. Key changes include:\n\n * Corrects the DST start date for the Fiji Islands to December 20, 2020.\n * Addresses a security vulnerability by preventing applications that run as a SYSTEM account from printing to local ports that point to a file. Failing print jobs log error 50, \u201cThe request is not supported.\u201d in event ID 372 in the PrintService\\Admin event log. To address this issue going forward, make sure your applications or services run as a specific user or service account.\n * Security updates to Windows Graphics, Windows Silicon Platform, Windows Authentication, Windows Core Networking, Windows Peripherals, Windows Network Security and Containers, Windows Hybrid Storage Services, and Windows Remote Desktop.\nFor more information about the resolved security vulnerabilities, please refer to the new [Security Update Guide](<https://msrc.microsoft.com/update-guide>) website.\n\n## Known issues in this update\n\n**Symptom**| **Workaround** \n---|--- \nAfter installing this update and restarting your device, you might receive the error, \u201cFailure to configure Windows updates. Reverting Changes. Do not turn off your computer,\u201d and the update might show as **Failed** in **Update History**.| This is expected in the following circumstances:\n\n * If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>).\n * If you do not have an ESU MAK add-on key installed and activated.\nIf you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this [blog](<https://aka.ms/Windows7ESU>) post. For information on the prerequisites, see the \"How to get this update\" section of this article. \nCertain operations, such as **rename**, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \u201cSTATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\u201d. This occurs when you perform the operation on a CSV owner node from a process that doesn\u2019t have administrator privilege.| Do one of the following:\n\n * Perform the operation from a process that has administrator privilege.\n * Perform the operation from a node that doesn\u2019t have CSV ownership.\nMicrosoft is working on a resolution and will provide an update in an upcoming release. \n \n## How to get this update\n\n**Before installing this update**\n\n**IMPORTANT** Customers who have purchased the Extended Security Update (ESU) for on-premises versions of these operating systems must follow the procedures in [KB4522133](<https://support.microsoft.com/help/4522133>) to continue receiving security updates after extended support ends. Extended support ends as follows:For more information about ESU and which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>).\n\n * For Windows 7 Service Pack 1 and Windows Server 2008 R2 Service Pack 1, extended support ends on January 14, 2020.\n * For Windows Embedded Standard 7, extended support ends on October 13, 2020.\n\n**Note** For Windows Embedded Standard 7, Windows Management Instrumentation (WMI) must be enabled to get updates from Windows Update or Windows Server Update Services.**Prerequisite:**You must install the updates listed below and **_restart your device_** before installing the latest Rollup. Installing these updates improves the reliability of the update process and mitigates potential issues while installing the Rollup and applying Microsoft security fixes.\n\n 1. The March 12, 2019 servicing stack update (SSU) ([KB4490628](<https://support.microsoft.com/help/4490628>)). To get the standalone package for this SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). This update is required to install updates that are only SHA-2 signed.\n 2. The latest SHA-2 update ([KB4474419](<https://support.microsoft.com/help/4474419>)) released September 10, 2019. If you are using Windows Update, the latest SHA-2 update will be offered to you automatically. This update is required to install updates that are only SHA-2 signed. For more information on SHA-2 updates, see [2019 SHA-2 Code Signing Support requirement for Windows and WSUS](<https://support.microsoft.com/help/4472027>).\n 3. The August 11, 2020 SSU ([KB4570673](<https://support.microsoft.com/help/4570673>)) or a later SSU. To get the standalone package for this SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). \n \n**Important** For Windows Thin PC, you must have the August 11, 2020 SSU ([KB4570673](<https://support.microsoft.com/help/4570673>)) or a later SSU installed to make sure you continue to get the extended security updates starting with the October 13, 2020 updates. \n\n 4. To get this security update, you must reinstall the \"Extended Security Updates (ESU) Licensing Preparation Package\" ([KB4538483](<https://support.microsoft.com/help/4538483>)) or the \"Update for the Extended Security Updates (ESU) Licensing Preparation Package\" ([KB4575903](<https://support.microsoft.com/help/4575903>)) even if you previously installed the ESU key. The ESU licensing preparation package will be offered to you from WSUS. To get the standalone package for ESU licensing preparation package, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>).\nAfter installing the items above, Microsoft strongly recommends that you install the _latest_ SSU ([KB4580970](<https://support.microsoft.com/help/4580970>)). If you are using Windows Update, the latest SSU will be offered to you automatically if you are an ESU customer. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/en-us/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/help/4535697>).\n\n**REMINDER** If you are using Security-only updates, you will also need to install all previous Security-only updates and the latest cumulative update for Internet Explorer ([KB4586768](<https://support.microsoft.com/help/4586768>)).\n\n**Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| No| See the other options below. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB4586805>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows 7 Service Pack 1, Windows Server 2008 R2 Service Pack 1, Windows Embedded Standard 7 Service Pack 1, Windows Embedded POSReady 7, Windows Thin PC**Classification**: Security Updates \n**File information**For a list of the files that are provided in this update, download the [file information for cumulative update 4586805](<https://download.microsoft.com/download/3/9/e/39e80bdf-ce89-4ee2-b663-0b6fc620975c/4586805.csv>).\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mskb", "title": "November 10, 2020\u2014KB4586805 (Security-only update)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17088"], "modified": "2020-11-10T08:00:00", "id": "KB4586805", "href": "https://support.microsoft.com/en-us/help/4586805", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-08-10T14:05:45", "description": "None\n**IMPORTANT **Verify that you have installed the required updates listed in the **How to get this update** section _before_ installing this update. \n\n**NEW 11/10/20** \nFor more information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following [article](<https://support.microsoft.com/help/824684>). To view other notes and messages, see the Windows Server 2008 Service Pack 2 update history [home page](<https://support.microsoft.com/help/4343218>).\n\n## Improvements and fixes\n\nThis security update includes improvements and fixes that were a part of update [KB4580378](<https://support.microsoft.com/help/4580378>) (released October 13, 2020) and addresses the following issues:\n\n * Corrects the DST start date for the Fiji Islands to December 20, 2020.\n * Addresses a security vulnerability by preventing applications that run as a SYSTEM account from printing to local ports that point to a file. Failing print jobs log error 50, \u201cThe request is not supported.\u201d in event ID 372 in the PrintService\\Admin event log. To address this issue going forward, make sure your applications or services run as a specific user or service account.\n * Security updates to Windows Graphics, Windows Silicon Platform, Windows Authentication, Windows Core Networking, Windows Peripherals, Windows Network Security and Containers, and Windows Hybrid Storage Services.\nFor more information about the resolved security vulnerabilities, please refer to the new [Security Update Guide](<https://msrc.microsoft.com/update-guide>) website.\n\n## Known issues in this update\n\n**Symptom**| **Workaround** \n---|--- \nAfter installing this update and restarting your device, you might receive the error, \u201cFailure to configure Windows updates. Reverting Changes. Do not turn off your computer\u201d, and the update might show as **Failed** in **Update History**.| This is expected in the following circumstances:\n\n * If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>).\n * If you do not have an ESU MAK add-on key installed and activated.\nIf you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this [blog](<https://aka.ms/Windows7ESU>) post. For information on the prerequisites, see the \"How to get this update\" section of this article. \nCertain operations, such as **rename**, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \u201cSTATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\u201d. This occurs when you perform the operation on a CSV owner node from a process that doesn\u2019t have administrator privilege.| Do one of the following:\n\n * Perform the operation from a process that has administrator privilege.\n * Perform the operation from a node that doesn\u2019t have CSV ownership.\nMicrosoft is working on a resolution and will provide an update in an upcoming release. \n \n## How to get this update\n\n**Before installing this update****IMPORTANT** Customers who have purchased the Extended Security Update (ESU) for on-premises versions of these operating systems must follow the procedures in [KB4522133](<https://support.microsoft.com/help/4522133>) to continue receiving security updates after extended support ends on January 14, 2020.For more information about ESU and which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>).**Prerequisite:**You must install the updates listed below and **_restart your device_** before installing the latest Rollup. Installing these updates improves the reliability of the update process and mitigates potential issues while installing the Rollup and applying Microsoft security fixes.\n\n 1. The April 9, 2019 servicing stack update (SSU) ([KB4493730](<https://support.microsoft.com/help/4493730>)). To get the standalone package for this SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). This update is required to install updates that are only SHA-2 signed.\n 2. The latest SHA-2 update ([KB4474419](<https://support.microsoft.com/help/4474419>)) released October 8, 2019. If you are using Windows Update, the latest SHA-2 update will be offered to you automatically. This update is required to install updates that are only SHA-2 signed. For more information on SHA-2 updates, see [2019 SHA-2 Code Signing Support requirement for Windows and WSUS](<https://support.microsoft.com/help/4472027>).\n 3. The August 11, 2020 SSU ([KB4572374](<https://support.microsoft.com/help/4572374>)) or later. To get the standalone package for this SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>).\n 4. The Extended Security Updates (ESU) Licensing Preparation Package ([KB4538484](<https://support.microsoft.com/help/4538484>)) released February 11, 2020. The ESU licensing preparation package will be offered to you from WSUS. To get the standalone package for ESU licensing preparation package, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>).\nAfter installing the items above, Microsoft strongly recommends that you install the _latest _SSU ([KB4580971](<https://support.microsoft.com/help/4580971>)). If you are using Windows Update, the latest SSU will be offered to you automatically if you are an ESU customer. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/en-us/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/help/4535697>).**Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update if you are an ESU customer. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB4586807>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows Server 2008 Service Pack 2**Classification**: Security Updates \n**File information**For a list of the files that are provided in this update, download the [file information for cumulative update 4586807](<https://download.microsoft.com/download/8/8/2/882a5b05-00ee-4d46-ad36-5db4a9b321dd/4586807.csv>).\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mskb", "title": "November 10, 2020\u2014KB4586807 (Monthly Rollup)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17088"], "modified": "2020-11-10T08:00:00", "id": "KB4586807", "href": "https://support.microsoft.com/en-us/help/4586807", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-08-10T14:05:51", "description": "None\n**IMPORTANT **Verify that you have installed the required updates listed in the **How to get this update** section _before_ installing this update. \n\n**NEW 11/10/20** \nFor more information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following [article](<https://support.microsoft.com/help/824684>). To view other notes and messages, see the Windows 7 SP1 and Windows Server 2008 R2 SP1 update history [home page](<https://support.microsoft.com/help/4009469>).\n\n## Improvements and fixes\n\nThis security update includes improvements and fixes that were a part of update [KB4580345](<https://support.microsoft.com/help/4580345>) (released October 13, 2020) and addresses the following issues:\n\n * Corrects the DST start date for the Fiji Islands to December 20, 2020.\n * Addresses a security vulnerability by preventing applications that run as a SYSTEM account from printing to local ports that point to a file. Failing print jobs log error 50, \u201cThe request is not supported.\u201d in event ID 372 in the PrintService\\Admin event log. To address this issue going forward, make sure your applications or services run as a specific user or service account.\n * Security updates to Windows Graphics, Windows Silicon Platform, Windows Authentication, Windows Core Networking, Windows Peripherals, Windows Network Security and Containers, Windows Hybrid Storage Services, and Windows Remote Desktop.\nFor more information about the resolved security vulnerabilities, please refer to the new [Security Update Guide](<https://msrc.microsoft.com/update-guide>) website.\n\n## Known issues in this update\n\n**Symptom **| **Workaround ** \n---|--- \nAfter installing this update and restarting your device, you might receive the error, \u201cFailure to configure Windows updates. Reverting Changes. Do not turn off your computer,\u201d and the update might show as **Failed** in **Update History**.| This is expected in the following circumstances:\n\n * If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>).\n * If you do not have an ESU MAK add-on key installed and activated.\nIf you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this [blog](<https://aka.ms/Windows7ESU>) post. For information on the prerequisites, see the \"How to get this update\" section of this article. \nCertain operations, such as **rename**, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \u201cSTATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\u201d. This occurs when you perform the operation on a CSV owner node from a process that doesn\u2019t have administrator privilege.| Do one of the following: \n\n * Perform the operation from a process that has administrator privilege. \n * Perform the operation from a node that doesn\u2019t have CSV ownership. \nMicrosoft is working on a resolution and will provide an update in an upcoming release. \n \n## How to get this update\n\n**Before installing this update****IMPORTANT** Customers who have purchased the Extended Security Update (ESU) for on-premises versions of these operating systems must follow the procedures in [KB4522133](<https://support.microsoft.com/help/4522133>) to continue receiving security updates after extended support ends. Extended support ends as follows:\n\n * For Windows 7 Service Pack 1 and Windows Server 2008 R2 Service Pack 1, extended support ends on January 14, 2020.\n * For Windows Embedded Standard 7, extended support ends on October 13, 2020.\nFor more information about ESU and which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>).**Note** For Windows Embedded Standard 7, Windows Management Instrumentation (WMI) must be enabled to get updates from Windows Update or Windows Server Update Services.**Prerequisite:**You must install the updates listed below and **_restart your device_** before installing the latest Rollup. Installing these updates improves the reliability of the update process and mitigates potential issues while installing the Rollup and applying Microsoft security fixes.\n\n 1. The March 12, 2019 servicing stack update (SSU) ([KB4490628](<https://support.microsoft.com/help/4490628>)). To get the standalone package for this SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). This update is required to install updates that are only SHA-2 signed.\n 2. The latest SHA-2 update ([KB4474419](<https://support.microsoft.com/help/4474419>)) released September 10, 2019. If you are using Windows Update, the latest SHA-2 update will be offered to you automatically. This update is required to install updates that are only SHA-2 signed. For more information on SHA-2 updates, see [2019 SHA-2 Code Signing Support requirement for Windows and WSUS](<https://support.microsoft.com/help/4472027>).\n 3. The August 11, 2020 SSU ([KB4570673](<https://support.microsoft.com/help/4570673>)) or a later SSU. To get the standalone package for this SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). \n \n**Important** For Windows Thin PC, you must have the August 11, 2020 SSU ([KB4570673](<https://support.microsoft.com/help/4570673>)) or a later SSU installed to make sure you continue to get the extended security updates starting with the October 13, 2020 updates. \n\n 4. To get this security update, you must reinstall the \"Extended Security Updates (ESU) Licensing Preparation Package\" ([KB4538483](<https://support.microsoft.com/help/4538483>)) or the \"Update for the Extended Security Updates (ESU) Licensing Preparation Package\" ([KB4575903](<https://support.microsoft.com/help/4575903>)) even if you previously installed the ESU key. The ESU licensing preparation package will be offered to you from WSUS. To get the standalone package for ESU licensing preparation package, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>).\nAfter you install the items above, we strongly recommend that you install the _latest_ SSU ([KB4580970](<https://support.microsoft.com/help/4580970>)). If you are using Windows Update, the latest SSU will be offered to you automatically if you are an ESU customer. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/en-us/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoftt.com/help/4535697>).**Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update if you are an ESU customer. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB4586827>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows 7 Service Pack 1, Windows Server 2008 R2 Service Pack 1, Windows Embedded Standard 7 Service Pack 1, Windows Embedded POSReady 7, Windows Thin PC**Classification**: Security Updates \n**File information**For a list of the files that are provided in this update, download the [file information for cumulative update 4586827](<https://download.microsoft.com/download/e/3/3/e339b2b6-097b-4d12-9dc9-b66926a2b792/4586827.csv>).\n", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.1, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mskb", "title": "November 10, 2020\u2014KB4586827 (Monthly Rollup)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17052"], "modified": "2020-11-10T08:00:00", "id": "KB4586827", "href": "https://support.microsoft.com/en-us/help/4586827", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-08-10T14:05:42", "description": "None\n * As of February 11, 2020, Internet Explorer 10 is no longer in support. To get Internet Explorer 11 for Windows Server 2012 or Windows 8 Embedded Standard, see [KB4492872](<https://support.microsoft.com/help/4492872>). Install one of the following applicable updates to stay updated with the latest security fixes:\n * Cumulative Update for Internet Explorer 11 for Windows Server 2012.\n * Cumulative Update for Internet Explorer 11 for Windows 8 Embedded Standard.\n * The November 2020 Monthly Rollup.\n * Some customers using Windows Server 2008 R2 SP1 who activated their ESU multiple activation key (MAK) add-on before installing the January 14, 2020 updates might need to re-activate their key. Re-activation on affected devices should only be required once. For information on activation, see this [blog](<https://aka.ms/Windows7ESU>) post.\n * WSUS scan cab files will continue to be available for Windows 7 SP1 and Windows Server 2008 R2 SP1. If you have a subset of devices running these operating systems without ESU, they might show as _non-compliant_ in your patch management and compliance toolsets.\n\n## About this update\n\nThis cumulative security update does not include an update for Internet Explorer 9 for Windows Server 2008 Service Pack 2 (SP2). For the latest update, see [KB4577010](<https://support.microsoft.com/help/4577010>).\n\n## Summary\n\nThis security update resolves vulnerabilities in Internet Explorer. To learn more about these vulnerabilities, see [Microsoft Common Vulnerabilities and Exposures](<https://portal.msrc.microsoft.com/en-us/security-guidance>).Additionally, see the following articles for more information about cumulative updates:\n\n * [Windows Server 2008 SP2 update history](<https://support.microsoft.com/help/4343218>)\n * [Windows 7 SP1 and Windows Server 2008 R2 SP1 update history](<https://support.microsoft.com/help/4009469>)\n * [Windows Server 2012 update history](<https://support.microsoft.com/help/4009471>)\n * [Windows 8.1 and Windows Server 2012 R2 update history](<https://support.microsoft.com/help/4009470>)\n**Important **\n\n * The fixes that are included in this update are also included in the November 2020 Security Monthly Quality Rollup. Installing either this update or the Security Monthly Quality Rollup installs the same fixes.\n * This update is not applicable for installation on a device on which the Security Monthly Quality Rollup or the Preview of Monthly Quality Rollup from November 2020 (or a later month) is already installed. This is because those updates contain all the same fixes that are included in this update.\n * If you use update management processes other than Windows Update and you automatically approve all security update classifications for deployment, this update, the November 2020 Security Only Quality Update, and the November 2020 Security Monthly Quality Rollup are deployed. We recommend that you review your update deployment rules to make sure that the desired updates are deployed.\n * If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see [Add language packs to Windows](<https://technet.microsoft.com/library/hh825699>).\n\n## Known issues in this security update\n\nWe are currently not aware of any issues in this update.\n\n## How to get and install this update\n\n**Before installing this update**To install Windows 7 SP1, Windows Server 2008 R2 SP1, or Windows Server 2008 SP2 updates released on or after July 2019, you must have the following required updates installed. If you use Windows Update, these required updates will be offered automatically as needed.\n\n * You must have the SHA-2 update ([KB4474419](<https://support.microsoft.com/help/4474419>)) that is dated September 23, 2019 or a later SHA-2 update installed and then restart your device before you apply this update. For more information about SHA-2 updates, see [2019 SHA-2 Code Signing Support requirement for Windows and WSUS](<https://support.microsoft.com/help/4472027>). \n \nYou must have installed the servicing stack update (SSU) ([KB4490628](<https://support.microsoft.com/help/4490628>)) that is dated March 12, 2019. After update [KB4490628](<https://support.microsoft.com/help/4490628>) is installed, you must install the October 13, 2020 SSU ([KB4580970](<https://support.microsoft.com/help/4580970>)) or a later SSU update. For more information about the latest SSU updates, see [ADV990001 | Latest Servicing Stack Updates](<https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV990001>). \n\n * For Windows 7 SP1 and Windows Server 2008 R2 SP1, you must have purchased the Extended Security Update (ESU) for on-premises versions of these operating systems and follow the procedures in [KB4522133](<https://support.microsoft.com/help/4522133>) to continue receiving security updates after extended support ends. Extended support ends as follows:\n * For Windows 7 Service Pack 1 and Windows Server 2008 R2 Service Pack 1, extended support ends on January 14, 2020.\n * For Windows Embedded Standard 7, extended support ends on October 13, 2020.\nFor more information about ESU and which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>). \n \n**Notes**\n * For Windows Embedded Standard 7, Windows Management Instrumentation (WMI) must be enabled to get updates from Windows Update or Windows Server Update Services.\n * For Windows Thin PC, you must have the August 11, 2020 SSU ([KB4570673](<https://support.microsoft.com/help/4570673>)) or a later SSU installed to make sure you continue to get the extended security updates starting with the October 13, 2020 updates.\n * For Windows Server 2008 SP2, you must have installed the servicing stack update (SSU) ([KB4493730](<https://support.microsoft.com/help/4493730>)) that is dated April 9, 2019. After update [KB4493730](<https://support.microsoft.com/help/4493730>) is installed, you must install the October 13, 2020 SSU ([KB4580971](<https://support.microsoft.com/help/4580971>)) or a later SSU update. For more information about the latest SSU updates, see [ADV990001 | Latest Servicing Stack Updates](<https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV990001>).\n * To get this security update, you must reinstall the \"Extended Security Updates (ESU) Licensing Preparation Package\" ([KB4538483](<https://support.microsoft.com/help/4538483>)) or the \"Update for the Extended Security Updates (ESU) Licensing Preparation Package\" ([KB4575903](<https://support.microsoft.com/help/4575903>)) even if you previously installed the ESU key. The ESU licensing preparation package will be offered to you from WSUS. To get the standalone package for ESU licensing preparation package, search for it in the Microsoft Update Catalog.\n**Important** You must restart your device after you install these required updates.**Install this update**To install this update, use one of the following release channels.**Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update for the following versions:\n\n * Internet Explorer 11 for Windows Server 2012 and Windows Embedded 8 Standard\nFor all other versions, see the other options below. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/Search.aspx?q=KB4586768>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically synchronize with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows Server 2008 Service Pack 2, Windows 7 Service Pack 1, Windows Server 2008 R2 Service Pack 1, Windows Server 2012, Windows Embedded 8 Standard, Windows 8.1, Windows Server 2012 R2**Classification**: Security Updates \n \n## File information\n\n### File attributes\n\nThe English (United States) version of this software update installs files that have the attributes that are listed in the following tables.**Note** The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.\n\n## File verification\n\n## File hash information\n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nWindows8.1-KB4586768-arm.msu| 3181704AD0FC25215B801A61EFD3B92590F61FF5| B2272B00573AE56FFFC93728C0F35E6FF71F23350ACAA5F3E8D4CD80E02ED696 \nWindows8.1-KB4586768-x86.msu| 7C48AF70DD46B17A5A4310470481D2A1634FDCC0| 636040E0293B0D7C3831759D31FFC59034AD6B0E38F940473FDC7CE1AA90BD16 \nWindows8.1-KB4586768-x64.msu| 4D122D8161CDC954958E87ED46E0CFC08A24AF1D| EB5EBC38F5DB8D3B42D47FB215C6B7E18A5A07B266275002F5B70CA12401D6AF \nIE11-Windows6.2-KB4586768-X86.msu| E798A888820A05AD66CF19E0EBB267EA754D353E| 18D50758BF24D61CACE842ECA2A474ADA5A56E5B109F304B1366A41D19B1C29F \nIE11-Windows6.2-KB4586768-X64.msu| 2B0AF4AB93248742A947336874E8BF451B8112A5| 36B4DBDC172343186784301BCD504C7FC39F0B8B4C87B05C000B981A2FAAA9EA \nWindows6.1-KB4586768-x86.msu| C756962FE6296139D5A84CDE77FAB5575F032E19| A72BA4BE4EFB794ACF6E443A353BFF4AF5EC4FF4E8EB62C7DC0424AE99CE38AB \nWindows6.1-KB4586768-x64.msu| 372A8CD9FB0F669BC8F3F0A0B97BB0F1FF7F2960| B5949B4C5E3EEA76483A134BF2C3B3C14375D769ADF89F8B0EF7BACFF55E1A56 \n**Windows 8.1, Windows RT 8.1 and Windows Server 2012 R2**\n\n## Internet Explorer 11 on all supported ARM-based versions\n\n**File name**| **File version**| **File size**| **Date**| **Time** \n---|---|---|---|--- \nActxprxy.dll| 6.3.9600.19301| 1,064,960| 26-Feb-2019| 05:59 \nHlink.dll| 6.3.9600.19101| 68,608| 19-Jul-2018| 03:30 \nPngfilt.dll| 11.0.9600.16384| 47,616| 22-Aug-2013| 03:06 \nUrlmon.dll| 11.0.9600.19867| 1,039,360| 13-Oct-2020| 03:36 \nIexplore.exe| 11.0.9600.19867| 807,816| 13-Oct-2020| 05:01 \nWininetplugin.dll| 6.3.9600.16384| 33,792| 22-Aug-2013| 02:52 \nWininet.dll.mui| 11.0.9600.18538| 46,592| 12-Nov-2016| 21:08 \nWininet.dll.mui| 11.0.9600.18538| 52,736| 12-Nov-2016| 21:08 \nWininet.dll.mui| 11.0.9600.18538| 51,200| 12-Nov-2016| 21:08 \nWininet.dll.mui| 11.0.9600.18538| 51,200| 12-Nov-2016| 21:08 \nWininet.dll.mui| 11.0.9600.18538| 56,320| 12-Nov-2016| 21:08 \nWininet.dll.mui| 11.0.9600.18538| 57,856| 12-Nov-2016| 21:09 \nWininet.dll.mui| 11.0.9600.18538| 49,664| 12-Nov-2016| 21:09 \nWininet.dll.mui| 11.0.9600.18538| 49,664| 12-Nov-2016| 18:19 \nWininet.dll.mui| 11.0.9600.18538| 54,272| 12-Nov-2016| 21:09 \nWininet.dll.mui| 11.0.9600.18538| 47,616| 12-Nov-2016| 21:09 \nWininet.dll.mui| 11.0.9600.18538| 49,152| 12-Nov-2016| 21:09 \nWininet.dll.mui| 11.0.9600.18538| 55,296| 12-Nov-2016| 21:08 \nWininet.dll.mui| 11.0.9600.18538| 45,056| 12-Nov-2016| 21:09 \nWininet.dll.mui| 11.0.9600.18538| 51,712| 12-Nov-2016| 21:09 \nWininet.dll.mui| 11.0.9600.18538| 51,712| 12-Nov-2016| 21:09 \nWininet.dll.mui| 11.0.9600.18538| 53,248| 12-Nov-2016| 21:09 \nWininet.dll.mui| 11.0.9600.18538| 39,424| 12-Nov-2016| 21:09 \nWininet.dll.mui| 11.0.9600.18538| 35,840| 12-Nov-2016| 21:09 \nWininet.dll.mui| 11.0.9600.18538| 50,176| 12-Nov-2016| 21:09 \nWininet.dll.mui| 11.0.9600.18538| 51,200| 12-Nov-2016| 21:09 \nWininet.dll.mui| 11.0.9600.18538| 50,688| 12-Nov-2016| 21:09 \nWininet.dll.mui| 11.0.9600.18538| 52,736| 12-Nov-2016| 21:10 \nWininet.dll.mui| 11.0.9600.18538| 53,760| 12-Nov-2016| 21:09 \nWininet.dll.mui| 11.0.9600.18538| 54,272| 12-Nov-2016| 21:08 \nWininet.dll.mui| 11.0.9600.18538| 54,272| 12-Nov-2016| 21:07 \nWininet.dll.mui| 11.0.9600.18538| 52,736| 12-Nov-2016| 21:08 \nWininet.dll.mui| 11.0.9600.18538| 51,200| 12-Nov-2016| 21:08 \nWininet.dll.mui| 11.0.9600.18538| 53,248| 12-Nov-2016| 21:08 \nWininet.dll.mui| 11.0.9600.18538| 52,736| 12-Nov-2016| 21:08 \nWininet.dll.mui| 11.0.9600.19867| 51,712| 13-Oct-2020| 05:19 \nWininet.dll.mui| 11.0.9600.18538| 50,688| 12-Nov-2016| 21:07 \nWininet.dll.mui| 11.0.9600.18538| 50,688| 12-Nov-2016| 21:06 \nWininet.dll.mui| 11.0.9600.18538| 50,176| 12-Nov-2016| 21:06 \nWininet.dll.mui| 11.0.9600.18538| 50,176| 12-Nov-2016| 21:06 \nWininet.dll.mui| 11.0.9600.18538| 31,232| 12-Nov-2016| 21:06 \nWininet.dll.mui| 11.0.9600.18538| 31,232| 12-Nov-2016| 21:08 \nWininet.dll.mui| 11.0.9600.18538| 31,232| 12-Nov-2016| 21:08 \nHtml.iec| 2019.0.0.19301| 320,000| 26-Feb-2019| 06:35 \nInetcpl.cpl| 11.0.9600.19867| 2,007,040| 13-Oct-2020| 03:55 \nMshtml.dll.mui| 11.0.9600.19507| 307,200| 06-Oct-2019| 03:51 \nMshtml.dll.mui| 11.0.9600.19507| 293,888| 06-Oct-2019| 03:51 \nMshtml.dll.mui| 11.0.9600.19507| 290,304| 06-Oct-2019| 03:51 \nMshtml.dll.mui| 11.0.9600.19507| 289,280| 06-Oct-2019| 03:51 \nMshtml.dll.mui| 11.0.9600.19507| 299,008| 06-Oct-2019| 03:51 \nMshtml.dll.mui| 11.0.9600.19507| 303,104| 06-Oct-2019| 03:51 \nMshtml.dll.mui| 11.0.9600.19507| 282,112| 06-Oct-2019| 03:51 \nMshtml.dll.mui| 11.0.9600.19507| 282,112| 06-Oct-2019| 03:16 \nMshtml.dll.mui| 11.0.9600.19507| 296,960| 06-Oct-2019| 03:52 \nMshtml.dll.mui| 11.0.9600.19507| 283,648| 06-Oct-2019| 03:51 \nMshtml.dll.mui| 11.0.9600.19507| 291,840| 06-Oct-2019| 03:51 \nMshtml.dll.mui| 11.0.9600.19507| 299,520| 06-Oct-2019| 03:51 \nMshtml.dll.mui| 11.0.9600.19507| 275,968| 06-Oct-2019| 03:51 \nMshtml.dll.mui| 11.0.9600.19507| 290,816| 06-Oct-2019| 03:52 \nMshtml.dll.mui| 11.0.9600.19507| 293,376| 06-Oct-2019| 03:51 \nMshtml.dll.mui| 11.0.9600.19507| 296,960| 06-Oct-2019| 03:51 \nMshtml.dll.mui| 11.0.9600.19507| 258,048| 06-Oct-2019| 03:51 \nMshtml.dll.mui| 11.0.9600.19507| 256,512| 06-Oct-2019| 03:51 \nMshtml.dll.mui| 11.0.9600.19507| 289,280| 06-Oct-2019| 03:51 \nMshtml.dll.mui| 11.0.9600.19507| 288,256| 06-Oct-2019| 03:51 \nMshtml.dll.mui| 11.0.9600.19507| 285,184| 06-Oct-2019| 03:51 \nMshtml.dll.mui| 11.0.9600.19507| 295,424| 06-Oct-2019| 03:51 \nMshtml.dll.mui| 11.0.9600.19507| 297,472| 06-Oct-2019| 03:51 \nMshtml.dll.mui| 11.0.9600.19507| 292,864| 06-Oct-2019| 03:50 \nMshtml.dll.mui| 11.0.9600.19507| 295,424| 06-Oct-2019| 03:50 \nMshtml.dll.mui| 11.0.9600.19507| 294,400| 06-Oct-2019| 03:51 \nMshtml.dll.mui| 11.0.9600.19507| 294,400| 06-Oct-2019| 03:50 \nMshtml.dll.mui| 11.0.9600.19507| 292,864| 06-Oct-2019| 03:50 \nMshtml.dll.mui| 11.0.9600.19507| 290,816| 06-Oct-2019| 03:51 \nMshtml.dll.mui| 11.0.9600.19867| 290,816| 13-Oct-2020| 05:19 \nMshtml.dll.mui| 11.0.9600.19507| 286,208| 06-Oct-2019| 03:50 \nMshtml.dll.mui| 11.0.9600.19507| 281,600| 06-Oct-2019| 03:48 \nMshtml.dll.mui| 11.0.9600.19507| 286,720| 06-Oct-2019| 03:48 \nMshtml.dll.mui| 11.0.9600.19507| 292,352| 06-Oct-2019| 03:48 \nMshtml.dll.mui| 11.0.9600.19507| 242,176| 06-Oct-2019| 03:48 \nMshtml.dll.mui| 11.0.9600.19507| 243,200| 06-Oct-2019| 03:51 \nMshtml.dll.mui| 11.0.9600.19507| 243,200| 06-Oct-2019| 03:51 \nF12resources.dll.mui| 11.0.9600.17278| 73,728| 16-Aug-2014| 11:19 \nF12resources.dll.mui| 11.0.9600.17278| 67,584| 16-Aug-2014| 11:19 \nF12resources.dll.mui| 11.0.9600.17278| 67,584| 16-Aug-2014| 11:19 \nF12resources.dll.mui| 11.0.9600.17278| 74,240| 16-Aug-2014| 11:19 \nF12resources.dll.mui| 11.0.9600.17278| 78,848| 16-Aug-2014| 11:19 \nF12resources.dll.mui| 11.0.9600.17278| 61,440| 16-Aug-2014| 11:19 \nF12resources.dll.mui| 11.0.9600.17278| 61,440| 16-Aug-2014| 01:39 \nF12resources.dll.mui| 11.0.9600.17278| 74,752| 16-Aug-2014| 11:19 \nF12resources.dll.mui| 11.0.9600.17278| 62,464| 16-Aug-2014| 11:19 \nF12resources.dll.mui| 11.0.9600.17278| 68,096| 16-Aug-2014| 11:27 \nF12resources.dll.mui| 11.0.9600.17278| 75,264| 16-Aug-2014| 11:27 \nF12resources.dll.mui| 11.0.9600.17278| 68,608| 16-Aug-2014| 11:28 \nF12resources.dll.mui| 11.0.9600.17278| 71,680| 16-Aug-2014| 11:27 \nF12resources.dll.mui| 11.0.9600.17278| 73,216| 16-Aug-2014| 11:27 \nF12resources.dll.mui| 11.0.9600.17278| 41,472| 16-Aug-2014| 11:18 \nF12resources.dll.mui| 11.0.9600.17278| 37,888| 16-Aug-2014| 11:18 \nF12resources.dll.mui| 11.0.9600.17278| 68,608| 16-Aug-2014| 11:18 \nF12resources.dll.mui| 11.0.9600.17278| 67,584| 16-Aug-2014| 11:18 \nF12resources.dll.mui| 11.0.9600.17278| 65,536| 16-Aug-2014| 11:18 \nF12resources.dll.mui| 11.0.9600.17278| 74,240| 16-Aug-2014| 11:18 \nF12resources.dll.mui| 11.0.9600.17278| 70,656| 16-Aug-2014| 11:18 \nF12resources.dll.mui| 11.0.9600.17278| 71,168| 16-Aug-2014| 11:18 \nF12resources.dll.mui| 11.0.9600.17278| 71,680| 16-Aug-2014| 11:18 \nF12resources.dll.mui| 11.0.9600.17278| 71,168| 16-Aug-2014| 11:18 \nF12resources.dll.mui| 11.0.9600.17278| 69,632| 16-Aug-2014| 11:27 \nF12resources.dll.mui| 11.0.9600.17278| 68,096| 16-Aug-2014| 11:27 \nF12resources.dll.mui| 11.0.9600.17278| 68,608| 16-Aug-2014| 11:26 \nF12resources.dll.mui| 11.0.9600.19867| 68,096| 13-Oct-2020| 05:19 \nF12resources.dll.mui| 11.0.9600.17278| 65,536| 16-Aug-2014| 11:27 \nF12resources.dll.mui| 11.0.9600.17278| 59,904| 16-Aug-2014| 11:27 \nF12resources.dll.mui| 11.0.9600.17278| 65,536| 16-Aug-2014| 11:27 \nF12resources.dll.mui| 11.0.9600.17278| 69,120| 16-Aug-2014| 11:26 \nF12resources.dll.mui| 11.0.9600.17278| 29,696| 16-Aug-2014| 11:27 \nF12resources.dll.mui| 11.0.9600.17278| 30,720| 16-Aug-2014| 11:19 \nF12resources.dll.mui| 11.0.9600.17278| 30,720| 16-Aug-2014| 11:18 \nJavascriptcollectionagent.dll| 11.0.9600.17416| 63,488| 31-Oct-2014| 02:29 \nDiagnosticshub.scriptedsandboxplugin.dll| 11.0.9600.19750| 215,552| 11-Jun-2020| 02:43 \nUrlmon.dll.mui| 11.0.9600.18378| 46,080| 11-Jun-2016| 20:02 \nUrlmon.dll.mui| 11.0.9600.18378| 50,176| 11-Jun-2016| 20:02 \nUrlmon.dll.mui| 11.0.9600.18378| 48,640| 11-Jun-2016| 20:02 \nUrlmon.dll.mui| 11.0.9600.18378| 49,664| 11-Jun-2016| 20:02 \nUrlmon.dll.mui| 11.0.9600.18378| 51,712| 11-Jun-2016| 20:02 \nUrlmon.dll.mui| 11.0.9600.18378| 54,272| 11-Jun-2016| 20:03 \nUrlmon.dll.mui| 11.0.9600.18378| 48,128| 11-Jun-2016| 20:03 \nUrlmon.dll.mui| 11.0.9600.18378| 48,128| 11-Jun-2016| 17:09 \nUrlmon.dll.mui| 11.0.9600.18378| 50,176| 11-Jun-2016| 20:03 \nUrlmon.dll.mui| 11.0.9600.18378| 47,616| 11-Jun-2016| 20:03 \nUrlmon.dll.mui| 11.0.9600.18378| 49,152| 11-Jun-2016| 20:04 \nUrlmon.dll.mui| 11.0.9600.18378| 50,688| 11-Jun-2016| 20:02 \nUrlmon.dll.mui| 11.0.9600.18378| 45,056| 11-Jun-2016| 20:03 \nUrlmon.dll.mui| 11.0.9600.18378| 49,152| 11-Jun-2016| 20:03 \nUrlmon.dll.mui| 11.0.9600.18378| 49,152| 11-Jun-2016| 20:03 \nUrlmon.dll.mui| 11.0.9600.18378| 49,664| 11-Jun-2016| 19:54 \nUrlmon.dll.mui| 11.0.9600.18378| 39,936| 11-Jun-2016| 19:53 \nUrlmon.dll.mui| 11.0.9600.18378| 39,424| 11-Jun-2016| 19:53 \nUrlmon.dll.mui| 11.0.9600.18378| 47,616| 11-Jun-2016| 19:53 \nUrlmon.dll.mui| 11.0.9600.18378| 47,616| 11-Jun-2016| 19:53 \nUrlmon.dll.mui| 11.0.9600.18378| 48,640| 11-Jun-2016| 19:53 \nUrlmon.dll.mui| 11.0.9600.18378| 51,200| 11-Jun-2016| 19:53 \nUrlmon.dll.mui| 11.0.9600.18378| 50,688| 11-Jun-2016| 19:53 \nUrlmon.dll.mui| 11.0.9600.18378| 49,152| 11-Jun-2016| 20:03 \nUrlmon.dll.mui| 11.0.9600.18378| 50,176| 11-Jun-2016| 20:02 \nUrlmon.dll.mui| 11.0.9600.18378| 49,152| 11-Jun-2016| 20:02 \nUrlmon.dll.mui| 11.0.9600.18378| 48,640| 11-Jun-2016| 20:02 \nUrlmon.dll.mui| 11.0.9600.18378| 49,664| 11-Jun-2016| 20:02 \nUrlmon.dll.mui| 11.0.9600.18378| 48,640| 11-Jun-2016| 20:02 \nUrlmon.dll.mui| 11.0.9600.19867| 49,664| 13-Oct-2020| 05:19 \nUrlmon.dll.mui| 11.0.9600.18378| 48,640| 11-Jun-2016| 20:02 \nUrlmon.dll.mui| 11.0.9600.18378| 48,128| 11-Jun-2016| 19:59 \nUrlmon.dll.mui| 11.0.9600.18378| 49,152| 11-Jun-2016| 19:58 \nUrlmon.dll.mui| 11.0.9600.18378| 48,128| 11-Jun-2016| 19:58 \nUrlmon.dll.mui| 11.0.9600.18378| 35,328| 11-Jun-2016| 19:58 \nUrlmon.dll.mui| 11.0.9600.18378| 35,328| 11-Jun-2016| 20:02 \nUrlmon.dll.mui| 11.0.9600.18378| 35,328| 11-Jun-2016| 20:02 \nJsproxy.dll| 11.0.9600.17416| 39,936| 31-Oct-2014| 02:43 \nWininet.dll| 11.0.9600.19867| 4,147,712| 13-Oct-2020| 03:36 \nInetcpl.cpl.mui| 11.0.9600.18817| 114,176| 07-Sep-2017| 22:24 \nInetcpl.cpl.mui| 11.0.9600.18817| 130,560| 07-Sep-2017| 22:24 \nInetcpl.cpl.mui| 11.0.9600.18817| 124,928| 07-Sep-2017| 22:24 \nInetcpl.cpl.mui| 11.0.9600.18817| 122,880| 07-Sep-2017| 22:24 \nInetcpl.cpl.mui| 11.0.9600.18817| 130,048| 07-Sep-2017| 22:24 \nInetcpl.cpl.mui| 11.0.9600.18817| 138,240| 07-Sep-2017| 22:23 \nInetcpl.cpl.mui| 11.0.9600.18817| 114,688| 07-Sep-2017| 22:23 \nInetcpl.cpl.mui| 11.0.9600.18698| 114,688| 14-May-2017| 19:41 \nInetcpl.cpl.mui| 11.0.9600.18817| 131,584| 07-Sep-2017| 22:23 \nInetcpl.cpl.mui| 11.0.9600.18817| 117,760| 07-Sep-2017| 22:23 \nInetcpl.cpl.mui| 11.0.9600.18817| 122,368| 07-Sep-2017| 22:23 \nInetcpl.cpl.mui| 11.0.9600.18817| 134,144| 07-Sep-2017| 22:24 \nInetcpl.cpl.mui| 11.0.9600.18817| 107,008| 07-Sep-2017| 22:23 \nInetcpl.cpl.mui| 11.0.9600.18838| 123,392| 14-Oct-2017| 07:14 \nInetcpl.cpl.mui| 11.0.9600.18817| 127,488| 07-Sep-2017| 22:24 \nInetcpl.cpl.mui| 11.0.9600.18817| 128,512| 07-Sep-2017| 22:23 \nInetcpl.cpl.mui| 11.0.9600.18817| 88,064| 07-Sep-2017| 22:23 \nInetcpl.cpl.mui| 11.0.9600.18838| 82,944| 14-Oct-2017| 07:14 \nInetcpl.cpl.mui| 11.0.9600.18817| 125,440| 07-Sep-2017| 22:23 \nInetcpl.cpl.mui| 11.0.9600.18817| 123,392| 07-Sep-2017| 22:23 \nInetcpl.cpl.mui| 11.0.9600.18817| 120,320| 07-Sep-2017| 22:23 \nInetcpl.cpl.mui| 11.0.9600.18817| 130,560| 07-Sep-2017| 22:24 \nInetcpl.cpl.mui| 11.0.9600.18817| 129,024| 07-Sep-2017| 22:23 \nInetcpl.cpl.mui| 11.0.9600.18817| 125,952| 07-Sep-2017| 22:24 \nInetcpl.cpl.mui| 11.0.9600.18817| 129,024| 07-Sep-2017| 22:24 \nInetcpl.cpl.mui| 11.0.9600.18817| 128,000| 07-Sep-2017| 22:24 \nInetcpl.cpl.mui| 11.0.9600.18817| 123,904| 07-Sep-2017| 22:24 \nInetcpl.cpl.mui| 11.0.9600.18817| 129,024| 07-Sep-2017| 22:24 \nInetcpl.cpl.mui| 11.0.9600.18817| 123,904| 07-Sep-2017| 22:24 \nInetcpl.cpl.mui| 11.0.9600.19867| 124,416| 13-Oct-2020| 05:19 \nInetcpl.cpl.mui| 11.0.9600.18817| 121,856| 07-Sep-2017| 22:24 \nInetcpl.cpl.mui| 11.0.9600.18817| 115,712| 07-Sep-2017| 22:21 \nInetcpl.cpl.mui| 11.0.9600.18817| 123,904| 07-Sep-2017| 22:21 \nInetcpl.cpl.mui| 11.0.9600.18817| 125,440| 07-Sep-2017| 22:22 \nInetcpl.cpl.mui| 11.0.9600.18817| 74,752| 07-Sep-2017| 22:21 \nInetcpl.cpl.mui| 11.0.9600.18817| 75,776| 07-Sep-2017| 22:23 \nInetcpl.cpl.mui| 11.0.9600.18817| 75,776| 07-Sep-2017| 22:24 \nIeui.dll| 11.0.9600.19650| 427,520| 11-Feb-2020| 12:46 \nIedkcs32.dll| 18.0.9600.19867| 292,864| 13-Oct-2020| 03:56 \nInstall.ins| Not applicable| 464| 13-Oct-2020| 02:25 \nIeapfltr.dat| 10.0.9301.0| 616,104| 24-Sep-2013| 02:22 \nIeapfltr.dll| 11.0.9600.19867| 549,376| 13-Oct-2020| 03:39 \nIepeers.dll| 11.0.9600.19867| 107,008| 13-Oct-2020| 04:03 \nLicmgr10.dll| 11.0.9600.17416| 23,552| 31-Oct-2014| 02:34 \nTdc.ocx| 11.0.9600.19750| 62,464| 11-Jun-2020| 02:41 \nDiagnosticshub.datawarehouse.dll| 11.0.9600.17416| 495,616| 31-Oct-2014| 02:52 \nIedvtool.dll| 11.0.9600.19867| 726,016| 13-Oct-2020| 04:05 \nDiagnosticshub_is.dll| 11.0.9600.17416| 38,912| 31-Oct-2014| 02:53 \nDxtmsft.dll| 11.0.9600.18052| 368,640| 10-Sep-2015| 15:57 \nDxtrans.dll| 11.0.9600.19867| 222,208| 13-Oct-2020| 04:02 \nMicrosoft-windows-ie-f12-provider.ptxml| Not applicable| 11,892| 15-Aug-2014| 22:50 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:18 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:18 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:19 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:19 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:19 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:20 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 01:39 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:19 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:18 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:27 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:28 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:27 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:27 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:27 \nF12.dll.mui| 11.0.9600.17278| 3,584| 16-Aug-2014| 11:18 \nF12.dll.mui| 11.0.9600.17278| 3,584| 16-Aug-2014| 11:19 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:18 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:17 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:18 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:18 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:19 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:18 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:18 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:18 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:27 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:27 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:26 \nF12.dll.mui| 11.0.9600.19867| 4,096| 13-Oct-2020| 05:19 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:26 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:27 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:26 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:26 \nF12.dll.mui| 11.0.9600.17278| 3,584| 16-Aug-2014| 11:27 \nF12.dll.mui| 11.0.9600.17278| 3,584| 16-Aug-2014| 11:19 \nF12.dll.mui| 11.0.9600.17278| 3,584| 16-Aug-2014| 11:18 \nDiagnosticstap.dll| 11.0.9600.19750| 174,592| 11-Jun-2020| 02:45 \nF12resources.dll| 11.0.9600.17496| 10,948,608| 22-Nov-2014| 01:44 \nF12tools.dll| 11.0.9600.19507| 263,168| 06-Oct-2019| 02:28 \nF12.dll| 11.0.9600.19846| 1,185,280| 24-Sep-2020| 03:11 \nMsfeeds.dll| 11.0.9600.19867| 587,776| 13-Oct-2020| 03:55 \nMsfeeds.mof| Not applicable| 1,518| 06-Feb-2014| 05:51 \nMsfeedsbs.dll| 11.0.9600.19650| 43,520| 11-Feb-2020| 12:34 \nMsfeedsbs.mof| Not applicable| 1,574| 21-Aug-2013| 23:43 \nMsfeedssync.exe| 11.0.9600.16384| 11,776| 22-Aug-2013| 03:05 \nMshtmled.dll| 11.0.9600.19867| 73,216| 13-Oct-2020| 04:04 \nMicrosoft-windows-ie-htmlrendering.ptxml| Not applicable| 3,228| 06-Feb-2014| 05:39 \nMshtml.dll| 11.0.9600.19867| 16,230,400| 13-Oct-2020| 03:49 \nMshtml.tlb| 11.0.9600.16518| 2,724,864| 06-Feb-2014| 09:36 \nIeadvpack.dll| 11.0.9600.16384| 98,816| 22-Aug-2013| 02:54 \nIeetwcollector.exe| 11.0.9600.18658| 98,816| 05-Apr-2017| 17:29 \nIeetwcollectorres.dll| 11.0.9600.16518| 4,096| 06-Feb-2014| 09:36 \nIeetwproxystub.dll| 11.0.9600.16518| 43,008| 06-Feb-2014| 09:23 \nIelowutil.exe| 11.0.9600.17031| 222,208| 22-Feb-2014| 09:32 \nIeproxy.dll| 11.0.9600.19867| 306,176| 13-Oct-2020| 03:37 \nIeshims.dll| 11.0.9600.19650| 268,800| 11-Feb-2020| 12:11 \nImgutil.dll| 11.0.9600.18123| 35,328| 08-Nov-2015| 20:20 \nBing.ico| Not applicable| 5,430| 24-Sep-2013| 02:51 \nIeunatt.exe| 11.0.9600.16518| 112,128| 06-Feb-2014| 09:12 \nMicrosoft-windows-ie-internetexplorer-ppdlic.xrm-ms| Not applicable| 2,956| 13-Oct-2020| 04:59 \nWindows feed discovered.wav| Not applicable| 19,884| 24-Sep-2013| 03:25 \nWindows information bar.wav| Not applicable| 23,308| 24-Sep-2013| 03:25 \nWindows navigation start.wav| Not applicable| 11,340| 24-Sep-2013| 03:25 \nWindows pop-up blocked.wav| Not applicable| 85,548| 24-Sep-2013| 03:25 \nJsdbgui.dll| 11.0.9600.19724| 457,216| 20-May-2020| 10:00 \nJsprofilerui.dll| 11.0.9600.19507| 574,976| 06-Oct-2019| 02:24 \nMemoryanalyzer.dll| 11.0.9600.19724| 1,934,848| 20-May-2020| 10:12 \nMshtmldac.dll| 11.0.9600.19867| 60,928| 13-Oct-2020| 04:22 \nNetworkinspection.dll| 11.0.9600.19867| 1,105,408| 13-Oct-2020| 04:01 \nDesktop.ini| Not applicable| 65| 18-Jun-2013| 14:46 \nOccache.dll| 11.0.9600.19867| 121,856| 13-Oct-2020| 04:01 \nDesktop.ini| Not applicable| 65| 18-Jun-2013| 14:46 \nWebcheck.dll| 11.0.9600.19867| 201,216| 13-Oct-2020| 03:57 \nMsdbg2.dll| 12.0.20712.1| 295,320| 26-Jul-2013| 17:03 \nPdm.dll| 12.0.20712.1| 420,752| 26-Jul-2013| 17:03 \nPdmproxy100.dll| 12.0.20712.1| 76,712| 26-Jul-2013| 17:03 \nIcrav03.rat| Not applicable| 8,798| 24-Sep-2013| 02:32 \nMsrating.dll| 11.0.9600.17905| 157,184| 15-Jun-2015| 19:46 \nTicrf.rat| Not applicable| 1,988| 24-Sep-2013| 02:32 \nIertutil.dll| 11.0.9600.19867| 2,185,728| 13-Oct-2020| 04:17 \nIe4uinit.exe| 11.0.9600.19867| 678,400| 13-Oct-2020| 03:56 \nIernonce.dll| 11.0.9600.16518| 28,160| 06-Feb-2014| 09:15 \nIesetup.dll| 11.0.9600.16518| 59,904| 06-Feb-2014| 09:23 \nInseng.dll| 11.0.9600.16384| 77,312| 22-Aug-2013| 02:35 \nIesysprep.dll| 11.0.9600.17416| 87,552| 31-Oct-2014| 02:28 \nTimeline.dll| 11.0.9600.19750| 155,136| 11-Jun-2020| 02:41 \nTimeline.cpu.xml| Not applicable| 3,197| 24-Jul-2014| 19:09 \nTimeline_is.dll| 11.0.9600.17416| 129,536| 31-Oct-2014| 02:43 \nVgx.dll| 11.0.9600.19867| 734,208| 13-Oct-2020| 04:04 \nUrl.dll| 11.0.9600.17416| 236,032| 31-Oct-2014| 02:49 \nIeframe.dll.mui| 11.0.9600.19846| 2,066,432| 24-Sep-2020| 04:51 \nIeframe.dll.mui| 11.0.9600.19846| 2,121,216| 24-Sep-2020| 04:51 \nIeframe.dll.mui| 11.0.9600.19846| 2,075,136| 24-Sep-2020| 04:51 \nIeframe.dll.mui| 11.0.9600.19846| 2,063,872| 24-Sep-2020| 04:51 \nIeframe.dll.mui| 11.0.9600.19846| 2,314,240| 24-Sep-2020| 04:51 \nIeframe.dll.mui| 11.0.9600.19846| 2,390,528| 24-Sep-2020| 04:54 \nIeframe.dll.mui| 11.0.9600.19846| 2,034,176| 24-Sep-2020| 04:53 \nIeframe.dll.mui| 11.0.9600.19846| 2,033,152| 24-Sep-2020| 04:03 \nIeframe.dll.mui| 11.0.9600.19846| 2,307,584| 24-Sep-2020| 04:53 \nIeframe.dll.mui| 11.0.9600.19846| 2,255,872| 24-Sep-2020| 04:54 \nIeframe.dll.mui| 11.0.9600.19846| 2,061,312| 24-Sep-2020| 04:53 \nIeframe.dll.mui| 11.0.9600.19846| 2,326,016| 24-Sep-2020| 04:51 \nIeframe.dll.mui| 11.0.9600.19846| 2,019,840| 24-Sep-2020| 04:54 \nIeframe.dll.mui| 11.0.9600.19846| 2,071,040| 24-Sep-2020| 04:53 \nIeframe.dll.mui| 11.0.9600.19846| 2,082,816| 24-Sep-2020| 04:53 \nIeframe.dll.mui| 11.0.9600.19846| 2,307,584| 24-Sep-2020| 04:52 \nIeframe.dll.mui| 11.0.9600.19846| 2,170,368| 24-Sep-2020| 04:53 \nIeframe.dll.mui| 11.0.9600.19846| 2,153,984| 24-Sep-2020| 04:53 \nIeframe.dll.mui| 11.0.9600.19846| 2,291,712| 24-Sep-2020| 04:52 \nIeframe.dll.mui| 11.0.9600.19846| 2,283,520| 24-Sep-2020| 04:52 \nIeframe.dll.mui| 11.0.9600.19846| 2,052,096| 24-Sep-2020| 04:52 \nIeframe.dll.mui| 11.0.9600.19846| 2,301,952| 24-Sep-2020| 04:52 \nIeframe.dll.mui| 11.0.9600.19846| 2,093,056| 24-Sep-2020| 04:52 \nIeframe.dll.mui| 11.0.9600.19846| 2,075,648| 24-Sep-2020| 04:53 \nIeframe.dll.mui| 11.0.9600.19846| 2,299,392| 24-Sep-2020| 04:52 \nIeframe.dll.mui| 11.0.9600.19846| 2,094,592| 24-Sep-2020| 04:52 \nIeframe.dll.mui| 11.0.9600.19846| 2,316,800| 24-Sep-2020| 04:52 \nIeframe.dll.mui| 11.0.9600.19846| 2,305,536| 24-Sep-2020| 04:52 \nIeframe.dll.mui| 11.0.9600.19846| 2,278,912| 24-Sep-2020| 04:52 \nIeframe.dll.mui| 11.0.9600.19867| 2,286,080| 13-Oct-2020| 05:20 \nIeframe.dll.mui| 11.0.9600.19846| 2,060,288| 24-Sep-2020| 04:52 \nIeframe.dll.mui| 11.0.9600.19846| 2,315,776| 24-Sep-2020| 04:49 \nIeframe.dll.mui| 11.0.9600.19846| 2,278,912| 24-Sep-2020| 04:49 \nIeframe.dll.mui| 11.0.9600.19846| 2,324,992| 24-Sep-2020| 04:48 \nIeframe.dll.mui| 11.0.9600.19846| 2,098,176| 24-Sep-2020| 04:49 \nIeframe.dll.mui| 11.0.9600.19846| 1,890,304| 24-Sep-2020| 04:51 \nIeframe.dll.mui| 11.0.9600.19846| 1,890,304| 24-Sep-2020| 04:50 \nIeframe.dll| 11.0.9600.19867| 12,307,968| 13-Oct-2020| 03:38 \nIeframe.ptxml| Not applicable| 24,486| 06-Feb-2014| 05:38 \nInetres.adml| Not applicable| 524,733| 13-Oct-2020| 05:32 \nInetres.adml| Not applicable| 498,151| 13-Oct-2020| 05:31 \nInetres.adml| Not applicable| 550,745| 13-Oct-2020| 05:31 \nInetres.adml| Not applicable| 942,143| 13-Oct-2020| 05:29 \nInetres.adml| Not applicable| 456,165| 13-Oct-2020| 04:53 \nInetres.adml| Not applicable| 542,443| 13-Oct-2020| 05:29 \nInetres.adml| Not applicable| 524,999| 13-Oct-2020| 05:29 \nInetres.adml| Not applicable| 574,243| 13-Oct-2020| 05:32 \nInetres.adml| Not applicable| 569,173| 13-Oct-2020| 05:30 \nInetres.adml| Not applicable| 546,643| 13-Oct-2020| 05:31 \nInetres.adml| Not applicable| 637,356| 13-Oct-2020| 05:31 \nInetres.adml| Not applicable| 523,880| 13-Oct-2020| 05:31 \nInetres.adml| Not applicable| 487,001| 13-Oct-2020| 05:31 \nInetres.adml| Not applicable| 546,980| 13-Oct-2020| 05:31 \nInetres.adml| Not applicable| 557,656| 13-Oct-2020| 05:30 \nInetres.adml| Not applicable| 533,510| 13-Oct-2020| 05:19 \nInetres.adml| Not applicable| 539,964| 13-Oct-2020| 05:19 \nInetres.adml| Not applicable| 802,394| 13-Oct-2020| 05:19 \nInetres.adml| Not applicable| 502,367| 13-Oct-2020| 05:19 \nInetres.adml| Not applicable| 519,994| 13-Oct-2020| 05:26 \nInetres.adml| Not applicable| 418,707| 13-Oct-2020| 05:26 \nInetres.adml| Not applicable| 435,257| 13-Oct-2020| 05:31 \nInetres.adml| Not applicable| 435,257| 13-Oct-2020| 05:32 \nInetres.admx| Not applicable| 1,676,517| 18-Sep-2020| 13:43 \nInetcomm.dll| 6.3.9600.19867| 675,328| 13-Oct-2020| 03:58 \nInetres.dll| 6.3.9600.16384| 84,480| 22-Aug-2013| 03:15 \nJscript9.dll| 11.0.9600.19867| 3,573,248| 13-Oct-2020| 03:47 \nJscript9diag.dll| 11.0.9600.19507| 557,568| 06-Oct-2019| 02:35 \nJscript.dll| 5.8.9600.19867| 516,608| 13-Oct-2020| 04:16 \nVbscript.dll| 5.8.9600.19867| 403,968| 13-Oct-2020| 04:22 \n \n## Internet Explorer 11 on all supported x86-based versions\n\n**File name**| **File version**| **File size**| **Date**| **Time** \n---|---|---|---|--- \nActxprxy.dll| 6.3.9600.19301| 1,049,600| 26-Feb-2019| 06:20 \nHlink.dll| 6.3.9600.19101| 99,328| 19-Jul-2018| 03:55 \nPngfilt.dll| 11.0.9600.17416| 57,344| 31-Oct-2014| 03:26 \nUrlmon.dll| 11.0.9600.19867| 1,342,976| 13-Oct-2020| 03:48 \nIexplore.exe| 11.0.9600.19036| 817,296| 25-May-2018| 05:24 \nWininetplugin.dll| 6.3.9600.17416| 35,328| 31-Oct-2014| 03:12 \nWininet.dll.mui| 11.0.9600.18538| 46,592| 12-Nov-2016| 21:31 \nWininet.dll.mui| 11.0.9600.18538| 52,736| 12-Nov-2016| 21:30 \nWininet.dll.mui| 11.0.9600.18538| 51,200| 12-Nov-2016| 21:30 \nWininet.dll.mui| 11.0.9600.18538| 51,200| 12-Nov-2016| 21:30 \nWininet.dll.mui| 11.0.9600.18538| 56,320| 12-Nov-2016| 21:30 \nWininet.dll.mui| 11.0.9600.18538| 57,856| 12-Nov-2016| 21:32 \nWininet.dll.mui| 11.0.9600.18538| 49,664| 12-Nov-2016| 21:32 \nWininet.dll.mui| 11.0.9600.18538| 49,664| 12-Nov-2016| 19:17 \nWininet.dll.mui| 11.0.9600.18538| 54,272| 12-Nov-2016| 21:32 \nWininet.dll.mui| 11.0.9600.18538| 47,616| 12-Nov-2016| 21:32 \nWininet.dll.mui| 11.0.9600.18538| 49,152| 12-Nov-2016| 21:32 \nWininet.dll.mui| 11.0.9600.18538| 55,296| 12-Nov-2016| 21:30 \nWininet.dll.mui| 11.0.9600.18538| 45,056| 12-Nov-2016| 21:32 \nWininet.dll.mui| 11.0.9600.18538| 51,712| 12-Nov-2016| 21:32 \nWininet.dll.mui| 11.0.9600.18538| 51,712| 12-Nov-2016| 21:32 \nWininet.dll.mui| 11.0.9600.18538| 53,248| 12-Nov-2016| 21:32 \nWininet.dll.mui| 11.0.9600.18538| 39,424| 12-Nov-2016| 21:32 \nWininet.dll.mui| 11.0.9600.18538| 35,840| 12-Nov-2016| 21:32 \nWininet.dll.mui| 11.0.9600.18538| 50,176| 12-Nov-2016| 21:31 \nWininet.dll.mui| 11.0.9600.18538| 51,200| 12-Nov-2016| 21:31 \nWininet.dll.mui| 11.0.9600.18538| 50,688| 12-Nov-2016| 21:31 \nWininet.dll.mui| 11.0.9600.18538| 52,736| 12-Nov-2016| 21:31 \nWininet.dll.mui| 11.0.9600.18538| 53,760| 12-Nov-2016| 21:31 \nWininet.dll.mui| 11.0.9600.18538| 54,272| 12-Nov-2016| 20:30 \nWininet.dll.mui| 11.0.9600.18538| 54,272| 12-Nov-2016| 20:29 \nWininet.dll.mui| 11.0.9600.18538| 52,736| 12-Nov-2016| 20:30 \nWininet.dll.mui| 11.0.9600.18538| 51,200| 12-Nov-2016| 20:29 \nWininet.dll.mui| 11.0.9600.18538| 53,248| 12-Nov-2016| 20:30 \nWininet.dll.mui| 11.0.9600.18538| 52,736| 12-Nov-2016| 20:30 \nWininet.dll.mui| 11.0.9600.19867| 51,712| 13-Oct-2020| 06:36 \nWininet.dll.mui| 11.0.9600.18538| 50,688| 12-Nov-2016| 20:30 \nWininet.dll.mui| 11.0.9600.18538| 50,688| 12-Nov-2016| 20:27 \nWininet.dll.mui| 11.0.9600.18538| 50,176| 12-Nov-2016| 20:28 \nWininet.dll.mui| 11.0.9600.18538| 50,176| 12-Nov-2016| 20:28 \nWininet.dll.mui| 11.0.9600.18538| 31,232| 12-Nov-2016| 20:28 \nWininet.dll.mui| 11.0.9600.18538| 31,232| 12-Nov-2016| 21:30 \nWininet.dll.mui| 11.0.9600.18538| 31,232| 12-Nov-2016| 21:30 \nHtml.iec| 2019.0.0.18895| 341,504| 02-Jan-2018| 04:51 \nInetcpl.cpl| 11.0.9600.19867| 2,058,752| 13-Oct-2020| 04:09 \nMshtml.dll.mui| 11.0.9600.19404| 307,200| 10-Jul-2019| 04:50 \nMshtml.dll.mui| 11.0.9600.19404| 293,888| 10-Jul-2019| 04:50 \nMshtml.dll.mui| 11.0.9600.19404| 290,304| 10-Jul-2019| 04:52 \nMshtml.dll.mui| 11.0.9600.19404| 289,280| 10-Jul-2019| 04:50 \nMshtml.dll.mui| 11.0.9600.19404| 299,008| 10-Jul-2019| 04:50 \nMshtml.dll.mui| 11.0.9600.19404| 303,104| 10-Jul-2019| 04:50 \nMshtml.dll.mui| 11.0.9600.19404| 282,112| 10-Jul-2019| 04:49 \nMshtml.dll.mui| 11.0.9600.19404| 282,112| 10-Jul-2019| 03:58 \nMshtml.dll.mui| 11.0.9600.19404| 296,960| 10-Jul-2019| 04:51 \nMshtml.dll.mui| 11.0.9600.19404| 283,648| 10-Jul-2019| 04:50 \nMshtml.dll.mui| 11.0.9600.19404| 291,840| 10-Jul-2019| 04:50 \nMshtml.dll.mui| 11.0.9600.19404| 299,520| 10-Jul-2019| 04:50 \nMshtml.dll.mui| 11.0.9600.19404| 275,968| 10-Jul-2019| 04:51 \nMshtml.dll.mui| 11.0.9600.19404| 290,816| 10-Jul-2019| 04:49 \nMshtml.dll.mui| 11.0.9600.19404| 293,376| 10-Jul-2019| 04:49 \nMshtml.dll.mui| 11.0.9600.19404| 296,960| 10-Jul-2019| 04:53 \nMshtml.dll.mui| 11.0.9600.19404| 258,048| 10-Jul-2019| 04:53 \nMshtml.dll.mui| 11.0.9600.19404| 256,512| 10-Jul-2019| 04:52 \nMshtml.dll.mui| 11.0.9600.19404| 289,280| 10-Jul-2019| 04:51 \nMshtml.dll.mui| 11.0.9600.19404| 288,256| 10-Jul-2019| 04:53 \nMshtml.dll.mui| 11.0.9600.19404| 285,184| 10-Jul-2019| 04:53 \nMshtml.dll.mui| 11.0.9600.19404| 295,424| 10-Jul-2019| 04:53 \nMshtml.dll.mui| 11.0.9600.19404| 297,472| 10-Jul-2019| 04:52 \nMshtml.dll.mui| 11.0.9600.19404| 292,864| 10-Jul-2019| 04:50 \nMshtml.dll.mui| 11.0.9600.19404| 295,424| 10-Jul-2019| 04:51 \nMshtml.dll.mui| 11.0.9600.19404| 294,400| 10-Jul-2019| 04:50 \nMshtml.dll.mui| 11.0.9600.19404| 294,400| 10-Jul-2019| 04:51 \nMshtml.dll.mui| 11.0.9600.19404| 292,864| 10-Jul-2019| 04:50 \nMshtml.dll.mui| 11.0.9600.19404| 290,816| 10-Jul-2019| 04:50 \nMshtml.dll.mui| 11.0.9600.19867| 290,816| 13-Oct-2020| 06:36 \nMshtml.dll.mui| 11.0.9600.19404| 286,208| 10-Jul-2019| 04:50 \nMshtml.dll.mui| 11.0.9600.19404| 281,600| 10-Jul-2019| 04:43 \nMshtml.dll.mui| 11.0.9600.19404| 286,720| 10-Jul-2019| 04:43 \nMshtml.dll.mui| 11.0.9600.19404| 292,352| 10-Jul-2019| 04:42 \nMshtml.dll.mui| 11.0.9600.19404| 242,176| 10-Jul-2019| 04:43 \nMshtml.dll.mui| 11.0.9600.19404| 243,200| 10-Jul-2019| 04:53 \nMshtml.dll.mui| 11.0.9600.19404| 243,200| 10-Jul-2019| 04:50 \nF12resources.dll.mui| 11.0.9600.17278| 73,728| 16-Aug-2014| 08:34 \nF12resources.dll.mui| 11.0.9600.17278| 67,584| 16-Aug-2014| 08:33 \nF12resources.dll.mui| 11.0.9600.17278| 67,584| 16-Aug-2014| 08:34 \nF12resources.dll.mui| 11.0.9600.17278| 74,240| 16-Aug-2014| 08:35 \nF12resources.dll.mui| 11.0.9600.17278| 78,848| 16-Aug-2014| 08:33 \nF12resources.dll.mui| 11.0.9600.17278| 61,440| 16-Aug-2014| 08:34 \nF12resources.dll.mui| 11.0.9600.17278| 61,440| 16-Aug-2014| 02:47 \nF12resources.dll.mui| 11.0.9600.17278| 74,752| 16-Aug-2014| 08:33 \nF12resources.dll.mui| 11.0.9600.17278| 62,464| 16-Aug-2014| 08:32 \nF12resources.dll.mui| 11.0.9600.17278| 68,096| 16-Aug-2014| 08:27 \nF12resources.dll.mui| 11.0.9600.17278| 75,264| 16-Aug-2014| 08:27 \nF12resources.dll.mui| 11.0.9600.17278| 68,608| 16-Aug-2014| 08:27 \nF12resources.dll.mui| 11.0.9600.17278| 71,680| 16-Aug-2014| 08:29 \nF12resources.dll.mui| 11.0.9600.17278| 73,216| 16-Aug-2014| 08:27 \nF12resources.dll.mui| 11.0.9600.17278| 41,472| 16-Aug-2014| 08:30 \nF12resources.dll.mui| 11.0.9600.17278| 37,888| 16-Aug-2014| 08:30 \nF12resources.dll.mui| 11.0.9600.17278| 68,608| 16-Aug-2014| 08:30 \nF12resources.dll.mui| 11.0.9600.17278| 67,584| 16-Aug-2014| 08:30 \nF12resources.dll.mui| 11.0.9600.17278| 65,536| 16-Aug-2014| 08:30 \nF12resources.dll.mui| 11.0.9600.17278| 74,240| 16-Aug-2014| 08:30 \nF12resources.dll.mui| 11.0.9600.17278| 70,656| 16-Aug-2014| 08:30 \nF12resources.dll.mui| 11.0.9600.17278| 71,168| 16-Aug-2014| 08:30 \nF12resources.dll.mui| 11.0.9600.17278| 71,680| 16-Aug-2014| 08:30 \nF12resources.dll.mui| 11.0.9600.17278| 71,168| 16-Aug-2014| 08:30 \nF12resources.dll.mui| 11.0.9600.17278| 69,632| 16-Aug-2014| 08:38 \nF12resources.dll.mui| 11.0.9600.17278| 68,096| 16-Aug-2014| 08:38 \nF12resources.dll.mui| 11.0.9600.17278| 68,608| 16-Aug-2014| 08:39 \nF12resources.dll.mui| 11.0.9600.19867| 68,096| 13-Oct-2020| 06:36 \nF12resources.dll.mui| 11.0.9600.17278| 65,536| 16-Aug-2014| 08:38 \nF12resources.dll.mui| 11.0.9600.17278| 59,904| 16-Aug-2014| 08:38 \nF12resources.dll.mui| 11.0.9600.17278| 65,536| 16-Aug-2014| 08:38 \nF12resources.dll.mui| 11.0.9600.17278| 69,120| 16-Aug-2014| 08:38 \nF12resources.dll.mui| 11.0.9600.17278| 29,696| 16-Aug-2014| 08:39 \nF12resources.dll.mui| 11.0.9600.17278| 30,720| 16-Aug-2014| 08:34 \nF12resources.dll.mui| 11.0.9600.17278| 30,720| 16-Aug-2014| 08:33 \nJavascriptcollectionagent.dll| 11.0.9600.17416| 60,416| 31-Oct-2014| 02:57 \nDiagnosticshub.scriptedsandboxplugin.dll| 11.0.9600.19724| 230,400| 20-May-2020| 10:23 \nUrlmon.dll.mui| 11.0.9600.18378| 46,080| 11-Jun-2016| 20:26 \nUrlmon.dll.mui| 11.0.9600.18378| 50,176| 11-Jun-2016| 20:24 \nUrlmon.dll.mui| 11.0.9600.18378| 48,640| 11-Jun-2016| 20:23 \nUrlmon.dll.mui| 11.0.9600.18378| 49,664| 11-Jun-2016| 20:24 \nUrlmon.dll.mui| 11.0.9600.18378| 51,712| 11-Jun-2016| 20:23 \nUrlmon.dll.mui| 11.0.9600.18378| 54,272| 11-Jun-2016| 19:12 \nUrlmon.dll.mui| 11.0.9600.18378| 48,128| 11-Jun-2016| 19:12 \nUrlmon.dll.mui| 11.0.9600.18378| 48,128| 11-Jun-2016| 18:10 \nUrlmon.dll.mui| 11.0.9600.18378| 50,176| 11-Jun-2016| 19:12 \nUrlmon.dll.mui| 11.0.9600.18378| 47,616| 11-Jun-2016| 19:12 \nUrlmon.dll.mui| 11.0.9600.18378| 49,152| 11-Jun-2016| 19:12 \nUrlmon.dll.mui| 11.0.9600.18378| 50,688| 11-Jun-2016| 20:24 \nUrlmon.dll.mui| 11.0.9600.18378| 45,056| 11-Jun-2016| 19:12 \nUrlmon.dll.mui| 11.0.9600.18378| 49,152| 11-Jun-2016| 19:12 \nUrlmon.dll.mui| 11.0.9600.18378| 49,152| 11-Jun-2016| 19:13 \nUrlmon.dll.mui| 11.0.9600.18378| 49,664| 11-Jun-2016| 19:07 \nUrlmon.dll.mui| 11.0.9600.18378| 39,936| 11-Jun-2016| 19:07 \nUrlmon.dll.mui| 11.0.9600.18378| 39,424| 11-Jun-2016| 19:07 \nUrlmon.dll.mui| 11.0.9600.18378| 47,616| 11-Jun-2016| 19:07 \nUrlmon.dll.mui| 11.0.9600.18378| 47,616| 11-Jun-2016| 19:07 \nUrlmon.dll.mui| 11.0.9600.18378| 48,640| 11-Jun-2016| 19:07 \nUrlmon.dll.mui| 11.0.9600.18378| 51,200| 11-Jun-2016| 19:07 \nUrlmon.dll.mui| 11.0.9600.18378| 50,688| 11-Jun-2016| 19:07 \nUrlmon.dll.mui| 11.0.9600.18378| 49,152| 11-Jun-2016| 19:03 \nUrlmon.dll.mui| 11.0.9600.18378| 50,176| 11-Jun-2016| 19:04 \nUrlmon.dll.mui| 11.0.9600.18378| 49,152| 11-Jun-2016| 19:02 \nUrlmon.dll.mui| 11.0.9600.18378| 48,640| 11-Jun-2016| 19:03 \nUrlmon.dll.mui| 11.0.9600.18378| 49,664| 11-Jun-2016| 19:03 \nUrlmon.dll.mui| 11.0.9600.18378| 48,640| 11-Jun-2016| 19:03 \nUrlmon.dll.mui| 11.0.9600.19867| 49,664| 13-Oct-2020| 06:36 \nUrlmon.dll.mui| 11.0.9600.18378| 48,640| 11-Jun-2016| 19:03 \nUrlmon.dll.mui| 11.0.9600.18378| 48,128| 11-Jun-2016| 19:04 \nUrlmon.dll.mui| 11.0.9600.18378| 49,152| 11-Jun-2016| 19:04 \nUrlmon.dll.mui| 11.0.9600.18378| 48,128| 11-Jun-2016| 19:05 \nUrlmon.dll.mui| 11.0.9600.18378| 35,328| 11-Jun-2016| 19:04 \nUrlmon.dll.mui| 11.0.9600.18378| 35,328| 11-Jun-2016| 20:23 \nUrlmon.dll.mui| 11.0.9600.18378| 35,328| 11-Jun-2016| 20:23 \nJsproxy.dll| 11.0.9600.17416| 47,104| 31-Oct-2014| 03:16 \nWininet.dll| 11.0.9600.19867| 4,387,840| 13-Oct-2020| 03:51 \nInetcpl.cpl.mui| 11.0.9600.18817| 114,176| 07-Sep-2017| 21:12 \nInetcpl.cpl.mui| 11.0.9600.18817| 130,560| 07-Sep-2017| 21:09 \nInetcpl.cpl.mui| 11.0.9600.18817| 124,928| 07-Sep-2017| 21:10 \nInetcpl.cpl.mui| 11.0.9600.18817| 122,880| 07-Sep-2017| 21:12 \nInetcpl.cpl.mui| 11.0.9600.18817| 130,048| 07-Sep-2017| 21:10 \nInetcpl.cpl.mui| 11.0.9600.18817| 138,240| 07-Sep-2017| 21:12 \nInetcpl.cpl.mui| 11.0.9600.18817| 114,688| 07-Sep-2017| 21:12 \nInetcpl.cpl.mui| 11.0.9600.18666| 114,688| 16-Apr-2017| 08:51 \nInetcpl.cpl.mui| 11.0.9600.18817| 131,584| 07-Sep-2017| 21:12 \nInetcpl.cpl.mui| 11.0.9600.18817| 117,760| 07-Sep-2017| 21:10 \nInetcpl.cpl.mui| 11.0.9600.18817| 122,368| 07-Sep-2017| 21:12 \nInetcpl.cpl.mui| 11.0.9600.18817| 134,144| 07-Sep-2017| 21:12 \nInetcpl.cpl.mui| 11.0.9600.18817| 107,008| 07-Sep-2017| 21:13 \nInetcpl.cpl.mui| 11.0.9600.18838| 123,392| 14-Oct-2017| 08:46 \nInetcpl.cpl.mui| 11.0.9600.18817| 127,488| 07-Sep-2017| 21:11 \nInetcpl.cpl.mui| 11.0.9600.18817| 128,512| 07-Sep-2017| 21:11 \nInetcpl.cpl.mui| 11.0.9600.18817| 88,064| 07-Sep-2017| 21:07 \nInetcpl.cpl.mui| 11.0.9600.18838| 82,944| 14-Oct-2017| 08:47 \nInetcpl.cpl.mui| 11.0.9600.18817| 125,440| 07-Sep-2017| 21:07 \nInetcpl.cpl.mui| 11.0.9600.18817| 123,392| 07-Sep-2017| 21:07 \nInetcpl.cpl.mui| 11.0.9600.18817| 120,320| 07-Sep-2017| 21:10 \nInetcpl.cpl.mui| 11.0.9600.18817| 130,560| 07-Sep-2017| 21:07 \nInetcpl.cpl.mui| 11.0.9600.18817| 129,024| 07-Sep-2017| 21:07 \nInetcpl.cpl.mui| 11.0.9600.18817| 125,952| 07-Sep-2017| 22:26 \nInetcpl.cpl.mui| 11.0.9600.18817| 129,024| 07-Sep-2017| 22:26 \nInetcpl.cpl.mui| 11.0.9600.18817| 128,000| 07-Sep-2017| 22:25 \nInetcpl.cpl.mui| 11.0.9600.18817| 123,904| 07-Sep-2017| 22:26 \nInetcpl.cpl.mui| 11.0.9600.18817| 129,024| 07-Sep-2017| 22:26 \nInetcpl.cpl.mui| 11.0.9600.18817| 123,904| 07-Sep-2017| 22:25 \nInetcpl.cpl.mui| 11.0.9600.19867| 124,416| 13-Oct-2020| 06:36 \nInetcpl.cpl.mui| 11.0.9600.18817| 121,856| 07-Sep-2017| 20:56 \nInetcpl.cpl.mui| 11.0.9600.18817| 115,712| 07-Sep-2017| 21:03 \nInetcpl.cpl.mui| 11.0.9600.18817| 123,904| 07-Sep-2017| 21:04 \nInetcpl.cpl.mui| 11.0.9600.18817| 125,440| 07-Sep-2017| 21:04 \nInetcpl.cpl.mui| 11.0.9600.18817| 74,752| 07-Sep-2017| 21:04 \nInetcpl.cpl.mui| 11.0.9600.18817| 75,776| 07-Sep-2017| 21:09 \nInetcpl.cpl.mui| 11.0.9600.18817| 75,776| 07-Sep-2017| 21:10 \nIeui.dll| 11.0.9600.18895| 476,160| 02-Jan-2018| 04:44 \nIedkcs32.dll| 18.0.9600.19867| 333,312| 13-Oct-2020| 04:09 \nInstall.ins| Not applicable| 464| 13-Oct-2020| 02:24 \nIeapfltr.dat| 10.0.9301.0| 616,104| 24-Sep-2013| 02:20 \nIeapfltr.dll| 11.0.9600.19867| 710,656| 13-Oct-2020| 03:46 \nIepeers.dll| 11.0.9600.19867| 128,000| 13-Oct-2020| 04:18 \nLicmgr10.dll| 11.0.9600.17416| 27,136| 31-Oct-2014| 03:03 \nTdc.ocx| 11.0.9600.19750| 73,216| 11-Jun-2020| 03:02 \nDiagnosticshub.datawarehouse.dll| 11.0.9600.18895| 489,472| 02-Jan-2018| 04:55 \nIedvtool.dll| 11.0.9600.19867| 772,608| 13-Oct-2020| 05:00 \nDiagnosticshub_is.dll| 11.0.9600.17416| 37,888| 31-Oct-2014| 03:29 \nDxtmsft.dll| 11.0.9600.18895| 416,256| 02-Jan-2018| 04:34 \nDxtrans.dll| 11.0.9600.19867| 279,552| 13-Oct-2020| 04:18 \nMicrosoft-windows-ie-f12-provider.ptxml| Not applicable| 11,892| 15-Aug-2014| 22:51 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 08:34 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 08:35 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 08:36 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 08:33 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 08:34 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 08:33 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 02:47 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 08:32 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 08:32 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 08:26 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 08:27 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 08:27 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 08:27 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 08:26 \nF12.dll.mui| 11.0.9600.17278| 3,584| 16-Aug-2014| 08:30 \nF12.dll.mui| 11.0.9600.17278| 3,584| 16-Aug-2014| 08:30 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 08:29 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 08:29 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 08:30 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 08:30 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 08:30 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 08:30 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 08:31 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 08:30 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 08:37 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 08:37 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 08:38 \nF12.dll.mui| 11.0.9600.19867| 4,096| 13-Oct-2020| 06:35 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 08:37 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 08:39 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 08:37 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 08:37 \nF12.dll.mui| 11.0.9600.17278| 3,584| 16-Aug-2014| 08:38 \nF12.dll.mui| 11.0.9600.17278| 3,584| 16-Aug-2014| 08:32 \nF12.dll.mui| 11.0.9600.17278| 3,584| 16-Aug-2014| 08:34 \nDiagnosticstap.dll| 11.0.9600.17905| 174,592| 15-Jun-2015| 20:52 \nF12resources.dll| 11.0.9600.18939| 10,948,096| 10-Feb-2018| 17:17 \nF12tools.dll| 11.0.9600.19724| 255,488| 20-May-2020| 10:24 \nF12.dll| 11.0.9600.19750| 1,206,784| 11-Jun-2020| 02:55 \nMsfeeds.dll| 11.0.9600.19867| 696,320| 13-Oct-2020| 04:10 \nMsfeeds.mof| Not applicable| 1,518| 06-Feb-2014| 05:53 \nMsfeedsbs.dll| 11.0.9600.19650| 52,736| 11-Feb-2020| 12:57 \nMsfeedsbs.mof| Not applicable| 1,574| 21-Aug-2013| 23:49 \nMsfeedssync.exe| 11.0.9600.17416| 11,264| 31-Oct-2014| 03:25 \nMshta.exe| 11.0.9600.17416| 12,800| 31-Oct-2014| 03:28 \nMshtmled.dll| 11.0.9600.19867| 76,800| 13-Oct-2020| 04:19 \nMicrosoft-windows-ie-htmlrendering.ptxml| Not applicable| 3,228| 06-Feb-2014| 05:40 \nMshtml.dll| 11.0.9600.19867| 20,293,632| 13-Oct-2020| 04:59 \nMshtml.tlb| 11.0.9600.16518| 2,724,864| 06-Feb-2014| 10:20 \nIeadvpack.dll| 11.0.9600.17416| 112,128| 31-Oct-2014| 03:14 \nIeetwcollector.exe| 11.0.9600.18666| 104,960| 16-Apr-2017| 07:47 \nIeetwcollectorres.dll| 11.0.9600.16518| 4,096| 06-Feb-2014| 10:19 \nIeetwproxystub.dll| 11.0.9600.17416| 47,616| 31-Oct-2014| 03:23 \nIelowutil.exe| 11.0.9600.19404| 221,184| 10-Jul-2019| 03:06 \nIeproxy.dll| 11.0.9600.19867| 309,248| 13-Oct-2020| 03:44 \nIeshims.dll| 11.0.9600.19846| 290,304| 24-Sep-2020| 03:01 \nIexpress.exe| 11.0.9600.17416| 152,064| 31-Oct-2014| 03:27 \nWextract.exe| 11.0.9600.17416| 137,728| 31-Oct-2014| 03:28 \nImgutil.dll| 11.0.9600.17416| 40,448| 31-Oct-2014| 02:24 \nExtexport.exe| 11.0.9600.17416| 25,600| 31-Oct-2014| 03:20 \nBing.ico| Not applicable| 5,430| 24-Sep-2013| 02:36 \nIeunatt.exe| 11.0.9600.17416| 115,712| 31-Oct-2014| 03:12 \nMicrosoft-windows-ie-internetexplorer-ppdlic.xrm-ms| Not applicable| 2,956| 13-Oct-2020| 06:01 \nWindows feed discovered.wav| Not applicable| 19,884| 24-Sep-2013| 02:58 \nWindows information bar.wav| Not applicable| 23,308| 24-Sep-2013| 02:58 \nWindows navigation start.wav| Not applicable| 11,340| 24-Sep-2013| 02:58 \nWindows pop-up blocked.wav| Not applicable| 85,548| 24-Sep-2013| 02:58 \nJsdbgui.dll| 11.0.9600.18895| 459,776| 02-Jan-2018| 04:27 \nJsprofilerui.dll| 11.0.9600.18895| 579,584| 02-Jan-2018| 04:27 \nMemoryanalyzer.dll| 11.0.9600.19750| 1,399,296| 11-Jun-2020| 03:13 \nMshtmldac.dll| 11.0.9600.19867| 64,000| 13-Oct-2020| 04:43 \nNetworkinspection.dll| 11.0.9600.19846| 1,075,200| 24-Sep-2020| 03:28 \nDesktop.ini| Not applicable| 65| 18-Jun-2013| 12:18 \nOccache.dll| 11.0.9600.17416| 130,048| 31-Oct-2014| 02:48 \nDesktop.ini| Not applicable| 65| 18-Jun-2013| 12:19 \nWebcheck.dll| 11.0.9600.19867| 230,400| 13-Oct-2020| 04:11 \nMsdbg2.dll| 12.0.41202.0| 315,008| 30-Sep-2014| 23:00 \nPdm.dll| 12.0.41202.0| 442,992| 30-Sep-2014| 23:00 \nPdmproxy100.dll| 12.0.41202.0| 99,984| 30-Sep-2014| 23:00 \nIcrav03.rat| Not applicable| 8,798| 24-Sep-2013| 02:25 \nMsrating.dll| 11.0.9600.19507| 168,960| 06-Oct-2019| 02:57 \nTicrf.rat| Not applicable| 1,988| 24-Sep-2013| 02:26 \nIertutil.dll| 11.0.9600.19867| 2,307,072| 13-Oct-2020| 04:42 \nIe4uinit.exe| 11.0.9600.19846| 692,224| 24-Sep-2020| 03:21 \nIernonce.dll| 11.0.9600.17416| 30,720| 31-Oct-2014| 03:15 \nIesetup.dll| 11.0.9600.17416| 62,464| 31-Oct-2014| 03:24 \nInseng.dll| 11.0.9600.17416| 91,136| 31-Oct-2014| 02:56 \nIesysprep.dll| 11.0.9600.17416| 90,624| 31-Oct-2014| 02:56 \nTimeline.dll| 11.0.9600.17416| 153,600| 31-Oct-2014| 02:55 \nTimeline.cpu.xml| Not applicable| 3,197| 24-Jul-2014| 19:11 \nTimeline_is.dll| 11.0.9600.17416| 124,416| 31-Oct-2014| 03:15 \nVgx.dll| 11.0.9600.19867| 817,664| 13-Oct-2020| 04:19 \nUrl.dll| 11.0.9600.17416| 235,520| 31-Oct-2014| 03:24 \nIeframe.dll.mui| 11.0.9600.19846| 2,066,432| 24-Sep-2020| 05:27 \nIeframe.dll.mui| 11.0.9600.19846| 2,121,216| 24-Sep-2020| 05:26 \nIeframe.dll.mui| 11.0.9600.19846| 2,075,136| 24-Sep-2020| 05:26 \nIeframe.dll.mui| 11.0.9600.19846| 2,063,872| 24-Sep-2020| 05:27 \nIeframe.dll.mui| 11.0.9600.19846| 2,314,240| 24-Sep-2020| 05:26 \nIeframe.dll.mui| 11.0.9600.19846| 2,390,528| 24-Sep-2020| 05:29 \nIeframe.dll.mui| 11.0.9600.19846| 2,034,176| 24-Sep-2020| 05:29 \nIeframe.dll.mui| 11.0.9600.19846| 2,033,152| 24-Sep-2020| 04:39 \nIeframe.dll.mui| 11.0.9600.19846| 2,307,584| 24-Sep-2020| 05:29 \nIeframe.dll.mui| 11.0.9600.19846| 2,255,872| 24-Sep-2020| 05:29 \nIeframe.dll.mui| 11.0.9600.19846| 2,061,312| 24-Sep-2020| 05:30 \nIeframe.dll.mui| 11.0.9600.19846| 2,326,016| 24-Sep-2020| 05:26 \nIeframe.dll.mui| 11.0.9600.19846| 2,019,840| 24-Sep-2020| 05:29 \nIeframe.dll.mui| 11.0.9600.19846| 2,071,040| 24-Sep-2020| 05:29 \nIeframe.dll.mui| 11.0.9600.19846| 2,082,816| 24-Sep-2020| 05:29 \nIeframe.dll.mui| 11.0.9600.19846| 2,307,584| 24-Sep-2020| 05:27 \nIeframe.dll.mui| 11.0.9600.19846| 2,170,368| 24-Sep-2020| 05:26 \nIeframe.dll.mui| 11.0.9600.19846| 2,153,984| 24-Sep-2020| 05:27 \nIeframe.dll.mui| 11.0.9600.19846| 2,291,712| 24-Sep-2020| 05:26 \nIeframe.dll.mui| 11.0.9600.19846| 2,283,520| 24-Sep-2020| 05:27 \nIeframe.dll.mui| 11.0.9600.19846| 2,052,096| 24-Sep-2020| 05:26 \nIeframe.dll.mui| 11.0.9600.19846| 2,301,952| 24-Sep-2020| 05:27 \nIeframe.dll.mui| 11.0.9600.19846| 2,093,056| 24-Sep-2020| 05:27 \nIeframe.dll.mui| 11.0.9600.19846| 2,075,648| 24-Sep-2020| 05:30 \nIeframe.dll.mui| 11.0.9600.19846| 2,299,392| 24-Sep-2020| 05:30 \nIeframe.dll.mui| 11.0.9600.19846| 2,094,592| 24-Sep-2020| 05:30 \nIeframe.dll.mui| 11.0.9600.19846| 2,316,800| 24-Sep-2020| 05:30 \nIeframe.dll.mui| 11.0.9600.19846| 2,305,536| 24-Sep-2020| 05:30 \nIeframe.dll.mui| 11.0.9600.19846| 2,278,912| 24-Sep-2020| 05:30 \nIeframe.dll.mui| 11.0.9600.19867| 2,286,080| 13-Oct-2020| 06:39 \nIeframe.dll.mui| 11.0.9600.19846| 2,060,288| 24-Sep-2020| 05:30 \nIeframe.dll.mui| 11.0.9600.19846| 2,315,776| 24-Sep-2020| 05:30 \nIeframe.dll.mui| 11.0.9600.19846| 2,278,912| 24-Sep-2020| 05:30 \nIeframe.dll.mui| 11.0.9600.19846| 2,324,992| 24-Sep-2020| 05:29 \nIeframe.dll.mui| 11.0.9600.19846| 2,098,176| 24-Sep-2020| 05:30 \nIeframe.dll.mui| 11.0.9600.19846| 1,890,304| 24-Sep-2020| 05:26 \nIeframe.dll.mui| 11.0.9600.19846| 1,890,304| 24-Sep-2020| 05:26 \nIeframe.dll| 11.0.9600.19867| 13,873,664| 13-Oct-2020| 04:09 \nIeframe.ptxml| Not applicable| 24,486| 06-Feb-2014| 05:40 \nIeinstal.exe| 11.0.9600.18921| 475,648| 10-Feb-2018| 05:35 \nInetres.adml| Not applicable| 524,733| 13-Oct-2020| 06:42 \nInetres.adml| Not applicable| 498,151| 13-Oct-2020| 06:42 \nInetres.adml| Not applicable| 550,745| 13-Oct-2020| 06:42 \nInetres.adml| Not applicable| 942,143| 13-Oct-2020| 06:36 \nInetres.adml| Not applicable| 456,165| 13-Oct-2020| 05:48 \nInetres.adml| Not applicable| 542,443| 13-Oct-2020| 06:35 \nInetres.adml| Not applicable| 524,999| 13-Oct-2020| 06:36 \nInetres.adml| Not applicable| 574,243| 13-Oct-2020| 06:42 \nInetres.adml| Not applicable| 569,173| 13-Oct-2020| 06:36 \nInetres.adml| Not applicable| 546,643| 13-Oct-2020| 06:38 \nInetres.adml| Not applicable| 637,356| 13-Oct-2020| 06:38 \nInetres.adml| Not applicable| 523,880| 13-Oct-2020| 06:39 \nInetres.adml| Not applicable| 487,001| 13-Oct-2020| 06:38 \nInetres.adml| Not applicable| 546,980| 13-Oct-2020| 06:39 \nInetres.adml| Not applicable| 557,656| 13-Oct-2020| 06:39 \nInetres.adml| Not applicable| 533,510| 13-Oct-2020| 06:36 \nInetres.adml| Not applicable| 539,964| 13-Oct-2020| 06:37 \nInetres.adml| Not applicable| 802,394| 13-Oct-2020| 06:39 \nInetres.adml| Not applicable| 502,367| 13-Oct-2020| 06:36 \nInetres.adml| Not applicable| 519,994| 13-Oct-2020| 06:38 \nInetres.adml| Not applicable| 418,707| 13-Oct-2020| 06:38 \nInetres.adml| Not applicable| 435,257| 13-Oct-2020| 06:42 \nInetres.adml| Not applicable| 435,257| 13-Oct-2020| 06:42 \nInetres.admx| Not applicable| 1,676,517| 13-Oct-2020| 02:04 \nInetcomm.dll| 6.3.9600.19867| 880,640| 13-Oct-2020| 04:15 \nInetres.dll| 6.3.9600.16384| 84,480| 22-Aug-2013| 04:14 \nJscript9.dll| 11.0.9600.19867| 4,112,384| 13-Oct-2020| 04:12 \nJscript9diag.dll| 11.0.9600.19101| 620,032| 19-Jul-2018| 03:54 \nJscript.dll| 5.8.9600.19867| 653,824| 13-Oct-2020| 04:35 \nVbscript.dll| 5.8.9600.19867| 498,176| 13-Oct-2020| 04:45 \n \n## Internet Explorer 11 on all supported x64-based versions\n\n**File name**| **File version**| **File size**| **Date**| **Time** \n---|---|---|---|--- \nActxprxy.dll| 6.3.9600.19301| 2,882,048| 26-Feb-2019| 06:25 \nHlink.dll| 6.3.9600.19101| 108,544| 19-Jul-2018| 04:22 \nPngfilt.dll| 11.0.9600.17416| 64,512| 31-Oct-2014| 05:09 \nUrlmon.dll| 11.0.9600.19867| 1,568,256| 13-Oct-2020| 04:10 \nIexplore.exe| 11.0.9600.19036| 817,296| 25-May-2018| 06:30 \nWininetplugin.dll| 6.3.9600.17416| 43,008| 31-Oct-2014| 04:51 \nWininet.dll.mui| 11.0.9600.18538| 46,592| 12-Nov-2016| 21:35 \nWininet.dll.mui| 11.0.9600.18538| 52,736| 12-Nov-2016| 21:34 \nWininet.dll.mui| 11.0.9600.18538| 51,200| 12-Nov-2016| 21:34 \nWininet.dll.mui| 11.0.9600.18538| 51,200| 12-Nov-2016| 21:34 \nWininet.dll.mui| 11.0.9600.18538| 56,320| 12-Nov-2016| 21:34 \nWininet.dll.mui| 11.0.9600.18538| 57,856| 13-Nov-2016| 00:01 \nWininet.dll.mui| 11.0.9600.18538| 49,664| 12-Nov-2016| 23:59 \nWininet.dll.mui| 11.0.9600.18538| 49,664| 12-Nov-2016| 20:20 \nWininet.dll.mui| 11.0.9600.18538| 54,272| 13-Nov-2016| 00:00 \nWininet.dll.mui| 11.0.9600.18538| 47,616| 12-Nov-2016| 23:59 \nWininet.dll.mui| 11.0.9600.18538| 49,152| 12-Nov-2016| 23:58 \nWininet.dll.mui| 11.0.9600.18538| 55,296| 12-Nov-2016| 21:34 \nWininet.dll.mui| 11.0.9600.18538| 45,056| 13-Nov-2016| 00:02 \nWininet.dll.mui| 11.0.9600.18538| 51,712| 12-Nov-2016| 23:57 \nWininet.dll.mui| 11.0.9600.18538| 51,712| 12-Nov-2016| 23:57 \nWininet.dll.mui| 11.0.9600.18538| 53,248| 12-Nov-2016| 21:38 \nWininet.dll.mui| 11.0.9600.18538| 39,424| 12-Nov-2016| 21:39 \nWininet.dll.mui| 11.0.9600.18538| 35,840| 12-Nov-2016| 21:38 \nWininet.dll.mui| 11.0.9600.18538| 50,176| 12-Nov-2016| 21:38 \nWininet.dll.mui| 11.0.9600.18538| 51,200| 12-Nov-2016| 21:38 \nWininet.dll.mui| 11.0.9600.18538| 50,688| 12-Nov-2016| 21:39 \nWininet.dll.mui| 11.0.9600.18538| 52,736| 12-Nov-2016| 21:38 \nWininet.dll.mui| 11.0.9600.18538| 53,760| 12-Nov-2016| 21:39 \nWininet.dll.mui| 11.0.9600.18538| 54,272| 12-Nov-2016| 21:38 \nWininet.dll.mui| 11.0.9600.18538| 54,272| 12-Nov-2016| 21:39 \nWininet.dll.mui| 11.0.9600.18538| 52,736| 12-Nov-2016| 21:38 \nWininet.dll.mui| 11.0.9600.18538| 51,200| 12-Nov-2016| 21:38 \nWininet.dll.mui| 11.0.9600.18538| 53,248| 12-Nov-2016| 21:37 \nWininet.dll.mui| 11.0.9600.18538| 52,736| 12-Nov-2016| 21:37 \nWininet.dll.mui| 11.0.9600.19867| 51,712| 13-Oct-2020| 08:09 \nWininet.dll.mui| 11.0.9600.18538| 50,688| 12-Nov-2016| 21:37 \nWininet.dll.mui| 11.0.9600.18538| 50,688| 12-Nov-2016| 21:27 \nWininet.dll.mui| 11.0.9600.18538| 50,176| 12-Nov-2016| 21:27 \nWininet.dll.mui| 11.0.9600.18538| 50,176| 12-Nov-2016| 21:27 \nWininet.dll.mui| 11.0.9600.18538| 31,232| 12-Nov-2016| 21:27 \nWininet.dll.mui| 11.0.9600.18538| 31,232| 12-Nov-2016| 21:34 \nWininet.dll.mui| 11.0.9600.18538| 31,232| 12-Nov-2016| 21:34 \nHtml.iec| 2019.0.0.19301| 417,280| 26-Feb-2019| 07:31 \nInetcpl.cpl| 11.0.9600.19867| 2,132,992| 13-Oct-2020| 04:31 \nMshtml.dll.mui| 11.0.9600.19404| 307,200| 10-Jul-2019| 05:16 \nMshtml.dll.mui| 11.0.9600.19404| 293,888| 10-Jul-2019| 05:16 \nMshtml.dll.mui| 11.0.9600.19404| 290,304| 10-Jul-2019| 05:16 \nMshtml.dll.mui| 11.0.9600.19404| 289,280| 10-Jul-2019| 05:17 \nMshtml.dll.mui| 11.0.9600.19404| 299,008| 10-Jul-2019| 05:18 \nMshtml.dll.mui| 11.0.9600.19404| 303,104| 10-Jul-2019| 05:15 \nMshtml.dll.mui| 11.0.9600.19404| 282,112| 10-Jul-2019| 05:15 \nMshtml.dll.mui| 11.0.9600.19404| 282,112| 10-Jul-2019| 04:33 \nMshtml.dll.mui| 11.0.9600.19404| 296,960| 10-Jul-2019| 05:15 \nMshtml.dll.mui| 11.0.9600.19404| 283,648| 10-Jul-2019| 05:15 \nMshtml.dll.mui| 11.0.9600.19404| 291,840| 10-Jul-2019| 05:16 \nMshtml.dll.mui| 11.0.9600.19404| 299,520| 10-Jul-2019| 05:18 \nMshtml.dll.mui| 11.0.9600.19404| 275,968| 10-Jul-2019| 05:15 \nMshtml.dll.mui| 11.0.9600.19404| 290,816| 10-Jul-2019| 05:12 \nMshtml.dll.mui| 11.0.9600.19404| 293,376| 10-Jul-2019| 05:12 \nMshtml.dll.mui| 11.0.9600.19404| 296,960| 10-Jul-2019| 07:26 \nMshtml.dll.mui| 11.0.9600.19404| 258,048| 10-Jul-2019| 07:26 \nMshtml.dll.mui| 11.0.9600.19404| 256,512| 10-Jul-2019| 07:25 \nMshtml.dll.mui| 11.0.9600.19404| 289,280| 10-Jul-2019| 07:25 \nMshtml.dll.mui| 11.0.9600.19404| 288,256| 10-Jul-2019| 07:25 \nMshtml.dll.mui| 11.0.9600.19404| 285,184| 10-Jul-2019| 07:25 \nMshtml.dll.mui| 11.0.9600.19404| 295,424| 10-Jul-2019| 07:26 \nMshtml.dll.mui| 11.0.9600.19404| 297,472| 10-Jul-2019| 07:25 \nMshtml.dll.mui| 11.0.9600.19404| 292,864| 10-Jul-2019| 05:12 \nMshtml.dll.mui| 11.0.9600.19404| 295,424| 10-Jul-2019| 05:13 \nMshtml.dll.mui| 11.0.9600.19404| 294,400| 10-Jul-2019| 05:12 \nMshtml.dll.mui| 11.0.9600.19404| 294,400| 10-Jul-2019| 05:12 \nMshtml.dll.mui| 11.0.9600.19404| 292,864| 10-Jul-2019| 05:12 \nMshtml.dll.mui| 11.0.9600.19404| 290,816| 10-Jul-2019| 05:12 \nMshtml.dll.mui| 11.0.9600.19867| 290,816| 13-Oct-2020| 08:09 \nMshtml.dll.mui| 11.0.9600.19404| 286,208| 10-Jul-2019| 05:13 \nMshtml.dll.mui| 11.0.9600.19404| 281,600| 10-Jul-2019| 05:06 \nMshtml.dll.mui| 11.0.9600.19404| 286,720| 10-Jul-2019| 05:04 \nMshtml.dll.mui| 11.0.9600.19404| 292,352| 10-Jul-2019| 05:04 \nMshtml.dll.mui| 11.0.9600.19404| 242,176| 10-Jul-2019| 05:04 \nMshtml.dll.mui| 11.0.9600.19404| 243,200| 10-Jul-2019| 05:16 \nMshtml.dll.mui| 11.0.9600.19404| 243,200| 10-Jul-2019| 05:17 \nF12resources.dll.mui| 11.0.9600.17278| 73,728| 16-Aug-2014| 11:58 \nF12resources.dll.mui| 11.0.9600.17278| 67,584| 16-Aug-2014| 11:59 \nF12resources.dll.mui| 11.0.9600.17278| 67,584| 16-Aug-2014| 11:58 \nF12resources.dll.mui| 11.0.9600.17278| 74,240| 16-Aug-2014| 12:00 \nF12resources.dll.mui| 11.0.9600.17278| 78,848| 16-Aug-2014| 11:58 \nF12resources.dll.mui| 11.0.9600.17278| 61,440| 16-Aug-2014| 11:59 \nF12resources.dll.mui| 11.0.9600.17278| 61,440| 16-Aug-2014| 03:19 \nF12resources.dll.mui| 11.0.9600.17278| 74,752| 16-Aug-2014| 12:00 \nF12resources.dll.mui| 11.0.9600.17278| 62,464| 16-Aug-2014| 11:58 \nF12resources.dll.mui| 11.0.9600.17278| 68,096| 16-Aug-2014| 12:04 \nF12resources.dll.mui| 11.0.9600.17278| 75,264| 16-Aug-2014| 12:02 \nF12resources.dll.mui| 11.0.9600.17278| 68,608| 16-Aug-2014| 12:01 \nF12resources.dll.mui| 11.0.9600.17278| 71,680| 16-Aug-2014| 12:03 \nF12resources.dll.mui| 11.0.9600.17278| 73,216| 16-Aug-2014| 12:03 \nF12resources.dll.mui| 11.0.9600.17278| 41,472| 16-Aug-2014| 12:03 \nF12resources.dll.mui| 11.0.9600.17278| 37,888| 16-Aug-2014| 12:03 \nF12resources.dll.mui| 11.0.9600.17278| 68,608| 16-Aug-2014| 12:02 \nF12resources.dll.mui| 11.0.9600.17278| 67,584| 16-Aug-2014| 12:01 \nF12resources.dll.mui| 11.0.9600.17278| 65,536| 16-Aug-2014| 12:02 \nF12resources.dll.mui| 11.0.9600.17278| 74,240| 16-Aug-2014| 12:03 \nF12resources.dll.mui| 11.0.9600.17278| 70,656| 16-Aug-2014| 12:02 \nF12resources.dll.mui| 11.0.9600.17278| 71,168| 16-Aug-2014| 12:02 \nF12resources.dll.mui| 11.0.9600.17278| 71,680| 16-Aug-2014| 12:03 \nF12resources.dll.mui| 11.0.9600.17278| 71,168| 16-Aug-2014| 12:02 \nF12resources.dll.mui| 11.0.9600.17278| 69,632| 16-Aug-2014| 12:03 \nF12resources.dll.mui| 11.0.9600.17278| 68,096| 16-Aug-2014| 12:03 \nF12resources.dll.mui| 11.0.9600.17278| 68,608| 16-Aug-2014| 12:03 \nF12resources.dll.mui| 11.0.9600.19867| 68,096| 13-Oct-2020| 08:08 \nF12resources.dll.mui| 11.0.9600.17278| 65,536| 16-Aug-2014| 12:03 \nF12resources.dll.mui| 11.0.9600.17278| 59,904| 16-Aug-2014| 12:03 \nF12resources.dll.mui| 11.0.9600.17278| 65,536| 16-Aug-2014| 12:04 \nF12resources.dll.mui| 11.0.9600.17278| 69,120| 16-Aug-2014| 12:03 \nF12resources.dll.mui| 11.0.9600.17278| 29,696| 16-Aug-2014| 12:03 \nF12resources.dll.mui| 11.0.9600.17278| 30,720| 16-Aug-2014| 11:58 \nF12resources.dll.mui| 11.0.9600.17278| 30,720| 16-Aug-2014| 11:59 \nJavascriptcollectionagent.dll| 11.0.9600.17416| 77,824| 31-Oct-2014| 04:30 \nDiagnosticshub.scriptedsandboxplugin.dll| 11.0.9600.19750| 276,480| 11-Jun-2020| 03:26 \nUrlmon.dll.mui| 11.0.9600.18378| 46,080| 11-Jun-2016| 20:20 \nUrlmon.dll.mui| 11.0.9600.18378| 50,176| 11-Jun-2016| 20:20 \nUrlmon.dll.mui| 11.0.9600.18378| 48,640| 11-Jun-2016| 20:20 \nUrlmon.dll.mui| 11.0.9600.18378| 49,664| 11-Jun-2016| 20:20 \nUrlmon.dll.mui| 11.0.9600.18378| 51,712| 11-Jun-2016| 20:20 \nUrlmon.dll.mui| 11.0.9600.18378| 54,272| 11-Jun-2016| 20:12 \nUrlmon.dll.mui| 11.0.9600.18378| 48,128| 11-Jun-2016| 20:12 \nUrlmon.dll.mui| 11.0.9600.18378| 48,128| 11-Jun-2016| 19:08 \nUrlmon.dll.mui| 11.0.9600.18378| 50,176| 11-Jun-2016| 20:12 \nUrlmon.dll.mui| 11.0.9600.18378| 47,616| 11-Jun-2016| 20:12 \nUrlmon.dll.mui| 11.0.9600.18378| 49,152| 11-Jun-2016| 20:12 \nUrlmon.dll.mui| 11.0.9600.18378| 50,688| 11-Jun-2016| 20:20 \nUrlmon.dll.mui| 11.0.9600.18378| 45,056| 11-Jun-2016| 20:12 \nUrlmon.dll.mui| 11.0.9600.18378| 49,152| 11-Jun-2016| 20:12 \nUrlmon.dll.mui| 11.0.9600.18378| 49,152| 11-Jun-2016| 20:12 \nUrlmon.dll.mui| 11.0.9600.18378| 49,664| 11-Jun-2016| 20:19 \nUrlmon.dll.mui| 11.0.9600.18378| 39,936| 11-Jun-2016| 20:19 \nUrlmon.dll.mui| 11.0.9600.18378| 39,424| 11-Jun-2016| 20:19 \nUrlmon.dll.mui| 11.0.9600.18378| 47,616| 11-Jun-2016| 20:19 \nUrlmon.dll.mui| 11.0.9600.18378| 47,616| 11-Jun-2016| 20:19 \nUrlmon.dll.mui| 11.0.9600.18378| 48,640| 11-Jun-2016| 20:20 \nUrlmon.dll.mui| 11.0.9600.18378| 51,200| 11-Jun-2016| 20:19 \nUrlmon.dll.mui| 11.0.9600.18378| 50,688| 11-Jun-2016| 20:19 \nUrlmon.dll.mui| 11.0.9600.18378| 49,152| 11-Jun-2016| 20:12 \nUrlmon.dll.mui| 11.0.9600.18378| 50,176| 11-Jun-2016| 20:12 \nUrlmon.dll.mui| 11.0.9600.18378| 49,152| 11-Jun-2016| 20:12 \nUrlmon.dll.mui| 11.0.9600.18378| 48,640| 11-Jun-2016| 20:12 \nUrlmon.dll.mui| 11.0.9600.18378| 49,664| 11-Jun-2016| 20:12 \nUrlmon.dll.mui| 11.0.9600.18378| 48,640| 11-Jun-2016| 20:12 \nUrlmon.dll.mui| 11.0.9600.19867| 49,664| 13-Oct-2020| 08:08 \nUrlmon.dll.mui| 11.0.9600.18378| 48,640| 11-Jun-2016| 20:12 \nUrlmon.dll.mui| 11.0.9600.18378| 48,128| 11-Jun-2016| 20:14 \nUrlmon.dll.mui| 11.0.9600.18378| 49,152| 11-Jun-2016| 20:15 \nUrlmon.dll.mui| 11.0.9600.18378| 48,128| 11-Jun-2016| 20:15 \nUrlmon.dll.mui| 11.0.9600.18378| 35,328| 11-Jun-2016| 20:15 \nUrlmon.dll.mui| 11.0.9600.18378| 35,328| 11-Jun-2016| 20:20 \nUrlmon.dll.mui| 11.0.9600.18378| 35,328| 11-Jun-2016| 20:20 \nJsproxy.dll| 11.0.9600.17416| 54,784| 31-Oct-2014| 04:57 \nWininet.dll| 11.0.9600.19867| 4,859,904| 13-Oct-2020| 04:20 \nInetcpl.cpl.mui| 11.0.9600.18817| 114,176| 08-Sep-2017| 00:18 \nInetcpl.cpl.mui| 11.0.9600.18817| 130,560| 08-Sep-2017| 00:16 \nInetcpl.cpl.mui| 11.0.9600.18817| 124,928| 08-Sep-2017| 00:17 \nInetcpl.cpl.mui| 11.0.9600.18817| 122,880| 08-Sep-2017| 00:17 \nInetcpl.cpl.mui| 11.0.9600.18817| 130,048| 08-Sep-2017| 00:17 \nInetcpl.cpl.mui| 11.0.9600.18817| 138,240| 08-Sep-2017| 00:39 \nInetcpl.cpl.mui| 11.0.9600.18817| 114,688| 08-Sep-2017| 00:38 \nInetcpl.cpl.mui| 11.0.9600.18666| 114,688| 16-Apr-2017| 09:49 \nInetcpl.cpl.mui| 11.0.9600.18817| 131,584| 08-Sep-2017| 00:38 \nInetcpl.cpl.mui| 11.0.9600.18817| 117,760| 08-Sep-2017| 00:39 \nInetcpl.cpl.mui| 11.0.9600.18817| 122,368| 08-Sep-2017| 00:40 \nInetcpl.cpl.mui| 11.0.9600.18817| 134,144| 08-Sep-2017| 00:17 \nInetcpl.cpl.mui| 11.0.9600.18817| 107,008| 08-Sep-2017| 00:40 \nInetcpl.cpl.mui| 11.0.9600.18838| 123,392| 14-Oct-2017| 09:53 \nInetcpl.cpl.mui| 11.0.9600.18817| 127,488| 08-Sep-2017| 00:36 \nInetcpl.cpl.mui| 11.0.9600.18817| 128,512| 08-Sep-2017| 00:21 \nInetcpl.cpl.mui| 11.0.9600.18817| 88,064| 08-Sep-2017| 00:19 \nInetcpl.cpl.mui| 11.0.9600.18838| 82,944| 14-Oct-2017| 09:53 \nInetcpl.cpl.mui| 11.0.9600.18817| 125,440| 08-Sep-2017| 00:18 \nInetcpl.cpl.mui| 11.0.9600.18817| 123,392| 08-Sep-2017| 00:18 \nInetcpl.cpl.mui| 11.0.9600.18817| 120,320| 08-Sep-2017| 00:21 \nInetcpl.cpl.mui| 11.0.9600.18817| 130,560| 08-Sep-2017| 00:18 \nInetcpl.cpl.mui| 11.0.9600.18817| 129,024| 08-Sep-2017| 00:19 \nInetcpl.cpl.mui| 11.0.9600.18817| 125,952| 07-Sep-2017| 23:17 \nInetcpl.cpl.mui| 11.0.9600.18817| 129,024| 07-Sep-2017| 23:17 \nInetcpl.cpl.mui| 11.0.9600.18817| 128,000| 07-Sep-2017| 23:16 \nInetcpl.cpl.mui| 11.0.9600.18817| 123,904| 07-Sep-2017| 23:17 \nInetcpl.cpl.mui| 11.0.9600.18817| 129,024| 07-Sep-2017| 23:18 \nInetcpl.cpl.mui| 11.0.9600.18817| 123,904| 07-Sep-2017| 23:16 \nInetcpl.cpl.mui| 11.0.9600.19867| 124,416| 13-Oct-2020| 08:08 \nInetcpl.cpl.mui| 11.0.9600.18817| 121,856| 07-Sep-2017| 23:18 \nInetcpl.cpl.mui| 11.0.9600.18817| 115,712| 07-Sep-2017| 23:13 \nInetcpl.cpl.mui| 11.0.9600.18817| 123,904| 07-Sep-2017| 23:14 \nInetcpl.cpl.mui| 11.0.9600.18817| 125,440| 07-Sep-2017| 23:13 \nInetcpl.cpl.mui| 11.0.9600.18817| 74,752| 07-Sep-2017| 23:13 \nInetcpl.cpl.mui| 11.0.9600.18817| 75,776| 08-Sep-2017| 00:16 \nInetcpl.cpl.mui| 11.0.9600.18817| 75,776| 08-Sep-2017| 00:17 \nIeui.dll| 11.0.9600.19650| 615,936| 11-Feb-2020| 13:38 \nIedkcs32.dll| 18.0.9600.19867| 381,952| 13-Oct-2020| 04:33 \nInstall.ins| Not applicable| 464| 13-Oct-2020| 02:28 \nIeapfltr.dat| 10.0.9301.0| 616,104| 24-Sep-2013| 02:22 \nIeapfltr.dll| 11.0.9600.19867| 801,280| 13-Oct-2020| 03:59 \nIepeers.dll| 11.0.9600.19867| 145,408| 13-Oct-2020| 04:46 \nLicmgr10.dll| 11.0.9600.17416| 33,280| 31-Oct-2014| 04:40 \nTdc.ocx| 11.0.9600.19750| 88,064| 11-Jun-2020| 03:24 \nDiagnosticshub.datawarehouse.dll| 11.0.9600.18895| 666,624| 02-Jan-2018| 05:32 \nIedvtool.dll| 11.0.9600.19867| 950,784| 13-Oct-2020| 06:57 \nDiagnosticshub_is.dll| 11.0.9600.17416| 49,664| 31-Oct-2014| 05:13 \nDxtmsft.dll| 11.0.9600.18895| 489,984| 02-Jan-2018| 05:06 \nDxtrans.dll| 11.0.9600.19867| 315,904| 13-Oct-2020| 04:46 \nEscmigplugin.dll| 11.0.9600.19326| 123,904| 26-Mar-2019| 05:38 \nEscunattend.exe| 11.0.9600.19326| 87,040| 26-Mar-2019| 05:54 \nMicrosoft-windows-ie-f12-provider.ptxml| Not applicable| 11,892| 15-Aug-2014| 22:51 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:59 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:59 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:59 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:59 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 12:00 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:59 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 03:19 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:59 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 11:58 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 12:04 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 12:02 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 12:01 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 12:02 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 12:02 \nF12.dll.mui| 11.0.9600.17278| 3,584| 16-Aug-2014| 12:02 \nF12.dll.mui| 11.0.9600.17278| 3,584| 16-Aug-2014| 12:03 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 12:01 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 12:01 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 12:03 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 12:02 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 12:02 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 12:02 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 12:04 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 12:01 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 12:04 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 12:03 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 12:03 \nF12.dll.mui| 11.0.9600.19867| 4,096| 13-Oct-2020| 08:09 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 12:03 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 12:03 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 12:03 \nF12.dll.mui| 11.0.9600.17278| 4,096| 16-Aug-2014| 12:03 \nF12.dll.mui| 11.0.9600.17278| 3,584| 16-Aug-2014| 12:03 \nF12.dll.mui| 11.0.9600.17278| 3,584| 16-Aug-2014| 11:58 \nF12.dll.mui| 11.0.9600.17278| 3,584| 16-Aug-2014| 11:58 \nDiagnosticstap.dll| 11.0.9600.19724| 244,224| 20-May-2020| 12:01 \nF12resources.dll| 11.0.9600.17496| 10,949,120| 22-Nov-2014| 03:00 \nF12tools.dll| 11.0.9600.19846| 372,224| 24-Sep-2020| 04:01 \nF12.dll| 11.0.9600.19846| 1,422,336| 24-Sep-2020| 03:48 \nMsfeeds.dll| 11.0.9600.19867| 809,472| 13-Oct-2020| 04:33 \nMsfeeds.mof| Not applicable| 1,518| 06-Feb-2014| 05:54 \nMsfeedsbs.dll| 11.0.9600.19650| 60,416| 11-Feb-2020| 13:16 \nMsfeedsbs.mof| Not applicable| 1,574| 22-Aug-2013| 06:54 \nMsfeedssync.exe| 11.0.9600.17416| 12,800| 31-Oct-2014| 05:08 \nMshta.exe| 11.0.9600.17416| 13,824| 31-Oct-2014| 05:12 \nMshtmled.dll| 11.0.9600.19867| 92,672| 13-Oct-2020| 04:48 \nMicrosoft-windows-ie-htmlrendering.ptxml| Not applicable| 3,228| 06-Feb-2014| 05:41 \nMshtml.dll| 11.0.9600.19867| 25,758,208| 13-Oct-2020| 06:57 \nMshtml.tlb| 11.0.9600.16518| 2,724,864| 06-Feb-2014| 11:30 \nIeadvpack.dll| 11.0.9600.17416| 132,096| 31-Oct-2014| 04:54 \nIeetwcollector.exe| 11.0.9600.18895| 116,224| 02-Jan-2018| 05:17 \nIeetwcollectorres.dll| 11.0.9600.16518| 4,096| 06-Feb-2014| 11:30 \nIeetwproxystub.dll| 11.0.9600.18895| 48,640| 02-Jan-2018| 05:28 \nIelowutil.exe| 11.0.9600.17416| 222,720| 31-Oct-2014| 04:55 \nIeproxy.dll| 11.0.9600.19846| 857,600| 24-Sep-2020| 03:00 \nIeshims.dll| 11.0.9600.19650| 387,072| 11-Feb-2020| 12:29 \nIexpress.exe| 11.0.9600.17416| 167,424| 31-Oct-2014| 05:10 \nWextract.exe| 11.0.9600.17416| 143,872| 31-Oct-2014| 05:12 \nImgutil.dll| 11.0.9600.17416| 51,200| 31-Oct-2014| 03:42 \nBing.ico| Not applicable| 5,430| 24-Sep-2013| 02:51 \nIeunatt.exe| 11.0.9600.17416| 144,384| 31-Oct-2014| 04:51 \nMicrosoft-windows-ie-internetexplorer-ppdlic.xrm-ms| Not applicable| 2,956| 13-Oct-2020| 07:30 \nWindows feed discovered.wav| Not applicable| 19,884| 24-Sep-2013| 03:25 \nWindows information bar.wav| Not applicable| 23,308| 24-Sep-2013| 03:25 \nWindows navigation start.wav| Not applicable| 11,340| 24-Sep-2013| 03:25 \nWindows pop-up blocked.wav| Not applicable| 85,548| 24-Sep-2013| 03:25 \nJsdbgui.dll| 11.0.9600.19404| 591,360| 10-Jul-2019| 03:12 \nJsprofilerui.dll| 11.0.9600.18895| 628,736| 02-Jan-2018| 04:56 \nMemoryanalyzer.dll| 11.0.9600.19750| 1,862,144| 11-Jun-2020| 03:39 \nMshtmldac.dll| 11.0.9600.19846| 88,064| 24-Sep-2020| 04:25 \nNetworkinspection.dll| 11.0.9600.19867| 1,217,024| 13-Oct-2020| 04:43 \nDesktop.ini| Not applicable| 65| 18-Jun-2013| 14:43 \nOccache.dll| 11.0.9600.17416| 152,064| 31-Oct-2014| 04:19 \nDesktop.ini| Not applicable| 65| 18-Jun-2013| 14:44 \nWebcheck.dll| 11.0.9600.19867| 262,144| 13-Oct-2020| 04:35 \nMsdbg2.dll| 12.0.41202.0| 403,592| 30-Sep-2014| 23:01 \nPdm.dll| 12.0.41202.0| 579,192| 30-Sep-2014| 23:01 \nPdmproxy100.dll| 12.0.41202.0| 107,152| 30-Sep-2014| 23:01 \nIcrav03.rat| Not applicable| 8,798| 24-Sep-2013| 02:32 \nMsrating.dll| 11.0.9600.18895| 199,680| 02-Jan-2018| 04:56 \nTicrf.rat| Not applicable| 1,988| 24-Sep-2013| 02:32 \nIertutil.dll| 11.0.9600.19867| 2,915,840| 13-Oct-2020| 05:22 \nIe4uinit.exe| 11.0.9600.19846| 728,064| 24-Sep-2020| 03:39 \nIernonce.dll| 11.0.9600.17416| 34,304| 31-Oct-2014| 04:56 \nIesetup.dll| 11.0.9600.17416| 66,560| 31-Oct-2014| 05:06 \nInseng.dll| 11.0.9600.19101| 107,520| 19-Jul-2018| 04:03 \nIesysprep.dll| 11.0.9600.17416| 111,616| 31-Oct-2014| 04:29 \nTimeline.dll| 11.0.9600.19724| 219,136| 20-May-2020| 11:55 \nTimeline.cpu.xml| Not applicable| 3,197| 24-Jul-2014| 18:58 \nTimeline_is.dll| 11.0.9600.17416| 171,008| 31-Oct-2014| 04:56 \nVgx.dll| 11.0.9600.19867| 1,018,368| 13-Oct-2020| 04:48 \nUrl.dll| 11.0.9600.17416| 237,568| 31-Oct-2014| 05:06 \nIeframe.dll.mui| 11.0.9600.19846| 2,066,432| 24-Sep-2020| 07:14 \nIeframe.dll.mui| 11.0.9600.19846| 2,121,216| 24-Sep-2020| 07:14 \nIeframe.dll.mui| 11.0.9600.19846| 2,075,136| 24-Sep-2020| 07:14 \nIeframe.dll.mui| 11.0.9600.19846| 2,063,872| 24-Sep-2020| 07:14 \nIeframe.dll.mui| 11.0.9600.19846| 2,314,240| 24-Sep-2020| 07:14 \nIeframe.dll.mui| 11.0.9600.19846| 2,390,528| 24-Sep-2020| 07:14 \nIeframe.dll.mui| 11.0.9600.19846| 2,034,176| 24-Sep-2020| 07:14 \nIeframe.dll.mui| 11.0.9600.19846| 2,033,152| 24-Sep-2020| 06:22 \nIeframe.dll.mui| 11.0.9600.19846| 2,307,584| 24-Sep-2020| 07:13 \nIeframe.dll.mui| 11.0.9600.19846| 2,255,872| 24-Sep-2020| 07:13 \nIeframe.dll.mui| 11.0.9600.19846| 2,061,312| 24-Sep-2020| 07:14 \nIeframe.dll.mui| 11.0.9600.19846| 2,326,016| 24-Sep-2020| 07:14 \nIeframe.dll.mui| 11.0.9600.19846| 2,019,840| 24-Sep-2020| 07:14 \nIeframe.dll.mui| 11.0.9600.19846| 2,071,040| 24-Sep-2020| 07:14 \nIeframe.dll.mui| 11.0.9600.19846| 2,082,816| 24-Sep-2020| 07:14 \nIeframe.dll.mui| 11.0.9600.19846| 2,307,584| 24-Sep-2020| 07:18 \nIeframe.dll.mui| 11.0.9600.19846| 2,170,368| 24-Sep-2020| 07:17 \nIeframe.dll.mui| 11.0.9600.19846| 2,153,984| 24-Sep-2020| 07:17 \nIeframe.dll.mui| 11.0.9600.19846| 2,291,712| 24-Sep-2020| 07:15 \nIeframe.dll.mui| 11.0.9600.19846| 2,283,520| 24-Sep-2020| 07:16 \nIeframe.dll.mui| 11.0.9600.19846| 2,052,096| 24-Sep-2020| 07:17 \nIeframe.dll.mui| 11.0.9600.19846| 2,301,952| 24-Sep-2020| 07:17 \nIeframe.dll.mui| 11.0.9600.19846| 2,093,056| 24-Sep-2020| 07:18 \nIeframe.dll.mui| 11.0.9600.19846| 2,075,648| 24-Sep-2020| 07:11 \nIeframe.dll.mui| 11.0.9600.19846| 2,299,392| 24-Sep-2020| 07:10 \nIeframe.dll.mui| 11.0.9600.19846| 2,094,592| 24-Sep-2020| 07:10 \nIeframe.dll.mui| 11.0.9600.19846| 2,316,800| 24-Sep-2020| 07:12 \nIeframe.dll.mui| 11.0.9600.19846| 2,305,536| 24-Sep-2020| 07:10 \nIeframe.dll.mui| 11.0.9600.19846| 2,278,912| 24-Sep-2020| 07:11 \nIeframe.dll.mui| 11.0.9600.19867| 2,286,080| 13-Oct-2020| 08:11 \nIeframe.dll.mui| 11.0.9600.19846| 2,060,288| 24-Sep-2020| 07:11 \nIeframe.dll.mui| 11.0.9600.19846| 2,315,776| 24-Sep-2020| 07:13 \nIeframe.dll.mui| 11.0.9600.19846| 2,278,912| 24-Sep-2020| 07:13 \nIeframe.dll.mui| 11.0.9600.19846| 2,324,992| 24-Sep-2020| 07:13 \nIeframe.dll.mui| 11.0.9600.19846| 2,098,176| 24-Sep-2020| 07:13 \nIeframe.dll.mui| 11.0.9600.19846| 1,890,304| 24-Sep-2020| 07:14 \nIeframe.dll.mui| 11.0.9600.19846| 1,890,304| 24-Sep-2020| 07:14 \nIeframe.dll| 11.0.9600.19867| 15,494,144| 13-Oct-2020| 04:32 \nIeframe.ptxml| Not applicable| 24,486| 06-Feb-2014| 05:41 \nIeinstal.exe| 11.0.9600.18639| 492,032| 25-Mar-2017| 17:20 \nInetres.adml| Not applicable| 524,733| 13-Oct-2020| 08:09 \nInetres.adml| Not applicable| 498,151| 13-Oct-2020| 08:11 \nInetres.adml| Not applicable| 550,745| 13-Oct-2020| 08:10 \nInetres.adml| Not applicable| 942,143| 13-Oct-2020| 08:10 \nInetres.adml| Not applicable| 456,165| 13-Oct-2020| 07:18 \nInetres.adml| Not applicable| 542,443| 13-Oct-2020| 08:10 \nInetres.adml| Not applicable| 524,999| 13-Oct-2020| 08:10 \nInetres.adml| Not applicable| 574,243| 13-Oct-2020| 08:10 \nInetres.adml| Not applicable| 569,173| 13-Oct-2020| 08:10 \nInetres.adml| Not applicable| 546,643| 13-Oct-2020| 08:13 \nInetres.adml| Not applicable| 637,356| 13-Oct-2020| 08:13 \nInetres.adml| Not applicable| 523,880| 13-Oct-2020| 08:14 \nInetres.adml| Not applicable| 487,001| 13-Oct-2020| 08:14 \nInetres.adml| Not applicable| 546,980| 13-Oct-2020| 08:14 \nInetres.adml| Not applicable| 557,656| 13-Oct-2020| 08:14 \nInetres.adml| Not applicable| 533,510| 13-Oct-2020| 08:12 \nInetres.adml| Not applicable| 539,964| 13-Oct-2020| 08:12 \nInetres.adml| Not applicable| 802,394| 13-Oct-2020| 08:10 \nInetres.adml| Not applicable| 502,367| 13-Oct-2020| 08:08 \nInetres.adml| Not applicable| 519,994| 13-Oct-2020| 07:59 \nInetres.adml| Not applicable| 418,707| 13-Oct-2020| 08:00 \nInetres.adml| Not applicable| 435,257| 13-Oct-2020| 08:09 \nInetres.adml| Not applicable| 435,257| 13-Oct-2020| 08:10 \nInetres.admx| Not applicable| 1,676,517| 07-Oct-2020| 15:22 \nInetcomm.dll| 6.3.9600.19867| 1,033,216| 13-Oct-2020| 04:41 \nInetres.dll| 6.3.9600.16384| 84,480| 22-Aug-2013| 11:43 \nJscript9.dll| 11.0.9600.19867| 5,499,392| 13-Oct-2020| 05:10 \nJscript9diag.dll| 11.0.9600.19101| 814,080| 19-Jul-2018| 04:21 \nJscript.dll| 5.8.9600.19867| 785,408| 13-Oct-2020| 05:09 \nVbscript.dll| 5.8.9600.19867| 581,120| 13-Oct-2020| 05:20 \nIexplore.exe| 11.0.9600.19036| 817,296| 25-May-2018| 05:24 \nHtml.iec| 2019.0.0.18895| 341,504| 02-Jan-2018| 04:51 \nIeui.dll| 11.0.9600.18895| 476,160| 02-Jan-2018| 04:44 \nIepeers.dll| 11.0.9600.19867| 128,000| 13-Oct-2020| 04:18 \nTdc.ocx| 11.0.9600.19750| 73,216| 11-Jun-2020| 03:02 \nDxtmsft.dll| 11.0.9600.18895| 416,256| 02-Jan-2018| 04:34 \nDxtrans.dll| 11.0.9600.19867| 279,552| 13-Oct-2020| 04:18 \nMsfeeds.dll| 11.0.9600.19867| 696,320| 13-Oct-2020| 04:10 \nMsfeeds.mof| Not applicable| 1,518| 06-Feb-2014| 05:53 \nMshta.exe| 11.0.9600.17416| 12,800| 31-Oct-2014| 03:28 \nMshtmled.dll| 11.0.9600.19867| 76,800| 13-Oct-2020| 04:19 \nMshtml.dll| 11.0.9600.19867| 20,293,632| 13-Oct-2020| 04:59 \nMshtml.tlb| 11.0.9600.16518| 2,724,864| 06-Feb-2014| 10:20 \nWow64_microsoft-windows-ie-htmlrendering.ptxml| Not applicable| 3,228| 06-Feb-2014| 05:43 \nIeetwproxystub.dll| 11.0.9600.17416| 47,616| 31-Oct-2014| 03:23 \nIeunatt.exe| 11.0.9600.17416| 115,712| 31-Oct-2014| 03:12 \nOccache.dll| 11.0.9600.17416| 130,048| 31-Oct-2014| 02:48 \nWebcheck.dll| 11.0.9600.19867| 230,400| 13-Oct-2020| 04:11 \nIernonce.dll| 11.0.9600.17416| 30,720| 31-Oct-2014| 03:15 \nIesetup.dll| 11.0.9600.17416| 62,464| 31-Oct-2014| 03:24 \nIesysprep.dll| 11.0.9600.17416| 90,624| 31-Oct-2014| 02:56 \nIe9props.propdesc| Not applicable| 2,843| 24-Sep-2013| 02:34 \nIeframe.dll| 11.0.9600.19867| 13,873,664| 13-Oct-2020| 04:09 \nWow64_ieframe.ptxml| Not applicable| 24,486| 06-Feb-2014| 05:43 \nJscript9.dll| 11.0.9600.19867| 4,112,384| 13-Oct-2020| 04:12 \nJscript9diag.dll| 11.0.9600.19101| 620,032| 19-Jul-2018| 03:54 \nJscript.dll| 5.8.9600.19867| 653,824| 13-Oct-2020| 04:35 \nVbscript.dll| 5.8.9600.19867| 498,176| 13-Oct-2020| 04:45 \nActxprxy.dll| 6.3.9600.19301| 1,049,600| 26-Feb-2019| 06:20 \nHlink.dll| 6.3.9600.19101| 99,328| 19-Jul-2018| 03:55 \nPngfilt.dll| 11.0.9600.17416| 57,344| 31-Oct-2014| 03:26 \nUrlmon.dll| 11.0.9600.19867| 1,342,976| 13-Oct-2020| 03:48 \nWininetplugin.dll| 6.3.9600.17416| 35,328| 31-Oct-2014| 03:12 \nWininet.dll.mui| 11.0.9600.18538| 46,592| 12-Nov-2016| 21:31 \nWininet.dll.mui| 11.0.9600.18538| 52,736| 12-Nov-2016| 21:30 \nWininet.dll.mui| 11.0.9600.18538| 51,200| 12-Nov-2016| 21:30 \nWininet.dll.mui| 11.0.9600.18538| 51,200| 12-Nov-2016| 21:30 \nWininet.dll.mui| 11.0.9600.18538| 56,320| 12-Nov-2016| 21:30 \nWininet.dll.mui| 11.0.9600.18538| 57,856| 12-Nov-2016| 21:32 \nWininet.dll.mui| 11.0.9600.18538| 49,664| 12-Nov-2016| 21:32 \nWininet.dll.mui| 11.0.9600.18538| 49,664| 12-Nov-2016| 19:17 \nWininet.dll.mui| 11.0.9600.18538| 54,272| 12-Nov-2016| 21:32 \nWininet.dll.mui| 11.0.9600.18538| 47,616| 12-Nov-2016| 21:32 \nWininet.dll.mui| 11.0.9600.18538| 49,152| 12-Nov-2016| 21:32 \nWininet.dll.mui| 11.0.9600.18538| 55,296| 12-Nov-2016| 21:30 \nWininet.dll.mui| 11.0.9600.18538| 45,056| 12-Nov-2016| 21:32 \nWininet.dll.mui| 11.0.9600.18538| 51,712| 12-Nov-2016| 21:32 \nWininet.dll.mui| 11.0.9600.18538| 51,712| 12-Nov-2016| 21:32 \nWininet.dll.mui| 11.0.9600.18538| 53,248| 12-Nov-2016| 21:32 \nWininet.dll.mui| 11.0.9600.18538| 39,424| 12-Nov-2016| 21:32 \nWininet.dll.mui| 11.0.9600.18538| 35,840| 12-Nov-2016| 21:32 \nWininet.dll.mui| 11.0.9600.18538| 50,176| 12-Nov-2016| 21:31 \nWininet.dll.mui| 11.0.9600.18538| 51,200| 12-Nov-2016| 21:31 \nWininet.dll.mui| 11.0.9600.18538| 50,688| 12-Nov-2016| 21:31 \nWininet.dll.mui| 11.0.9600.18538| 52,736| 12-Nov-2016| 21:31 \nWininet.dll.mui| 11.0.9600.18538| 53,760| 12-Nov-2016| 21:31 \nWininet.dll.mui| 11.0.9600.18538| 54,272| 12-Nov-2016| 20:30 \nWininet.dll.mui| 11.0.9600.18538| 54,272| 12-Nov-2016| 20:29 \nWininet.dll.mui| 11.0.9600.18538| 52,736| 12-Nov-2016| 20:30 \nWininet.dll.mui| 11.0.9600.18538| 51,200| 12-Nov-2016| 20:29 \nWininet.dll.mui| 11.0.9600.18538| 53,248| 12-Nov-2016| 20:30 \nWininet.dll.mui| 11.0.9600.18538| 52,736| 12-Nov-2016| 20:30 \nWininet.dll.mui| 11.0.9600.19867| 51,712| 13-Oct-2020| 06:36 \nWininet.dll.mui| 11.0.9600.18538| 50,688| 12-Nov-2016| 20:30 \nWininet.dll.mui| 11.0.9600.18538| 50,688| 12-Nov-2016| 20:27 \nWininet.dll.mui| 11.0.9600.18538| 50,176| 12-Nov-2016| 20:28 \nWininet.dll.mui| 11.0.9600.18538| 50,176| 12-Nov-2016| 20:28 \nWininet.dll.mui| 11.0.9600.18538| 31,232| 12-Nov-2016| 20:28 \nWininet.dll.mui| 11.0.9600.18538| 31,232| 12-Nov-2016| 21:30 \nWininet.dll.mui| 11.0.9600.18538| 31,232| 12-Nov-2016| 21:30 \nInetcpl.cpl| 11.0.9600.19867| 2,058,752| 13-Oct-2020| 04:09 \nMshtml.dll.mui| 11.0.9600.19404| 307,200| 10-Jul-2019| 04:50 \nMshtml.dll.mui| 11.0.9600.19404| 293,888| 10-Jul-2019| 04:50 \nMshtml.dll.mui| 11.0.9600.19404| 290,304| 10-Jul-2019| 04:52 \nMshtml.dll.mui| 11.0.9600.19404| 289,280| 10-Jul-2019| 04:50 \nMshtml.dll.mui| 11.0.9600.19404| 299,008| 10-Jul-2019| 04:50 \nMshtml.dll.mui| 11.0.9600.19404| 303,104| 10-Jul-2019| 04:50 \nMshtml.dll.mui| 11.0.9600.19404| 282,112| 10-Jul-2019| 04:49 \nMshtml.dll.mui| 11.0.9600.19404| 282,112| 10-Jul-2019| 03:58 \nMshtml.dll.mui| 11.0.9600.19404| 296,960| 10-Jul-2019| 04:51 \nMshtml.dll.mui| 11.0.9600.19404| 283,648| 10-Jul-2019| 04:50 \nMshtml.dll.mui| 11.0.9600.19404| 291,840| 10-Jul-2019| 04:50 \nMshtml.dll.mui| 11.0.9600.19404| 299,520| 10-Jul-2019| 04:50 \nMshtml.dll.mui| 11.0.9600.19404| 275,968| 10-Jul-2019| 04:51 \nMshtml.dll.mui| 11.0.9600.19404| 290,816| 10-Jul-2019| 04:49 \nMshtml.dll.mui| 11.0.9600.19404| 293,376| 10-Jul-2019| 04:49 \nMshtml.dll.mui| 11.0.9600.19404| 296,960| 10-Jul-2019| 04:53 \nMshtml.dll.mui| 11.0.9600.19404| 258,048| 10-Jul-2019| 04:53 \nMshtml.dll.mui| 11.0.9600.19404| 256,512| 10-Jul-2019| 04:52 \nMshtml.dll.mui| 11.0.9600.19404| 289,280| 10-Jul-2019| 04:51 \nMshtml.dll.mui| 11.0.9600.19404| 288,256| 10-Jul-2019| 04:53 \nMshtml.dll.mui| 11.0.9600.19404| 285,184| 10-Jul-2019| 04:53 \nMshtml.dll.mui| 11.0.9600.19404| 295,424| 10-Jul-2019| 04:53 \nMshtml.dll.mui| 11.0.9600.19404| 297,472| 10-Jul-2019| 04:52 \nMshtml.dll.mui| 11.0.9600.19404| 292,864| 10-Jul-2019| 04:50 \nMshtml.dll.mui| 11.0.9600.19404| 295,424| 10-Jul-2019| 04:51 \nMshtml.dll.mui| 11.0.9600.19404| 294,400| 10-Jul-2019| 04:50 \nMshtml.dll.mui| 11.0.9600.19404| 294,400| 10-Jul-2019| 04:51 \nMshtml.dll.mui| 11.0.9600.19404| 292,864| 10-Jul-2019| 04:50 \nMshtml.dll.mui| 11.0.9600.19404| 290,816| 10-Jul-2019| 04:50 \nMshtml.dll.mui| 11.0.9600.19867| 290,816| 13-Oct-2020| 06:36 \nMshtml.dll.mui| 11.0.9600.19404| 286,208| 10-Jul-2019| 04:50 \nMshtml.dll.mui| 11.0.9600.19404| 281,600| 10-Jul-2019| 04:43 \nMshtml.dll.mui| 11.0.9600.19404| 286,720| 10-Jul-2019| 04:43 \nMshtml.dll.mui| 11.0.9600.19404| 292,352| 10-Jul-2019| 04:42 \nMshtml.dll.mui| 11.0.9600.19404| 242,176| 10-Jul-2019| 04:43 \nMshtml.dll.mui| 11.0.9600.19404| 243,200| 10-Jul-2019| 04:53 \nMshtml.dll.mui| 11.0.9600.19404| 243,200| 10-Jul-2019| 04:50 \nJavascriptcollectionagent.dll| 11.0.9600.17416| 60,416| 31-Oct-2014| 02:57 \nUrlmon.dll.mui| 11.0.9600.18378| 46,080| 11-Jun-2016| 20:26 \nUrlmon.dll.mui| 11.0.9600.18378| 50,176| 11-Jun-2016| 20:24 \nUrlmon.dll.mui| 11.0.9600.18378| 48,640| 11-Jun-2016| 20:23 \nUrlmon.dll.mui| 11.0.9600.18378| 49,664| 11-Jun-2016| 20:24 \nUrlmon.dll.mui| 11.0.9600.18378| 51,712| 11-Jun-2016| 20:23 \nUrlmon.dll.mui| 11.0.9600.18378| 54,272| 11-Jun-2016| 19:12 \nUrlmon.dll.mui| 11.0.9600.18378| 48,128| 11-Jun-2016| 19:12 \nUrlmon.dll.mui| 11.0.9600.18378| 48,128| 11-Jun-2016| 18:10 \nUrlmon.dll.mui| 11.0.9600.18378| 50,176| 11-Jun-2016| 19:12 \nUrlmon.dll.mui| 11.0.9600.18378| 47,616| 11-Jun-2016| 19:12 \nUrlmon.dll.mui| 11.0.9600.18378| 49,152| 11-Jun-2016| 19:12 \nUrlmon.dll.mui| 11.0.9600.18378| 50,688| 11-Jun-2016| 20:24 \nUrlmon.dll.mui| 11.0.9600.18378| 45,056| 11-Jun-2016| 19:12 \nUrlmon.dll.mui| 11.0.9600.18378| 49,152| 11-Jun-2016| 19:12 \nUrlmon.dll.mui| 11.0.9600.18378| 49,152| 11-Jun-2016| 19:13 \nUrlmon.dll.mui| 11.0.9600.18378| 49,664| 11-Jun-2016| 19:07 \nUrlmon.dll.mui| 11.0.9600.18378| 39,936| 11-Jun-2016| 19:07 \nUrlmon.dll.mui| 11.0.9600.18378| 39,424| 11-Jun-2016| 19:07 \nUrlmon.dll.mui| 11.0.9600.18378| 47,616| 11-Jun-2016| 19:07 \nUrlmon.dll.mui| 11.0.9600.18378| 47,616| 11-Jun-2016| 19:07 \nUrlmon.dll.mui| 11.0.9600.18378| 48,640| 11-Jun-2016| 19:07 \nUrlmon.dll.mui| 11.0.9600.18378| 51,200| 11-Jun-2016| 19:07 \nUrlmon.dll.mui| 11.0.9600.18378| 50,688| 11-Jun-2016| 19:07 \nUrlmon.dll.mui| 11.0.9600.18378| 49,152| 11-Jun-2016| 19:03 \nUrlmon.dll.mui| 11.0.9600.18378| 50,176| 11-Jun-2016| 19:04 \nUrlmon.dll.mui| 11.0.9600.18378| 49,152| 11-Jun-2016| 19:02 \nUrlmon.dll.mui| 11.0.9600.18378| 48,640| 11-Jun-2016| 19:03 \nUrlmon.dll.mui| 11.0.9600.18378| 49,664| 11-Jun-2016| 19:03 \nUrlmon.dll.mui| 11.0.9600.18378| 48,640| 11-Jun-2016| 19:03 \nUrlmon.dll.mui| 11.0.9600.19867| 49,664| 13-Oct-2020| 06:36 \nUrlmon.dll.mui| 11.0.9600.18378| 48,640| 11-Jun-2016| 19:03 \nUrlmon.dll.mui| 11.0.9600.18378| 48,128| 11-Jun-2016| 19:04 \nUrlmon.dll.mui| 11.0.9600.18378| 49,152| 11-Jun-2016| 19:04 \nUrlmon.dll.mui| 11.0.9600.18378| 48,128| 11-Jun-2016| 19:05 \nUrlmon.dll.mui| 11.0.9600.18378| 35,328| 11-Jun-2016| 19:04 \nUrlmon.dll.mui| 11.0.9600.18378| 35,328| 11-Jun-2016| 20:23 \nUrlmon.dll.mui| 11.0.9600.18378| 35,328| 11-Jun-2016| 20:23 \nJsproxy.dll| 11.0.9600.17416| 47,104| 31-Oct-2014| 03:16 \nWininet.dll| 11.0.9600.19867| 4,387,840| 13-Oct-2020| 03:51 \nInetcpl.cpl.mui| 11.0.9600.18817| 114,176| 07-Sep-2017| 21:12 \nInetcpl.cpl.mui| 11.0.9600.18817| 130,560| 07-Sep-2017| 21:09 \nInetcpl.cpl.mui| 11.0.9600.18817| 124,928| 07-Sep-2017| 21:10 \nInetcpl.cpl.mui| 11.0.9600.18817| 122,880| 07-Sep-2017| 21:12 \nInetcpl.cpl.mui| 11.0.9600.18817| 130,048| 07-Sep-2017| 21:10 \nInetcpl.cpl.mui| 11.0.9600.18817| 138,240| 07-Sep-2017| 21:12 \nInetcpl.cpl.mui| 11.0.9600.18817| 114,688| 07-Sep-2017| 21:12 \nInetcpl.cpl.mui| 11.0.9600.18666| 114,688| 16-Apr-2017| 08:51 \nInetcpl.cpl.mui| 11.0.9600.18817| 131,584| 07-Sep-2017| 21:12 \nInetcpl.cpl.mui| 11.0.9600.18817| 117,760| 07-Sep-2017| 21:10 \nInetcpl.cpl.mui| 11.0.9600.18817| 122,368| 07-Sep-2017| 21:12 \nInetcpl.cpl.mui| 11.0.9600.18817| 134,144| 07-Sep-2017| 21:12 \nInetcpl.cpl.mui| 11.0.9600.18817| 107,008| 07-Sep-2017| 21:13 \nInetcpl.cpl.mui| 11.0.9600.18838| 123,392| 14-Oct-2017| 08:46 \nInetcpl.cpl.mui| 11.0.9600.18817| 127,488| 07-Sep-2017| 21:11 \nInetcpl.cpl.mui| 11.0.9600.18817| 128,512| 07-Sep-2017| 21:11 \nInetcpl.cpl.mui| 11.0.9600.18817| 88,064| 07-Sep-2017| 21:07 \nInetcpl.cpl.mui| 11.0.9600.18838| 82,944| 14-Oct-2017| 08:47 \nInetcpl.cpl.mui| 11.0.9600.18817| 125,440| 07-Sep-2017| 21:07 \nInetcpl.cpl.mui| 11.0.9600.18817| 123,392| 07-Sep-2017| 21:07 \nInetcpl.cpl.mui| 11.0.9600.18817| 120,320| 07-Sep-2017| 21:10 \nInetcpl.cpl.mui| 11.0.9600.18817| 130,560| 07-Sep-2017| 21:07 \nInetcpl.cpl.mui| 11.0.9600.18817| 129,024| 07-Sep-2017| 21:07 \nInetcpl.cpl.mui| 11.0.9600.18817| 125,952| 07-Sep-2017| 22:26 \nInetcpl.cpl.mui| 11.0.9600.18817| 129,024| 07-Sep-2017| 22:26 \nInetcpl.cpl.mui| 11.0.9600.18817| 128,000| 07-Sep-2017| 22:25 \nInetcpl.cpl.mui| 11.0.9600.18817| 123,904| 07-Sep-2017| 22:26 \nInetcpl.cpl.mui| 11.0.9600.18817| 129,024| 07-Sep-2017| 22:26 \nInetcpl.cpl.mui| 11.0.9600.18817| 123,904| 07-Sep-2017| 22:25 \nInetcpl.cpl.mui| 11.0.9600.19867| 124,416| 13-Oct-2020| 06:36 \nInetcpl.cpl.mui| 11.0.9600.18817| 121,856| 07-Sep-2017| 20:56 \nInetcpl.cpl.mui| 11.0.9600.18817| 115,712| 07-Sep-2017| 21:03 \nInetcpl.cpl.mui| 11.0.9600.18817| 123,904| 07-Sep-2017| 21:04 \nInetcpl.cpl.mui| 11.0.9600.18817| 125,440| 07-Sep-2017| 21:04 \nInetcpl.cpl.mui| 11.0.9600.18817| 74,752| 07-Sep-2017| 21:04 \nInetcpl.cpl.mui| 11.0.9600.18817| 75,776| 07-Sep-2017| 21:09 \nInetcpl.cpl.mui| 11.0.9600.18817| 75,776| 07-Sep-2017| 21:10 \nIedkcs32.dll| 18.0.9600.19867| 333,312| 13-Oct-2020| 04:09 \nInstall.ins| Not applicable| 464| 13-Oct-2020| 02:24 \nIeapfltr.dat| 10.0.9301.0| 616,104| 24-Sep-2013| 02:20 \nIeapfltr.dll| 11.0.9600.19867| 710,656| 13-Oct-2020| 03:46 \nLicmgr10.dll| 11.0.9600.17416| 27,136| 31-Oct-2014| 03:03 \nIedvtool.dll| 11.0.9600.19867| 772,608| 13-Oct-2020| 05:00 \nDiagnosticstap.dll| 11.0.9600.17905| 174,592| 15-Jun-2015| 20:52 \nF12tools.dll| 11.0.9600.19724| 255,488| 20-May-2020| 10:24 \nMsfeedsbs.dll| 11.0.9600.19650| 52,736| 11-Feb-2020| 12:57 \nMsfeedsbs.mof| Not applicable| 1,574| 21-Aug-2013| 23:49 \nMsfeedssync.exe| 11.0.9600.17416| 11,264| 31-Oct-2014| 03:25 \nIeadvpack.dll| 11.0.9600.17416| 112,128| 31-Oct-2014| 03:14 \nIelowutil.exe| 11.0.9600.19404| 221,184| 10-Jul-2019| 03:06 \nIeproxy.dll| 11.0.9600.19867| 309,248| 13-Oct-2020| 03:44 \nIeshims.dll| 11.0.9600.19846| 290,304| 24-Sep-2020| 03:01 \nIexpress.exe| 11.0.9600.17416| 152,064| 31-Oct-2014| 03:27 \nWextract.exe| 11.0.9600.17416| 137,728| 31-Oct-2014| 03:28 \nImgutil.dll| 11.0.9600.17416| 40,448| 31-Oct-2014| 02:24 \nExtexport.exe| 11.0.9600.17416| 25,600| 31-Oct-2014| 03:20 \nJsdbgui.dll| 11.0.9600.18895| 459,776| 02-Jan-2018| 04:27 \nJsprofilerui.dll| 11.0.9600.18895| 579,584| 02-Jan-2018| 04:27 \nMshtmldac.dll| 11.0.9600.19867| 64,000| 13-Oct-2020| 04:43 \nNetworkinspection.dll| 11.0.9600.19846| 1,075,200| 24-Sep-2020| 03:28 \nMsdbg2.dll| 12.0.41202.0| 315,008| 30-Sep-2014| 23:00 \nPdm.dll| 12.0.41202.0| 442,992| 30-Sep-2014| 23:00 \nPdmproxy100.dll| 12.0.41202.0| 99,984| 30-Sep-2014| 23:00 \nIcrav03.rat| Not applicable| 8,798| 24-Sep-2013| 02:25 \nMsrating.dll| 11.0.9600.19507| 168,960| 06-Oct-2019| 02:57 \nTicrf.rat| Not applicable| 1,988| 24-Sep-2013| 02:26 \nIertutil.dll| 11.0.9600.19867| 2,307,072| 13-Oct-2020| 04:42 \nInseng.dll| 11.0.9600.17416| 91,136| 31-Oct-2014| 02:56 \nVgx.dll| 11.0.9600.19867| 817,664| 13-Oct-2020| 04:19 \nUrl.dll| 11.0.9600.17416| 235,520| 31-Oct-2014| 03:24 \nIeframe.dll.mui| 11.0.9600.19846| 2,066,432| 24-Sep-2020| 05:27 \nIeframe.dll.mui| 11.0.9600.19846| 2,121,216| 24-Sep-2020| 05:26 \nIeframe.dll.mui| 11.0.9600.19846| 2,075,136| 24-Sep-2020| 05:26 \nIeframe.dll.mui| 11.0.9600.19846| 2,063,872| 24-Sep-2020| 05:27 \nIeframe.dll.mui| 11.0.9600.19846| 2,314,240| 24-Sep-2020| 05:26 \nIeframe.dll.mui| 11.0.9600.19846| 2,390,528| 24-Sep-2020| 05:29 \nIeframe.dll.mui| 11.0.9600.19846| 2,034,176| 24-Sep-2020| 05:29 \nIeframe.dll.mui| 11.0.9600.19846| 2,033,152| 24-Sep-2020| 04:39 \nIeframe.dll.mui| 11.0.9600.19846| 2,307,584| 24-Sep-2020| 05:29 \nIeframe.dll.mui| 11.0.9600.19846| 2,255,872| 24-Sep-2020| 05:29 \nIeframe.dll.mui| 11.0.9600.19846| 2,061,312| 24-Sep-2020| 05:30 \nIeframe.dll.mui| 11.0.9600.19846| 2,326,016| 24-Sep-2020| 05:26 \nIeframe.dll.mui| 11.0.9600.19846| 2,019,840| 24-Sep-2020| 05:29 \nIeframe.dll.mui| 11.0.9600.19846| 2,071,040| 24-Sep-2020| 05:29 \nIeframe.dll.mui| 11.0.9600.19846| 2,082,816| 24-Sep-2020| 05:29 \nIeframe.dll.mui| 11.0.9600.19846| 2,307,584| 24-Sep-2020| 05:27 \nIeframe.dll.mui| 11.0.9600.19846| 2,170,368| 24-Sep-2020| 05:26 \nIeframe.dll.mui| 11.0.9600.19846| 2,153,984| 24-Sep-2020| 05:27 \nIeframe.dll.mui| 11.0.9600.19846| 2,291,712| 24-Sep-2020| 05:26 \nIeframe.dll.mui| 11.0.9600.19846| 2,283,520| 24-Sep-2020| 05:27 \nIeframe.dll.mui| 11.0.9600.19846| 2,052,096| 24-Sep-2020| 05:26 \nIeframe.dll.mui| 11.0.9600.19846| 2,301,952| 24-Sep-2020| 05:27 \nIeframe.dll.mui| 11.0.9600.19846| 2,093,056| 24-Sep-2020| 05:27 \nIeframe.dll.mui| 11.0.9600.19846| 2,075,648| 24-Sep-2020| 05:30 \nIeframe.dll.mui| 11.0.9600.19846| 2,299,392| 24-Sep-2020| 05:30 \nIeframe.dll.mui| 11.0.9600.19846| 2,094,592| 24-Sep-2020| 05:30 \nIeframe.dll.mui| 11.0.9600.19846| 2,316,800| 24-Sep-2020| 05:30 \nIeframe.dll.mui| 11.0.9600.19846| 2,305,536| 24-Sep-2020| 05:30 \nIeframe.dll.mui| 11.0.9600.19846| 2,278,912| 24-Sep-2020| 05:30 \nIeframe.dll.mui| 11.0.9600.19867| 2,286,080| 13-Oct-2020| 06:39 \nIeframe.dll.mui| 11.0.9600.19846| 2,060,288| 24-Sep-2020| 05:30 \nIeframe.dll.mui| 11.0.9600.19846| 2,315,776| 24-Sep-2020| 05:30 \nIeframe.dll.mui| 11.0.9600.19846| 2,278,912| 24-Sep-2020| 05:30 \nIeframe.dll.mui| 11.0.9600.19846| 2,324,992| 24-Sep-2020| 05:29 \nIeframe.dll.mui| 11.0.9600.19846| 2,098,176| 24-Sep-2020| 05:30 \nIeframe.dll.mui| 11.0.9600.19846| 1,890,304| 24-Sep-2020| 05:26 \nIeframe.dll.mui| 11.0.9600.19846| 1,890,304| 24-Sep-2020| 05:26 \nIeinstal.exe| 11.0.9600.18921| 475,648| 10-Feb-2018| 05:35 \nInetcomm.dll| 6.3.9600.19867| 880,640| 13-Oct-2020| 04:15 \nInetres.dll| 6.3.9600.16384| 84,480| 22-Aug-2013| 04:14 \n \n## Windows Server 2012\n\n## Internet Explorer 11 on all supported x86-based versions of Windows 8\n\n**File name**| **File version**| **File size**| **Date**| **Time** \n---|---|---|---|--- \nUrlmon.dll| 11.0.9600.19867| 1,342,976| 13-Oct-2020| 03:48 \nIexplore.exe| 11.0.9600.19867| 810,392| 15-Oct-2020| 18:42 \nWininet.dll.mui| 11.0.9600.19867| 46,592| 15-Oct-2020| 18:43 \nWininet.dll.mui| 11.0.9600.19867| 52,736| 15-Oct-2020| 18:44 \nWininet.dll.mui| 11.0.9600.19867| 51,200| 15-Oct-2020| 18:45 \nWininet.dll.mui| 11.0.9600.19867| 51,200| 15-Oct-2020| 18:46 \nWininet.dll.mui| 11.0.9600.19867| 56,320| 15-Oct-2020| 18:46 \nWininet.dll.mui| 11.0.9600.19867| 57,856| 15-Oct-2020| 18:47 \nWininet.dll.mui| 11.0.9600.19867| 54,272| 15-Oct-2020| 18:49 \nWininet.dll.mui| 11.0.9600.19867| 47,616| 15-Oct-2020| 18:49 \nWininet.dll.mui| 11.0.9600.19867| 49,152| 15-Oct-2020| 18:50 \nWininet.dll.mui| 11.0.9600.19867| 55,296| 15-Oct-2020| 18:51 \nWininet.dll.mui| 11.0.9600.19867| 45,056| 15-Oct-2020| 18:52 \nWininet.dll.mui| 11.0.9600.19867| 51,712| 15-Oct-2020| 18:52 \nWininet.dll.mui| 11.0.9600.19867| 51,712| 15-Oct-2020| 18:53 \nWininet.dll.mui| 11.0.9600.19867| 53,248| 15-Oct-2020| 18:54 \nWininet.dll.mui| 11.0.9600.19867| 39,424| 15-Oct-2020| 18:55 \nWininet.dll.mui| 11.0.9600.19867| 35,840| 15-Oct-2020| 18:56 \nWininet.dll.mui| 11.0.9600.19867| 50,176| 15-Oct-2020| 18:57 \nWininet.dll.mui| 11.0.9600.19867| 51,200| 15-Oct-2020| 18:57 \nWininet.dll.mui| 11.0.9600.19867| 50,688| 15-Oct-2020| 18:58 \nWininet.dll.mui| 11.0.9600.19867| 52,736| 15-Oct-2020| 18:59 \nWininet.dll.mui| 11.0.9600.19867| 53,760| 15-Oct-2020| 19:00 \nWininet.dll.mui| 11.0.9600.19867| 54,272| 15-Oct-2020| 19:01 \nWininet.dll.mui| 11.0.9600.19867| 54,272| 15-Oct-2020| 19:01 \nWininet.dll.mui| 11.0.9600.19867| 52,736| 15-Oct-2020| 19:02 \nWininet.dll.mui| 11.0.9600.19867| 51,200| 15-Oct-2020| 19:03 \nWininet.dll.mui| 11.0.9600.19867| 53,248| 15-Oct-2020| 19:04 \nWininet.dll.mui| 11.0.9600.19867| 52,736| 15-Oct-2020| 19:05 \nWininet.dll.mui| 11.0.9600.19867| 51,712| 15-Oct-2020| 19:05 \nWininet.dll.mui| 11.0.9600.19867| 50,688| 15-Oct-2020| 19:06 \nWininet.dll.mui| 11.0.9600.19867| 50,688| 15-Oct-2020| 19:07 \nWininet.dll.mui| 11.0.9600.19867| 50,176| 15-Oct-2020| 19:08 \nWininet.dll.mui| 11.0.9600.19867| 50,176| 15-Oct-2020| 19:09 \nWininet.dll.mui| 11.0.9600.19867| 30,720| 15-Oct-2020| 19:10 \nWininet.dll.mui| 11.0.9600.19867| 30,720| 15-Oct-2020| 19:10 \nWininet.dll.mui| 11.0.9600.19867| 30,720| 15-Oct-2020| 19:11 \nInetcpl.cpl| 11.0.9600.19867| 2,058,752| 13-Oct-2020| 04:09 \nMshtml.dll.mui| 11.0.9600.19867| 307,200| 15-Oct-2020| 18:43 \nMshtml.dll.mui| 11.0.9600.19867| 293,888| 15-Oct-2020| 18:44 \nMshtml.dll.mui| 11.0.9600.19867| 290,304| 15-Oct-2020| 18:45 \nMshtml.dll.mui| 11.0.9600.19867| 289,280| 15-Oct-2020| 18:46 \nMshtml.dll.mui| 11.0.9600.19867| 299,008| 15-Oct-2020| 18:47 \nMshtml.dll.mui| 11.0.9600.19867| 303,104| 15-Oct-2020| 18:48 \nMshtml.dll.mui| 11.0.9600.19867| 282,112| 15-Oct-2020| 20:11 \nMshtml.dll.mui| 11.0.9600.19867| 296,960| 15-Oct-2020| 18:49 \nMshtml.dll.mui| 11.0.9600.19867| 283,648| 15-Oct-2020| 18:49 \nMshtml.dll.mui| 11.0.9600.19867| 291,840| 15-Oct-2020| 18:50 \nMshtml.dll.mui| 11.0.9600.19867| 299,520| 15-Oct-2020| 18:51 \nMshtml.dll.mui| 11.0.9600.19867| 275,968| 15-Oct-2020| 18:52 \nMshtml.dll.mui| 11.0.9600.19867| 290,816| 15-Oct-2020| 18:52 \nMshtml.dll.mui| 11.0.9600.19867| 293,376| 15-Oct-2020| 18:53 \nMshtml.dll.mui| 11.0.9600.19867| 296,960| 15-Oct-2020| 18:54 \nMshtml.dll.mui| 11.0.9600.19867| 258,048| 15-Oct-2020| 18:55 \nMshtml.dll.mui| 11.0.9600.19867| 256,512| 15-Oct-2020| 18:56 \nMshtml.dll.mui| 11.0.9600.19867| 289,280| 15-Oct-2020| 18:57 \nMshtml.dll.mui| 11.0.9600.19867| 288,256| 15-Oct-2020| 18:57 \nMshtml.dll.mui| 11.0.9600.19867| 285,184| 15-Oct-2020| 18:59 \nMshtml.dll.mui| 11.0.9600.19867| 295,424| 15-Oct-2020| 18:59 \nMshtml.dll.mui| 11.0.9600.19867| 297,472| 15-Oct-2020| 19:00 \nMshtml.dll.mui| 11.0.9600.19867| 292,864| 15-Oct-2020| 19:01 \nMshtml.dll.mui| 11.0.9600.19867| 295,424| 15-Oct-2020| 19:01 \nMshtml.dll.mui| 11.0.9600.19867| 294,400| 15-Oct-2020| 19:02 \nMshtml.dll.mui| 11.0.9600.19867| 294,400| 15-Oct-2020| 19:03 \nMshtml.dll.mui| 11.0.9600.19867| 292,864| 15-Oct-2020| 19:04 \nMshtml.dll.mui| 11.0.9600.19867| 290,816| 15-Oct-2020| 19:05 \nMshtml.dll.mui| 11.0.9600.19867| 288,768| 15-Oct-2020| 19:06 \nMshtml.dll.mui| 11.0.9600.19867| 286,208| 15-Oct-2020| 19:06 \nMshtml.dll.mui| 11.0.9600.19867| 281,600| 15-Oct-2020| 19:07 \nMshtml.dll.mui| 11.0.9600.19867| 286,720| 15-Oct-2020| 19:08 \nMshtml.dll.mui| 11.0.9600.19867| 292,352| 15-Oct-2020| 19:09 \nMshtml.dll.mui| 11.0.9600.19867| 242,176| 15-Oct-2020| 19:10 \nMshtml.dll.mui| 11.0.9600.19867| 243,200| 15-Oct-2020| 19:11 \nMshtml.dll.mui| 11.0.9600.19867| 243,200| 15-Oct-2020| 19:11 \nUrlmon.dll.mui| 11.0.9600.19867| 46,080| 15-Oct-2020| 18:43 \nUrlmon.dll.mui| 11.0.9600.19867| 50,176| 15-Oct-2020| 18:45 \nUrlmon.dll.mui| 11.0.9600.19867| 48,640| 15-Oct-2020| 18:45 \nUrlmon.dll.mui| 11.0.9600.19867| 49,664| 15-Oct-2020| 18:45 \nUrlmon.dll.mui| 11.0.9600.19867| 51,712| 15-Oct-2020| 18:46 \nUrlmon.dll.mui| 11.0.9600.19867| 54,272| 15-Oct-2020| 18:47 \nUrlmon.dll.mui| 11.0.9600.19867| 50,176| 15-Oct-2020| 18:48 \nUrlmon.dll.mui| 11.0.9600.19867| 47,616| 15-Oct-2020| 18:49 \nUrlmon.dll.mui| 11.0.9600.19867| 49,152| 15-Oct-2020| 18:50 \nUrlmon.dll.mui| 11.0.9600.19867| 50,688| 15-Oct-2020| 18:51 \nUrlmon.dll.mui| 11.0.9600.19867| 45,056| 15-Oct-2020| 18:52 \nUrlmon.dll.mui| 11.0.9600.19867| 49,152| 15-Oct-2020| 18:52 \nUrlmon.dll.mui| 11.0.9600.19867| 49,152| 15-Oct-2020| 18:53 \nUrlmon.dll.mui| 11.0.9600.19867| 49,664| 15-Oct-2020| 18:54 \nUrlmon.dll.mui| 11.0.9600.19867| 39,936| 15-Oct-2020| 18:55 \nUrlmon.dll.mui| 11.0.9600.19867| 39,424| 15-Oct-2020| 18:56 \nUrlmon.dll.mui| 11.0.9600.19867| 47,616| 15-Oct-2020| 18:57 \nUrlmon.dll.mui| 11.0.9600.19867| 47,616| 15-Oct-2020| 18:57 \nUrlmon.dll.mui| 11.0.9600.19867| 48,640| 15-Oct-2020| 18:58 \nUrlmon.dll.mui| 11.0.9600.19867| 51,200| 15-Oct-2020| 18:59 \nUrlmon.dll.mui| 11.0.9600.19867| 50,688| 15-Oct-2020| 19:00 \nUrlmon.dll.mui| 11.0.9600.19867| 49,664| 15-Oct-2020| 19:00 \nUrlmon.dll.mui| 11.0.9600.19867| 50,176| 15-Oct-2020| 19:01 \nUrlmon.dll.mui| 11.0.9600.19867| 49,152| 15-Oct-2020| 19:02 \nUrlmon.dll.mui| 11.0.9600.19867| 48,640| 15-Oct-2020| 19:03 \nUrlmon.dll.mui| 11.0.9600.19867| 50,176| 15-Oct-2020| 19:04 \nUrlmon.dll.mui| 11.0.9600.19867| 48,640| 15-Oct-2020| 19:04 \nUrlmon.dll.mui| 11.0.9600.19867| 49,664| 15-Oct-2020| 19:05 \nUrlmon.dll.mui| 11.0.9600.19867| 48,640| 15-Oct-2020| 19:06 \nUrlmon.dll.mui| 11.0.9600.19867| 48,128| 15-Oct-2020| 19:07 \nUrlmon.dll.mui| 11.0.9600.19867| 49,152| 15-Oct-2020| 19:08 \nUrlmon.dll.mui| 11.0.9600.19867| 48,128| 15-Oct-2020| 19:09 \nUrlmon.dll.mui| 11.0.9600.19867| 35,328| 15-Oct-2020| 19:10 \nUrlmon.dll.mui| 11.0.9600.19867| 35,328| 15-Oct-2020| 19:10 \nUrlmon.dll.mui| 11.0.9600.19867| 35,328| 15-Oct-2020| 19:12 \nJsproxy.dll| 11.0.9600.19867| 47,104| 13-Oct-2020| 04:38 \nWininet.dll| 11.0.9600.19867| 4,387,840| 13-Oct-2020| 03:51 \nInetcpl.cpl.mui| 11.0.9600.19867| 114,176| 15-Oct-2020| 18:44 \nInetcpl.cpl.mui| 11.0.9600.19867| 130,560| 15-Oct-2020| 18:44 \nInetcpl.cpl.mui| 11.0.9600.19867| 124,928| 15-Oct-2020| 18:45 \nInetcpl.cpl.mui| 11.0.9600.19867| 122,880| 15-Oct-2020| 18:46 \nInetcpl.cpl.mui| 11.0.9600.19867| 130,048| 15-Oct-2020| 18:46 \nInetcpl.cpl.mui| 11.0.9600.19867| 138,240| 15-Oct-2020| 18:47 \nInetcpl.cpl.mui| 11.0.9600.19867| 114,688| 15-Oct-2020| 20:11 \nInetcpl.cpl.mui| 11.0.9600.19867| 131,584| 15-Oct-2020| 18:48 \nInetcpl.cpl.mui| 11.0.9600.19867| 117,760| 15-Oct-2020| 18:49 \nInetcpl.cpl.mui| 11.0.9600.19867| 122,368| 15-Oct-2020| 18:50 \nInetcpl.cpl.mui| 11.0.9600.19867| 134,144| 15-Oct-2020| 18:51 \nInetcpl.cpl.mui| 11.0.9600.19867| 107,008| 15-Oct-2020| 18:52 \nInetcpl.cpl.mui| 11.0.9600.19867| 123,392| 15-Oct-2020| 18:52 \nInetcpl.cpl.mui| 11.0.9600.19867| 127,488| 15-Oct-2020| 18:53 \nInetcpl.cpl.mui| 11.0.9600.19867| 128,512| 15-Oct-2020| 18:54 \nInetcpl.cpl.mui| 11.0.9600.19867| 88,576| 15-Oct-2020| 18:55 \nInetcpl.cpl.mui| 11.0.9600.19867| 82,944| 15-Oct-2020| 18:56 \nInetcpl.cpl.mui| 11.0.9600.19867| 125,440| 15-Oct-2020| 18:57 \nInetcpl.cpl.mui| 11.0.9600.19867| 123,392| 15-Oct-2020| 18:57 \nInetcpl.cpl.mui| 11.0.9600.19867| 120,320| 15-Oct-2020| 18:58 \nInetcpl.cpl.mui| 11.0.9600.19867| 130,560| 15-Oct-2020| 18:59 \nInetcpl.cpl.mui| 11.0.9600.19867| 129,024| 15-Oct-2020| 19:00 \nInetcpl.cpl.mui| 11.0.9600.19867| 125,952| 15-Oct-2020| 19:00 \nInetcpl.cpl.mui| 11.0.9600.19867| 129,024| 15-Oct-2020| 19:01 \nInetcpl.cpl.mui| 11.0.9600.19867| 128,000| 15-Oct-2020| 19:02 \nInetcpl.cpl.mui| 11.0.9600.19867| 123,904| 15-Oct-2020| 19:03 \nInetcpl.cpl.mui| 11.0.9600.19867| 129,024| 15-Oct-2020| 19:04 \nInetcpl.cpl.mui| 11.0.9600.19867| 123,904| 15-Oct-2020| 19:05 \nInetcpl.cpl.mui| 11.0.9600.19867| 124,416| 15-Oct-2020| 19:06 \nInetcpl.cpl.mui| 11.0.9600.19867| 121,856| 15-Oct-2020| 19:06 \nInetcpl.cpl.mui| 11.0.9600.19867| 115,712| 15-Oct-2020| 19:08 \nInetcpl.cpl.mui| 11.0.9600.19867| 123,904| 15-Oct-2020| 19:08 \nInetcpl.cpl.mui| 11.0.9600.19867| 125,440| 15-Oct-2020| 19:09 \nInetcpl.cpl.mui| 11.0.9600.19867| 72,704| 15-Oct-2020| 19:10 \nInetcpl.cpl.mui| 11.0.9600.19867| 73,728| 15-Oct-2020| 19:11 \nInetcpl.cpl.mui| 11.0.9600.19867| 73,728| 15-Oct-2020| 19:12 \nMsfeedsbs.dll| 11.0.9600.19867| 52,736| 13-Oct-2020| 04:19 \nMsfeedsbs.mof| Not applicable| 1,574| 13-Oct-2020| 02:33 \nMsfeedssync.exe| 11.0.9600.19867| 11,776| 13-Oct-2020| 04:46 \nMicrosoft-windows-ie-htmlrendering.ptxml| Not applicable| 3,228| 13-Oct-2020| 02:22 \nMshtml.dll| 11.0.9600.19867| 20,293,632| 13-Oct-2020| 04:59 \nMshtml.tlb| 11.0.9600.19867| 2,724,864| 13-Oct-2020| 04:57 \nIeproxy.dll| 11.0.9600.19867| 309,248| 13-Oct-2020| 03:44 \nIeshims.dll| 11.0.9600.19867| 290,304| 13-Oct-2020| 03:49 \nIertutil.dll| 11.0.9600.19867| 2,307,072| 13-Oct-2020| 04:42 \nSqmapi.dll| 6.2.9200.16384| 228,248| 15-Oct-2020| 18:42 \nIeframe.dll.mui| 11.0.9600.19867| 2,066,432| 15-Oct-2020| 18:44 \nIeframe.dll.mui| 11.0.9600.19867| 2,121,216| 15-Oct-2020| 18:44 \nIeframe.dll.mui| 11.0.9600.19867| 2,075,136| 15-Oct-2020| 18:45 \nIeframe.dll.mui| 11.0.9600.19867| 2,063,872| 15-Oct-2020| 18:46 \nIeframe.dll.mui| 11.0.9600.19867| 2,314,240| 15-Oct-2020| 18:47 \nIeframe.dll.mui| 11.0.9600.19867| 2,390,528| 15-Oct-2020| 18:48 \nIeframe.dll.mui| 11.0.9600.19867| 2,033,152| 15-Oct-2020| 20:11 \nIeframe.dll.mui| 11.0.9600.19867| 2,307,584| 15-Oct-2020| 18:49 \nIeframe.dll.mui| 11.0.9600.19867| 2,255,872| 15-Oct-2020| 18:50 \nIeframe.dll.mui| 11.0.9600.19867| 2,061,312| 15-Oct-2020| 18:50 \nIeframe.dll.mui| 11.0.9600.19867| 2,326,016| 15-Oct-2020| 18:51 \nIeframe.dll.mui| 11.0.9600.19867| 2,019,840| 15-Oct-2020| 18:52 \nIeframe.dll.mui| 11.0.9600.19867| 2,071,040| 15-Oct-2020| 18:53 \nIeframe.dll.mui| 11.0.9600.19867| 2,082,816| 15-Oct-2020| 18:54 \nIeframe.dll.mui| 11.0.9600.19867| 2,307,584| 15-Oct-2020| 18:55 \nIeframe.dll.mui| 11.0.9600.19867| 2,170,368| 15-Oct-2020| 18:55 \nIeframe.dll.mui| 11.0.9600.19867| 2,153,984| 15-Oct-2020| 18:56 \nIeframe.dll.mui| 11.0.9600.19867| 2,291,712| 15-Oct-2020| 18:57 \nIeframe.dll.mui| 11.0.9600.19867| 2,283,520| 15-Oct-2020| 18:58 \nIeframe.dll.mui| 11.0.9600.19867| 2,052,096| 15-Oct-2020| 18:58 \nIeframe.dll.mui| 11.0.9600.19867| 2,301,952| 15-Oct-2020| 18:59 \nIeframe.dll.mui| 11.0.9600.19867| 2,093,056| 15-Oct-2020| 19:00 \nIeframe.dll.mui| 11.0.9600.19867| 2,075,648| 15-Oct-2020| 19:01 \nIeframe.dll.mui| 11.0.9600.19867| 2,299,392| 15-Oct-2020| 19:02 \nIeframe.dll.mui| 11.0.9600.19867| 2,094,592| 15-Oct-2020| 19:02 \nIeframe.dll.mui| 11.0.9600.19867| 2,316,800| 15-Oct-2020| 19:03 \nIeframe.dll.mui| 11.0.9600.19867| 2,305,536| 15-Oct-2020| 19:04 \nIeframe.dll.mui| 11.0.9600.19867| 2,278,912| 15-Oct-2020| 19:05 \nIeframe.dll.mui| 11.0.9600.19867| 2,277,888| 15-Oct-2020| 19:06 \nIeframe.dll.mui| 11.0.9600.19867| 2,060,288| 15-Oct-2020| 19:07 \nIeframe.dll.mui| 11.0.9600.19867| 2,315,776| 15-Oct-2020| 19:08 \nIeframe.dll.mui| 11.0.9600.19867| 2,278,912| 15-Oct-2020| 19:09 \nIeframe.dll.mui| 11.0.9600.19867| 2,324,992| 15-Oct-2020| 19:09 \nIeframe.dll.mui| 11.0.9600.19867| 2,098,176| 15-Oct-2020| 19:10 \nIeframe.dll.mui| 11.0.9600.19867| 1,890,304| 15-Oct-2020| 19:11 \nIeframe.dll.mui| 11.0.9600.19867| 1,890,304| 15-Oct-2020| 19:12 \nIeframe.dll| 11.0.9600.19867| 13,873,664| 13-Oct-2020| 04:09 \nIeframe.ptxml| Not applicable| 24,486| 13-Oct-2020| 02:21 \nInetres.adml| Not applicable| 456,165| 15-Oct-2020| 18:43 \nInetres.adml| Not applicable| 456,165| 15-Oct-2020| 18:44 \nInetres.adml| Not applicable| 524,733| 15-Oct-2020| 18:45 \nInetres.adml| Not applicable| 498,151| 15-Oct-2020| 18:46 \nInetres.adml| Not applicable| 550,745| 15-Oct-2020| 18:47 \nInetres.adml| Not applicable| 942,143| 15-Oct-2020| 18:47 \nInetres.adml| Not applicable| 456,165| 15-Oct-2020| 20:11 \nInetres.adml| Not applicable| 542,443| 15-Oct-2020| 18:48 \nInetres.adml| Not applicable| 456,165| 15-Oct-2020| 18:49 \nInetres.adml| Not applicable| 524,999| 15-Oct-2020| 18:50 \nInetres.adml| Not applicable| 574,243| 15-Oct-2020| 18:51 \nInetres.adml| Not applicable| 456,165| 15-Oct-2020| 18:52 \nInetres.adml| Not applicable| 456,165| 15-Oct-2020| 18:52 \nInetres.adml| Not applicable| 569,173| 15-Oct-2020| 18:53 \nInetres.adml| Not applicable| 546,643| 15-Oct-2020| 18:54 \nInetres.adml| Not applicable| 637,356| 15-Oct-2020| 18:55 \nInetres.adml| Not applicable| 523,880| 15-Oct-2020| 18:56 \nInetres.adml| Not applicable| 456,165| 15-Oct-2020| 18:57 \nInetres.adml| Not applicable| 456,165| 15-Oct-2020| 18:57 \nInetres.adml| Not applicable| 487,001| 15-Oct-2020| 18:58 \nInetres.adml| Not applicable| 546,980| 15-Oct-2020| 18:59 \nInetres.adml| Not applicable| 557,656| 15-Oct-2020| 19:00 \nInetres.adml| Not applicable| 533,510| 15-Oct-2020| 19:01 \nInetres.adml| Not applicable| 539,964| 15-Oct-2020| 19:01 \nInetres.adml| Not applicable| 456,165| 15-Oct-2020| 19:02 \nInetres.adml| Not applicable| 802,394| 15-Oct-2020| 19:03 \nInetres.adml| Not applicable| 456,165| 15-Oct-2020| 19:04 \nInetres.adml| Not applicable| 456,165| 15-Oct-2020| 19:05 \nInetres.adml| Not applicable| 456,165| 15-Oct-2020| 19:05 \nInetres.adml| Not applicable| 502,367| 15-Oct-2020| 19:06 \nInetres.adml| Not applicable| 456,165| 15-Oct-2020| 19:07 \nInetres.adml| Not applicable| 519,994| 15-Oct-2020| 19:08 \nInetres.adml| Not applicable| 456,165| 15-Oct-2020| 19:09 \nInetres.adml| Not applicable| 418,707| 15-Oct-2020| 19:10 \nInetres.adml| Not applicable| 435,257| 15-Oct-2020| 19:10 \nInetres.adml| Not applicable| 435,257| 15-Oct-2020| 19:11 \nInetres.admx| Not applicable| 1,676,517| 13-Oct-2020| 02:04 \nJscript9.dll.mui| 11.0.9600.19867| 29,184| 15-Oct-2020| 18:43 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 15-Oct-2020| 18:44 \nJscript9.dll.mui| 11.0.9600.19867| 32,768| 15-Oct-2020| 18:45 \nJscript9.dll.mui| 11.0.9600.19867| 33,280| 15-Oct-2020| 18:46 \nJscript9.dll.mui| 11.0.9600.19867| 35,328| 15-Oct-2020| 18:46 \nJscript9.dll.mui| 11.0.9600.19867| 37,888| 15-Oct-2020| 18:47 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 15-Oct-2020| 20:11 \nJscript9.dll.mui| 11.0.9600.19867| 34,304| 15-Oct-2020| 18:49 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 15-Oct-2020| 18:49 \nJscript9.dll.mui| 11.0.9600.19867| 33,280| 15-Oct-2020| 18:50 \nJscript9.dll.mui| 11.0.9600.19867| 34,304| 15-Oct-2020| 18:51 \nJscript9.dll.mui| 11.0.9600.19867| 27,648| 15-Oct-2020| 18:52 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 15-Oct-2020| 18:52 \nJscript9.dll.mui| 11.0.9600.19867| 34,304| 15-Oct-2020| 18:53 \nJscript9.dll.mui| 11.0.9600.19867| 33,792| 15-Oct-2020| 18:54 \nJscript9.dll.mui| 11.0.9600.19867| 23,040| 15-Oct-2020| 18:55 \nJscript9.dll.mui| 11.0.9600.19867| 22,016| 15-Oct-2020| 18:56 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 15-Oct-2020| 18:57 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 15-Oct-2020| 18:57 \nJscript9.dll.mui| 11.0.9600.19867| 31,232| 15-Oct-2020| 18:58 \nJscript9.dll.mui| 11.0.9600.19867| 34,304| 15-Oct-2020| 18:59 \nJscript9.dll.mui| 11.0.9600.19867| 35,840| 15-Oct-2020| 19:00 \nJscript9.dll.mui| 11.0.9600.19867| 32,768| 15-Oct-2020| 19:00 \nJscript9.dll.mui| 11.0.9600.19867| 33,280| 15-Oct-2020| 19:01 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 15-Oct-2020| 19:02 \nJscript9.dll.mui| 11.0.9600.19867| 34,816| 15-Oct-2020| 19:03 \nJscript9.dll.mui| 11.0.9600.19867| 33,280| 15-Oct-2020| 19:04 \nJscript9.dll.mui| 11.0.9600.19867| 32,256| 15-Oct-2020| 19:04 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 15-Oct-2020| 19:05 \nJscript9.dll.mui| 11.0.9600.19867| 32,768| 15-Oct-2020| 19:07 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 15-Oct-2020| 19:07 \nJscript9.dll.mui| 11.0.9600.19867| 30,720| 15-Oct-2020| 19:08 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 15-Oct-2020| 19:09 \nJscript9.dll.mui| 11.0.9600.19867| 16,384| 15-Oct-2020| 19:09 \nJscript9.dll.mui| 11.0.9600.19867| 16,896| 15-Oct-2020| 19:10 \nJscript9.dll.mui| 11.0.9600.19867| 16,896| 15-Oct-2020| 19:11 \nJscript9.dll| 11.0.9600.19867| 4,112,384| 13-Oct-2020| 04:12 \nJscript9diag.dll| 11.0.9600.19867| 620,032| 13-Oct-2020| 04:35 \nJscript.dll| 5.8.9600.19867| 653,824| 13-Oct-2020| 04:35 \nVbscript.dll| 5.8.9600.19867| 498,176| 13-Oct-2020| 04:45 \n \n## Internet Explorer 11 on all supported x64-based versions of Windows 8\n\n**File name**| **File version**| **File size**| **Date**| **Time** \n---|---|---|---|--- \nUrlmon.dll| 11.0.9600.19867| 1,568,256| 13-Oct-2020| 04:10 \nIexplore.exe| 11.0.9600.19867| 810,376| 15-Oct-2020| 19:36 \nWininet.dll.mui| 11.0.9600.19867| 46,592| 15-Oct-2020| 19:37 \nWininet.dll.mui| 11.0.9600.19867| 52,736| 15-Oct-2020| 19:38 \nWininet.dll.mui| 11.0.9600.19867| 51,200| 15-Oct-2020| 19:38 \nWininet.dll.mui| 11.0.9600.19867| 51,200| 15-Oct-2020| 19:39 \nWininet.dll.mui| 11.0.9600.19867| 56,320| 15-Oct-2020| 19:40 \nWininet.dll.mui| 11.0.9600.19867| 57,856| 15-Oct-2020| 19:41 \nWininet.dll.mui| 11.0.9600.19867| 49,664| 15-Oct-2020| 20:35 \nWininet.dll.mui| 11.0.9600.19867| 54,272| 15-Oct-2020| 19:42 \nWininet.dll.mui| 11.0.9600.19867| 47,616| 15-Oct-2020| 19:43 \nWininet.dll.mui| 11.0.9600.19867| 49,152| 15-Oct-2020| 19:43 \nWininet.dll.mui| 11.0.9600.19867| 55,296| 15-Oct-2020| 19:44 \nWininet.dll.mui| 11.0.9600.19867| 45,056| 15-Oct-2020| 19:45 \nWininet.dll.mui| 11.0.9600.19867| 51,712| 15-Oct-2020| 19:46 \nWininet.dll.mui| 11.0.9600.19867| 51,712| 15-Oct-2020| 19:47 \nWininet.dll.mui| 11.0.9600.19867| 53,248| 15-Oct-2020| 19:48 \nWininet.dll.mui| 11.0.9600.19867| 39,424| 15-Oct-2020| 19:49 \nWininet.dll.mui| 11.0.9600.19867| 35,840| 15-Oct-2020| 19:49 \nWininet.dll.mui| 11.0.9600.19867| 50,176| 15-Oct-2020| 19:50 \nWininet.dll.mui| 11.0.9600.19867| 51,200| 15-Oct-2020| 19:51 \nWininet.dll.mui| 11.0.9600.19867| 50,688| 15-Oct-2020| 19:52 \nWininet.dll.mui| 11.0.9600.19867| 52,736| 15-Oct-2020| 19:52 \nWininet.dll.mui| 11.0.9600.19867| 53,760| 15-Oct-2020| 19:53 \nWininet.dll.mui| 11.0.9600.19867| 54,272| 15-Oct-2020| 19:54 \nWininet.dll.mui| 11.0.9600.19867| 54,272| 15-Oct-2020| 19:55 \nWininet.dll.mui| 11.0.9600.19867| 52,736| 15-Oct-2020| 19:56 \nWininet.dll.mui| 11.0.9600.19867| 51,200| 15-Oct-2020| 19:57 \nWininet.dll.mui| 11.0.9600.19867| 53,248| 15-Oct-2020| 19:57 \nWininet.dll.mui| 11.0.9600.19867| 52,736| 15-Oct-2020| 19:58 \nWininet.dll.mui| 11.0.9600.19867| 51,712| 15-Oct-2020| 19:59 \nWininet.dll.mui| 11.0.9600.19867| 50,688| 15-Oct-2020| 20:00 \nWininet.dll.mui| 11.0.9600.19867| 50,688| 15-Oct-2020| 20:00 \nWininet.dll.mui| 11.0.9600.19867| 50,176| 15-Oct-2020| 20:01 \nWininet.dll.mui| 11.0.9600.19867| 50,176| 15-Oct-2020| 20:02 \nWininet.dll.mui| 11.0.9600.19867| 30,720| 15-Oct-2020| 20:03 \nWininet.dll.mui| 11.0.9600.19867| 30,720| 15-Oct-2020| 20:04 \nWininet.dll.mui| 11.0.9600.19867| 30,720| 15-Oct-2020| 20:05 \nInetcpl.cpl| 11.0.9600.19867| 2,132,992| 13-Oct-2020| 04:31 \nMshtml.dll.mui| 11.0.9600.19867| 307,200| 15-Oct-2020| 19:37 \nMshtml.dll.mui| 11.0.9600.19867| 293,888| 15-Oct-2020| 19:38 \nMshtml.dll.mui| 11.0.9600.19867| 290,304| 15-Oct-2020| 19:39 \nMshtml.dll.mui| 11.0.9600.19867| 289,280| 15-Oct-2020| 19:39 \nMshtml.dll.mui| 11.0.9600.19867| 299,008| 15-Oct-2020| 19:40 \nMshtml.dll.mui| 11.0.9600.19867| 303,104| 15-Oct-2020| 19:41 \nMshtml.dll.mui| 11.0.9600.19867| 282,112| 15-Oct-2020| 20:35 \nMshtml.dll.mui| 11.0.9600.19867| 296,960| 15-Oct-2020| 19:42 \nMshtml.dll.mui| 11.0.9600.19867| 283,648| 15-Oct-2020| 19:43 \nMshtml.dll.mui| 11.0.9600.19867| 291,840| 15-Oct-2020| 19:43 \nMshtml.dll.mui| 11.0.9600.19867| 299,520| 15-Oct-2020| 19:44 \nMshtml.dll.mui| 11.0.9600.19867| 275,968| 15-Oct-2020| 19:45 \nMshtml.dll.mui| 11.0.9600.19867| 290,816| 15-Oct-2020| 19:46 \nMshtml.dll.mui| 11.0.9600.19867| 293,376| 15-Oct-2020| 19:47 \nMshtml.dll.mui| 11.0.9600.19867| 296,960| 15-Oct-2020| 19:48 \nMshtml.dll.mui| 11.0.9600.19867| 258,048| 15-Oct-2020| 19:48 \nMshtml.dll.mui| 11.0.9600.19867| 256,512| 15-Oct-2020| 19:49 \nMshtml.dll.mui| 11.0.9600.19867| 289,280| 15-Oct-2020| 19:50 \nMshtml.dll.mui| 11.0.9600.19867| 288,256| 15-Oct-2020| 19:51 \nMshtml.dll.mui| 11.0.9600.19867| 285,184| 15-Oct-2020| 19:52 \nMshtml.dll.mui| 11.0.9600.19867| 295,424| 15-Oct-2020| 19:52 \nMshtml.dll.mui| 11.0.9600.19867| 297,472| 15-Oct-2020| 19:54 \nMshtml.dll.mui| 11.0.9600.19867| 292,864| 15-Oct-2020| 19:54 \nMshtml.dll.mui| 11.0.9600.19867| 295,424| 15-Oct-2020| 19:55 \nMshtml.dll.mui| 11.0.9600.19867| 294,400| 15-Oct-2020| 19:56 \nMshtml.dll.mui| 11.0.9600.19867| 294,400| 15-Oct-2020| 19:57 \nMshtml.dll.mui| 11.0.9600.19867| 292,864| 15-Oct-2020| 19:57 \nMshtml.dll.mui| 11.0.9600.19867| 290,816| 15-Oct-2020| 19:58 \nMshtml.dll.mui| 11.0.9600.19867| 288,768| 15-Oct-2020| 19:59 \nMshtml.dll.mui| 11.0.9600.19867| 286,208| 15-Oct-2020| 20:00 \nMshtml.dll.mui| 11.0.9600.19867| 281,600| 15-Oct-2020| 20:00 \nMshtml.dll.mui| 11.0.9600.19867| 286,720| 15-Oct-2020| 20:01 \nMshtml.dll.mui| 11.0.9600.19867| 292,352| 15-Oct-2020| 20:02 \nMshtml.dll.mui| 11.0.9600.19867| 242,176| 15-Oct-2020| 20:03 \nMshtml.dll.mui| 11.0.9600.19867| 243,200| 15-Oct-2020| 20:04 \nMshtml.dll.mui| 11.0.9600.19867| 243,200| 15-Oct-2020| 20:05 \nUrlmon.dll.mui| 11.0.9600.19867| 46,080| 15-Oct-2020| 19:37 \nUrlmon.dll.mui| 11.0.9600.19867| 50,176| 15-Oct-2020| 19:38 \nUrlmon.dll.mui| 11.0.9600.19867| 48,640| 15-Oct-2020| 19:38 \nUrlmon.dll.mui| 11.0.9600.19867| 49,664| 15-Oct-2020| 19:39 \nUrlmon.dll.mui| 11.0.9600.19867| 51,712| 15-Oct-2020| 19:40 \nUrlmon.dll.mui| 11.0.9600.19867| 54,272| 15-Oct-2020| 19:42 \nUrlmon.dll.mui| 11.0.9600.19867| 48,128| 15-Oct-2020| 20:35 \nUrlmon.dll.mui| 11.0.9600.19867| 50,176| 15-Oct-2020| 19:42 \nUrlmon.dll.mui| 11.0.9600.19867| 47,616| 15-Oct-2020| 19:43 \nUrlmon.dll.mui| 11.0.9600.19867| 49,152| 15-Oct-2020| 19:43 \nUrlmon.dll.mui| 11.0.9600.19867| 50,688| 15-Oct-2020| 19:44 \nUrlmon.dll.mui| 11.0.9600.19867| 45,056| 15-Oct-2020| 19:45 \nUrlmon.dll.mui| 11.0.9600.19867| 49,152| 15-Oct-2020| 19:46 \nUrlmon.dll.mui| 11.0.9600.19867| 49,152| 15-Oct-2020| 19:47 \nUrlmon.dll.mui| 11.0.9600.19867| 49,664| 15-Oct-2020| 19:48 \nUrlmon.dll.mui| 11.0.9600.19867| 39,936| 15-Oct-2020| 19:48 \nUrlmon.dll.mui| 11.0.9600.19867| 39,424| 15-Oct-2020| 19:49 \nUrlmon.dll.mui| 11.0.9600.19867| 47,616| 15-Oct-2020| 19:50 \nUrlmon.dll.mui| 11.0.9600.19867| 47,616| 15-Oct-2020| 19:51 \nUrlmon.dll.mui| 11.0.9600.19867| 48,640| 15-Oct-2020| 19:52 \nUrlmon.dll.mui| 11.0.9600.19867| 51,200| 15-Oct-2020| 19:52 \nUrlmon.dll.mui| 11.0.9600.19867| 50,688| 15-Oct-2020| 19:53 \nUrlmon.dll.mui| 11.0.9600.19867| 49,664| 15-Oct-2020| 19:54 \nUrlmon.dll.mui| 11.0.9600.19867| 50,176| 15-Oct-2020| 19:55 \nUrlmon.dll.mui| 11.0.9600.19867| 49,152| 15-Oct-2020| 19:56 \nUrlmon.dll.mui| 11.0.9600.19867| 48,640| 15-Oct-2020| 19:57 \nUrlmon.dll.mui| 11.0.9600.19867| 50,176| 15-Oct-2020| 19:57 \nUrlmon.dll.mui| 11.0.9600.19867| 48,640| 15-Oct-2020| 19:58 \nUrlmon.dll.mui| 11.0.9600.19867| 49,664| 15-Oct-2020| 19:59 \nUrlmon.dll.mui| 11.0.9600.19867| 48,640| 15-Oct-2020| 20:00 \nUrlmon.dll.mui| 11.0.9600.19867| 48,128| 15-Oct-2020| 20:00 \nUrlmon.dll.mui| 11.0.9600.19867| 49,152| 15-Oct-2020| 20:01 \nUrlmon.dll.mui| 11.0.9600.19867| 48,128| 15-Oct-2020| 20:02 \nUrlmon.dll.mui| 11.0.9600.19867| 35,328| 15-Oct-2020| 20:03 \nUrlmon.dll.mui| 11.0.9600.19867| 35,328| 15-Oct-2020| 20:04 \nUrlmon.dll.mui| 11.0.9600.19867| 35,328| 15-Oct-2020| 20:05 \nJsproxy.dll| 11.0.9600.19867| 54,784| 13-Oct-2020| 05:14 \nWininet.dll| 11.0.9600.19867| 4,859,904| 13-Oct-2020| 04:20 \nInetcpl.cpl.mui| 11.0.9600.19867| 114,176| 15-Oct-2020| 19:37 \nInetcpl.cpl.mui| 11.0.9600.19867| 130,560| 15-Oct-2020| 19:38 \nInetcpl.cpl.mui| 11.0.9600.19867| 124,928| 15-Oct-2020| 19:38 \nInetcpl.cpl.mui| 11.0.9600.19867| 122,880| 15-Oct-2020| 19:39 \nInetcpl.cpl.mui| 11.0.9600.19867| 130,048| 15-Oct-2020| 19:40 \nInetcpl.cpl.mui| 11.0.9600.19867| 138,240| 15-Oct-2020| 19:41 \nInetcpl.cpl.mui| 11.0.9600.19867| 114,688| 15-Oct-2020| 20:35 \nInetcpl.cpl.mui| 11.0.9600.19867| 131,584| 15-Oct-2020| 19:42 \nInetcpl.cpl.mui| 11.0.9600.19867| 117,760| 15-Oct-2020| 19:43 \nInetcpl.cpl.mui| 11.0.9600.19867| 122,368| 15-Oct-2020| 19:43 \nInetcpl.cpl.mui| 11.0.9600.19867| 134,144| 15-Oct-2020| 19:44 \nInetcpl.cpl.mui| 11.0.9600.19867| 107,008| 15-Oct-2020| 19:45 \nInetcpl.cpl.mui| 11.0.9600.19867| 123,392| 15-Oct-2020| 19:46 \nInetcpl.cpl.mui| 11.0.9600.19867| 127,488| 15-Oct-2020| 19:47 \nInetcpl.cpl.mui| 11.0.9600.19867| 128,512| 15-Oct-2020| 19:48 \nInetcpl.cpl.mui| 11.0.9600.19867| 88,576| 15-Oct-2020| 19:48 \nInetcpl.cpl.mui| 11.0.9600.19867| 82,944| 15-Oct-2020| 19:49 \nInetcpl.cpl.mui| 11.0.9600.19867| 125,440| 15-Oct-2020| 19:50 \nInetcpl.cpl.mui| 11.0.9600.19867| 123,392| 15-Oct-2020| 19:51 \nInetcpl.cpl.mui| 11.0.9600.19867| 120,320| 15-Oct-2020| 19:52 \nInetcpl.cpl.mui| 11.0.9600.19867| 130,560| 15-Oct-2020| 19:53 \nInetcpl.cpl.mui| 11.0.9600.19867| 129,024| 15-Oct-2020| 19:53 \nInetcpl.cpl.mui| 11.0.9600.19867| 125,952| 15-Oct-2020| 19:54 \nInetcpl.cpl.mui| 11.0.9600.19867| 129,024| 15-Oct-2020| 19:55 \nInetcpl.cpl.mui| 11.0.9600.19867| 128,000| 15-Oct-2020| 19:56 \nInetcpl.cpl.mui| 11.0.9600.19867| 123,904| 15-Oct-2020| 19:56 \nInetcpl.cpl.mui| 11.0.9600.19867| 129,024| 15-Oct-2020| 19:57 \nInetcpl.cpl.mui| 11.0.9600.19867| 123,904| 15-Oct-2020| 19:59 \nInetcpl.cpl.mui| 11.0.9600.19867| 124,416| 15-Oct-2020| 19:59 \nInetcpl.cpl.mui| 11.0.9600.19867| 121,856| 15-Oct-2020| 20:00 \nInetcpl.cpl.mui| 11.0.9600.19867| 115,712| 15-Oct-2020| 20:00 \nInetcpl.cpl.mui| 11.0.9600.19867| 123,904| 15-Oct-2020| 20:01 \nInetcpl.cpl.mui| 11.0.9600.19867| 125,440| 15-Oct-2020| 20:02 \nInetcpl.cpl.mui| 11.0.9600.19867| 72,704| 15-Oct-2020| 20:03 \nInetcpl.cpl.mui| 11.0.9600.19867| 73,728| 15-Oct-2020| 20:04 \nInetcpl.cpl.mui| 11.0.9600.19867| 73,728| 15-Oct-2020| 20:05 \nMsfeedsbs.dll| 11.0.9600.19867| 60,416| 13-Oct-2020| 04:48 \nMsfeedsbs.mof| Not applicable| 1,574| 13-Oct-2020| 02:41 \nMsfeedssync.exe| 11.0.9600.19867| 13,312| 13-Oct-2020| 05:22 \nMicrosoft-windows-ie-htmlrendering.ptxml| Not applicable| 3,228| 13-Oct-2020| 02:27 \nMshtml.dll| 11.0.9600.19867| 25,758,208| 13-Oct-2020| 06:57 \nMshtml.tlb| 11.0.9600.19867| 2,724,864| 13-Oct-2020| 05:35 \nIeproxy.dll| 11.0.9600.19867| 857,600| 13-Oct-2020| 03:54 \nIeshims.dll| 11.0.9600.19867| 387,072| 13-Oct-2020| 04:03 \nIertutil.dll| 11.0.9600.19867| 2,915,840| 13-Oct-2020| 05:22 \nSqmapi.dll| 6.2.9200.16384| 286,088| 15-Oct-2020| 19:36 \nIeframe.dll.mui| 11.0.9600.19867| 2,066,432| 15-Oct-2020| 19:37 \nIeframe.dll.mui| 11.0.9600.19867| 2,121,216| 15-Oct-2020| 19:38 \nIeframe.dll.mui| 11.0.9600.19867| 2,075,136| 15-Oct-2020| 19:39 \nIeframe.dll.mui| 11.0.9600.19867| 2,063,872| 15-Oct-2020| 19:40 \nIeframe.dll.mui| 11.0.9600.19867| 2,314,240| 15-Oct-2020| 19:41 \nIeframe.dll.mui| 11.0.9600.19867| 2,390,528| 15-Oct-2020| 19:41 \nIeframe.dll.mui| 11.0.9600.19867| 2,033,152| 15-Oct-2020| 20:35 \nIeframe.dll.mui| 11.0.9600.19867| 2,307,584| 15-Oct-2020| 19:42 \nIeframe.dll.mui| 11.0.9600.19867| 2,255,872| 15-Oct-2020| 19:43 \nIeframe.dll.mui| 11.0.9600.19867| 2,061,312| 15-Oct-2020| 19:44 \nIeframe.dll.mui| 11.0.9600.19867| 2,326,016| 15-Oct-2020| 19:45 \nIeframe.dll.mui| 11.0.9600.19867| 2,019,840| 15-Oct-2020| 19:46 \nIeframe.dll.mui| 11.0.9600.19867| 2,071,040| 15-Oct-2020| 19:47 \nIeframe.dll.mui| 11.0.9600.19867| 2,082,816| 15-Oct-2020| 19:47 \nIeframe.dll.mui| 11.0.9600.19867| 2,307,584| 15-Oct-2020| 19:48 \nIeframe.dll.mui| 11.0.9600.19867| 2,170,368| 15-Oct-2020| 19:49 \nIeframe.dll.mui| 11.0.9600.19867| 2,153,984| 15-Oct-2020| 19:50 \nIeframe.dll.mui| 11.0.9600.19867| 2,291,712| 15-Oct-2020| 19:51 \nIeframe.dll.mui| 11.0.9600.19867| 2,283,520| 15-Oct-2020| 19:51 \nIeframe.dll.mui| 11.0.9600.19867| 2,052,096| 15-Oct-2020| 19:52 \nIeframe.dll.mui| 11.0.9600.19867| 2,301,952| 15-Oct-2020| 19:53 \nIeframe.dll.mui| 11.0.9600.19867| 2,093,056| 15-Oct-2020| 19:54 \nIeframe.dll.mui| 11.0.9600.19867| 2,075,648| 15-Oct-2020| 19:55 \nIeframe.dll.mui| 11.0.9600.19867| 2,299,392| 15-Oct-2020| 19:55 \nIeframe.dll.mui| 11.0.9600.19867| 2,094,592| 15-Oct-2020| 19:56 \nIeframe.dll.mui| 11.0.9600.19867| 2,316,800| 15-Oct-2020| 19:57 \nIeframe.dll.mui| 11.0.9600.19867| 2,305,536| 15-Oct-2020| 19:58 \nIeframe.dll.mui| 11.0.9600.19867| 2,278,912| 15-Oct-2020| 19:58 \nIeframe.dll.mui| 11.0.9600.19867| 2,277,888| 15-Oct-2020| 19:59 \nIeframe.dll.mui| 11.0.9600.19867| 2,060,288| 15-Oct-2020| 20:00 \nIeframe.dll.mui| 11.0.9600.19867| 2,315,776| 15-Oct-2020| 20:01 \nIeframe.dll.mui| 11.0.9600.19867| 2,278,912| 15-Oct-2020| 20:02 \nIeframe.dll.mui| 11.0.9600.19867| 2,324,992| 15-Oct-2020| 20:03 \nIeframe.dll.mui| 11.0.9600.19867| 2,098,176| 15-Oct-2020| 20:04 \nIeframe.dll.mui| 11.0.9600.19867| 1,890,304| 15-Oct-2020| 20:04 \nIeframe.dll.mui| 11.0.9600.19867| 1,890,304| 15-Oct-2020| 20:05 \nIeframe.dll| 11.0.9600.19867| 15,494,144| 13-Oct-2020| 04:32 \nIeframe.ptxml| Not applicable| 24,486| 13-Oct-2020| 02:27 \nInetres.adml| Not applicable| 456,165| 15-Oct-2020| 19:37 \nInetres.adml| Not applicable| 456,165| 15-Oct-2020| 19:38 \nInetres.adml| Not applicable| 524,733| 15-Oct-2020| 19:39 \nInetres.adml| Not applicable| 498,151| 15-Oct-2020| 19:39 \nInetres.adml| Not applicable| 550,745| 15-Oct-2020| 19:40 \nInetres.adml| Not applicable| 942,143| 15-Oct-2020| 19:41 \nInetres.adml| Not applicable| 456,165| 15-Oct-2020| 20:35 \nInetres.adml| Not applicable| 542,443| 15-Oct-2020| 19:42 \nInetres.adml| Not applicable| 456,165| 15-Oct-2020| 19:43 \nInetres.adml| Not applicable| 524,999| 15-Oct-2020| 19:43 \nInetres.adml| Not applicable| 574,243| 15-Oct-2020| 19:45 \nInetres.adml| Not applicable| 456,165| 15-Oct-2020| 19:45 \nInetres.adml| Not applicable| 456,165| 15-Oct-2020| 19:46 \nInetres.adml| Not applicable| 569,173| 15-Oct-2020| 19:47 \nInetres.adml| Not applicable| 546,643| 15-Oct-2020| 19:48 \nInetres.adml| Not applicable| 637,356| 15-Oct-2020| 19:48 \nInetres.adml| Not applicable| 523,880| 15-Oct-2020| 19:49 \nInetres.adml| Not applicable| 456,165| 15-Oct-2020| 19:50 \nInetres.adml| Not applicable| 456,165| 15-Oct-2020| 19:51 \nInetres.adml| Not applicable| 487,001| 15-Oct-2020| 19:52 \nInetres.adml| Not applicable| 546,980| 15-Oct-2020| 19:52 \nInetres.adml| Not applicable| 557,656| 15-Oct-2020| 19:53 \nInetres.adml| Not applicable| 533,510| 15-Oct-2020| 19:54 \nInetres.adml| Not applicable| 539,964| 15-Oct-2020| 19:55 \nInetres.adml| Not applicable| 456,165| 15-Oct-2020| 19:56 \nInetres.adml| Not applicable| 802,394| 15-Oct-2020| 19:56 \nInetres.adml| Not applicable| 456,165| 15-Oct-2020| 19:57 \nInetres.adml| Not applicable| 456,165| 15-Oct-2020| 19:58 \nInetres.adml| Not applicable| 456,165| 15-Oct-2020| 19:59 \nInetres.adml| Not applicable| 502,367| 15-Oct-2020| 20:00 \nInetres.adml| Not applicable| 456,165| 15-Oct-2020| 20:00 \nInetres.adml| Not applicable| 519,994| 15-Oct-2020| 20:01 \nInetres.adml| Not applicable| 456,165| 15-Oct-2020| 20:02 \nInetres.adml| Not applicable| 418,707| 15-Oct-2020| 20:03 \nInetres.adml| Not applicable| 435,257| 15-Oct-2020| 20:04 \nInetres.adml| Not applicable| 435,257| 15-Oct-2020| 20:05 \nInetres.admx| Not applicable| 1,676,517| 07-Oct-2020| 15:22 \nJscript9.dll.mui| 11.0.9600.19867| 29,184| 15-Oct-2020| 19:37 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 15-Oct-2020| 19:38 \nJscript9.dll.mui| 11.0.9600.19867| 32,768| 15-Oct-2020| 19:39 \nJscript9.dll.mui| 11.0.9600.19867| 33,280| 15-Oct-2020| 19:39 \nJscript9.dll.mui| 11.0.9600.19867| 35,328| 15-Oct-2020| 19:40 \nJscript9.dll.mui| 11.0.9600.19867| 37,888| 15-Oct-2020| 19:41 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 15-Oct-2020| 20:35 \nJscript9.dll.mui| 11.0.9600.19867| 34,304| 15-Oct-2020| 19:42 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 15-Oct-2020| 19:43 \nJscript9.dll.mui| 11.0.9600.19867| 33,280| 15-Oct-2020| 19:43 \nJscript9.dll.mui| 11.0.9600.19867| 34,304| 15-Oct-2020| 19:44 \nJscript9.dll.mui| 11.0.9600.19867| 27,648| 15-Oct-2020| 19:45 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 15-Oct-2020| 19:46 \nJscript9.dll.mui| 11.0.9600.19867| 34,304| 15-Oct-2020| 19:47 \nJscript9.dll.mui| 11.0.9600.19867| 33,792| 15-Oct-2020| 19:48 \nJscript9.dll.mui| 11.0.9600.19867| 23,040| 15-Oct-2020| 19:48 \nJscript9.dll.mui| 11.0.9600.19867| 22,016| 15-Oct-2020| 19:49 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 15-Oct-2020| 19:50 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 15-Oct-2020| 19:51 \nJscript9.dll.mui| 11.0.9600.19867| 31,232| 15-Oct-2020| 19:52 \nJscript9.dll.mui| 11.0.9600.19867| 34,304| 15-Oct-2020| 19:52 \nJscript9.dll.mui| 11.0.9600.19867| 35,840| 15-Oct-2020| 19:53 \nJscript9.dll.mui| 11.0.9600.19867| 32,768| 15-Oct-2020| 19:54 \nJscript9.dll.mui| 11.0.9600.19867| 33,280| 15-Oct-2020| 19:55 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 15-Oct-2020| 19:56 \nJscript9.dll.mui| 11.0.9600.19867| 34,816| 15-Oct-2020| 19:56 \nJscript9.dll.mui| 11.0.9600.19867| 33,280| 15-Oct-2020| 19:57 \nJscript9.dll.mui| 11.0.9600.19867| 32,256| 15-Oct-2020| 19:58 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 15-Oct-2020| 19:59 \nJscript9.dll.mui| 11.0.9600.19867| 32,768| 15-Oct-2020| 20:00 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 15-Oct-2020| 20:00 \nJscript9.dll.mui| 11.0.9600.19867| 30,720| 15-Oct-2020| 20:01 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 15-Oct-2020| 20:02 \nJscript9.dll.mui| 11.0.9600.19867| 16,384| 15-Oct-2020| 20:03 \nJscript9.dll.mui| 11.0.9600.19867| 16,896| 15-Oct-2020| 20:04 \nJscript9.dll.mui| 11.0.9600.19867| 16,896| 15-Oct-2020| 20:05 \nJscript9.dll| 11.0.9600.19867| 5,499,392| 13-Oct-2020| 05:10 \nJscript9diag.dll| 11.0.9600.19867| 814,080| 13-Oct-2020| 05:09 \nJscript.dll| 5.8.9600.19867| 785,408| 13-Oct-2020| 05:09 \nVbscript.dll| 5.8.9600.19867| 581,120| 13-Oct-2020| 05:20 \nIexplore.exe| 11.0.9600.19867| 810,392| 15-Oct-2020| 18:42 \nMshtml.dll| 11.0.9600.19867| 20,293,632| 13-Oct-2020| 04:59 \nMshtml.tlb| 11.0.9600.19867| 2,724,864| 13-Oct-2020| 04:57 \nWow64_microsoft-windows-ie-htmlrendering.ptxml| Not applicable| 3,228| 13-Oct-2020| 02:25 \nIe9props.propdesc| Not applicable| 2,843| 23-Sep-2018| 13:32 \nIeframe.dll| 11.0.9600.19867| 13,873,664| 13-Oct-2020| 04:09 \nWow64_ieframe.ptxml| Not applicable| 24,486| 13-Oct-2020| 02:25 \nJscript9.dll| 11.0.9600.19867| 4,112,384| 13-Oct-2020| 04:12 \nJscript9diag.dll| 11.0.9600.19867| 620,032| 13-Oct-2020| 04:35 \nJscript.dll| 5.8.9600.19867| 653,824| 13-Oct-2020| 04:35 \nVbscript.dll| 5.8.9600.19867| 498,176| 13-Oct-2020| 04:45 \nUrlmon.dll| 11.0.9600.19867| 1,342,976| 13-Oct-2020| 03:48 \nWininet.dll.mui| 11.0.9600.19867| 46,592| 15-Oct-2020| 18:43 \nWininet.dll.mui| 11.0.9600.19867| 52,736| 15-Oct-2020| 18:44 \nWininet.dll.mui| 11.0.9600.19867| 51,200| 15-Oct-2020| 18:45 \nWininet.dll.mui| 11.0.9600.19867| 51,200| 15-Oct-2020| 18:46 \nWininet.dll.mui| 11.0.9600.19867| 56,320| 15-Oct-2020| 18:46 \nWininet.dll.mui| 11.0.9600.19867| 57,856| 15-Oct-2020| 18:47 \nWininet.dll.mui| 11.0.9600.19867| 49,664| 15-Oct-2020| 20:11 \nWininet.dll.mui| 11.0.9600.19867| 54,272| 15-Oct-2020| 18:49 \nWininet.dll.mui| 11.0.9600.19867| 47,616| 15-Oct-2020| 18:49 \nWininet.dll.mui| 11.0.9600.19867| 49,152| 15-Oct-2020| 18:50 \nWininet.dll.mui| 11.0.9600.19867| 55,296| 15-Oct-2020| 18:51 \nWininet.dll.mui| 11.0.9600.19867| 45,056| 15-Oct-2020| 18:52 \nWininet.dll.mui| 11.0.9600.19867| 51,712| 15-Oct-2020| 18:52 \nWininet.dll.mui| 11.0.9600.19867| 51,712| 15-Oct-2020| 18:53 \nWininet.dll.mui| 11.0.9600.19867| 53,248| 15-Oct-2020| 18:54 \nWininet.dll.mui| 11.0.9600.19867| 39,424| 15-Oct-2020| 18:55 \nWininet.dll.mui| 11.0.9600.19867| 35,840| 15-Oct-2020| 18:56 \nWininet.dll.mui| 11.0.9600.19867| 50,176| 15-Oct-2020| 18:57 \nWininet.dll.mui| 11.0.9600.19867| 51,200| 15-Oct-2020| 18:57 \nWininet.dll.mui| 11.0.9600.19867| 50,688| 15-Oct-2020| 18:58 \nWininet.dll.mui| 11.0.9600.19867| 52,736| 15-Oct-2020| 18:59 \nWininet.dll.mui| 11.0.9600.19867| 53,760| 15-Oct-2020| 19:00 \nWininet.dll.mui| 11.0.9600.19867| 54,272| 15-Oct-2020| 19:01 \nWininet.dll.mui| 11.0.9600.19867| 54,272| 15-Oct-2020| 19:01 \nWininet.dll.mui| 11.0.9600.19867| 52,736| 15-Oct-2020| 19:02 \nWininet.dll.mui| 11.0.9600.19867| 51,200| 15-Oct-2020| 19:03 \nWininet.dll.mui| 11.0.9600.19867| 53,248| 15-Oct-2020| 19:04 \nWininet.dll.mui| 11.0.9600.19867| 52,736| 15-Oct-2020| 19:05 \nWininet.dll.mui| 11.0.9600.19867| 51,712| 15-Oct-2020| 19:05 \nWininet.dll.mui| 11.0.9600.19867| 50,688| 15-Oct-2020| 19:06 \nWininet.dll.mui| 11.0.9600.19867| 50,688| 15-Oct-2020| 19:07 \nWininet.dll.mui| 11.0.9600.19867| 50,176| 15-Oct-2020| 19:08 \nWininet.dll.mui| 11.0.9600.19867| 50,176| 15-Oct-2020| 19:09 \nWininet.dll.mui| 11.0.9600.19867| 30,720| 15-Oct-2020| 19:10 \nWininet.dll.mui| 11.0.9600.19867| 30,720| 15-Oct-2020| 19:10 \nWininet.dll.mui| 11.0.9600.19867| 30,720| 15-Oct-2020| 19:11 \nInetcpl.cpl| 11.0.9600.19867| 2,058,752| 13-Oct-2020| 04:09 \nMshtml.dll.mui| 11.0.9600.19867| 307,200| 15-Oct-2020| 18:43 \nMshtml.dll.mui| 11.0.9600.19867| 293,888| 15-Oct-2020| 18:44 \nMshtml.dll.mui| 11.0.9600.19867| 290,304| 15-Oct-2020| 18:45 \nMshtml.dll.mui| 11.0.9600.19867| 289,280| 15-Oct-2020| 18:46 \nMshtml.dll.mui| 11.0.9600.19867| 299,008| 15-Oct-2020| 18:47 \nMshtml.dll.mui| 11.0.9600.19867| 303,104| 15-Oct-2020| 18:48 \nMshtml.dll.mui| 11.0.9600.19867| 282,112| 15-Oct-2020| 20:11 \nMshtml.dll.mui| 11.0.9600.19867| 296,960| 15-Oct-2020| 18:49 \nMshtml.dll.mui| 11.0.9600.19867| 283,648| 15-Oct-2020| 18:49 \nMshtml.dll.mui| 11.0.9600.19867| 291,840| 15-Oct-2020| 18:50 \nMshtml.dll.mui| 11.0.9600.19867| 299,520| 15-Oct-2020| 18:51 \nMshtml.dll.mui| 11.0.9600.19867| 275,968| 15-Oct-2020| 18:52 \nMshtml.dll.mui| 11.0.9600.19867| 290,816| 15-Oct-2020| 18:52 \nMshtml.dll.mui| 11.0.9600.19867| 293,376| 15-Oct-2020| 18:53 \nMshtml.dll.mui| 11.0.9600.19867| 296,960| 15-Oct-2020| 18:54 \nMshtml.dll.mui| 11.0.9600.19867| 258,048| 15-Oct-2020| 18:55 \nMshtml.dll.mui| 11.0.9600.19867| 256,512| 15-Oct-2020| 18:56 \nMshtml.dll.mui| 11.0.9600.19867| 289,280| 15-Oct-2020| 18:57 \nMshtml.dll.mui| 11.0.9600.19867| 288,256| 15-Oct-2020| 18:57 \nMshtml.dll.mui| 11.0.9600.19867| 285,184| 15-Oct-2020| 18:59 \nMshtml.dll.mui| 11.0.9600.19867| 295,424| 15-Oct-2020| 18:59 \nMshtml.dll.mui| 11.0.9600.19867| 297,472| 15-Oct-2020| 19:00 \nMshtml.dll.mui| 11.0.9600.19867| 292,864| 15-Oct-2020| 19:01 \nMshtml.dll.mui| 11.0.9600.19867| 295,424| 15-Oct-2020| 19:01 \nMshtml.dll.mui| 11.0.9600.19867| 294,400| 15-Oct-2020| 19:02 \nMshtml.dll.mui| 11.0.9600.19867| 294,400| 15-Oct-2020| 19:03 \nMshtml.dll.mui| 11.0.9600.19867| 292,864| 15-Oct-2020| 19:04 \nMshtml.dll.mui| 11.0.9600.19867| 290,816| 15-Oct-2020| 19:05 \nMshtml.dll.mui| 11.0.9600.19867| 288,768| 15-Oct-2020| 19:06 \nMshtml.dll.mui| 11.0.9600.19867| 286,208| 15-Oct-2020| 19:06 \nMshtml.dll.mui| 11.0.9600.19867| 281,600| 15-Oct-2020| 19:07 \nMshtml.dll.mui| 11.0.9600.19867| 286,720| 15-Oct-2020| 19:08 \nMshtml.dll.mui| 11.0.9600.19867| 292,352| 15-Oct-2020| 19:09 \nMshtml.dll.mui| 11.0.9600.19867| 242,176| 15-Oct-2020| 19:10 \nMshtml.dll.mui| 11.0.9600.19867| 243,200| 15-Oct-2020| 19:11 \nMshtml.dll.mui| 11.0.9600.19867| 243,200| 15-Oct-2020| 19:11 \nUrlmon.dll.mui| 11.0.9600.19867| 46,080| 15-Oct-2020| 18:43 \nUrlmon.dll.mui| 11.0.9600.19867| 50,176| 15-Oct-2020| 18:45 \nUrlmon.dll.mui| 11.0.9600.19867| 48,640| 15-Oct-2020| 18:45 \nUrlmon.dll.mui| 11.0.9600.19867| 49,664| 15-Oct-2020| 18:45 \nUrlmon.dll.mui| 11.0.9600.19867| 51,712| 15-Oct-2020| 18:46 \nUrlmon.dll.mui| 11.0.9600.19867| 54,272| 15-Oct-2020| 18:47 \nUrlmon.dll.mui| 11.0.9600.19867| 48,128| 15-Oct-2020| 20:11 \nUrlmon.dll.mui| 11.0.9600.19867| 50,176| 15-Oct-2020| 18:48 \nUrlmon.dll.mui| 11.0.9600.19867| 47,616| 15-Oct-2020| 18:49 \nUrlmon.dll.mui| 11.0.9600.19867| 49,152| 15-Oct-2020| 18:50 \nUrlmon.dll.mui| 11.0.9600.19867| 50,688| 15-Oct-2020| 18:51 \nUrlmon.dll.mui| 11.0.9600.19867| 45,056| 15-Oct-2020| 18:52 \nUrlmon.dll.mui| 11.0.9600.19867| 49,152| 15-Oct-2020| 18:52 \nUrlmon.dll.mui| 11.0.9600.19867| 49,152| 15-Oct-2020| 18:53 \nUrlmon.dll.mui| 11.0.9600.19867| 49,664| 15-Oct-2020| 18:54 \nUrlmon.dll.mui| 11.0.9600.19867| 39,936| 15-Oct-2020| 18:55 \nUrlmon.dll.mui| 11.0.9600.19867| 39,424| 15-Oct-2020| 18:56 \nUrlmon.dll.mui| 11.0.9600.19867| 47,616| 15-Oct-2020| 18:57 \nUrlmon.dll.mui| 11.0.9600.19867| 47,616| 15-Oct-2020| 18:57 \nUrlmon.dll.mui| 11.0.9600.19867| 48,640| 15-Oct-2020| 18:58 \nUrlmon.dll.mui| 11.0.9600.19867| 51,200| 15-Oct-2020| 18:59 \nUrlmon.dll.mui| 11.0.9600.19867| 50,688| 15-Oct-2020| 19:00 \nUrlmon.dll.mui| 11.0.9600.19867| 49,664| 15-Oct-2020| 19:00 \nUrlmon.dll.mui| 11.0.9600.19867| 50,176| 15-Oct-2020| 19:01 \nUrlmon.dll.mui| 11.0.9600.19867| 49,152| 15-Oct-2020| 19:02 \nUrlmon.dll.mui| 11.0.9600.19867| 48,640| 15-Oct-2020| 19:03 \nUrlmon.dll.mui| 11.0.9600.19867| 50,176| 15-Oct-2020| 19:04 \nUrlmon.dll.mui| 11.0.9600.19867| 48,640| 15-Oct-2020| 19:04 \nUrlmon.dll.mui| 11.0.9600.19867| 49,664| 15-Oct-2020| 19:05 \nUrlmon.dll.mui| 11.0.9600.19867| 48,640| 15-Oct-2020| 19:06 \nUrlmon.dll.mui| 11.0.9600.19867| 48,128| 15-Oct-2020| 19:07 \nUrlmon.dll.mui| 11.0.9600.19867| 49,152| 15-Oct-2020| 19:08 \nUrlmon.dll.mui| 11.0.9600.19867| 48,128| 15-Oct-2020| 19:09 \nUrlmon.dll.mui| 11.0.9600.19867| 35,328| 15-Oct-2020| 19:10 \nUrlmon.dll.mui| 11.0.9600.19867| 35,328| 15-Oct-2020| 19:10 \nUrlmon.dll.mui| 11.0.9600.19867| 35,328| 15-Oct-2020| 19:12 \nJsproxy.dll| 11.0.9600.19867| 47,104| 13-Oct-2020| 04:38 \nWininet.dll| 11.0.9600.19867| 4,387,840| 13-Oct-2020| 03:51 \nInetcpl.cpl.mui| 11.0.9600.19867| 114,176| 15-Oct-2020| 18:44 \nInetcpl.cpl.mui| 11.0.9600.19867| 130,560| 15-Oct-2020| 18:44 \nInetcpl.cpl.mui| 11.0.9600.19867| 124,928| 15-Oct-2020| 18:45 \nInetcpl.cpl.mui| 11.0.9600.19867| 122,880| 15-Oct-2020| 18:46 \nInetcpl.cpl.mui| 11.0.9600.19867| 130,048| 15-Oct-2020| 18:46 \nInetcpl.cpl.mui| 11.0.9600.19867| 138,240| 15-Oct-2020| 18:47 \nInetcpl.cpl.mui| 11.0.9600.19867| 114,688| 15-Oct-2020| 20:11 \nInetcpl.cpl.mui| 11.0.9600.19867| 131,584| 15-Oct-2020| 18:48 \nInetcpl.cpl.mui| 11.0.9600.19867| 117,760| 15-Oct-2020| 18:49 \nInetcpl.cpl.mui| 11.0.9600.19867| 122,368| 15-Oct-2020| 18:50 \nInetcpl.cpl.mui| 11.0.9600.19867| 134,144| 15-Oct-2020| 18:51 \nInetcpl.cpl.mui| 11.0.9600.19867| 107,008| 15-Oct-2020| 18:52 \nInetcpl.cpl.mui| 11.0.9600.19867| 123,392| 15-Oct-2020| 18:52 \nInetcpl.cpl.mui| 11.0.9600.19867| 127,488| 15-Oct-2020| 18:53 \nInetcpl.cpl.mui| 11.0.9600.19867| 128,512| 15-Oct-2020| 18:54 \nInetcpl.cpl.mui| 11.0.9600.19867| 88,576| 15-Oct-2020| 18:55 \nInetcpl.cpl.mui| 11.0.9600.19867| 82,944| 15-Oct-2020| 18:56 \nInetcpl.cpl.mui| 11.0.9600.19867| 125,440| 15-Oct-2020| 18:57 \nInetcpl.cpl.mui| 11.0.9600.19867| 123,392| 15-Oct-2020| 18:57 \nInetcpl.cpl.mui| 11.0.9600.19867| 120,320| 15-Oct-2020| 18:58 \nInetcpl.cpl.mui| 11.0.9600.19867| 130,560| 15-Oct-2020| 18:59 \nInetcpl.cpl.mui| 11.0.9600.19867| 129,024| 15-Oct-2020| 19:00 \nInetcpl.cpl.mui| 11.0.9600.19867| 125,952| 15-Oct-2020| 19:00 \nInetcpl.cpl.mui| 11.0.9600.19867| 129,024| 15-Oct-2020| 19:01 \nInetcpl.cpl.mui| 11.0.9600.19867| 128,000| 15-Oct-2020| 19:02 \nInetcpl.cpl.mui| 11.0.9600.19867| 123,904| 15-Oct-2020| 19:03 \nInetcpl.cpl.mui| 11.0.9600.19867| 129,024| 15-Oct-2020| 19:04 \nInetcpl.cpl.mui| 11.0.9600.19867| 123,904| 15-Oct-2020| 19:05 \nInetcpl.cpl.mui| 11.0.9600.19867| 124,416| 15-Oct-2020| 19:06 \nInetcpl.cpl.mui| 11.0.9600.19867| 121,856| 15-Oct-2020| 19:06 \nInetcpl.cpl.mui| 11.0.9600.19867| 115,712| 15-Oct-2020| 19:08 \nInetcpl.cpl.mui| 11.0.9600.19867| 123,904| 15-Oct-2020| 19:08 \nInetcpl.cpl.mui| 11.0.9600.19867| 125,440| 15-Oct-2020| 19:09 \nInetcpl.cpl.mui| 11.0.9600.19867| 72,704| 15-Oct-2020| 19:10 \nInetcpl.cpl.mui| 11.0.9600.19867| 73,728| 15-Oct-2020| 19:11 \nInetcpl.cpl.mui| 11.0.9600.19867| 73,728| 15-Oct-2020| 19:12 \nMsfeedsbs.dll| 11.0.9600.19867| 52,736| 13-Oct-2020| 04:19 \nMsfeedsbs.mof| Not applicable| 1,574| 13-Oct-2020| 02:33 \nMsfeedssync.exe| 11.0.9600.19867| 11,776| 13-Oct-2020| 04:46 \nIeproxy.dll| 11.0.9600.19867| 309,248| 13-Oct-2020| 03:44 \nIeshims.dll| 11.0.9600.19867| 290,304| 13-Oct-2020| 03:49 \nIertutil.dll| 11.0.9600.19867| 2,307,072| 13-Oct-2020| 04:42 \nSqmapi.dll| 6.2.9200.16384| 228,248| 15-Oct-2020| 18:42 \nIeframe.dll.mui| 11.0.9600.19867| 2,066,432| 15-Oct-2020| 18:44 \nIeframe.dll.mui| 11.0.9600.19867| 2,121,216| 15-Oct-2020| 18:44 \nIeframe.dll.mui| 11.0.9600.19867| 2,075,136| 15-Oct-2020| 18:45 \nIeframe.dll.mui| 11.0.9600.19867| 2,063,872| 15-Oct-2020| 18:46 \nIeframe.dll.mui| 11.0.9600.19867| 2,314,240| 15-Oct-2020| 18:47 \nIeframe.dll.mui| 11.0.9600.19867| 2,390,528| 15-Oct-2020| 18:48 \nIeframe.dll.mui| 11.0.9600.19867| 2,033,152| 15-Oct-2020| 20:11 \nIeframe.dll.mui| 11.0.9600.19867| 2,307,584| 15-Oct-2020| 18:49 \nIeframe.dll.mui| 11.0.9600.19867| 2,255,872| 15-Oct-2020| 18:50 \nIeframe.dll.mui| 11.0.9600.19867| 2,061,312| 15-Oct-2020| 18:50 \nIeframe.dll.mui| 11.0.9600.19867| 2,326,016| 15-Oct-2020| 18:51 \nIeframe.dll.mui| 11.0.9600.19867| 2,019,840| 15-Oct-2020| 18:52 \nIeframe.dll.mui| 11.0.9600.19867| 2,071,040| 15-Oct-2020| 18:53 \nIeframe.dll.mui| 11.0.9600.19867| 2,082,816| 15-Oct-2020| 18:54 \nIeframe.dll.mui| 11.0.9600.19867| 2,307,584| 15-Oct-2020| 18:55 \nIeframe.dll.mui| 11.0.9600.19867| 2,170,368| 15-Oct-2020| 18:55 \nIeframe.dll.mui| 11.0.9600.19867| 2,153,984| 15-Oct-2020| 18:56 \nIeframe.dll.mui| 11.0.9600.19867| 2,291,712| 15-Oct-2020| 18:57 \nIeframe.dll.mui| 11.0.9600.19867| 2,283,520| 15-Oct-2020| 18:58 \nIeframe.dll.mui| 11.0.9600.19867| 2,052,096| 15-Oct-2020| 18:58 \nIeframe.dll.mui| 11.0.9600.19867| 2,301,952| 15-Oct-2020| 18:59 \nIeframe.dll.mui| 11.0.9600.19867| 2,093,056| 15-Oct-2020| 19:00 \nIeframe.dll.mui| 11.0.9600.19867| 2,075,648| 15-Oct-2020| 19:01 \nIeframe.dll.mui| 11.0.9600.19867| 2,299,392| 15-Oct-2020| 19:02 \nIeframe.dll.mui| 11.0.9600.19867| 2,094,592| 15-Oct-2020| 19:02 \nIeframe.dll.mui| 11.0.9600.19867| 2,316,800| 15-Oct-2020| 19:03 \nIeframe.dll.mui| 11.0.9600.19867| 2,305,536| 15-Oct-2020| 19:04 \nIeframe.dll.mui| 11.0.9600.19867| 2,278,912| 15-Oct-2020| 19:05 \nIeframe.dll.mui| 11.0.9600.19867| 2,277,888| 15-Oct-2020| 19:06 \nIeframe.dll.mui| 11.0.9600.19867| 2,060,288| 15-Oct-2020| 19:07 \nIeframe.dll.mui| 11.0.9600.19867| 2,315,776| 15-Oct-2020| 19:08 \nIeframe.dll.mui| 11.0.9600.19867| 2,278,912| 15-Oct-2020| 19:09 \nIeframe.dll.mui| 11.0.9600.19867| 2,324,992| 15-Oct-2020| 19:09 \nIeframe.dll.mui| 11.0.9600.19867| 2,098,176| 15-Oct-2020| 19:10 \nIeframe.dll.mui| 11.0.9600.19867| 1,890,304| 15-Oct-2020| 19:11 \nIeframe.dll.mui| 11.0.9600.19867| 1,890,304| 15-Oct-2020| 19:12 \nJscript9.dll.mui| 11.0.9600.19867| 29,184| 15-Oct-2020| 18:43 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 15-Oct-2020| 18:44 \nJscript9.dll.mui| 11.0.9600.19867| 32,768| 15-Oct-2020| 18:45 \nJscript9.dll.mui| 11.0.9600.19867| 33,280| 15-Oct-2020| 18:46 \nJscript9.dll.mui| 11.0.9600.19867| 35,328| 15-Oct-2020| 18:46 \nJscript9.dll.mui| 11.0.9600.19867| 37,888| 15-Oct-2020| 18:47 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 15-Oct-2020| 20:11 \nJscript9.dll.mui| 11.0.9600.19867| 34,304| 15-Oct-2020| 18:49 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 15-Oct-2020| 18:49 \nJscript9.dll.mui| 11.0.9600.19867| 33,280| 15-Oct-2020| 18:50 \nJscript9.dll.mui| 11.0.9600.19867| 34,304| 15-Oct-2020| 18:51 \nJscript9.dll.mui| 11.0.9600.19867| 27,648| 15-Oct-2020| 18:52 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 15-Oct-2020| 18:52 \nJscript9.dll.mui| 11.0.9600.19867| 34,304| 15-Oct-2020| 18:53 \nJscript9.dll.mui| 11.0.9600.19867| 33,792| 15-Oct-2020| 18:54 \nJscript9.dll.mui| 11.0.9600.19867| 23,040| 15-Oct-2020| 18:55 \nJscript9.dll.mui| 11.0.9600.19867| 22,016| 15-Oct-2020| 18:56 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 15-Oct-2020| 18:57 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 15-Oct-2020| 18:57 \nJscript9.dll.mui| 11.0.9600.19867| 31,232| 15-Oct-2020| 18:58 \nJscript9.dll.mui| 11.0.9600.19867| 34,304| 15-Oct-2020| 18:59 \nJscript9.dll.mui| 11.0.9600.19867| 35,840| 15-Oct-2020| 19:00 \nJscript9.dll.mui| 11.0.9600.19867| 32,768| 15-Oct-2020| 19:00 \nJscript9.dll.mui| 11.0.9600.19867| 33,280| 15-Oct-2020| 19:01 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 15-Oct-2020| 19:02 \nJscript9.dll.mui| 11.0.9600.19867| 34,816| 15-Oct-2020| 19:03 \nJscript9.dll.mui| 11.0.9600.19867| 33,280| 15-Oct-2020| 19:04 \nJscript9.dll.mui| 11.0.9600.19867| 32,256| 15-Oct-2020| 19:04 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 15-Oct-2020| 19:05 \nJscript9.dll.mui| 11.0.9600.19867| 32,768| 15-Oct-2020| 19:07 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 15-Oct-2020| 19:07 \nJscript9.dll.mui| 11.0.9600.19867| 30,720| 15-Oct-2020| 19:08 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 15-Oct-2020| 19:09 \nJscript9.dll.mui| 11.0.9600.19867| 16,384| 15-Oct-2020| 19:09 \nJscript9.dll.mui| 11.0.9600.19867| 16,896| 15-Oct-2020| 19:10 \nJscript9.dll.mui| 11.0.9600.19867| 16,896| 15-Oct-2020| 19:11 \n \n## Windows 7 and Windows Server 2008 R2\n\n## Internet Explorer 11 on all supported x86-based versions\n\n**File name**| **File version**| **File size**| **Date**| **Time** \n---|---|---|---|--- \nUrlmon.dll| 11.0.9600.19867| 1,342,976| 13-Oct-2020| 03:48 \nIexplore.exe| 11.0.9600.19867| 810,376| 16-Oct-2020| 00:08 \nWebcheck.dll.mui| 11.0.9600.19867| 31,744| 16-Oct-2020| 00:10 \nWebcheck.dll.mui| 11.0.9600.19867| 36,352| 16-Oct-2020| 00:11 \nWebcheck.dll.mui| 11.0.9600.19867| 35,328| 16-Oct-2020| 00:11 \nWebcheck.dll.mui| 11.0.9600.19867| 34,816| 16-Oct-2020| 00:12 \nWebcheck.dll.mui| 11.0.9600.19867| 36,864| 16-Oct-2020| 00:13 \nWebcheck.dll.mui| 11.0.9600.19867| 39,424| 16-Oct-2020| 00:14 \nWebcheck.dll.mui| 11.0.9600.19867| 32,768| 16-Oct-2020| 01:38 \nWebcheck.dll.mui| 11.0.9600.19867| 37,376| 16-Oct-2020| 00:15 \nWebcheck.dll.mui| 11.0.9600.19867| 33,280| 16-Oct-2020| 00:16 \nWebcheck.dll.mui| 11.0.9600.19867| 34,816| 16-Oct-2020| 00:16 \nWebcheck.dll.mui| 11.0.9600.19867| 38,400| 16-Oct-2020| 00:17 \nWebcheck.dll.mui| 11.0.9600.19867| 30,720| 16-Oct-2020| 00:18 \nWebcheck.dll.mui| 11.0.9600.19867| 34,816| 16-Oct-2020| 00:19 \nWebcheck.dll.mui| 11.0.9600.19867| 35,328| 16-Oct-2020| 00:20 \nWebcheck.dll.mui| 11.0.9600.19867| 36,864| 16-Oct-2020| 00:20 \nWebcheck.dll.mui| 11.0.9600.19867| 25,600| 16-Oct-2020| 00:21 \nWebcheck.dll.mui| 11.0.9600.19867| 24,576| 16-Oct-2020| 00:22 \nWebcheck.dll.mui| 11.0.9600.19867| 35,840| 16-Oct-2020| 00:23 \nWebcheck.dll.mui| 11.0.9600.19867| 34,304| 16-Oct-2020| 00:24 \nWebcheck.dll.mui| 11.0.9600.19867| 34,304| 16-Oct-2020| 00:25 \nWebcheck.dll.mui| 11.0.9600.19867| 36,352| 16-Oct-2020| 00:25 \nWebcheck.dll.mui| 11.0.9600.19867| 35,840| 16-Oct-2020| 00:26 \nWebcheck.dll.mui| 11.0.9600.19867| 34,816| 16-Oct-2020| 00:27 \nWebcheck.dll.mui| 11.0.9600.19867| 35,840| 16-Oct-2020| 00:28 \nWebcheck.dll.mui| 11.0.9600.19867| 35,840| 16-Oct-2020| 00:29 \nWebcheck.dll.mui| 11.0.9600.19867| 34,304| 16-Oct-2020| 00:29 \nWebcheck.dll.mui| 11.0.9600.19867| 35,840| 16-Oct-2020| 00:30 \nWebcheck.dll.mui| 11.0.9600.19867| 34,816| 16-Oct-2020| 00:31 \nWebcheck.dll.mui| 11.0.9600.19867| 34,816| 16-Oct-2020| 00:32 \nWebcheck.dll.mui| 11.0.9600.19867| 34,816| 16-Oct-2020| 00:33 \nWebcheck.dll.mui| 11.0.9600.19867| 33,280| 16-Oct-2020| 00:33 \nWebcheck.dll.mui| 11.0.9600.19867| 34,304| 16-Oct-2020| 00:34 \nWebcheck.dll.mui| 11.0.9600.19867| 34,304| 16-Oct-2020| 00:35 \nWebcheck.dll.mui| 11.0.9600.19867| 20,992| 16-Oct-2020| 00:36 \nWebcheck.dll.mui| 11.0.9600.19867| 21,504| 16-Oct-2020| 00:37 \nWebcheck.dll.mui| 11.0.9600.19867| 21,504| 16-Oct-2020| 00:38 \nWininet.dll.mui| 11.0.9600.19867| 46,592| 16-Oct-2020| 00:10 \nWininet.dll.mui| 11.0.9600.19867| 52,736| 16-Oct-2020| 00:11 \nWininet.dll.mui| 11.0.9600.19867| 51,200| 16-Oct-2020| 00:11 \nWininet.dll.mui| 11.0.9600.19867| 51,200| 16-Oct-2020| 00:12 \nWininet.dll.mui| 11.0.9600.19867| 56,320| 16-Oct-2020| 00:13 \nWininet.dll.mui| 11.0.9600.19867| 57,856| 16-Oct-2020| 00:14 \nWininet.dll.mui| 11.0.9600.19867| 49,664| 16-Oct-2020| 01:38 \nWininet.dll.mui| 11.0.9600.19867| 54,272| 16-Oct-2020| 00:15 \nWininet.dll.mui| 11.0.9600.19867| 47,616| 16-Oct-2020| 00:15 \nWininet.dll.mui| 11.0.9600.19867| 49,152| 16-Oct-2020| 00:16 \nWininet.dll.mui| 11.0.9600.19867| 55,296| 16-Oct-2020| 00:17 \nWininet.dll.mui| 11.0.9600.19867| 45,056| 16-Oct-2020| 00:18 \nWininet.dll.mui| 11.0.9600.19867| 51,712| 16-Oct-2020| 00:19 \nWininet.dll.mui| 11.0.9600.19867| 51,712| 16-Oct-2020| 00:19 \nWininet.dll.mui| 11.0.9600.19867| 53,248| 16-Oct-2020| 00:20 \nWininet.dll.mui| 11.0.9600.19867| 39,424| 16-Oct-2020| 00:21 \nWininet.dll.mui| 11.0.9600.19867| 35,840| 16-Oct-2020| 00:22 \nWininet.dll.mui| 11.0.9600.19867| 50,176| 16-Oct-2020| 00:23 \nWininet.dll.mui| 11.0.9600.19867| 51,200| 16-Oct-2020| 00:24 \nWininet.dll.mui| 11.0.9600.19867| 50,688| 16-Oct-2020| 00:24 \nWininet.dll.mui| 11.0.9600.19867| 52,736| 16-Oct-2020| 00:25 \nWininet.dll.mui| 11.0.9600.19867| 53,760| 16-Oct-2020| 00:26 \nWininet.dll.mui| 11.0.9600.19867| 54,272| 16-Oct-2020| 00:27 \nWininet.dll.mui| 11.0.9600.19867| 54,272| 16-Oct-2020| 00:28 \nWininet.dll.mui| 11.0.9600.19867| 52,736| 16-Oct-2020| 00:29 \nWininet.dll.mui| 11.0.9600.19867| 51,200| 16-Oct-2020| 00:29 \nWininet.dll.mui| 11.0.9600.19867| 53,248| 16-Oct-2020| 00:30 \nWininet.dll.mui| 11.0.9600.19867| 52,736| 16-Oct-2020| 00:31 \nWininet.dll.mui| 11.0.9600.19867| 51,712| 16-Oct-2020| 00:32 \nWininet.dll.mui| 11.0.9600.19867| 50,688| 16-Oct-2020| 00:33 \nWininet.dll.mui| 11.0.9600.19867| 50,688| 16-Oct-2020| 00:33 \nWininet.dll.mui| 11.0.9600.19867| 50,176| 16-Oct-2020| 00:34 \nWininet.dll.mui| 11.0.9600.19867| 50,176| 16-Oct-2020| 00:35 \nWininet.dll.mui| 11.0.9600.19867| 30,720| 16-Oct-2020| 00:36 \nWininet.dll.mui| 11.0.9600.19867| 30,720| 16-Oct-2020| 00:37 \nWininet.dll.mui| 11.0.9600.19867| 30,720| 16-Oct-2020| 00:38 \nInetcpl.cpl| 11.0.9600.19867| 2,058,752| 13-Oct-2020| 04:09 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:10 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:11 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:11 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:12 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:13 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:14 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:38 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:15 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:15 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:16 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:17 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:18 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:19 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:19 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:20 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:21 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:22 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:23 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:24 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:25 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:25 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:26 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:27 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:28 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:29 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:29 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:30 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:31 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:32 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:33 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:33 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:34 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:35 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:36 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:37 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:38 \nMshtml.dll.mui| 11.0.9600.19867| 307,200| 16-Oct-2020| 00:10 \nMshtml.dll.mui| 11.0.9600.19867| 293,888| 16-Oct-2020| 00:11 \nMshtml.dll.mui| 11.0.9600.19867| 290,304| 16-Oct-2020| 00:11 \nMshtml.dll.mui| 11.0.9600.19867| 289,280| 16-Oct-2020| 00:12 \nMshtml.dll.mui| 11.0.9600.19867| 299,008| 16-Oct-2020| 00:13 \nMshtml.dll.mui| 11.0.9600.19867| 303,104| 16-Oct-2020| 00:14 \nMshtml.dll.mui| 11.0.9600.19867| 282,112| 16-Oct-2020| 01:38 \nMshtml.dll.mui| 11.0.9600.19867| 296,960| 16-Oct-2020| 00:15 \nMshtml.dll.mui| 11.0.9600.19867| 283,648| 16-Oct-2020| 00:16 \nMshtml.dll.mui| 11.0.9600.19867| 291,840| 16-Oct-2020| 00:17 \nMshtml.dll.mui| 11.0.9600.19867| 299,520| 16-Oct-2020| 00:17 \nMshtml.dll.mui| 11.0.9600.19867| 275,968| 16-Oct-2020| 00:18 \nMshtml.dll.mui| 11.0.9600.19867| 290,816| 16-Oct-2020| 00:19 \nMshtml.dll.mui| 11.0.9600.19867| 293,376| 16-Oct-2020| 00:19 \nMshtml.dll.mui| 11.0.9600.19867| 296,960| 16-Oct-2020| 00:20 \nMshtml.dll.mui| 11.0.9600.19867| 258,048| 16-Oct-2020| 00:21 \nMshtml.dll.mui| 11.0.9600.19867| 256,512| 16-Oct-2020| 00:22 \nMshtml.dll.mui| 11.0.9600.19867| 289,280| 16-Oct-2020| 00:23 \nMshtml.dll.mui| 11.0.9600.19867| 288,256| 16-Oct-2020| 00:24 \nMshtml.dll.mui| 11.0.9600.19867| 285,184| 16-Oct-2020| 00:25 \nMshtml.dll.mui| 11.0.9600.19867| 295,424| 16-Oct-2020| 00:26 \nMshtml.dll.mui| 11.0.9600.19867| 297,472| 16-Oct-2020| 00:26 \nMshtml.dll.mui| 11.0.9600.19867| 292,864| 16-Oct-2020| 00:27 \nMshtml.dll.mui| 11.0.9600.19867| 295,424| 16-Oct-2020| 00:28 \nMshtml.dll.mui| 11.0.9600.19867| 294,400| 16-Oct-2020| 00:29 \nMshtml.dll.mui| 11.0.9600.19867| 294,400| 16-Oct-2020| 00:30 \nMshtml.dll.mui| 11.0.9600.19867| 292,864| 16-Oct-2020| 00:30 \nMshtml.dll.mui| 11.0.9600.19867| 290,816| 16-Oct-2020| 00:31 \nMshtml.dll.mui| 11.0.9600.19867| 288,768| 16-Oct-2020| 00:32 \nMshtml.dll.mui| 11.0.9600.19867| 286,208| 16-Oct-2020| 00:33 \nMshtml.dll.mui| 11.0.9600.19867| 281,600| 16-Oct-2020| 00:33 \nMshtml.dll.mui| 11.0.9600.19867| 286,720| 16-Oct-2020| 00:35 \nMshtml.dll.mui| 11.0.9600.19867| 292,352| 16-Oct-2020| 00:35 \nMshtml.dll.mui| 11.0.9600.19867| 242,176| 16-Oct-2020| 00:36 \nMshtml.dll.mui| 11.0.9600.19867| 243,200| 16-Oct-2020| 00:37 \nMshtml.dll.mui| 11.0.9600.19867| 243,200| 16-Oct-2020| 00:38 \nF12resources.dll.mui| 11.0.9600.19867| 61,440| 16-Oct-2020| 00:10 \nF12resources.dll.mui| 11.0.9600.19867| 73,728| 16-Oct-2020| 00:11 \nF12resources.dll.mui| 11.0.9600.19867| 67,584| 16-Oct-2020| 00:11 \nF12resources.dll.mui| 11.0.9600.19867| 67,584| 16-Oct-2020| 00:12 \nF12resources.dll.mui| 11.0.9600.19867| 74,240| 16-Oct-2020| 00:13 \nF12resources.dll.mui| 11.0.9600.19867| 78,848| 16-Oct-2020| 00:14 \nF12resources.dll.mui| 11.0.9600.19867| 61,440| 16-Oct-2020| 01:37 \nF12resources.dll.mui| 11.0.9600.19867| 74,752| 16-Oct-2020| 00:15 \nF12resources.dll.mui| 11.0.9600.19867| 62,464| 16-Oct-2020| 00:15 \nF12resources.dll.mui| 11.0.9600.19867| 68,096| 16-Oct-2020| 00:16 \nF12resources.dll.mui| 11.0.9600.19867| 75,264| 16-Oct-2020| 00:17 \nF12resources.dll.mui| 11.0.9600.19867| 61,440| 16-Oct-2020| 00:18 \nF12resources.dll.mui| 11.0.9600.19867| 68,608| 16-Oct-2020| 00:19 \nF12resources.dll.mui| 11.0.9600.19867| 72,192| 16-Oct-2020| 00:19 \nF12resources.dll.mui| 11.0.9600.19867| 73,216| 16-Oct-2020| 00:20 \nF12resources.dll.mui| 11.0.9600.19867| 41,472| 16-Oct-2020| 00:21 \nF12resources.dll.mui| 11.0.9600.19867| 37,888| 16-Oct-2020| 00:22 \nF12resources.dll.mui| 11.0.9600.19867| 68,608| 16-Oct-2020| 00:23 \nF12resources.dll.mui| 11.0.9600.19867| 67,584| 16-Oct-2020| 00:24 \nF12resources.dll.mui| 11.0.9600.19867| 65,536| 16-Oct-2020| 00:24 \nF12resources.dll.mui| 11.0.9600.19867| 74,240| 16-Oct-2020| 00:25 \nF12resources.dll.mui| 11.0.9600.19867| 70,656| 16-Oct-2020| 00:27 \nF12resources.dll.mui| 11.0.9600.19867| 71,168| 16-Oct-2020| 00:27 \nF12resources.dll.mui| 11.0.9600.19867| 71,680| 16-Oct-2020| 00:28 \nF12resources.dll.mui| 11.0.9600.19867| 71,168| 16-Oct-2020| 00:29 \nF12resources.dll.mui| 11.0.9600.19867| 69,632| 16-Oct-2020| 00:30 \nF12resources.dll.mui| 11.0.9600.19867| 68,096| 16-Oct-2020| 00:30 \nF12resources.dll.mui| 11.0.9600.19867| 68,608| 16-Oct-2020| 00:31 \nF12resources.dll.mui| 11.0.9600.19867| 68,096| 16-Oct-2020| 00:32 \nF12resources.dll.mui| 11.0.9600.19867| 65,536| 16-Oct-2020| 00:33 \nF12resources.dll.mui| 11.0.9600.19867| 59,904| 16-Oct-2020| 00:33 \nF12resources.dll.mui| 11.0.9600.19867| 65,536| 16-Oct-2020| 00:34 \nF12resources.dll.mui| 11.0.9600.19867| 69,120| 16-Oct-2020| 00:35 \nF12resources.dll.mui| 11.0.9600.19867| 29,696| 16-Oct-2020| 00:36 \nF12resources.dll.mui| 11.0.9600.19867| 30,720| 16-Oct-2020| 00:37 \nF12resources.dll.mui| 11.0.9600.19867| 30,720| 16-Oct-2020| 00:38 \nJavascriptcollectionagent.dll| 11.0.9600.19867| 60,416| 13-Oct-2020| 04:23 \nDiagnosticshub.scriptedsandboxplugin.dll| 11.0.9600.19867| 230,400| 13-Oct-2020| 04:24 \nUrlmon.dll.mui| 11.0.9600.19867| 46,080| 16-Oct-2020| 00:10 \nUrlmon.dll.mui| 11.0.9600.19867| 50,176| 16-Oct-2020| 00:11 \nUrlmon.dll.mui| 11.0.9600.19867| 48,640| 16-Oct-2020| 00:12 \nUrlmon.dll.mui| 11.0.9600.19867| 49,664| 16-Oct-2020| 00:12 \nUrlmon.dll.mui| 11.0.9600.19867| 51,712| 16-Oct-2020| 00:13 \nUrlmon.dll.mui| 11.0.9600.19867| 54,272| 16-Oct-2020| 00:14 \nUrlmon.dll.mui| 11.0.9600.19867| 48,128| 16-Oct-2020| 01:37 \nUrlmon.dll.mui| 11.0.9600.19867| 50,176| 16-Oct-2020| 00:15 \nUrlmon.dll.mui| 11.0.9600.19867| 47,616| 16-Oct-2020| 00:15 \nUrlmon.dll.mui| 11.0.9600.19867| 49,152| 16-Oct-2020| 00:16 \nUrlmon.dll.mui| 11.0.9600.19867| 50,688| 16-Oct-2020| 00:17 \nUrlmon.dll.mui| 11.0.9600.19867| 45,056| 16-Oct-2020| 00:18 \nUrlmon.dll.mui| 11.0.9600.19867| 49,152| 16-Oct-2020| 00:19 \nUrlmon.dll.mui| 11.0.9600.19867| 49,152| 16-Oct-2020| 00:19 \nUrlmon.dll.mui| 11.0.9600.19867| 49,664| 16-Oct-2020| 00:20 \nUrlmon.dll.mui| 11.0.9600.19867| 39,936| 16-Oct-2020| 00:22 \nUrlmon.dll.mui| 11.0.9600.19867| 39,424| 16-Oct-2020| 00:22 \nUrlmon.dll.mui| 11.0.9600.19867| 47,616| 16-Oct-2020| 00:23 \nUrlmon.dll.mui| 11.0.9600.19867| 47,616| 16-Oct-2020| 00:24 \nUrlmon.dll.mui| 11.0.9600.19867| 48,640| 16-Oct-2020| 00:24 \nUrlmon.dll.mui| 11.0.9600.19867| 51,200| 16-Oct-2020| 00:25 \nUrlmon.dll.mui| 11.0.9600.19867| 50,688| 16-Oct-2020| 00:26 \nUrlmon.dll.mui| 11.0.9600.19867| 49,664| 16-Oct-2020| 00:27 \nUrlmon.dll.mui| 11.0.9600.19867| 50,176| 16-Oct-2020| 00:28 \nUrlmon.dll.mui| 11.0.9600.19867| 49,152| 16-Oct-2020| 00:29 \nUrlmon.dll.mui| 11.0.9600.19867| 48,640| 16-Oct-2020| 00:29 \nUrlmon.dll.mui| 11.0.9600.19867| 50,176| 16-Oct-2020| 00:30 \nUrlmon.dll.mui| 11.0.9600.19867| 48,640| 16-Oct-2020| 00:31 \nUrlmon.dll.mui| 11.0.9600.19867| 49,664| 16-Oct-2020| 00:32 \nUrlmon.dll.mui| 11.0.9600.19867| 48,640| 16-Oct-2020| 00:33 \nUrlmon.dll.mui| 11.0.9600.19867| 48,128| 16-Oct-2020| 00:33 \nUrlmon.dll.mui| 11.0.9600.19867| 49,152| 16-Oct-2020| 00:35 \nUrlmon.dll.mui| 11.0.9600.19867| 48,128| 16-Oct-2020| 00:35 \nUrlmon.dll.mui| 11.0.9600.19867| 35,328| 16-Oct-2020| 00:36 \nUrlmon.dll.mui| 11.0.9600.19867| 35,328| 16-Oct-2020| 00:37 \nUrlmon.dll.mui| 11.0.9600.19867| 35,328| 16-Oct-2020| 00:38 \nOccache.dll.mui| 11.0.9600.19867| 9,728| 16-Oct-2020| 00:10 \nOccache.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:11 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 00:11 \nOccache.dll.mui| 11.0.9600.19867| 9,728| 16-Oct-2020| 00:12 \nOccache.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:13 \nOccache.dll.mui| 11.0.9600.19867| 11,264| 16-Oct-2020| 00:14 \nOccache.dll.mui| 11.0.9600.19867| 9,728| 16-Oct-2020| 01:37 \nOccache.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:15 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 00:15 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 00:16 \nOccache.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:17 \nOccache.dll.mui| 11.0.9600.19867| 9,216| 16-Oct-2020| 00:18 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 00:19 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 00:19 \nOccache.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:20 \nOccache.dll.mui| 11.0.9600.19867| 7,680| 16-Oct-2020| 00:22 \nOccache.dll.mui| 11.0.9600.19867| 7,680| 16-Oct-2020| 00:22 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 00:23 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 00:24 \nOccache.dll.mui| 11.0.9600.19867| 9,728| 16-Oct-2020| 00:25 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 00:25 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 00:26 \nOccache.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:27 \nOccache.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:28 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 00:29 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 00:29 \nOccache.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:30 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 00:31 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 00:32 \nOccache.dll.mui| 11.0.9600.19867| 9,728| 16-Oct-2020| 00:33 \nOccache.dll.mui| 11.0.9600.19867| 9,728| 16-Oct-2020| 00:33 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 00:34 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 00:35 \nOccache.dll.mui| 11.0.9600.19867| 6,656| 16-Oct-2020| 00:36 \nOccache.dll.mui| 11.0.9600.19867| 6,656| 16-Oct-2020| 00:37 \nOccache.dll.mui| 11.0.9600.19867| 6,656| 16-Oct-2020| 00:38 \nJsproxy.dll| 11.0.9600.19867| 47,104| 13-Oct-2020| 04:38 \nWininet.dll| 11.0.9600.19867| 4,387,840| 13-Oct-2020| 03:51 \nInetcpl.cpl.mui| 11.0.9600.19867| 114,176| 16-Oct-2020| 00:10 \nInetcpl.cpl.mui| 11.0.9600.19867| 130,560| 16-Oct-2020| 00:11 \nInetcpl.cpl.mui| 11.0.9600.19867| 124,928| 16-Oct-2020| 00:12 \nInetcpl.cpl.mui| 11.0.9600.19867| 122,880| 16-Oct-2020| 00:12 \nInetcpl.cpl.mui| 11.0.9600.19867| 130,048| 16-Oct-2020| 00:13 \nInetcpl.cpl.mui| 11.0.9600.19867| 138,240| 16-Oct-2020| 00:14 \nInetcpl.cpl.mui| 11.0.9600.19867| 114,688| 16-Oct-2020| 01:38 \nInetcpl.cpl.mui| 11.0.9600.19867| 131,584| 16-Oct-2020| 00:15 \nInetcpl.cpl.mui| 11.0.9600.19867| 117,760| 16-Oct-2020| 00:16 \nInetcpl.cpl.mui| 11.0.9600.19867| 122,368| 16-Oct-2020| 00:16 \nInetcpl.cpl.mui| 11.0.9600.19867| 134,144| 16-Oct-2020| 00:17 \nInetcpl.cpl.mui| 11.0.9600.19867| 107,008| 16-Oct-2020| 00:18 \nInetcpl.cpl.mui| 11.0.9600.19867| 123,392| 16-Oct-2020| 00:19 \nInetcpl.cpl.mui| 11.0.9600.19867| 127,488| 16-Oct-2020| 00:19 \nInetcpl.cpl.mui| 11.0.9600.19867| 128,512| 16-Oct-2020| 00:20 \nInetcpl.cpl.mui| 11.0.9600.19867| 88,576| 16-Oct-2020| 00:21 \nInetcpl.cpl.mui| 11.0.9600.19867| 82,944| 16-Oct-2020| 00:22 \nInetcpl.cpl.mui| 11.0.9600.19867| 125,440| 16-Oct-2020| 00:23 \nInetcpl.cpl.mui| 11.0.9600.19867| 123,392| 16-Oct-2020| 00:24 \nInetcpl.cpl.mui| 11.0.9600.19867| 120,320| 16-Oct-2020| 00:24 \nInetcpl.cpl.mui| 11.0.9600.19867| 130,560| 16-Oct-2020| 00:25 \nInetcpl.cpl.mui| 11.0.9600.19867| 129,024| 16-Oct-2020| 00:26 \nInetcpl.cpl.mui| 11.0.9600.19867| 125,952| 16-Oct-2020| 00:27 \nInetcpl.cpl.mui| 11.0.9600.19867| 129,024| 16-Oct-2020| 00:28 \nInetcpl.cpl.mui| 11.0.9600.19867| 128,000| 16-Oct-2020| 00:29 \nInetcpl.cpl.mui| 11.0.9600.19867| 123,904| 16-Oct-2020| 00:30 \nInetcpl.cpl.mui| 11.0.9600.19867| 129,024| 16-Oct-2020| 00:30 \nInetcpl.cpl.mui| 11.0.9600.19867| 123,904| 16-Oct-2020| 00:31 \nInetcpl.cpl.mui| 11.0.9600.19867| 124,416| 16-Oct-2020| 00:32 \nInetcpl.cpl.mui| 11.0.9600.19867| 121,856| 16-Oct-2020| 00:33 \nInetcpl.cpl.mui| 11.0.9600.19867| 115,712| 16-Oct-2020| 00:33 \nInetcpl.cpl.mui| 11.0.9600.19867| 123,904| 16-Oct-2020| 00:34 \nInetcpl.cpl.mui| 11.0.9600.19867| 125,440| 16-Oct-2020| 00:35 \nInetcpl.cpl.mui| 11.0.9600.19867| 72,704| 16-Oct-2020| 00:37 \nInetcpl.cpl.mui| 11.0.9600.19867| 73,728| 16-Oct-2020| 00:37 \nInetcpl.cpl.mui| 11.0.9600.19867| 73,728| 16-Oct-2020| 00:38 \nIedkcs32.dll| 18.0.9600.19867| 341,896| 16-Oct-2020| 00:08 \nInstall.ins| Not applicable| 464| 13-Oct-2020| 02:24 \nIeapfltr.dat| 10.0.9301.0| 616,104| 23-Sep-2018| 13:18 \nIeapfltr.dll| 11.0.9600.19867| 710,656| 13-Oct-2020| 03:46 \nTdc.ocx| 11.0.9600.19867| 73,216| 13-Oct-2020| 04:22 \nDiagnosticshub.datawarehouse.dll| 11.0.9600.19867| 489,472| 13-Oct-2020| 04:48 \nIedvtool.dll| 11.0.9600.19867| 772,608| 13-Oct-2020| 05:00 \nDiagnosticshub_is.dll| 11.0.9600.19867| 38,400| 13-Oct-2020| 04:49 \nDxtmsft.dll| 11.0.9600.19867| 416,256| 13-Oct-2020| 04:27 \nDxtrans.dll| 11.0.9600.19867| 279,552| 13-Oct-2020| 04:18 \nMicrosoft-windows-ie-f12-provider.ptxml| Not applicable| 11,892| 13-Oct-2020| 02:22 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 00:10 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 00:11 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 00:11 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 00:12 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 00:13 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 00:14 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 01:37 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 00:15 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 00:16 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 00:16 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 00:17 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 00:18 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 00:19 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 00:19 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 00:20 \nF12.dll.mui| 11.0.9600.19867| 3,584| 16-Oct-2020| 00:22 \nF12.dll.mui| 11.0.9600.19867| 3,584| 16-Oct-2020| 00:22 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 00:23 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 00:24 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 00:24 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 00:25 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 00:26 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 00:27 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 00:28 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 00:29 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 00:29 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 00:30 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 00:31 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 00:32 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 00:33 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 00:33 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 00:34 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 00:35 \nF12.dll.mui| 11.0.9600.19867| 3,584| 16-Oct-2020| 00:36 \nF12.dll.mui| 11.0.9600.19867| 3,584| 16-Oct-2020| 00:37 \nF12.dll.mui| 11.0.9600.19867| 3,584| 16-Oct-2020| 00:38 \nDiagnosticstap.dll| 11.0.9600.19867| 174,592| 13-Oct-2020| 04:26 \nF12resources.dll| 11.0.9600.19867| 10,948,096| 13-Oct-2020| 04:52 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:10 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:11 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:12 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:12 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:13 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:14 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:37 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:15 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:15 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:16 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:17 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:18 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:19 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:20 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:20 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:21 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:22 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:23 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:24 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:24 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:25 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:26 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:27 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:28 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:29 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:29 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:30 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:31 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:32 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:33 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:33 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:34 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:35 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:36 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:37 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:38 \nF12tools.dll| 11.0.9600.19867| 255,488| 13-Oct-2020| 04:25 \nF12.dll| 11.0.9600.19867| 1,206,784| 13-Oct-2020| 04:15 \nMsfeeds.dll| 11.0.9600.19867| 696,320| 13-Oct-2020| 04:10 \nMsfeeds.mof| Not applicable| 1,518| 13-Oct-2020| 02:33 \nMsfeedsbs.dll| 11.0.9600.19867| 52,736| 13-Oct-2020| 04:19 \nMsfeedsbs.mof| Not applicable| 1,574| 13-Oct-2020| 02:33 \nMsfeedssync.exe| 11.0.9600.19867| 11,776| 13-Oct-2020| 04:46 \nHtml.iec| 2019.0.0.19867| 341,504| 13-Oct-2020| 04:44 \nMshtmled.dll| 11.0.9600.19867| 76,800| 13-Oct-2020| 04:19 \nMshtmlmedia.dll| 11.0.9600.19867| 1,155,072| 13-Oct-2020| 04:09 \nMicrosoft-windows-ie-htmlrendering.ptxml| Not applicable| 3,228| 13-Oct-2020| 02:22 \nMshtml.dll| 11.0.9600.19867| 20,293,632| 13-Oct-2020| 04:59 \nMshtml.tlb| 11.0.9600.19867| 2,724,864| 13-Oct-2020| 04:57 \nIeetwcollector.exe| 11.0.9600.19867| 104,960| 13-Oct-2020| 04:35 \nIeetwcollectorres.dll| 11.0.9600.19867| 4,096| 13-Oct-2020| 04:56 \nIeetwproxystub.dll| 11.0.9600.19867| 47,616| 13-Oct-2020| 04:44 \nIelowutil.exe| 11.0.9600.19867| 221,184| 13-Oct-2020| 04:37 \nIeproxy.dll| 11.0.9600.19867| 309,248| 13-Oct-2020| 03:44 \nIeshims.dll| 11.0.9600.19867| 290,304| 13-Oct-2020| 03:49 \nBing.ico| Not applicable| 5,430| 23-Sep-2018| 13:33 \nIeunatt.exe| 11.0.9600.19867| 115,712| 13-Oct-2020| 04:35 \nMicrosoft-windows-ie-internetexplorer-ppdlic.xrm-ms| Not applicable| 2,956| 16-Oct-2020| 01:37 \nWindows feed discovered.wav| Not applicable| 19,884| 23-Sep-2018| 13:39 \nWindows information bar.wav| Not applicable| 23,308| 23-Sep-2018| 13:39 \nWindows navigation start.wav| Not applicable| 11,340| 23-Sep-2018| 13:39 \nWindows pop-up blocked.wav| Not applicable| 85,548| 23-Sep-2018| 13:39 \nJsprofilerui.dll| 11.0.9600.19867| 579,584| 13-Oct-2020| 04:20 \nMemoryanalyzer.dll| 11.0.9600.19867| 1,399,296| 13-Oct-2020| 04:33 \nMshtmldac.dll| 11.0.9600.19867| 64,000| 13-Oct-2020| 04:43 \nNetworkinspection.dll| 11.0.9600.19867| 1,075,200| 13-Oct-2020| 04:16 \nDesktop.ini| Not applicable| 65| 23-Sep-2018| 13:26 \nOccache.dll| 11.0.9600.19867| 130,048| 13-Oct-2020| 04:16 \nDesktop.ini| Not applicable| 65| 23-Sep-2018| 13:27 \nWebcheck.dll| 11.0.9600.19867| 230,400| 13-Oct-2020| 04:11 \nIcrav03.rat| Not applicable| 8,798| 23-Sep-2018| 13:27 \nMsrating.dll| 11.0.9600.19867| 168,960| 13-Oct-2020| 04:19 \nTicrf.rat| Not applicable| 1,988| 23-Sep-2018| 13:27 \nIertutil.dll| 11.0.9600.19867| 2,307,072| 13-Oct-2020| 04:42 \nSqmapi.dll| 6.2.9200.16384| 228,232| 16-Oct-2020| 00:08 \nIe4uinit.exe| 11.0.9600.19867| 692,224| 13-Oct-2020| 04:09 \nIernonce.dll| 11.0.9600.19867| 30,720| 13-Oct-2020| 04:38 \nIesetup.dll| 11.0.9600.19867| 62,464| 13-Oct-2020| 04:45 \nInseng.dll| 11.0.9600.19867| 91,136| 13-Oct-2020| 04:22 \nTimeline.dll| 11.0.9600.19867| 153,600| 13-Oct-2020| 04:21 \nTimeline.cpu.xml| Not applicable| 3,197| 23-Sep-2018| 13:26 \nTimeline_is.dll| 11.0.9600.19867| 124,928| 13-Oct-2020| 04:38 \nVgx.dll| 11.0.9600.19867| 817,664| 13-Oct-2020| 04:19 \nIeframe.dll.mui| 11.0.9600.19867| 2,066,432| 16-Oct-2020| 00:10 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:10 \nIeframe.dll.mui| 11.0.9600.19867| 2,121,216| 16-Oct-2020| 00:11 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:11 \nIeframe.dll.mui| 11.0.9600.19867| 2,075,136| 16-Oct-2020| 00:12 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:11 \nIeframe.dll.mui| 11.0.9600.19867| 2,063,872| 16-Oct-2020| 00:13 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:13 \nIeframe.dll.mui| 11.0.9600.19867| 2,314,240| 16-Oct-2020| 00:14 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:13 \nIeframe.dll.mui| 11.0.9600.19867| 2,390,528| 16-Oct-2020| 00:14 \nIeui.dll.mui| 11.0.9600.19867| 3,584| 16-Oct-2020| 00:14 \nIeframe.dll.mui| 11.0.9600.19867| 2,033,152| 16-Oct-2020| 01:38 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 01:37 \nIeframe.dll.mui| 11.0.9600.19867| 2,307,584| 16-Oct-2020| 00:15 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:15 \nIeframe.dll.mui| 11.0.9600.19867| 2,255,872| 16-Oct-2020| 00:16 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:15 \nIeframe.dll.mui| 11.0.9600.19867| 2,061,312| 16-Oct-2020| 00:17 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:16 \nIeframe.dll.mui| 11.0.9600.19867| 2,326,016| 16-Oct-2020| 00:18 \nIeui.dll.mui| 11.0.9600.19867| 3,584| 16-Oct-2020| 00:17 \nIeframe.dll.mui| 11.0.9600.19867| 2,019,840| 16-Oct-2020| 00:18 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:18 \nIeframe.dll.mui| 11.0.9600.19867| 2,071,040| 16-Oct-2020| 00:19 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:19 \nIeframe.dll.mui| 11.0.9600.19867| 2,082,816| 16-Oct-2020| 00:20 \nIeui.dll.mui| 11.0.9600.19867| 3,584| 16-Oct-2020| 00:20 \nIeframe.dll.mui| 11.0.9600.19867| 2,307,584| 16-Oct-2020| 00:21 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:20 \nIeframe.dll.mui| 11.0.9600.19867| 2,170,368| 16-Oct-2020| 00:22 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:21 \nIeframe.dll.mui| 11.0.9600.19867| 2,153,984| 16-Oct-2020| 00:22 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:22 \nIeframe.dll.mui| 11.0.9600.19867| 2,291,712| 16-Oct-2020| 00:23 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:23 \nIeframe.dll.mui| 11.0.9600.19867| 2,283,520| 16-Oct-2020| 00:24 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:24 \nIeframe.dll.mui| 11.0.9600.19867| 2,052,096| 16-Oct-2020| 00:25 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:25 \nIeframe.dll.mui| 11.0.9600.19867| 2,301,952| 16-Oct-2020| 00:26 \nIeui.dll.mui| 11.0.9600.19867| 3,584| 16-Oct-2020| 00:25 \nIeframe.dll.mui| 11.0.9600.19867| 2,093,056| 16-Oct-2020| 00:27 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:26 \nIeframe.dll.mui| 11.0.9600.19867| 2,075,648| 16-Oct-2020| 00:28 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:27 \nIeframe.dll.mui| 11.0.9600.19867| 2,299,392| 16-Oct-2020| 00:28 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:28 \nIeframe.dll.mui| 11.0.9600.19867| 2,094,592| 16-Oct-2020| 00:29 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:29 \nIeframe.dll.mui| 11.0.9600.19867| 2,316,800| 16-Oct-2020| 00:30 \nIeui.dll.mui| 11.0.9600.19867| 3,584| 16-Oct-2020| 00:30 \nIeframe.dll.mui| 11.0.9600.19867| 2,305,536| 16-Oct-2020| 00:31 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:30 \nIeframe.dll.mui| 11.0.9600.19867| 2,278,912| 16-Oct-2020| 00:32 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:31 \nIeframe.dll.mui| 11.0.9600.19867| 2,277,888| 16-Oct-2020| 00:32 \nIeui.dll.mui| 11.0.9600.19867| 3,584| 16-Oct-2020| 00:32 \nIeframe.dll.mui| 11.0.9600.19867| 2,060,288| 16-Oct-2020| 00:33 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:33 \nIeframe.dll.mui| 11.0.9600.19867| 2,315,776| 16-Oct-2020| 00:34 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:33 \nIeframe.dll.mui| 11.0.9600.19867| 2,278,912| 16-Oct-2020| 00:35 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:34 \nIeframe.dll.mui| 11.0.9600.19867| 2,324,992| 16-Oct-2020| 00:36 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:35 \nIeframe.dll.mui| 11.0.9600.19867| 2,098,176| 16-Oct-2020| 00:36 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:36 \nIeframe.dll.mui| 11.0.9600.19867| 1,890,304| 16-Oct-2020| 00:37 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:37 \nIeframe.dll.mui| 11.0.9600.19867| 1,890,304| 16-Oct-2020| 00:38 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:38 \nIeframe.dll| 11.0.9600.19867| 13,873,664| 13-Oct-2020| 04:09 \nIeframe.ptxml| Not applicable| 24,486| 13-Oct-2020| 02:21 \nIeui.dll| 11.0.9600.19867| 476,160| 13-Oct-2020| 04:36 \nIeinstal.exe| 11.0.9600.19867| 475,648| 13-Oct-2020| 04:18 \nInetres.adml| Not applicable| 456,165| 16-Oct-2020| 00:10 \nInetres.adml| Not applicable| 456,165| 16-Oct-2020| 00:11 \nInetres.adml| Not applicable| 524,733| 16-Oct-2020| 00:12 \nInetres.adml| Not applicable| 498,151| 16-Oct-2020| 00:12 \nInetres.adml| Not applicable| 550,745| 16-Oct-2020| 00:13 \nInetres.adml| Not applicable| 942,143| 16-Oct-2020| 00:14 \nInetres.adml| Not applicable| 456,165| 16-Oct-2020| 01:38 \nInetres.adml| Not applicable| 542,443| 16-Oct-2020| 00:15 \nInetres.adml| Not applicable| 456,165| 16-Oct-2020| 00:16 \nInetres.adml| Not applicable| 524,999| 16-Oct-2020| 00:16 \nInetres.adml| Not applicable| 574,243| 16-Oct-2020| 00:17 \nInetres.adml| Not applicable| 456,165| 16-Oct-2020| 00:18 \nInetres.adml| Not applicable| 456,165| 16-Oct-2020| 00:19 \nInetres.adml| Not applicable| 569,173| 16-Oct-2020| 00:19 \nInetres.adml| Not applicable| 546,643| 16-Oct-2020| 00:20 \nInetres.adml| Not applicable| 637,356| 16-Oct-2020| 00:21 \nInetres.adml| Not applicable| 523,880| 16-Oct-2020| 00:22 \nInetres.adml| Not applicable| 456,165| 16-Oct-2020| 00:23 \nInetres.adml| Not applicable| 456,165| 16-Oct-2020| 00:24 \nInetres.adml| Not applicable| 487,001| 16-Oct-2020| 00:25 \nInetres.adml| Not applicable| 546,980| 16-Oct-2020| 00:25 \nInetres.adml| Not applicable| 557,656| 16-Oct-2020| 00:26 \nInetres.adml| Not applicable| 533,510| 16-Oct-2020| 00:27 \nInetres.adml| Not applicable| 539,964| 16-Oct-2020| 00:28 \nInetres.adml| Not applicable| 456,165| 16-Oct-2020| 00:29 \nInetres.adml| Not applicable| 802,394| 16-Oct-2020| 00:29 \nInetres.adml| Not applicable| 456,165| 16-Oct-2020| 00:30 \nInetres.adml| Not applicable| 456,165| 16-Oct-2020| 00:31 \nInetres.adml| Not applicable| 456,165| 16-Oct-2020| 00:32 \nInetres.adml| Not applicable| 502,367| 16-Oct-2020| 00:33 \nInetres.adml| Not applicable| 456,165| 16-Oct-2020| 00:34 \nInetres.adml| Not applicable| 519,994| 16-Oct-2020| 00:34 \nInetres.adml| Not applicable| 456,165| 16-Oct-2020| 00:35 \nInetres.adml| Not applicable| 418,707| 16-Oct-2020| 00:36 \nInetres.adml| Not applicable| 435,257| 16-Oct-2020| 00:37 \nInetres.adml| Not applicable| 435,257| 16-Oct-2020| 00:38 \nInetres.admx| Not applicable| 1,676,517| 13-Oct-2020| 02:04 \nMsspellcheckingfacility.exe| 6.3.9600.19867| 668,672| 13-Oct-2020| 04:29 \nJscript9.dll.mui| 11.0.9600.19867| 29,184| 16-Oct-2020| 00:10 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 16-Oct-2020| 00:11 \nJscript9.dll.mui| 11.0.9600.19867| 32,768| 16-Oct-2020| 00:11 \nJscript9.dll.mui| 11.0.9600.19867| 33,280| 16-Oct-2020| 00:12 \nJscript9.dll.mui| 11.0.9600.19867| 35,328| 16-Oct-2020| 00:13 \nJscript9.dll.mui| 11.0.9600.19867| 37,888| 16-Oct-2020| 00:14 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 16-Oct-2020| 01:37 \nJscript9.dll.mui| 11.0.9600.19867| 34,304| 16-Oct-2020| 00:15 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 16-Oct-2020| 00:15 \nJscript9.dll.mui| 11.0.9600.19867| 33,280| 16-Oct-2020| 00:16 \nJscript9.dll.mui| 11.0.9600.19867| 34,304| 16-Oct-2020| 00:17 \nJscript9.dll.mui| 11.0.9600.19867| 27,648| 16-Oct-2020| 00:18 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 16-Oct-2020| 00:19 \nJscript9.dll.mui| 11.0.9600.19867| 34,304| 16-Oct-2020| 00:19 \nJscript9.dll.mui| 11.0.9600.19867| 33,792| 16-Oct-2020| 00:20 \nJscript9.dll.mui| 11.0.9600.19867| 23,040| 16-Oct-2020| 00:21 \nJscript9.dll.mui| 11.0.9600.19867| 22,016| 16-Oct-2020| 00:22 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 16-Oct-2020| 00:23 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 16-Oct-2020| 00:24 \nJscript9.dll.mui| 11.0.9600.19867| 31,232| 16-Oct-2020| 00:24 \nJscript9.dll.mui| 11.0.9600.19867| 34,304| 16-Oct-2020| 00:25 \nJscript9.dll.mui| 11.0.9600.19867| 35,840| 16-Oct-2020| 00:26 \nJscript9.dll.mui| 11.0.9600.19867| 32,768| 16-Oct-2020| 00:27 \nJscript9.dll.mui| 11.0.9600.19867| 33,280| 16-Oct-2020| 00:28 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 16-Oct-2020| 00:29 \nJscript9.dll.mui| 11.0.9600.19867| 34,816| 16-Oct-2020| 00:29 \nJscript9.dll.mui| 11.0.9600.19867| 33,280| 16-Oct-2020| 00:30 \nJscript9.dll.mui| 11.0.9600.19867| 32,256| 16-Oct-2020| 00:31 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 16-Oct-2020| 00:32 \nJscript9.dll.mui| 11.0.9600.19867| 32,768| 16-Oct-2020| 00:33 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 16-Oct-2020| 00:33 \nJscript9.dll.mui| 11.0.9600.19867| 30,720| 16-Oct-2020| 00:34 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 16-Oct-2020| 00:35 \nJscript9.dll.mui| 11.0.9600.19867| 16,384| 16-Oct-2020| 00:36 \nJscript9.dll.mui| 11.0.9600.19867| 16,896| 16-Oct-2020| 00:37 \nJscript9.dll.mui| 11.0.9600.19867| 16,896| 16-Oct-2020| 00:38 \nJscript9.dll| 11.0.9600.19867| 4,112,384| 13-Oct-2020| 04:12 \nJscript9diag.dll| 11.0.9600.19867| 620,032| 13-Oct-2020| 04:35 \nJscript.dll| 5.8.9600.19867| 653,824| 13-Oct-2020| 04:35 \nVbscript.dll| 5.8.9600.19867| 498,176| 13-Oct-2020| 04:45 \n \n## Internet Explorer 11 on all supported x64-based versions\n\n**File name**| **File version**| **File size**| **Date**| **Time** \n---|---|---|---|--- \nUrlmon.dll| 11.0.9600.19867| 1,568,256| 13-Oct-2020| 04:10 \nIexplore.exe| 11.0.9600.19867| 810,376| 16-Oct-2020| 01:03 \nWebcheck.dll.mui| 11.0.9600.19867| 31,744| 16-Oct-2020| 01:05 \nWebcheck.dll.mui| 11.0.9600.19867| 36,352| 16-Oct-2020| 01:06 \nWebcheck.dll.mui| 11.0.9600.19867| 35,328| 16-Oct-2020| 01:06 \nWebcheck.dll.mui| 11.0.9600.19867| 34,816| 16-Oct-2020| 01:07 \nWebcheck.dll.mui| 11.0.9600.19867| 36,864| 16-Oct-2020| 01:09 \nWebcheck.dll.mui| 11.0.9600.19867| 39,424| 16-Oct-2020| 01:09 \nWebcheck.dll.mui| 11.0.9600.19867| 32,768| 16-Oct-2020| 02:04 \nWebcheck.dll.mui| 11.0.9600.19867| 37,376| 16-Oct-2020| 01:10 \nWebcheck.dll.mui| 11.0.9600.19867| 33,280| 16-Oct-2020| 01:11 \nWebcheck.dll.mui| 11.0.9600.19867| 34,816| 16-Oct-2020| 01:11 \nWebcheck.dll.mui| 11.0.9600.19867| 38,400| 16-Oct-2020| 01:12 \nWebcheck.dll.mui| 11.0.9600.19867| 30,720| 16-Oct-2020| 01:13 \nWebcheck.dll.mui| 11.0.9600.19867| 34,816| 16-Oct-2020| 01:14 \nWebcheck.dll.mui| 11.0.9600.19867| 35,328| 16-Oct-2020| 01:15 \nWebcheck.dll.mui| 11.0.9600.19867| 36,864| 16-Oct-2020| 01:16 \nWebcheck.dll.mui| 11.0.9600.19867| 25,600| 16-Oct-2020| 01:17 \nWebcheck.dll.mui| 11.0.9600.19867| 24,576| 16-Oct-2020| 01:17 \nWebcheck.dll.mui| 11.0.9600.19867| 35,840| 16-Oct-2020| 01:18 \nWebcheck.dll.mui| 11.0.9600.19867| 34,304| 16-Oct-2020| 01:19 \nWebcheck.dll.mui| 11.0.9600.19867| 34,304| 16-Oct-2020| 01:20 \nWebcheck.dll.mui| 11.0.9600.19867| 36,352| 16-Oct-2020| 01:20 \nWebcheck.dll.mui| 11.0.9600.19867| 35,840| 16-Oct-2020| 01:21 \nWebcheck.dll.mui| 11.0.9600.19867| 34,816| 16-Oct-2020| 01:22 \nWebcheck.dll.mui| 11.0.9600.19867| 35,840| 16-Oct-2020| 01:23 \nWebcheck.dll.mui| 11.0.9600.19867| 35,840| 16-Oct-2020| 01:23 \nWebcheck.dll.mui| 11.0.9600.19867| 34,304| 16-Oct-2020| 01:25 \nWebcheck.dll.mui| 11.0.9600.19867| 35,840| 16-Oct-2020| 01:25 \nWebcheck.dll.mui| 11.0.9600.19867| 34,816| 16-Oct-2020| 01:26 \nWebcheck.dll.mui| 11.0.9600.19867| 34,816| 16-Oct-2020| 01:26 \nWebcheck.dll.mui| 11.0.9600.19867| 34,816| 16-Oct-2020| 01:27 \nWebcheck.dll.mui| 11.0.9600.19867| 33,280| 16-Oct-2020| 01:28 \nWebcheck.dll.mui| 11.0.9600.19867| 34,304| 16-Oct-2020| 01:29 \nWebcheck.dll.mui| 11.0.9600.19867| 34,304| 16-Oct-2020| 01:30 \nWebcheck.dll.mui| 11.0.9600.19867| 20,992| 16-Oct-2020| 01:31 \nWebcheck.dll.mui| 11.0.9600.19867| 21,504| 16-Oct-2020| 01:31 \nWebcheck.dll.mui| 11.0.9600.19867| 21,504| 16-Oct-2020| 01:32 \nWininet.dll.mui| 11.0.9600.19867| 46,592| 16-Oct-2020| 01:05 \nWininet.dll.mui| 11.0.9600.19867| 52,736| 16-Oct-2020| 01:05 \nWininet.dll.mui| 11.0.9600.19867| 51,200| 16-Oct-2020| 01:06 \nWininet.dll.mui| 11.0.9600.19867| 51,200| 16-Oct-2020| 01:07 \nWininet.dll.mui| 11.0.9600.19867| 56,320| 16-Oct-2020| 01:08 \nWininet.dll.mui| 11.0.9600.19867| 57,856| 16-Oct-2020| 01:09 \nWininet.dll.mui| 11.0.9600.19867| 49,664| 16-Oct-2020| 02:04 \nWininet.dll.mui| 11.0.9600.19867| 54,272| 16-Oct-2020| 01:10 \nWininet.dll.mui| 11.0.9600.19867| 47,616| 16-Oct-2020| 01:11 \nWininet.dll.mui| 11.0.9600.19867| 49,152| 16-Oct-2020| 01:11 \nWininet.dll.mui| 11.0.9600.19867| 55,296| 16-Oct-2020| 01:13 \nWininet.dll.mui| 11.0.9600.19867| 45,056| 16-Oct-2020| 01:13 \nWininet.dll.mui| 11.0.9600.19867| 51,712| 16-Oct-2020| 01:14 \nWininet.dll.mui| 11.0.9600.19867| 51,712| 16-Oct-2020| 01:14 \nWininet.dll.mui| 11.0.9600.19867| 53,248| 16-Oct-2020| 01:15 \nWininet.dll.mui| 11.0.9600.19867| 39,424| 16-Oct-2020| 01:16 \nWininet.dll.mui| 11.0.9600.19867| 35,840| 16-Oct-2020| 01:18 \nWininet.dll.mui| 11.0.9600.19867| 50,176| 16-Oct-2020| 01:18 \nWininet.dll.mui| 11.0.9600.19867| 51,200| 16-Oct-2020| 01:19 \nWininet.dll.mui| 11.0.9600.19867| 50,688| 16-Oct-2020| 01:20 \nWininet.dll.mui| 11.0.9600.19867| 52,736| 16-Oct-2020| 01:20 \nWininet.dll.mui| 11.0.9600.19867| 53,760| 16-Oct-2020| 01:22 \nWininet.dll.mui| 11.0.9600.19867| 54,272| 16-Oct-2020| 01:22 \nWininet.dll.mui| 11.0.9600.19867| 54,272| 16-Oct-2020| 01:23 \nWininet.dll.mui| 11.0.9600.19867| 52,736| 16-Oct-2020| 01:24 \nWininet.dll.mui| 11.0.9600.19867| 51,200| 16-Oct-2020| 01:25 \nWininet.dll.mui| 11.0.9600.19867| 53,248| 16-Oct-2020| 01:25 \nWininet.dll.mui| 11.0.9600.19867| 52,736| 16-Oct-2020| 01:26 \nWininet.dll.mui| 11.0.9600.19867| 51,712| 16-Oct-2020| 01:26 \nWininet.dll.mui| 11.0.9600.19867| 50,688| 16-Oct-2020| 01:27 \nWininet.dll.mui| 11.0.9600.19867| 50,688| 16-Oct-2020| 01:28 \nWininet.dll.mui| 11.0.9600.19867| 50,176| 16-Oct-2020| 01:29 \nWininet.dll.mui| 11.0.9600.19867| 50,176| 16-Oct-2020| 01:29 \nWininet.dll.mui| 11.0.9600.19867| 30,720| 16-Oct-2020| 01:30 \nWininet.dll.mui| 11.0.9600.19867| 30,720| 16-Oct-2020| 01:31 \nWininet.dll.mui| 11.0.9600.19867| 30,720| 16-Oct-2020| 01:32 \nInetcpl.cpl| 11.0.9600.19867| 2,132,992| 13-Oct-2020| 04:31 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:05 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:05 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:06 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:07 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:08 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:09 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 02:04 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:10 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:11 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:11 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:12 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:13 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:14 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:14 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:15 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:16 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:17 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:18 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:19 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:20 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:20 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:21 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:22 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:23 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:24 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:24 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:26 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:26 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:26 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:27 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:28 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:29 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:29 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:30 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:31 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:32 \nMshtml.dll.mui| 11.0.9600.19867| 307,200| 16-Oct-2020| 01:05 \nMshtml.dll.mui| 11.0.9600.19867| 293,888| 16-Oct-2020| 01:06 \nMshtml.dll.mui| 11.0.9600.19867| 290,304| 16-Oct-2020| 01:06 \nMshtml.dll.mui| 11.0.9600.19867| 289,280| 16-Oct-2020| 01:07 \nMshtml.dll.mui| 11.0.9600.19867| 299,008| 16-Oct-2020| 01:08 \nMshtml.dll.mui| 11.0.9600.19867| 303,104| 16-Oct-2020| 01:09 \nMshtml.dll.mui| 11.0.9600.19867| 282,112| 16-Oct-2020| 02:04 \nMshtml.dll.mui| 11.0.9600.19867| 296,960| 16-Oct-2020| 01:10 \nMshtml.dll.mui| 11.0.9600.19867| 283,648| 16-Oct-2020| 01:11 \nMshtml.dll.mui| 11.0.9600.19867| 291,840| 16-Oct-2020| 01:11 \nMshtml.dll.mui| 11.0.9600.19867| 299,520| 16-Oct-2020| 01:13 \nMshtml.dll.mui| 11.0.9600.19867| 275,968| 16-Oct-2020| 01:13 \nMshtml.dll.mui| 11.0.9600.19867| 290,816| 16-Oct-2020| 01:14 \nMshtml.dll.mui| 11.0.9600.19867| 293,376| 16-Oct-2020| 01:14 \nMshtml.dll.mui| 11.0.9600.19867| 296,960| 16-Oct-2020| 01:16 \nMshtml.dll.mui| 11.0.9600.19867| 258,048| 16-Oct-2020| 01:16 \nMshtml.dll.mui| 11.0.9600.19867| 256,512| 16-Oct-2020| 01:18 \nMshtml.dll.mui| 11.0.9600.19867| 289,280| 16-Oct-2020| 01:18 \nMshtml.dll.mui| 11.0.9600.19867| 288,256| 16-Oct-2020| 01:19 \nMshtml.dll.mui| 11.0.9600.19867| 285,184| 16-Oct-2020| 01:20 \nMshtml.dll.mui| 11.0.9600.19867| 295,424| 16-Oct-2020| 01:20 \nMshtml.dll.mui| 11.0.9600.19867| 297,472| 16-Oct-2020| 01:21 \nMshtml.dll.mui| 11.0.9600.19867| 292,864| 16-Oct-2020| 01:22 \nMshtml.dll.mui| 11.0.9600.19867| 295,424| 16-Oct-2020| 01:23 \nMshtml.dll.mui| 11.0.9600.19867| 294,400| 16-Oct-2020| 01:24 \nMshtml.dll.mui| 11.0.9600.19867| 294,400| 16-Oct-2020| 01:24 \nMshtml.dll.mui| 11.0.9600.19867| 292,864| 16-Oct-2020| 01:25 \nMshtml.dll.mui| 11.0.9600.19867| 290,816| 16-Oct-2020| 01:26 \nMshtml.dll.mui| 11.0.9600.19867| 288,768| 16-Oct-2020| 01:27 \nMshtml.dll.mui| 11.0.9600.19867| 286,208| 16-Oct-2020| 01:27 \nMshtml.dll.mui| 11.0.9600.19867| 281,600| 16-Oct-2020| 01:28 \nMshtml.dll.mui| 11.0.9600.19867| 286,720| 16-Oct-2020| 01:29 \nMshtml.dll.mui| 11.0.9600.19867| 292,352| 16-Oct-2020| 01:30 \nMshtml.dll.mui| 11.0.9600.19867| 242,176| 16-Oct-2020| 01:30 \nMshtml.dll.mui| 11.0.9600.19867| 243,200| 16-Oct-2020| 01:31 \nMshtml.dll.mui| 11.0.9600.19867| 243,200| 16-Oct-2020| 01:32 \nF12resources.dll.mui| 11.0.9600.19867| 61,440| 16-Oct-2020| 01:05 \nF12resources.dll.mui| 11.0.9600.19867| 73,728| 16-Oct-2020| 01:05 \nF12resources.dll.mui| 11.0.9600.19867| 67,584| 16-Oct-2020| 01:06 \nF12resources.dll.mui| 11.0.9600.19867| 67,584| 16-Oct-2020| 01:07 \nF12resources.dll.mui| 11.0.9600.19867| 74,240| 16-Oct-2020| 01:08 \nF12resources.dll.mui| 11.0.9600.19867| 78,848| 16-Oct-2020| 01:09 \nF12resources.dll.mui| 11.0.9600.19867| 61,440| 16-Oct-2020| 02:04 \nF12resources.dll.mui| 11.0.9600.19867| 74,752| 16-Oct-2020| 01:10 \nF12resources.dll.mui| 11.0.9600.19867| 62,464| 16-Oct-2020| 01:10 \nF12resources.dll.mui| 11.0.9600.19867| 68,096| 16-Oct-2020| 01:11 \nF12resources.dll.mui| 11.0.9600.19867| 75,264| 16-Oct-2020| 01:12 \nF12resources.dll.mui| 11.0.9600.19867| 61,440| 16-Oct-2020| 01:13 \nF12resources.dll.mui| 11.0.9600.19867| 68,608| 16-Oct-2020| 01:14 \nF12resources.dll.mui| 11.0.9600.19867| 72,192| 16-Oct-2020| 01:15 \nF12resources.dll.mui| 11.0.9600.19867| 73,216| 16-Oct-2020| 01:15 \nF12resources.dll.mui| 11.0.9600.19867| 41,472| 16-Oct-2020| 01:17 \nF12resources.dll.mui| 11.0.9600.19867| 37,888| 16-Oct-2020| 01:17 \nF12resources.dll.mui| 11.0.9600.19867| 68,608| 16-Oct-2020| 01:18 \nF12resources.dll.mui| 11.0.9600.19867| 67,584| 16-Oct-2020| 01:19 \nF12resources.dll.mui| 11.0.9600.19867| 65,536| 16-Oct-2020| 01:20 \nF12resources.dll.mui| 11.0.9600.19867| 74,240| 16-Oct-2020| 01:20 \nF12resources.dll.mui| 11.0.9600.19867| 70,656| 16-Oct-2020| 01:21 \nF12resources.dll.mui| 11.0.9600.19867| 71,168| 16-Oct-2020| 01:22 \nF12resources.dll.mui| 11.0.9600.19867| 71,680| 16-Oct-2020| 01:23 \nF12resources.dll.mui| 11.0.9600.19867| 71,168| 16-Oct-2020| 01:23 \nF12resources.dll.mui| 11.0.9600.19867| 69,632| 16-Oct-2020| 01:24 \nF12resources.dll.mui| 11.0.9600.19867| 68,096| 16-Oct-2020| 01:25 \nF12resources.dll.mui| 11.0.9600.19867| 68,608| 16-Oct-2020| 01:26 \nF12resources.dll.mui| 11.0.9600.19867| 68,096| 16-Oct-2020| 01:26 \nF12resources.dll.mui| 11.0.9600.19867| 65,536| 16-Oct-2020| 01:27 \nF12resources.dll.mui| 11.0.9600.19867| 59,904| 16-Oct-2020| 01:28 \nF12resources.dll.mui| 11.0.9600.19867| 65,536| 16-Oct-2020| 01:29 \nF12resources.dll.mui| 11.0.9600.19867| 69,120| 16-Oct-2020| 01:30 \nF12resources.dll.mui| 11.0.9600.19867| 29,696| 16-Oct-2020| 01:30 \nF12resources.dll.mui| 11.0.9600.19867| 30,720| 16-Oct-2020| 01:31 \nF12resources.dll.mui| 11.0.9600.19867| 30,720| 16-Oct-2020| 01:32 \nJavascriptcollectionagent.dll| 11.0.9600.19867| 77,824| 13-Oct-2020| 04:52 \nDiagnosticshub.scriptedsandboxplugin.dll| 11.0.9600.19867| 276,480| 13-Oct-2020| 04:54 \nUrlmon.dll.mui| 11.0.9600.19867| 46,080| 16-Oct-2020| 01:05 \nUrlmon.dll.mui| 11.0.9600.19867| 50,176| 16-Oct-2020| 01:06 \nUrlmon.dll.mui| 11.0.9600.19867| 48,640| 16-Oct-2020| 01:06 \nUrlmon.dll.mui| 11.0.9600.19867| 49,664| 16-Oct-2020| 01:07 \nUrlmon.dll.mui| 11.0.9600.19867| 51,712| 16-Oct-2020| 01:09 \nUrlmon.dll.mui| 11.0.9600.19867| 54,272| 16-Oct-2020| 01:09 \nUrlmon.dll.mui| 11.0.9600.19867| 48,128| 16-Oct-2020| 02:04 \nUrlmon.dll.mui| 11.0.9600.19867| 50,176| 16-Oct-2020| 01:10 \nUrlmon.dll.mui| 11.0.9600.19867| 47,616| 16-Oct-2020| 01:11 \nUrlmon.dll.mui| 11.0.9600.19867| 49,152| 16-Oct-2020| 01:11 \nUrlmon.dll.mui| 11.0.9600.19867| 50,688| 16-Oct-2020| 01:12 \nUrlmon.dll.mui| 11.0.9600.19867| 45,056| 16-Oct-2020| 01:13 \nUrlmon.dll.mui| 11.0.9600.19867| 49,152| 16-Oct-2020| 01:14 \nUrlmon.dll.mui| 11.0.9600.19867| 49,152| 16-Oct-2020| 01:15 \nUrlmon.dll.mui| 11.0.9600.19867| 49,664| 16-Oct-2020| 01:15 \nUrlmon.dll.mui| 11.0.9600.19867| 39,936| 16-Oct-2020| 01:16 \nUrlmon.dll.mui| 11.0.9600.19867| 39,424| 16-Oct-2020| 01:17 \nUrlmon.dll.mui| 11.0.9600.19867| 47,616| 16-Oct-2020| 01:18 \nUrlmon.dll.mui| 11.0.9600.19867| 47,616| 16-Oct-2020| 01:19 \nUrlmon.dll.mui| 11.0.9600.19867| 48,640| 16-Oct-2020| 01:20 \nUrlmon.dll.mui| 11.0.9600.19867| 51,200| 16-Oct-2020| 01:20 \nUrlmon.dll.mui| 11.0.9600.19867| 50,688| 16-Oct-2020| 01:22 \nUrlmon.dll.mui| 11.0.9600.19867| 49,664| 16-Oct-2020| 01:22 \nUrlmon.dll.mui| 11.0.9600.19867| 50,176| 16-Oct-2020| 01:23 \nUrlmon.dll.mui| 11.0.9600.19867| 49,152| 16-Oct-2020| 01:24 \nUrlmon.dll.mui| 11.0.9600.19867| 48,640| 16-Oct-2020| 01:24 \nUrlmon.dll.mui| 11.0.9600.19867| 50,176| 16-Oct-2020| 01:26 \nUrlmon.dll.mui| 11.0.9600.19867| 48,640| 16-Oct-2020| 01:26 \nUrlmon.dll.mui| 11.0.9600.19867| 49,664| 16-Oct-2020| 01:26 \nUrlmon.dll.mui| 11.0.9600.19867| 48,640| 16-Oct-2020| 01:27 \nUrlmon.dll.mui| 11.0.9600.19867| 48,128| 16-Oct-2020| 01:28 \nUrlmon.dll.mui| 11.0.9600.19867| 49,152| 16-Oct-2020| 01:29 \nUrlmon.dll.mui| 11.0.9600.19867| 48,128| 16-Oct-2020| 01:30 \nUrlmon.dll.mui| 11.0.9600.19867| 35,328| 16-Oct-2020| 01:30 \nUrlmon.dll.mui| 11.0.9600.19867| 35,328| 16-Oct-2020| 01:31 \nUrlmon.dll.mui| 11.0.9600.19867| 35,328| 16-Oct-2020| 01:32 \nOccache.dll.mui| 11.0.9600.19867| 9,728| 16-Oct-2020| 01:05 \nOccache.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:06 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 01:06 \nOccache.dll.mui| 11.0.9600.19867| 9,728| 16-Oct-2020| 01:08 \nOccache.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:08 \nOccache.dll.mui| 11.0.9600.19867| 11,264| 16-Oct-2020| 01:09 \nOccache.dll.mui| 11.0.9600.19867| 9,728| 16-Oct-2020| 02:04 \nOccache.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:10 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 01:11 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 01:11 \nOccache.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:12 \nOccache.dll.mui| 11.0.9600.19867| 9,216| 16-Oct-2020| 01:14 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 01:14 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 01:14 \nOccache.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:15 \nOccache.dll.mui| 11.0.9600.19867| 7,680| 16-Oct-2020| 01:17 \nOccache.dll.mui| 11.0.9600.19867| 7,680| 16-Oct-2020| 01:17 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 01:18 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 01:19 \nOccache.dll.mui| 11.0.9600.19867| 9,728| 16-Oct-2020| 01:20 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 01:21 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 01:21 \nOccache.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:22 \nOccache.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:23 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 01:24 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 01:24 \nOccache.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:26 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 01:26 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 01:27 \nOccache.dll.mui| 11.0.9600.19867| 9,728| 16-Oct-2020| 01:28 \nOccache.dll.mui| 11.0.9600.19867| 9,728| 16-Oct-2020| 01:28 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 01:29 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 01:29 \nOccache.dll.mui| 11.0.9600.19867| 6,656| 16-Oct-2020| 01:30 \nOccache.dll.mui| 11.0.9600.19867| 6,656| 16-Oct-2020| 01:31 \nOccache.dll.mui| 11.0.9600.19867| 6,656| 16-Oct-2020| 01:32 \nJsproxy.dll| 11.0.9600.19867| 54,784| 13-Oct-2020| 05:14 \nWininet.dll| 11.0.9600.19867| 4,859,904| 13-Oct-2020| 04:20 \nInetcpl.cpl.mui| 11.0.9600.19867| 114,176| 16-Oct-2020| 01:05 \nInetcpl.cpl.mui| 11.0.9600.19867| 130,560| 16-Oct-2020| 01:06 \nInetcpl.cpl.mui| 11.0.9600.19867| 124,928| 16-Oct-2020| 01:06 \nInetcpl.cpl.mui| 11.0.9600.19867| 122,880| 16-Oct-2020| 01:07 \nInetcpl.cpl.mui| 11.0.9600.19867| 130,048| 16-Oct-2020| 01:08 \nInetcpl.cpl.mui| 11.0.9600.19867| 138,240| 16-Oct-2020| 01:09 \nInetcpl.cpl.mui| 11.0.9600.19867| 114,688| 16-Oct-2020| 02:04 \nInetcpl.cpl.mui| 11.0.9600.19867| 131,584| 16-Oct-2020| 01:10 \nInetcpl.cpl.mui| 11.0.9600.19867| 117,760| 16-Oct-2020| 01:11 \nInetcpl.cpl.mui| 11.0.9600.19867| 122,368| 16-Oct-2020| 01:11 \nInetcpl.cpl.mui| 11.0.9600.19867| 134,144| 16-Oct-2020| 01:12 \nInetcpl.cpl.mui| 11.0.9600.19867| 107,008| 16-Oct-2020| 01:13 \nInetcpl.cpl.mui| 11.0.9600.19867| 123,392| 16-Oct-2020| 01:14 \nInetcpl.cpl.mui| 11.0.9600.19867| 127,488| 16-Oct-2020| 01:15 \nInetcpl.cpl.mui| 11.0.9600.19867| 128,512| 16-Oct-2020| 01:15 \nInetcpl.cpl.mui| 11.0.9600.19867| 88,576| 16-Oct-2020| 01:16 \nInetcpl.cpl.mui| 11.0.9600.19867| 82,944| 16-Oct-2020| 01:17 \nInetcpl.cpl.mui| 11.0.9600.19867| 125,440| 16-Oct-2020| 01:18 \nInetcpl.cpl.mui| 11.0.9600.19867| 123,392| 16-Oct-2020| 01:19 \nInetcpl.cpl.mui| 11.0.9600.19867| 120,320| 16-Oct-2020| 01:20 \nInetcpl.cpl.mui| 11.0.9600.19867| 130,560| 16-Oct-2020| 01:20 \nInetcpl.cpl.mui| 11.0.9600.19867| 129,024| 16-Oct-2020| 01:21 \nInetcpl.cpl.mui| 11.0.9600.19867| 125,952| 16-Oct-2020| 01:22 \nInetcpl.cpl.mui| 11.0.9600.19867| 129,024| 16-Oct-2020| 01:23 \nInetcpl.cpl.mui| 11.0.9600.19867| 128,000| 16-Oct-2020| 01:23 \nInetcpl.cpl.mui| 11.0.9600.19867| 123,904| 16-Oct-2020| 01:24 \nInetcpl.cpl.mui| 11.0.9600.19867| 129,024| 16-Oct-2020| 01:25 \nInetcpl.cpl.mui| 11.0.9600.19867| 123,904| 16-Oct-2020| 01:26 \nInetcpl.cpl.mui| 11.0.9600.19867| 124,416| 16-Oct-2020| 01:27 \nInetcpl.cpl.mui| 11.0.9600.19867| 121,856| 16-Oct-2020| 01:27 \nInetcpl.cpl.mui| 11.0.9600.19867| 115,712| 16-Oct-2020| 01:28 \nInetcpl.cpl.mui| 11.0.9600.19867| 123,904| 16-Oct-2020| 01:29 \nInetcpl.cpl.mui| 11.0.9600.19867| 125,440| 16-Oct-2020| 01:30 \nInetcpl.cpl.mui| 11.0.9600.19867| 72,704| 16-Oct-2020| 01:30 \nInetcpl.cpl.mui| 11.0.9600.19867| 73,728| 16-Oct-2020| 01:31 \nInetcpl.cpl.mui| 11.0.9600.19867| 73,728| 16-Oct-2020| 01:32 \nIedkcs32.dll| 18.0.9600.19867| 390,552| 16-Oct-2020| 01:03 \nInstall.ins| Not applicable| 464| 13-Oct-2020| 02:28 \nIeapfltr.dat| 10.0.9301.0| 616,104| 19-Oct-2017| 08:12 \nIeapfltr.dll| 11.0.9600.19867| 801,280| 13-Oct-2020| 03:59 \nTdc.ocx| 11.0.9600.19867| 88,064| 13-Oct-2020| 04:52 \nDiagnosticshub.datawarehouse.dll| 11.0.9600.19867| 666,624| 13-Oct-2020| 05:24 \nIedvtool.dll| 11.0.9600.19867| 950,784| 13-Oct-2020| 06:57 \nDiagnosticshub_is.dll| 11.0.9600.19867| 50,176| 13-Oct-2020| 05:27 \nDxtmsft.dll| 11.0.9600.19867| 489,984| 13-Oct-2020| 04:58 \nDxtrans.dll| 11.0.9600.19867| 315,904| 13-Oct-2020| 04:46 \nMicrosoft-windows-ie-f12-provider.ptxml| Not applicable| 11,892| 13-Oct-2020| 02:27 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 01:05 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 01:05 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 01:06 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 01:07 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 01:08 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 01:09 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 02:04 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 01:10 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 01:11 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 01:11 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 01:12 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 01:13 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 01:14 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 01:14 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 01:15 \nF12.dll.mui| 11.0.9600.19867| 3,584| 16-Oct-2020| 01:16 \nF12.dll.mui| 11.0.9600.19867| 3,584| 16-Oct-2020| 01:17 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 01:18 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 01:19 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 01:20 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 01:20 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 01:21 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 01:22 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 01:23 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 01:23 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 01:25 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 01:26 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 01:26 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 01:26 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 01:27 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 01:28 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 01:29 \nF12.dll.mui| 11.0.9600.19867| 4,096| 16-Oct-2020| 01:30 \nF12.dll.mui| 11.0.9600.19867| 3,584| 16-Oct-2020| 01:30 \nF12.dll.mui| 11.0.9600.19867| 3,584| 16-Oct-2020| 01:31 \nF12.dll.mui| 11.0.9600.19867| 3,584| 16-Oct-2020| 01:32 \nDiagnosticstap.dll| 11.0.9600.19867| 244,224| 13-Oct-2020| 04:57 \nF12resources.dll| 11.0.9600.19867| 10,949,120| 13-Oct-2020| 05:30 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:05 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:05 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:06 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:07 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:08 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:09 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 02:04 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:10 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:11 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:11 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:12 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:13 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:14 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:15 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:16 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:16 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:17 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:18 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:19 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:20 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:20 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:21 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:22 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:23 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:24 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:24 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:25 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:26 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:26 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:27 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:28 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:29 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:29 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:30 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:31 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:32 \nF12tools.dll| 11.0.9600.19867| 372,224| 13-Oct-2020| 04:56 \nF12.dll| 11.0.9600.19867| 1,422,336| 13-Oct-2020| 04:42 \nMsfeeds.dll| 11.0.9600.19867| 809,472| 13-Oct-2020| 04:33 \nMsfeeds.mof| Not applicable| 1,518| 13-Oct-2020| 02:41 \nMsfeedsbs.dll| 11.0.9600.19867| 60,416| 13-Oct-2020| 04:48 \nMsfeedsbs.mof| Not applicable| 1,574| 13-Oct-2020| 02:41 \nMsfeedssync.exe| 11.0.9600.19867| 13,312| 13-Oct-2020| 05:22 \nHtml.iec| 2019.0.0.19867| 417,280| 13-Oct-2020| 05:20 \nMshtmled.dll| 11.0.9600.19867| 92,672| 13-Oct-2020| 04:48 \nMshtmlmedia.dll| 11.0.9600.19867| 1,359,360| 13-Oct-2020| 04:31 \nMicrosoft-windows-ie-htmlrendering.ptxml| Not applicable| 3,228| 13-Oct-2020| 02:27 \nMshtml.dll| 11.0.9600.19867| 25,758,208| 13-Oct-2020| 06:57 \nMshtml.tlb| 11.0.9600.19867| 2,724,864| 13-Oct-2020| 05:35 \nIeetwcollector.exe| 11.0.9600.19867| 116,224| 13-Oct-2020| 05:09 \nIeetwcollectorres.dll| 11.0.9600.19867| 4,096| 13-Oct-2020| 05:34 \nIeetwproxystub.dll| 11.0.9600.19867| 48,640| 13-Oct-2020| 05:20 \nIelowutil.exe| 11.0.9600.19867| 222,720| 13-Oct-2020| 05:12 \nIeproxy.dll| 11.0.9600.19867| 857,600| 13-Oct-2020| 03:54 \nIeshims.dll| 11.0.9600.19867| 387,072| 13-Oct-2020| 04:03 \nBing.ico| Not applicable| 5,430| 19-Oct-2017| 08:15 \nIeunatt.exe| 11.0.9600.19867| 144,384| 13-Oct-2020| 05:09 \nMicrosoft-windows-ie-internetexplorer-ppdlic.xrm-ms| Not applicable| 2,956| 16-Oct-2020| 02:04 \nWindows feed discovered.wav| Not applicable| 19,884| 19-Oct-2017| 08:17 \nWindows information bar.wav| Not applicable| 23,308| 19-Oct-2017| 08:17 \nWindows navigation start.wav| Not applicable| 11,340| 19-Oct-2017| 08:17 \nWindows pop-up blocked.wav| Not applicable| 85,548| 19-Oct-2017| 08:17 \nJsprofilerui.dll| 11.0.9600.19867| 628,736| 13-Oct-2020| 04:49 \nMemoryanalyzer.dll| 11.0.9600.19867| 1,862,144| 13-Oct-2020| 05:07 \nMshtmldac.dll| 11.0.9600.19867| 88,064| 13-Oct-2020| 05:20 \nNetworkinspection.dll| 11.0.9600.19867| 1,217,024| 13-Oct-2020| 04:43 \nDesktop.ini| Not applicable| 65| 19-Oct-2017| 08:13 \nOccache.dll| 11.0.9600.19867| 152,064| 13-Oct-2020| 04:44 \nDesktop.ini| Not applicable| 65| 19-Oct-2017| 08:13 \nWebcheck.dll| 11.0.9600.19867| 262,144| 13-Oct-2020| 04:35 \nIcrav03.rat| Not applicable| 8,798| 19-Oct-2017| 08:13 \nMsrating.dll| 11.0.9600.19867| 199,680| 13-Oct-2020| 04:48 \nTicrf.rat| Not applicable| 1,988| 19-Oct-2017| 08:13 \nIertutil.dll| 11.0.9600.19867| 2,915,840| 13-Oct-2020| 05:22 \nSqmapi.dll| 6.2.9200.16384| 286,104| 16-Oct-2020| 01:03 \nIe4uinit.exe| 11.0.9600.19867| 728,064| 13-Oct-2020| 04:33 \nIernonce.dll| 11.0.9600.19867| 34,304| 13-Oct-2020| 05:13 \nIesetup.dll| 11.0.9600.19867| 66,560| 13-Oct-2020| 05:21 \nInseng.dll| 11.0.9600.19867| 107,520| 13-Oct-2020| 04:51 \nTimeline.dll| 11.0.9600.19867| 219,136| 13-Oct-2020| 04:51 \nTimeline.cpu.xml| Not applicable| 3,197| 19-Oct-2017| 08:13 \nTimeline_is.dll| 11.0.9600.19867| 171,520| 13-Oct-2020| 05:13 \nVgx.dll| 11.0.9600.19867| 1,018,368| 13-Oct-2020| 04:48 \nIeframe.dll.mui| 11.0.9600.19867| 2,066,432| 16-Oct-2020| 01:05 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 01:05 \nIeframe.dll.mui| 11.0.9600.19867| 2,121,216| 16-Oct-2020| 01:06 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 01:05 \nIeframe.dll.mui| 11.0.9600.19867| 2,075,136| 16-Oct-2020| 01:07 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 01:06 \nIeframe.dll.mui| 11.0.9600.19867| 2,063,872| 16-Oct-2020| 01:08 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 01:07 \nIeframe.dll.mui| 11.0.9600.19867| 2,314,240| 16-Oct-2020| 01:09 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 01:08 \nIeframe.dll.mui| 11.0.9600.19867| 2,390,528| 16-Oct-2020| 01:09 \nIeui.dll.mui| 11.0.9600.19867| 3,584| 16-Oct-2020| 01:09 \nIeframe.dll.mui| 11.0.9600.19867| 2,033,152| 16-Oct-2020| 02:05 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 02:04 \nIeframe.dll.mui| 11.0.9600.19867| 2,307,584| 16-Oct-2020| 01:10 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 01:10 \nIeframe.dll.mui| 11.0.9600.19867| 2,255,872| 16-Oct-2020| 01:11 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 01:11 \nIeframe.dll.mui| 11.0.9600.19867| 2,061,312| 16-Oct-2020| 01:12 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 01:11 \nIeframe.dll.mui| 11.0.9600.19867| 2,326,016| 16-Oct-2020| 01:13 \nIeui.dll.mui| 11.0.9600.19867| 3,584| 16-Oct-2020| 01:12 \nIeframe.dll.mui| 11.0.9600.19867| 2,019,840| 16-Oct-2020| 01:13 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 01:13 \nIeframe.dll.mui| 11.0.9600.19867| 2,071,040| 16-Oct-2020| 01:14 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 01:14 \nIeframe.dll.mui| 11.0.9600.19867| 2,082,816| 16-Oct-2020| 01:15 \nIeui.dll.mui| 11.0.9600.19867| 3,584| 16-Oct-2020| 01:15 \nIeframe.dll.mui| 11.0.9600.19867| 2,307,584| 16-Oct-2020| 01:16 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 01:15 \nIeframe.dll.mui| 11.0.9600.19867| 2,170,368| 16-Oct-2020| 01:17 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 01:17 \nIeframe.dll.mui| 11.0.9600.19867| 2,153,984| 16-Oct-2020| 01:18 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 01:17 \nIeframe.dll.mui| 11.0.9600.19867| 2,291,712| 16-Oct-2020| 01:18 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 01:18 \nIeframe.dll.mui| 11.0.9600.19867| 2,283,520| 16-Oct-2020| 01:19 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 01:19 \nIeframe.dll.mui| 11.0.9600.19867| 2,052,096| 16-Oct-2020| 01:20 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 01:20 \nIeframe.dll.mui| 11.0.9600.19867| 2,301,952| 16-Oct-2020| 01:21 \nIeui.dll.mui| 11.0.9600.19867| 3,584| 16-Oct-2020| 01:20 \nIeframe.dll.mui| 11.0.9600.19867| 2,093,056| 16-Oct-2020| 01:22 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 01:21 \nIeframe.dll.mui| 11.0.9600.19867| 2,075,648| 16-Oct-2020| 01:22 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 01:22 \nIeframe.dll.mui| 11.0.9600.19867| 2,299,392| 16-Oct-2020| 01:23 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 01:23 \nIeframe.dll.mui| 11.0.9600.19867| 2,094,592| 16-Oct-2020| 01:24 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 01:23 \nIeframe.dll.mui| 11.0.9600.19867| 2,316,800| 16-Oct-2020| 01:25 \nIeui.dll.mui| 11.0.9600.19867| 3,584| 16-Oct-2020| 01:25 \nIeframe.dll.mui| 11.0.9600.19867| 2,305,536| 16-Oct-2020| 01:25 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 01:25 \nIeframe.dll.mui| 11.0.9600.19867| 2,278,912| 16-Oct-2020| 01:26 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 01:26 \nIeframe.dll.mui| 11.0.9600.19867| 2,277,888| 16-Oct-2020| 01:27 \nIeui.dll.mui| 11.0.9600.19867| 3,584| 16-Oct-2020| 01:26 \nIeframe.dll.mui| 11.0.9600.19867| 2,060,288| 16-Oct-2020| 01:28 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 01:27 \nIeframe.dll.mui| 11.0.9600.19867| 2,315,776| 16-Oct-2020| 01:28 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 01:28 \nIeframe.dll.mui| 11.0.9600.19867| 2,278,912| 16-Oct-2020| 01:29 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 01:29 \nIeframe.dll.mui| 11.0.9600.19867| 2,324,992| 16-Oct-2020| 01:30 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 01:30 \nIeframe.dll.mui| 11.0.9600.19867| 2,098,176| 16-Oct-2020| 01:31 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 01:30 \nIeframe.dll.mui| 11.0.9600.19867| 1,890,304| 16-Oct-2020| 01:32 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 01:31 \nIeframe.dll.mui| 11.0.9600.19867| 1,890,304| 16-Oct-2020| 01:33 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 01:32 \nIeframe.dll| 11.0.9600.19867| 15,494,144| 13-Oct-2020| 04:32 \nIeframe.ptxml| Not applicable| 24,486| 13-Oct-2020| 02:27 \nIeui.dll| 11.0.9600.19867| 615,936| 13-Oct-2020| 05:10 \nIeinstal.exe| 11.0.9600.19867| 492,032| 13-Oct-2020| 04:46 \nInetres.adml| Not applicable| 456,165| 16-Oct-2020| 01:05 \nInetres.adml| Not applicable| 456,165| 16-Oct-2020| 01:05 \nInetres.adml| Not applicable| 524,733| 16-Oct-2020| 01:06 \nInetres.adml| Not applicable| 498,151| 16-Oct-2020| 01:07 \nInetres.adml| Not applicable| 550,745| 16-Oct-2020| 01:08 \nInetres.adml| Not applicable| 942,143| 16-Oct-2020| 01:09 \nInetres.adml| Not applicable| 456,165| 16-Oct-2020| 02:04 \nInetres.adml| Not applicable| 542,443| 16-Oct-2020| 01:10 \nInetres.adml| Not applicable| 456,165| 16-Oct-2020| 01:11 \nInetres.adml| Not applicable| 524,999| 16-Oct-2020| 01:11 \nInetres.adml| Not applicable| 574,243| 16-Oct-2020| 01:12 \nInetres.adml| Not applicable| 456,165| 16-Oct-2020| 01:13 \nInetres.adml| Not applicable| 456,165| 16-Oct-2020| 01:14 \nInetres.adml| Not applicable| 569,173| 16-Oct-2020| 01:15 \nInetres.adml| Not applicable| 546,643| 16-Oct-2020| 01:15 \nInetres.adml| Not applicable| 637,356| 16-Oct-2020| 01:16 \nInetres.adml| Not applicable| 523,880| 16-Oct-2020| 01:17 \nInetres.adml| Not applicable| 456,165| 16-Oct-2020| 01:18 \nInetres.adml| Not applicable| 456,165| 16-Oct-2020| 01:19 \nInetres.adml| Not applicable| 487,001| 16-Oct-2020| 01:20 \nInetres.adml| Not applicable| 546,980| 16-Oct-2020| 01:20 \nInetres.adml| Not applicable| 557,656| 16-Oct-2020| 01:21 \nInetres.adml| Not applicable| 533,510| 16-Oct-2020| 01:22 \nInetres.adml| Not applicable| 539,964| 16-Oct-2020| 01:23 \nInetres.adml| Not applicable| 456,165| 16-Oct-2020| 01:23 \nInetres.adml| Not applicable| 802,394| 16-Oct-2020| 01:24 \nInetres.adml| Not applicable| 456,165| 16-Oct-2020| 01:25 \nInetres.adml| Not applicable| 456,165| 16-Oct-2020| 01:26 \nInetres.adml| Not applicable| 456,165| 16-Oct-2020| 01:27 \nInetres.adml| Not applicable| 502,367| 16-Oct-2020| 01:27 \nInetres.adml| Not applicable| 456,165| 16-Oct-2020| 01:28 \nInetres.adml| Not applicable| 519,994| 16-Oct-2020| 01:29 \nInetres.adml| Not applicable| 456,165| 16-Oct-2020| 01:30 \nInetres.adml| Not applicable| 418,707| 16-Oct-2020| 01:30 \nInetres.adml| Not applicable| 435,257| 16-Oct-2020| 01:31 \nInetres.adml| Not applicable| 435,257| 16-Oct-2020| 01:32 \nInetres.admx| Not applicable| 1,676,517| 07-Oct-2020| 15:22 \nMsspellcheckingfacility.exe| 6.3.9600.19867| 970,240| 13-Oct-2020| 05:02 \nJscript9.dll.mui| 11.0.9600.19867| 29,184| 16-Oct-2020| 01:05 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 16-Oct-2020| 01:05 \nJscript9.dll.mui| 11.0.9600.19867| 32,768| 16-Oct-2020| 01:06 \nJscript9.dll.mui| 11.0.9600.19867| 33,280| 16-Oct-2020| 01:07 \nJscript9.dll.mui| 11.0.9600.19867| 35,328| 16-Oct-2020| 01:08 \nJscript9.dll.mui| 11.0.9600.19867| 37,888| 16-Oct-2020| 01:09 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 16-Oct-2020| 02:04 \nJscript9.dll.mui| 11.0.9600.19867| 34,304| 16-Oct-2020| 01:10 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 16-Oct-2020| 01:11 \nJscript9.dll.mui| 11.0.9600.19867| 33,280| 16-Oct-2020| 01:11 \nJscript9.dll.mui| 11.0.9600.19867| 34,304| 16-Oct-2020| 01:12 \nJscript9.dll.mui| 11.0.9600.19867| 27,648| 16-Oct-2020| 01:13 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 16-Oct-2020| 01:14 \nJscript9.dll.mui| 11.0.9600.19867| 34,304| 16-Oct-2020| 01:14 \nJscript9.dll.mui| 11.0.9600.19867| 33,792| 16-Oct-2020| 01:15 \nJscript9.dll.mui| 11.0.9600.19867| 23,040| 16-Oct-2020| 01:16 \nJscript9.dll.mui| 11.0.9600.19867| 22,016| 16-Oct-2020| 01:17 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 16-Oct-2020| 01:18 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 16-Oct-2020| 01:19 \nJscript9.dll.mui| 11.0.9600.19867| 31,232| 16-Oct-2020| 01:20 \nJscript9.dll.mui| 11.0.9600.19867| 34,304| 16-Oct-2020| 01:20 \nJscript9.dll.mui| 11.0.9600.19867| 35,840| 16-Oct-2020| 01:22 \nJscript9.dll.mui| 11.0.9600.19867| 32,768| 16-Oct-2020| 01:22 \nJscript9.dll.mui| 11.0.9600.19867| 33,280| 16-Oct-2020| 01:23 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 16-Oct-2020| 01:24 \nJscript9.dll.mui| 11.0.9600.19867| 34,816| 16-Oct-2020| 01:24 \nJscript9.dll.mui| 11.0.9600.19867| 33,280| 16-Oct-2020| 01:25 \nJscript9.dll.mui| 11.0.9600.19867| 32,256| 16-Oct-2020| 01:26 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 16-Oct-2020| 01:27 \nJscript9.dll.mui| 11.0.9600.19867| 32,768| 16-Oct-2020| 01:27 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 16-Oct-2020| 01:28 \nJscript9.dll.mui| 11.0.9600.19867| 30,720| 16-Oct-2020| 01:29 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 16-Oct-2020| 01:30 \nJscript9.dll.mui| 11.0.9600.19867| 16,384| 16-Oct-2020| 01:30 \nJscript9.dll.mui| 11.0.9600.19867| 16,896| 16-Oct-2020| 01:31 \nJscript9.dll.mui| 11.0.9600.19867| 16,896| 16-Oct-2020| 01:32 \nJscript9.dll| 11.0.9600.19867| 5,499,392| 13-Oct-2020| 05:10 \nJscript9diag.dll| 11.0.9600.19867| 814,080| 13-Oct-2020| 05:09 \nJscript.dll| 5.8.9600.19867| 785,408| 13-Oct-2020| 05:09 \nVbscript.dll| 5.8.9600.19867| 581,120| 13-Oct-2020| 05:20 \nIexplore.exe| 11.0.9600.19867| 810,376| 16-Oct-2020| 00:08 \nTdc.ocx| 11.0.9600.19867| 73,216| 13-Oct-2020| 04:22 \nDxtmsft.dll| 11.0.9600.19867| 416,256| 13-Oct-2020| 04:27 \nDxtrans.dll| 11.0.9600.19867| 279,552| 13-Oct-2020| 04:18 \nMsfeeds.dll| 11.0.9600.19867| 696,320| 13-Oct-2020| 04:10 \nMsfeeds.mof| Not applicable| 1,518| 13-Oct-2020| 02:33 \nMshtmled.dll| 11.0.9600.19867| 76,800| 13-Oct-2020| 04:19 \nMshtmlmedia.dll| 11.0.9600.19867| 1,155,072| 13-Oct-2020| 04:09 \nMshtml.dll| 11.0.9600.19867| 20,293,632| 13-Oct-2020| 04:59 \nMshtml.tlb| 11.0.9600.19867| 2,724,864| 13-Oct-2020| 04:57 \nWow64_microsoft-windows-ie-htmlrendering.ptxml| Not applicable| 3,228| 13-Oct-2020| 02:25 \nIeetwproxystub.dll| 11.0.9600.19867| 47,616| 13-Oct-2020| 04:44 \nIeunatt.exe| 11.0.9600.19867| 115,712| 13-Oct-2020| 04:35 \nOccache.dll| 11.0.9600.19867| 130,048| 13-Oct-2020| 04:16 \nWebcheck.dll| 11.0.9600.19867| 230,400| 13-Oct-2020| 04:11 \nIernonce.dll| 11.0.9600.19867| 30,720| 13-Oct-2020| 04:38 \nIesetup.dll| 11.0.9600.19867| 62,464| 13-Oct-2020| 04:45 \nIe9props.propdesc| Not applicable| 2,843| 23-Sep-2018| 13:32 \nIeframe.dll| 11.0.9600.19867| 13,873,664| 13-Oct-2020| 04:09 \nIeui.dll| 11.0.9600.19867| 476,160| 13-Oct-2020| 04:36 \nWow64_ieframe.ptxml| Not applicable| 24,486| 13-Oct-2020| 02:25 \nJscript9.dll| 11.0.9600.19867| 4,112,384| 13-Oct-2020| 04:12 \nJscript9diag.dll| 11.0.9600.19867| 620,032| 13-Oct-2020| 04:35 \nJscript.dll| 5.8.9600.19867| 653,824| 13-Oct-2020| 04:35 \nVbscript.dll| 5.8.9600.19867| 498,176| 13-Oct-2020| 04:45 \nUrlmon.dll| 11.0.9600.19867| 1,342,976| 13-Oct-2020| 03:48 \nWebcheck.dll.mui| 11.0.9600.19867| 31,744| 16-Oct-2020| 00:10 \nWebcheck.dll.mui| 11.0.9600.19867| 36,352| 16-Oct-2020| 00:11 \nWebcheck.dll.mui| 11.0.9600.19867| 35,328| 16-Oct-2020| 00:11 \nWebcheck.dll.mui| 11.0.9600.19867| 34,816| 16-Oct-2020| 00:12 \nWebcheck.dll.mui| 11.0.9600.19867| 36,864| 16-Oct-2020| 00:13 \nWebcheck.dll.mui| 11.0.9600.19867| 39,424| 16-Oct-2020| 00:14 \nWebcheck.dll.mui| 11.0.9600.19867| 32,768| 16-Oct-2020| 01:38 \nWebcheck.dll.mui| 11.0.9600.19867| 37,376| 16-Oct-2020| 00:15 \nWebcheck.dll.mui| 11.0.9600.19867| 33,280| 16-Oct-2020| 00:16 \nWebcheck.dll.mui| 11.0.9600.19867| 34,816| 16-Oct-2020| 00:16 \nWebcheck.dll.mui| 11.0.9600.19867| 38,400| 16-Oct-2020| 00:17 \nWebcheck.dll.mui| 11.0.9600.19867| 30,720| 16-Oct-2020| 00:18 \nWebcheck.dll.mui| 11.0.9600.19867| 34,816| 16-Oct-2020| 00:19 \nWebcheck.dll.mui| 11.0.9600.19867| 35,328| 16-Oct-2020| 00:20 \nWebcheck.dll.mui| 11.0.9600.19867| 36,864| 16-Oct-2020| 00:20 \nWebcheck.dll.mui| 11.0.9600.19867| 25,600| 16-Oct-2020| 00:21 \nWebcheck.dll.mui| 11.0.9600.19867| 24,576| 16-Oct-2020| 00:22 \nWebcheck.dll.mui| 11.0.9600.19867| 35,840| 16-Oct-2020| 00:23 \nWebcheck.dll.mui| 11.0.9600.19867| 34,304| 16-Oct-2020| 00:24 \nWebcheck.dll.mui| 11.0.9600.19867| 34,304| 16-Oct-2020| 00:25 \nWebcheck.dll.mui| 11.0.9600.19867| 36,352| 16-Oct-2020| 00:25 \nWebcheck.dll.mui| 11.0.9600.19867| 35,840| 16-Oct-2020| 00:26 \nWebcheck.dll.mui| 11.0.9600.19867| 34,816| 16-Oct-2020| 00:27 \nWebcheck.dll.mui| 11.0.9600.19867| 35,840| 16-Oct-2020| 00:28 \nWebcheck.dll.mui| 11.0.9600.19867| 35,840| 16-Oct-2020| 00:29 \nWebcheck.dll.mui| 11.0.9600.19867| 34,304| 16-Oct-2020| 00:29 \nWebcheck.dll.mui| 11.0.9600.19867| 35,840| 16-Oct-2020| 00:30 \nWebcheck.dll.mui| 11.0.9600.19867| 34,816| 16-Oct-2020| 00:31 \nWebcheck.dll.mui| 11.0.9600.19867| 34,816| 16-Oct-2020| 00:32 \nWebcheck.dll.mui| 11.0.9600.19867| 34,816| 16-Oct-2020| 00:33 \nWebcheck.dll.mui| 11.0.9600.19867| 33,280| 16-Oct-2020| 00:33 \nWebcheck.dll.mui| 11.0.9600.19867| 34,304| 16-Oct-2020| 00:34 \nWebcheck.dll.mui| 11.0.9600.19867| 34,304| 16-Oct-2020| 00:35 \nWebcheck.dll.mui| 11.0.9600.19867| 20,992| 16-Oct-2020| 00:36 \nWebcheck.dll.mui| 11.0.9600.19867| 21,504| 16-Oct-2020| 00:37 \nWebcheck.dll.mui| 11.0.9600.19867| 21,504| 16-Oct-2020| 00:38 \nWininet.dll.mui| 11.0.9600.19867| 46,592| 16-Oct-2020| 00:10 \nWininet.dll.mui| 11.0.9600.19867| 52,736| 16-Oct-2020| 00:11 \nWininet.dll.mui| 11.0.9600.19867| 51,200| 16-Oct-2020| 00:11 \nWininet.dll.mui| 11.0.9600.19867| 51,200| 16-Oct-2020| 00:12 \nWininet.dll.mui| 11.0.9600.19867| 56,320| 16-Oct-2020| 00:13 \nWininet.dll.mui| 11.0.9600.19867| 57,856| 16-Oct-2020| 00:14 \nWininet.dll.mui| 11.0.9600.19867| 49,664| 16-Oct-2020| 01:38 \nWininet.dll.mui| 11.0.9600.19867| 54,272| 16-Oct-2020| 00:15 \nWininet.dll.mui| 11.0.9600.19867| 47,616| 16-Oct-2020| 00:15 \nWininet.dll.mui| 11.0.9600.19867| 49,152| 16-Oct-2020| 00:16 \nWininet.dll.mui| 11.0.9600.19867| 55,296| 16-Oct-2020| 00:17 \nWininet.dll.mui| 11.0.9600.19867| 45,056| 16-Oct-2020| 00:18 \nWininet.dll.mui| 11.0.9600.19867| 51,712| 16-Oct-2020| 00:19 \nWininet.dll.mui| 11.0.9600.19867| 51,712| 16-Oct-2020| 00:19 \nWininet.dll.mui| 11.0.9600.19867| 53,248| 16-Oct-2020| 00:20 \nWininet.dll.mui| 11.0.9600.19867| 39,424| 16-Oct-2020| 00:21 \nWininet.dll.mui| 11.0.9600.19867| 35,840| 16-Oct-2020| 00:22 \nWininet.dll.mui| 11.0.9600.19867| 50,176| 16-Oct-2020| 00:23 \nWininet.dll.mui| 11.0.9600.19867| 51,200| 16-Oct-2020| 00:24 \nWininet.dll.mui| 11.0.9600.19867| 50,688| 16-Oct-2020| 00:24 \nWininet.dll.mui| 11.0.9600.19867| 52,736| 16-Oct-2020| 00:25 \nWininet.dll.mui| 11.0.9600.19867| 53,760| 16-Oct-2020| 00:26 \nWininet.dll.mui| 11.0.9600.19867| 54,272| 16-Oct-2020| 00:27 \nWininet.dll.mui| 11.0.9600.19867| 54,272| 16-Oct-2020| 00:28 \nWininet.dll.mui| 11.0.9600.19867| 52,736| 16-Oct-2020| 00:29 \nWininet.dll.mui| 11.0.9600.19867| 51,200| 16-Oct-2020| 00:29 \nWininet.dll.mui| 11.0.9600.19867| 53,248| 16-Oct-2020| 00:30 \nWininet.dll.mui| 11.0.9600.19867| 52,736| 16-Oct-2020| 00:31 \nWininet.dll.mui| 11.0.9600.19867| 51,712| 16-Oct-2020| 00:32 \nWininet.dll.mui| 11.0.9600.19867| 50,688| 16-Oct-2020| 00:33 \nWininet.dll.mui| 11.0.9600.19867| 50,688| 16-Oct-2020| 00:33 \nWininet.dll.mui| 11.0.9600.19867| 50,176| 16-Oct-2020| 00:34 \nWininet.dll.mui| 11.0.9600.19867| 50,176| 16-Oct-2020| 00:35 \nWininet.dll.mui| 11.0.9600.19867| 30,720| 16-Oct-2020| 00:36 \nWininet.dll.mui| 11.0.9600.19867| 30,720| 16-Oct-2020| 00:37 \nWininet.dll.mui| 11.0.9600.19867| 30,720| 16-Oct-2020| 00:38 \nInetcpl.cpl| 11.0.9600.19867| 2,058,752| 13-Oct-2020| 04:09 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:10 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:11 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:11 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:12 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:13 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:14 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 01:38 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:15 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:15 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:16 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:17 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:18 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:19 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:19 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:20 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:21 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:22 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:23 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:24 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:25 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:25 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:26 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:27 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:28 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:29 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:29 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:30 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:31 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:32 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:33 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:33 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:34 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:35 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:36 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:37 \nDiagnosticstap.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:38 \nMshtml.dll.mui| 11.0.9600.19867| 307,200| 16-Oct-2020| 00:10 \nMshtml.dll.mui| 11.0.9600.19867| 293,888| 16-Oct-2020| 00:11 \nMshtml.dll.mui| 11.0.9600.19867| 290,304| 16-Oct-2020| 00:11 \nMshtml.dll.mui| 11.0.9600.19867| 289,280| 16-Oct-2020| 00:12 \nMshtml.dll.mui| 11.0.9600.19867| 299,008| 16-Oct-2020| 00:13 \nMshtml.dll.mui| 11.0.9600.19867| 303,104| 16-Oct-2020| 00:14 \nMshtml.dll.mui| 11.0.9600.19867| 282,112| 16-Oct-2020| 01:38 \nMshtml.dll.mui| 11.0.9600.19867| 296,960| 16-Oct-2020| 00:15 \nMshtml.dll.mui| 11.0.9600.19867| 283,648| 16-Oct-2020| 00:16 \nMshtml.dll.mui| 11.0.9600.19867| 291,840| 16-Oct-2020| 00:17 \nMshtml.dll.mui| 11.0.9600.19867| 299,520| 16-Oct-2020| 00:17 \nMshtml.dll.mui| 11.0.9600.19867| 275,968| 16-Oct-2020| 00:18 \nMshtml.dll.mui| 11.0.9600.19867| 290,816| 16-Oct-2020| 00:19 \nMshtml.dll.mui| 11.0.9600.19867| 293,376| 16-Oct-2020| 00:19 \nMshtml.dll.mui| 11.0.9600.19867| 296,960| 16-Oct-2020| 00:20 \nMshtml.dll.mui| 11.0.9600.19867| 258,048| 16-Oct-2020| 00:21 \nMshtml.dll.mui| 11.0.9600.19867| 256,512| 16-Oct-2020| 00:22 \nMshtml.dll.mui| 11.0.9600.19867| 289,280| 16-Oct-2020| 00:23 \nMshtml.dll.mui| 11.0.9600.19867| 288,256| 16-Oct-2020| 00:24 \nMshtml.dll.mui| 11.0.9600.19867| 285,184| 16-Oct-2020| 00:25 \nMshtml.dll.mui| 11.0.9600.19867| 295,424| 16-Oct-2020| 00:26 \nMshtml.dll.mui| 11.0.9600.19867| 297,472| 16-Oct-2020| 00:26 \nMshtml.dll.mui| 11.0.9600.19867| 292,864| 16-Oct-2020| 00:27 \nMshtml.dll.mui| 11.0.9600.19867| 295,424| 16-Oct-2020| 00:28 \nMshtml.dll.mui| 11.0.9600.19867| 294,400| 16-Oct-2020| 00:29 \nMshtml.dll.mui| 11.0.9600.19867| 294,400| 16-Oct-2020| 00:30 \nMshtml.dll.mui| 11.0.9600.19867| 292,864| 16-Oct-2020| 00:30 \nMshtml.dll.mui| 11.0.9600.19867| 290,816| 16-Oct-2020| 00:31 \nMshtml.dll.mui| 11.0.9600.19867| 288,768| 16-Oct-2020| 00:32 \nMshtml.dll.mui| 11.0.9600.19867| 286,208| 16-Oct-2020| 00:33 \nMshtml.dll.mui| 11.0.9600.19867| 281,600| 16-Oct-2020| 00:33 \nMshtml.dll.mui| 11.0.9600.19867| 286,720| 16-Oct-2020| 00:35 \nMshtml.dll.mui| 11.0.9600.19867| 292,352| 16-Oct-2020| 00:35 \nMshtml.dll.mui| 11.0.9600.19867| 242,176| 16-Oct-2020| 00:36 \nMshtml.dll.mui| 11.0.9600.19867| 243,200| 16-Oct-2020| 00:37 \nMshtml.dll.mui| 11.0.9600.19867| 243,200| 16-Oct-2020| 00:38 \nJavascriptcollectionagent.dll| 11.0.9600.19867| 60,416| 13-Oct-2020| 04:23 \nUrlmon.dll.mui| 11.0.9600.19867| 46,080| 16-Oct-2020| 00:10 \nUrlmon.dll.mui| 11.0.9600.19867| 50,176| 16-Oct-2020| 00:11 \nUrlmon.dll.mui| 11.0.9600.19867| 48,640| 16-Oct-2020| 00:12 \nUrlmon.dll.mui| 11.0.9600.19867| 49,664| 16-Oct-2020| 00:12 \nUrlmon.dll.mui| 11.0.9600.19867| 51,712| 16-Oct-2020| 00:13 \nUrlmon.dll.mui| 11.0.9600.19867| 54,272| 16-Oct-2020| 00:14 \nUrlmon.dll.mui| 11.0.9600.19867| 48,128| 16-Oct-2020| 01:37 \nUrlmon.dll.mui| 11.0.9600.19867| 50,176| 16-Oct-2020| 00:15 \nUrlmon.dll.mui| 11.0.9600.19867| 47,616| 16-Oct-2020| 00:15 \nUrlmon.dll.mui| 11.0.9600.19867| 49,152| 16-Oct-2020| 00:16 \nUrlmon.dll.mui| 11.0.9600.19867| 50,688| 16-Oct-2020| 00:17 \nUrlmon.dll.mui| 11.0.9600.19867| 45,056| 16-Oct-2020| 00:18 \nUrlmon.dll.mui| 11.0.9600.19867| 49,152| 16-Oct-2020| 00:19 \nUrlmon.dll.mui| 11.0.9600.19867| 49,152| 16-Oct-2020| 00:19 \nUrlmon.dll.mui| 11.0.9600.19867| 49,664| 16-Oct-2020| 00:20 \nUrlmon.dll.mui| 11.0.9600.19867| 39,936| 16-Oct-2020| 00:22 \nUrlmon.dll.mui| 11.0.9600.19867| 39,424| 16-Oct-2020| 00:22 \nUrlmon.dll.mui| 11.0.9600.19867| 47,616| 16-Oct-2020| 00:23 \nUrlmon.dll.mui| 11.0.9600.19867| 47,616| 16-Oct-2020| 00:24 \nUrlmon.dll.mui| 11.0.9600.19867| 48,640| 16-Oct-2020| 00:24 \nUrlmon.dll.mui| 11.0.9600.19867| 51,200| 16-Oct-2020| 00:25 \nUrlmon.dll.mui| 11.0.9600.19867| 50,688| 16-Oct-2020| 00:26 \nUrlmon.dll.mui| 11.0.9600.19867| 49,664| 16-Oct-2020| 00:27 \nUrlmon.dll.mui| 11.0.9600.19867| 50,176| 16-Oct-2020| 00:28 \nUrlmon.dll.mui| 11.0.9600.19867| 49,152| 16-Oct-2020| 00:29 \nUrlmon.dll.mui| 11.0.9600.19867| 48,640| 16-Oct-2020| 00:29 \nUrlmon.dll.mui| 11.0.9600.19867| 50,176| 16-Oct-2020| 00:30 \nUrlmon.dll.mui| 11.0.9600.19867| 48,640| 16-Oct-2020| 00:31 \nUrlmon.dll.mui| 11.0.9600.19867| 49,664| 16-Oct-2020| 00:32 \nUrlmon.dll.mui| 11.0.9600.19867| 48,640| 16-Oct-2020| 00:33 \nUrlmon.dll.mui| 11.0.9600.19867| 48,128| 16-Oct-2020| 00:33 \nUrlmon.dll.mui| 11.0.9600.19867| 49,152| 16-Oct-2020| 00:35 \nUrlmon.dll.mui| 11.0.9600.19867| 48,128| 16-Oct-2020| 00:35 \nUrlmon.dll.mui| 11.0.9600.19867| 35,328| 16-Oct-2020| 00:36 \nUrlmon.dll.mui| 11.0.9600.19867| 35,328| 16-Oct-2020| 00:37 \nUrlmon.dll.mui| 11.0.9600.19867| 35,328| 16-Oct-2020| 00:38 \nOccache.dll.mui| 11.0.9600.19867| 9,728| 16-Oct-2020| 00:10 \nOccache.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:11 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 00:11 \nOccache.dll.mui| 11.0.9600.19867| 9,728| 16-Oct-2020| 00:12 \nOccache.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:13 \nOccache.dll.mui| 11.0.9600.19867| 11,264| 16-Oct-2020| 00:14 \nOccache.dll.mui| 11.0.9600.19867| 9,728| 16-Oct-2020| 01:37 \nOccache.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:15 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 00:15 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 00:16 \nOccache.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:17 \nOccache.dll.mui| 11.0.9600.19867| 9,216| 16-Oct-2020| 00:18 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 00:19 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 00:19 \nOccache.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:20 \nOccache.dll.mui| 11.0.9600.19867| 7,680| 16-Oct-2020| 00:22 \nOccache.dll.mui| 11.0.9600.19867| 7,680| 16-Oct-2020| 00:22 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 00:23 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 00:24 \nOccache.dll.mui| 11.0.9600.19867| 9,728| 16-Oct-2020| 00:25 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 00:25 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 00:26 \nOccache.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:27 \nOccache.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:28 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 00:29 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 00:29 \nOccache.dll.mui| 11.0.9600.19867| 10,752| 16-Oct-2020| 00:30 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 00:31 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 00:32 \nOccache.dll.mui| 11.0.9600.19867| 9,728| 16-Oct-2020| 00:33 \nOccache.dll.mui| 11.0.9600.19867| 9,728| 16-Oct-2020| 00:33 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 00:34 \nOccache.dll.mui| 11.0.9600.19867| 10,240| 16-Oct-2020| 00:35 \nOccache.dll.mui| 11.0.9600.19867| 6,656| 16-Oct-2020| 00:36 \nOccache.dll.mui| 11.0.9600.19867| 6,656| 16-Oct-2020| 00:37 \nOccache.dll.mui| 11.0.9600.19867| 6,656| 16-Oct-2020| 00:38 \nJsproxy.dll| 11.0.9600.19867| 47,104| 13-Oct-2020| 04:38 \nWininet.dll| 11.0.9600.19867| 4,387,840| 13-Oct-2020| 03:51 \nInetcpl.cpl.mui| 11.0.9600.19867| 114,176| 16-Oct-2020| 00:10 \nInetcpl.cpl.mui| 11.0.9600.19867| 130,560| 16-Oct-2020| 00:11 \nInetcpl.cpl.mui| 11.0.9600.19867| 124,928| 16-Oct-2020| 00:12 \nInetcpl.cpl.mui| 11.0.9600.19867| 122,880| 16-Oct-2020| 00:12 \nInetcpl.cpl.mui| 11.0.9600.19867| 130,048| 16-Oct-2020| 00:13 \nInetcpl.cpl.mui| 11.0.9600.19867| 138,240| 16-Oct-2020| 00:14 \nInetcpl.cpl.mui| 11.0.9600.19867| 114,688| 16-Oct-2020| 01:38 \nInetcpl.cpl.mui| 11.0.9600.19867| 131,584| 16-Oct-2020| 00:15 \nInetcpl.cpl.mui| 11.0.9600.19867| 117,760| 16-Oct-2020| 00:16 \nInetcpl.cpl.mui| 11.0.9600.19867| 122,368| 16-Oct-2020| 00:16 \nInetcpl.cpl.mui| 11.0.9600.19867| 134,144| 16-Oct-2020| 00:17 \nInetcpl.cpl.mui| 11.0.9600.19867| 107,008| 16-Oct-2020| 00:18 \nInetcpl.cpl.mui| 11.0.9600.19867| 123,392| 16-Oct-2020| 00:19 \nInetcpl.cpl.mui| 11.0.9600.19867| 127,488| 16-Oct-2020| 00:19 \nInetcpl.cpl.mui| 11.0.9600.19867| 128,512| 16-Oct-2020| 00:20 \nInetcpl.cpl.mui| 11.0.9600.19867| 88,576| 16-Oct-2020| 00:21 \nInetcpl.cpl.mui| 11.0.9600.19867| 82,944| 16-Oct-2020| 00:22 \nInetcpl.cpl.mui| 11.0.9600.19867| 125,440| 16-Oct-2020| 00:23 \nInetcpl.cpl.mui| 11.0.9600.19867| 123,392| 16-Oct-2020| 00:24 \nInetcpl.cpl.mui| 11.0.9600.19867| 120,320| 16-Oct-2020| 00:24 \nInetcpl.cpl.mui| 11.0.9600.19867| 130,560| 16-Oct-2020| 00:25 \nInetcpl.cpl.mui| 11.0.9600.19867| 129,024| 16-Oct-2020| 00:26 \nInetcpl.cpl.mui| 11.0.9600.19867| 125,952| 16-Oct-2020| 00:27 \nInetcpl.cpl.mui| 11.0.9600.19867| 129,024| 16-Oct-2020| 00:28 \nInetcpl.cpl.mui| 11.0.9600.19867| 128,000| 16-Oct-2020| 00:29 \nInetcpl.cpl.mui| 11.0.9600.19867| 123,904| 16-Oct-2020| 00:30 \nInetcpl.cpl.mui| 11.0.9600.19867| 129,024| 16-Oct-2020| 00:30 \nInetcpl.cpl.mui| 11.0.9600.19867| 123,904| 16-Oct-2020| 00:31 \nInetcpl.cpl.mui| 11.0.9600.19867| 124,416| 16-Oct-2020| 00:32 \nInetcpl.cpl.mui| 11.0.9600.19867| 121,856| 16-Oct-2020| 00:33 \nInetcpl.cpl.mui| 11.0.9600.19867| 115,712| 16-Oct-2020| 00:33 \nInetcpl.cpl.mui| 11.0.9600.19867| 123,904| 16-Oct-2020| 00:34 \nInetcpl.cpl.mui| 11.0.9600.19867| 125,440| 16-Oct-2020| 00:35 \nInetcpl.cpl.mui| 11.0.9600.19867| 72,704| 16-Oct-2020| 00:37 \nInetcpl.cpl.mui| 11.0.9600.19867| 73,728| 16-Oct-2020| 00:37 \nInetcpl.cpl.mui| 11.0.9600.19867| 73,728| 16-Oct-2020| 00:38 \nIedkcs32.dll| 18.0.9600.19867| 341,896| 16-Oct-2020| 00:08 \nInstall.ins| Not applicable| 464| 13-Oct-2020| 02:24 \nIeapfltr.dat| 10.0.9301.0| 616,104| 23-Sep-2018| 13:18 \nIeapfltr.dll| 11.0.9600.19867| 710,656| 13-Oct-2020| 03:46 \nIedvtool.dll| 11.0.9600.19867| 772,608| 13-Oct-2020| 05:00 \nDiagnosticstap.dll| 11.0.9600.19867| 174,592| 13-Oct-2020| 04:26 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:10 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:11 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:12 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:12 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:13 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:14 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 01:37 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:15 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:15 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:16 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:17 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:18 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:19 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:20 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:20 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:21 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:22 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:23 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:24 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:24 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:25 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:26 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:27 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:28 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:29 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:29 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:30 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:31 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:32 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:33 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:33 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:34 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:35 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:36 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:37 \nF12tools.dll.mui| 11.0.9600.19867| 2,048| 16-Oct-2020| 00:38 \nF12tools.dll| 11.0.9600.19867| 255,488| 13-Oct-2020| 04:25 \nMsfeedsbs.dll| 11.0.9600.19867| 52,736| 13-Oct-2020| 04:19 \nMsfeedsbs.mof| Not applicable| 1,574| 13-Oct-2020| 02:33 \nMsfeedssync.exe| 11.0.9600.19867| 11,776| 13-Oct-2020| 04:46 \nHtml.iec| 2019.0.0.19867| 341,504| 13-Oct-2020| 04:44 \nIelowutil.exe| 11.0.9600.19867| 221,184| 13-Oct-2020| 04:37 \nIeproxy.dll| 11.0.9600.19867| 309,248| 13-Oct-2020| 03:44 \nIeshims.dll| 11.0.9600.19867| 290,304| 13-Oct-2020| 03:49 \nJsprofilerui.dll| 11.0.9600.19867| 579,584| 13-Oct-2020| 04:20 \nMshtmldac.dll| 11.0.9600.19867| 64,000| 13-Oct-2020| 04:43 \nNetworkinspection.dll| 11.0.9600.19867| 1,075,200| 13-Oct-2020| 04:16 \nIcrav03.rat| Not applicable| 8,798| 23-Sep-2018| 13:27 \nMsrating.dll| 11.0.9600.19867| 168,960| 13-Oct-2020| 04:19 \nTicrf.rat| Not applicable| 1,988| 23-Sep-2018| 13:27 \nIertutil.dll| 11.0.9600.19867| 2,307,072| 13-Oct-2020| 04:42 \nSqmapi.dll| 6.2.9200.16384| 228,232| 16-Oct-2020| 00:08 \nInseng.dll| 11.0.9600.19867| 91,136| 13-Oct-2020| 04:22 \nVgx.dll| 11.0.9600.19867| 817,664| 13-Oct-2020| 04:19 \nIeframe.dll.mui| 11.0.9600.19867| 2,066,432| 16-Oct-2020| 00:10 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:10 \nIeframe.dll.mui| 11.0.9600.19867| 2,121,216| 16-Oct-2020| 00:11 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:11 \nIeframe.dll.mui| 11.0.9600.19867| 2,075,136| 16-Oct-2020| 00:12 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:11 \nIeframe.dll.mui| 11.0.9600.19867| 2,063,872| 16-Oct-2020| 00:13 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:13 \nIeframe.dll.mui| 11.0.9600.19867| 2,314,240| 16-Oct-2020| 00:14 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:13 \nIeframe.dll.mui| 11.0.9600.19867| 2,390,528| 16-Oct-2020| 00:14 \nIeui.dll.mui| 11.0.9600.19867| 3,584| 16-Oct-2020| 00:14 \nIeframe.dll.mui| 11.0.9600.19867| 2,033,152| 16-Oct-2020| 01:38 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 01:37 \nIeframe.dll.mui| 11.0.9600.19867| 2,307,584| 16-Oct-2020| 00:15 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:15 \nIeframe.dll.mui| 11.0.9600.19867| 2,255,872| 16-Oct-2020| 00:16 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:15 \nIeframe.dll.mui| 11.0.9600.19867| 2,061,312| 16-Oct-2020| 00:17 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:16 \nIeframe.dll.mui| 11.0.9600.19867| 2,326,016| 16-Oct-2020| 00:18 \nIeui.dll.mui| 11.0.9600.19867| 3,584| 16-Oct-2020| 00:17 \nIeframe.dll.mui| 11.0.9600.19867| 2,019,840| 16-Oct-2020| 00:18 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:18 \nIeframe.dll.mui| 11.0.9600.19867| 2,071,040| 16-Oct-2020| 00:19 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:19 \nIeframe.dll.mui| 11.0.9600.19867| 2,082,816| 16-Oct-2020| 00:20 \nIeui.dll.mui| 11.0.9600.19867| 3,584| 16-Oct-2020| 00:20 \nIeframe.dll.mui| 11.0.9600.19867| 2,307,584| 16-Oct-2020| 00:21 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:20 \nIeframe.dll.mui| 11.0.9600.19867| 2,170,368| 16-Oct-2020| 00:22 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:21 \nIeframe.dll.mui| 11.0.9600.19867| 2,153,984| 16-Oct-2020| 00:22 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:22 \nIeframe.dll.mui| 11.0.9600.19867| 2,291,712| 16-Oct-2020| 00:23 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:23 \nIeframe.dll.mui| 11.0.9600.19867| 2,283,520| 16-Oct-2020| 00:24 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:24 \nIeframe.dll.mui| 11.0.9600.19867| 2,052,096| 16-Oct-2020| 00:25 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:25 \nIeframe.dll.mui| 11.0.9600.19867| 2,301,952| 16-Oct-2020| 00:26 \nIeui.dll.mui| 11.0.9600.19867| 3,584| 16-Oct-2020| 00:25 \nIeframe.dll.mui| 11.0.9600.19867| 2,093,056| 16-Oct-2020| 00:27 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:26 \nIeframe.dll.mui| 11.0.9600.19867| 2,075,648| 16-Oct-2020| 00:28 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:27 \nIeframe.dll.mui| 11.0.9600.19867| 2,299,392| 16-Oct-2020| 00:28 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:28 \nIeframe.dll.mui| 11.0.9600.19867| 2,094,592| 16-Oct-2020| 00:29 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:29 \nIeframe.dll.mui| 11.0.9600.19867| 2,316,800| 16-Oct-2020| 00:30 \nIeui.dll.mui| 11.0.9600.19867| 3,584| 16-Oct-2020| 00:30 \nIeframe.dll.mui| 11.0.9600.19867| 2,305,536| 16-Oct-2020| 00:31 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:30 \nIeframe.dll.mui| 11.0.9600.19867| 2,278,912| 16-Oct-2020| 00:32 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:31 \nIeframe.dll.mui| 11.0.9600.19867| 2,277,888| 16-Oct-2020| 00:32 \nIeui.dll.mui| 11.0.9600.19867| 3,584| 16-Oct-2020| 00:32 \nIeframe.dll.mui| 11.0.9600.19867| 2,060,288| 16-Oct-2020| 00:33 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:33 \nIeframe.dll.mui| 11.0.9600.19867| 2,315,776| 16-Oct-2020| 00:34 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:33 \nIeframe.dll.mui| 11.0.9600.19867| 2,278,912| 16-Oct-2020| 00:35 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:34 \nIeframe.dll.mui| 11.0.9600.19867| 2,324,992| 16-Oct-2020| 00:36 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:35 \nIeframe.dll.mui| 11.0.9600.19867| 2,098,176| 16-Oct-2020| 00:36 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:36 \nIeframe.dll.mui| 11.0.9600.19867| 1,890,304| 16-Oct-2020| 00:37 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:37 \nIeframe.dll.mui| 11.0.9600.19867| 1,890,304| 16-Oct-2020| 00:38 \nIeui.dll.mui| 11.0.9600.19867| 3,072| 16-Oct-2020| 00:38 \nIeinstal.exe| 11.0.9600.19867| 475,648| 13-Oct-2020| 04:18 \nJscript9.dll.mui| 11.0.9600.19867| 29,184| 16-Oct-2020| 00:10 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 16-Oct-2020| 00:11 \nJscript9.dll.mui| 11.0.9600.19867| 32,768| 16-Oct-2020| 00:11 \nJscript9.dll.mui| 11.0.9600.19867| 33,280| 16-Oct-2020| 00:12 \nJscript9.dll.mui| 11.0.9600.19867| 35,328| 16-Oct-2020| 00:13 \nJscript9.dll.mui| 11.0.9600.19867| 37,888| 16-Oct-2020| 00:14 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 16-Oct-2020| 01:37 \nJscript9.dll.mui| 11.0.9600.19867| 34,304| 16-Oct-2020| 00:15 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 16-Oct-2020| 00:15 \nJscript9.dll.mui| 11.0.9600.19867| 33,280| 16-Oct-2020| 00:16 \nJscript9.dll.mui| 11.0.9600.19867| 34,304| 16-Oct-2020| 00:17 \nJscript9.dll.mui| 11.0.9600.19867| 27,648| 16-Oct-2020| 00:18 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 16-Oct-2020| 00:19 \nJscript9.dll.mui| 11.0.9600.19867| 34,304| 16-Oct-2020| 00:19 \nJscript9.dll.mui| 11.0.9600.19867| 33,792| 16-Oct-2020| 00:20 \nJscript9.dll.mui| 11.0.9600.19867| 23,040| 16-Oct-2020| 00:21 \nJscript9.dll.mui| 11.0.9600.19867| 22,016| 16-Oct-2020| 00:22 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 16-Oct-2020| 00:23 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 16-Oct-2020| 00:24 \nJscript9.dll.mui| 11.0.9600.19867| 31,232| 16-Oct-2020| 00:24 \nJscript9.dll.mui| 11.0.9600.19867| 34,304| 16-Oct-2020| 00:25 \nJscript9.dll.mui| 11.0.9600.19867| 35,840| 16-Oct-2020| 00:26 \nJscript9.dll.mui| 11.0.9600.19867| 32,768| 16-Oct-2020| 00:27 \nJscript9.dll.mui| 11.0.9600.19867| 33,280| 16-Oct-2020| 00:28 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 16-Oct-2020| 00:29 \nJscript9.dll.mui| 11.0.9600.19867| 34,816| 16-Oct-2020| 00:29 \nJscript9.dll.mui| 11.0.9600.19867| 33,280| 16-Oct-2020| 00:30 \nJscript9.dll.mui| 11.0.9600.19867| 32,256| 16-Oct-2020| 00:31 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 16-Oct-2020| 00:32 \nJscript9.dll.mui| 11.0.9600.19867| 32,768| 16-Oct-2020| 00:33 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 16-Oct-2020| 00:33 \nJscript9.dll.mui| 11.0.9600.19867| 30,720| 16-Oct-2020| 00:34 \nJscript9.dll.mui| 11.0.9600.19867| 29,696| 16-Oct-2020| 00:35 \nJscript9.dll.mui| 11.0.9600.19867| 16,384| 16-Oct-2020| 00:36 \nJscript9.dll.mui| 11.0.9600.19867| 16,896| 16-Oct-2020| 00:37 \nJscript9.dll.mui| 11.0.9600.19867| 16,896| 16-Oct-2020| 00:38 \n \n## Information about protection and security\n\n * Protect yourself online: [Windows Security support](<https://support.microsoft.com/hub/4099151/windows-security-help>)\n * Learn how we guard against cyber threats: [Microsoft Security](<https://www.microsoft.com/security>)\n\n## References\n\nLearn about the [terminology](<https://support.microsoft.com/help/824684>) that Microsoft uses to describe software updates.\n", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.1, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mskb", "title": "Cumulative security update for Internet Explorer: November 10, 2020", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17052"], "modified": "2020-11-10T08:00:00", "id": "KB4586768", "href": "https://support.microsoft.com/en-us/help/4586768", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-08-10T14:05:44", "description": "None\n**NEW 8/5/21 \nEXPIRATION NOTICE****IMPORTANT **As of 8/5/2021, this KB is no longer available from Windows Update, the Microsoft Update Catalog, or other release channels. We recommend that you update your devices to the latest security quality update. \n\n**UPDATED 11/10/20** \nFor more information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following article. To view other notes and messages, see the Windows 10, version 1507 update history home page.\n\n## Highlights\n\n * Updates the 2020 DST start date for the Fiji Islands to December 20, 2020.\n * Updates to improve security when using Microsoft Office products.\n\n## Improvements and fixes\n\nThis security update includes quality improvements. Key changes include: \n\n * Allows administrators to use a Group Policy to enable Save Target As for users in Microsoft Edge IE Mode.\n * Allows you to restrict the JScript Scripting Engine to a process.\n * Updates the 2020 DST start date for the Fiji Islands to December 20, 2020.\n * Addresses a security vulnerability by preventing applications that run as a SYSTEM account from printing to local ports that point to a file. Failing print jobs log error 50, \u201cThe request is not supported.\u201d in event ID 372 in the PrintService\\Admin event log. To address this issue in the future, make sure your applications or services run as a specific user or service account.\n * Security updates to the Microsoft Scripting Engine, the Microsoft Graphics Component, the Windows Wallet Service, Windows Cryptography, and Windows Fundamentals.\nIf you installed earlier updates, only the new fixes contained in this package will be downloaded and installed on your device.For more information about the resolved security vulnerabilities, please refer to the new [Security Update Guide](<https://msrc.microsoft.com/update-guide>) website.\n\n**Windows Update Improvements**Microsoft has released an update directly to the Windows Update client to improve reliability. Any device running Windows 10 configured to receive updates automatically from Windows Update, including Enterprise and Pro editions, will be offered the latest Windows 10 feature update based on device compatibility and Windows Update for Business deferral policy. This doesn't apply to long-term servicing editions.\n\n## Known issues in this update\n\nMicrosoft is not currently aware of any issues with this update.\n\n## How to get this update\n\n**Before installing this update**Microsoft strongly recommends that you install the latest servicing stack update (SSU) for your operating system before installing the latest cumulative update (LCU). SSUs improve the reliability of the update process to mitigate potential issues while installing the LCU and applying Microsoft security fixes. For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/en-us/windows/deployment/update/servicing-stack-updates>) and Servicing Stack Updates (SSU): Frequently Asked Questions.If you are using Windows Update, the latest SSU (KB4565911) will be offered to you automatically. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>).**Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB4586787>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows 10**Classification**: Security Updates \n**File information**For a list of the files that are provided in this update, download the [file information for cumulative update 4586787](<https://download.microsoft.com/download/0/5/b/05be12e5-b9c4-4631-8dd4-704f1a914270/4586787.csv>). \n", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.1, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-11-10T08:00:00", "type": "mskb", "title": "November 10, 2020\u2014KB4586787 (OS Build 10240.18756) - EXPIRED", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17052"], "modified": "2020-11-10T08:00:00", "id": "KB4586787", "href": "https://support.microsoft.com/en-us/help/4586787", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-08-10T14:06:16", "description": "None\n**NEW 8/5/21 \nEXPIRATION NOTICE****IMPORTANT **As of 8/5/2021, this KB is no longer available from Windows Update, the Microsoft Update Catalog, or other release channels. We recommend that you update your devices to the latest security quality update. \n\n**UPDATED 1/12/21 \nREMINDER **Adobe Flash Player went out of support on December 31, 2020. For more information, see [Adobe Flash end of support on December 31, 2020](<https://docs.microsoft.com/en-us/lifecycle/announcements/adobe-flash-end-of-support#:~:text=Adobe%20will%20end%20support%20of,site%2Dby%2Dsite%20basis.>). Flash content will be blocked from running in Flash Player beginning January 12, 2021. For more information, see [Adobe Flash Player EOL General Information Page](<https://www.adobe.com/products/flashplayer/end-of-life.html>).\n\n**11/19/20** \nFor information about Windows update terminology, see the article about the [types of Windows updates](<https://docs.microsoft.com/en-us/troubleshoot/windows-client/deployment/standard-terminology-software-updates>) and the [monthly quality update types](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/windows-10-update-servicing-cadence/ba-p/222376>). To view other notes and messages, see the Windows 10, version 1607 update history home page.\n\n## Highlights\n\n * Updates to improve security when using Microsoft Office products.\n * Updates to improve security when using external devices, such as game controllers, printers, and web cameras.\n\n## Improvements and fixes\n\nThis security update includes quality improvements. Key changes include:\n\n * Adds the ability to set a Group Policy to show only the domain and username when a user signs in.\n * Addresses an issue that delays authentication traffic because of Netlogon scalability issues.\n * Addresses an issue in which a principal in a trusted MIT realm fails to obtain a Kerberos service ticket from Active Directory domain controllers (DC). This occurs on devices that installed Windows Updates that contain CVE-2020-17049 protections and configured PerfromTicketSignature to 1 or higher. These updates were released between November 10, 2020 and December 8, 2020. Ticket acquisition also fails with the error, \u201cKRB_GENERIC_ERROR\u201d, if callers submit a PAC-less Ticket Granting Ticket (TGT) as an evidence ticket without providing the USER_NO_AUTH_DATA_REQUIRED flag.\n * Addresses a security bypass vulnerability that exists in the way the Printer Remote Procedure Call (RPC) binding handles authentication for the remote Winspool interface. For more information, see KB4599464.\n * Addresses a security vulnerability issue with HTTPS-based intranet servers. After installing this update, HTTPS-based intranet servers cannot, by default, use a user proxy to detect updates. Scans using these servers will fail if you have not configured a system proxy on the clients. If you must use a user proxy, you must configure the behavior using the policy \u201cAllow user proxy to be used as a fallback if detection using system proxy fails.\u201d To ensure the highest levels of security, also use Windows Server Update Services (WSUS) Transport Layer Security (TLS) certificate pinning on all devices. This change does not affect customers who are using HTTP WSUS servers. For more information, see [Changes to scans, improved security for Windows devices](<https://aka.ms/WSUS-scans-part2>).\n * Addresses an issue in the Remote Desktop Protocol (RDP) redirector (**rdpdr.sys**) that causes a stop error.\n * Security updates to the Windows App Platform and Frameworks, Microsoft Graphics Component, Windows Media, Windows Fundamentals, Windows Cryptography, Windows Virtualization, Windows Peripherals, and Windows Hybrid Storage Services.\nIf you installed earlier updates, only the new fixes contained in this package will be downloaded and installed on your device.For more information about the resolved security vulnerabilities, please refer to the new [Security Update Guide](<https://msrc.microsoft.com/update-guide>) website.\n\n**Windows Update Improvements**Microsoft has released an update directly to the Windows Update client to improve reliability. Any device running Windows 10 configured to receive updates automatically from Windows Update, including Enterprise and Pro editions, will be offered the latest Windows 10 feature update based on device compatibility and Windows Update for Business deferral policy. This doesn't apply to long-term servicing editions.\n\n## Known issues in this update\n\n**Symptom**| **Workaround** \n---|--- \nAfter installing KB4467684, the cluster service may fail to start with the error \u201c2245 (NERR_PasswordTooShort)\u201d if the group policy \u201cMinimum Password Length\u201d is configured with greater than 14 characters.| This issue is resolved in KB4601318. \n \n## How to get this update\n\n**Before installing this update**Microsoft strongly recommends you install the latest servicing stack update (SSU) for your operating system before installing the latest cumulative update (LCU). SSUs improve the reliability of the update process to mitigate potential issues while installing the LCU and applying Microsoft security fixes. For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/en-us/windows/deployment/update/servicing-stack-updates>) and Servicing Stack Updates (SSU): Frequently Asked Questions.If you are using Windows Update, the latest SSU (KB4576750) will be offered to you automatically. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). **Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB4598243>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows 10**Classification**: Security Updates \n**File information**For a list of the files that are provided in this update, download the [file information for cumulative update 4598243](<https://download.microsoft.com/download/a/9/c/a9cc5807-bbe4-4aad-bb18-14455a62ae38/4598243.csv>).\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-01-12T08:00:00", "type": "mskb", "title": "January 12, 2021\u2014KB4598243 (OS Build 14393.4169) - EXPIRED", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17049", "CVE-2021-1655"], "modified": "2021-01-12T08:00:00", "id": "KB4598243", "href": "https://support.microsoft.com/en-us/help/4598243", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2022-08-10T14:06:26", "description": "None\n**IMPORTANT **Verify that you have installed the required updates listed in the **How to get this update** section _before_ installing this update. \n\nFor information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following [article](<https://support.microsoft.com/help/824684>). To view other notes and messages, see the Windows Server 2008 Service Pack 2 update history [home page](<https://support.microsoft.com/help/4343218>).\n\n## Improvements and fixes\n\nThis security update includes improvements and fixes that were a part of update [KB4592498](<https://support.microsoft.com/help/4592498>) (released December 8, 2020) and addresses the following issues:\n\n * Addresses a security bypass vulnerability that exists in the way the Printer Remote Procedure Call (RPC) binding handles authentication for the remote Winspool interface. For more information, see [KB4599464](<https://support.microsoft.com/help/4599464>).\n * Addresses a security vulnerability issue with HTTPS-based intranet servers. After you install this update, HTTPS-based intranet servers cannot leverage a user proxy to detect updates by default. Scans that use these servers will fail if the clients do not have a configured system proxy. \n \nIf you must leverage a user proxy, you must configure the behavior by using the Windows Update policy **Allow user proxy to be used as a fallback if detection using system proxy fails**. To make sure that the highest levels of security, additionally leverage Windows Server Update Services (WSUS) Transport Layer Security (TLS) certificate pinning on all devices. For more information, see [Changes to scans, improved security for Windows devices](<https://aka.ms/WSUS-scans-part2>). \n \n**Note** This change does not affect customers who use HTTP WSUS servers.\n * Addresses an issue in which a principal in a trusted Managed Identity for Application (MIT) realm does not obtain a Kerberos Service ticket from Active Directory domain controllers (DCs). This issue occurs after Windows Updates that contains [CVE-2020-17049](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17049>) protections released between November 10 and December 8, 2020 are installed and **PerfromTicketSignature** is configured to **1** or higher. Ticket acquisition fails with KRB_GENERIC_ERROR if callers submit a PAC-less Ticket Granting Ticket (TGT) as an evidence ticket without providing the **USER_NO_AUTH_DATA_REQUIRED** flag.\n * Security updates to Windows App Platform and Frameworks, Windows Graphics, Windows Fundamentals, Windows Cryptography, Windows Virtualization, and Windows Hybrid Storage Services.\nFor more information about the resolved security vulnerabilities, please refer to the new [Security Update Guide](<https://msrc.microsoft.com/update-guide>) website.\n\n## Known issues in this update\n\n**Symptom**| **Workaround** \n---|--- \nAfter installing this update and restarting your device, you might receive the error, \u201cFailure to configure Windows updates. Reverting Changes. Do not turn off your computer\u201d, and the update might show as **Failed** in **Update History**.| This is expected in the following circumstances:\n\n * If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>).\n * If you do not have an ESU MAK add-on key installed and activated.\nIf you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this [blog](<https://aka.ms/Windows7ESU>) post. For information on the prerequisites, see the \"How to get this update\" section of this article. \nCertain operations, such as **rename**, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \u201cSTATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\u201d. This occurs when you perform the operation on a CSV owner node from a process that doesn\u2019t have administrator privilege.| Do one of the following:\n\n * Perform the operation from a process that has administrator privilege.\n * Perform the operation from a node that doesn\u2019t have CSV ownership.\nMicrosoft is working on a resolution and will provide an update in an upcoming release. \n \n## How to get this update\n\n**Before installing this update****IMPORTANT** Customers who have purchased the Extended Security Update (ESU) for on-premises versions of these operating systems must follow the procedures in [KB4522133](<https://support.microsoft.com/help/4522133>) to continue receiving security updates after extended support ends on January 14, 2020.For more information about ESU and which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>).**Prerequisite:**You must install the updates listed below and **_restart your device_** before installing the latest Rollup. Installing these updates improves the reliability of the update process and mitigates potential issues while installing the Rollup and applying Microsoft security fixes.\n\n 1. The April 9, 2019 servicing stack update (SSU) ([KB4493730](<https://support.microsoft.com/help/4493730>)). To get the standalone package for this SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). This update is required to install updates that are only SHA-2 signed.\n 2. The latest SHA-2 update ([KB4474419](<https://support.microsoft.com/help/4474419>)) released October 8, 2019. If you are using Windows Update, the latest SHA-2 update will be offered to you automatically. This update is required to install updates that are only SHA-2 signed. For more information on SHA-2 updates, see [2019 SHA-2 Code Signing Support requirement for Windows and WSUS](<https://support.microsoft.com/help/4472027>).\n 3. The Extended Security Updates (ESU) Licensing Preparation Package ([KB4538484](<https://support.microsoft.com/help/4538484>)) or the Update for the Extended Security Updates (ESU) Licensing Preparation Package ([KB4575904](<https://support.microsoft.com/help/4575904>)). The ESU licensing preparation package will be offered to you from WSUS. To get the standalone package for ESU licensing preparation package, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>).\nAfter installing the items above, Microsoft strongly recommends that you install the _latest _SSU ([KB4580971](<https://support.microsoft.com/help/4580971>)). If you are using Windows Update, the latest SSU will be offered to you automatically if you are an ESU customer. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/en-us/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/help/4535697>).**Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update if you are an ESU customer. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB4598288>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows Server 2008 Service Pack 2**Classification**: Security Updates \n**File information**For a list of the files that are provided in this update, download the [file information for cumulative update 4598288](<https://download.microsoft.com/download/9/8/0/980f60c3-10e1-40a3-baad-ae04e57bd3a2/4598288.csv>).\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-01-12T08:00:00", "type": "mskb", "title": "January 12, 2021\u2014KB4598288 (Monthly Rollup)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17049", "CVE-2021-1701"], "modified": "2021-01-12T08:00:00", "id": "KB4598288", "href": "https://support.microsoft.com/en-us/help/4598288", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2022-08-10T14:07:36", "description": "None\n**Important: **Verify that** **you have installed the required updates listed in the **How to get this update** section before installing this update. \n\n**Important: **For information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following [article](<https://support.microsoft.com/help/824684>). To view other notes and messages, see the Windows 7 SP1 and Windows Server 2008 R2 SP1 update history [home page](<https://support.microsoft.com/help/4009469>).\n\n## Improvements and fixes\n\nThis security update includes improvements and fixes that were a part of update [KB4601347](<https://support.microsoft.com/help/4601347>) (released February 9, 2021) and addresses the following issues: \n\n * Addresses an elevation of privilege security vulnerability documented in [CVE-2021-1640](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-1640>) related to print jobs submitted to \u201cFILE:\u201d ports. After installing Windows updates from March 9, 2021 and later, print jobs that are in a pending state before restarting the print spooler service or restarting the OS will remain in an error state. Manually delete the affected print jobs and resubmit them to the print queue when the print spooler service is online.\n * Addresses an issue in which a non-native device that is in the same realm does not receive a Kerberos Service ticket from Active Directory DCs. This issue occurs even though Windows Updates are installed that contain [CVE-2020-17049](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17049>) protections released between November 10 and December 8, 2020 and configured **PerfromTicketSignature** to **1** or larger. Ticket acquisition fails with **KRB_GENERIC_ERROR** if callers submit a PAC-less Ticket Granting Ticket (TGT) as an evidence ticket without the **USER_NO_AUTH_DATA_REQUIRED** flag being set for the user in User Account Controls.\n * Security updates to Windows Fundamentals, Windows Shell, Windows UAC, Windows Hybrid Cloud Networking, and Windows Media.\nFor more information about the resolved security vulnerabilities, please refer to the new [Security Update Guide](<https://msrc.microsoft.com/update-guide>) website. \n\n## Known issues in this update\n\n**Symptom **| **Workaround ** \n---|--- \nAfter installing this update and restarting your device, you might receive the error, \u201cFailure to configure Windows updates. Reverting Changes. Do not turn off your computer,\u201d and the update might show as **Failed** in **Update History**.| This is expected in the following circumstances:\n\n * If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>).\n * If you do not have an ESU MAK add-on key installed and activated.\nIf you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this [blog](<https://aka.ms/Windows7ESU>) post. For information on the prerequisites, see the \"How to get this update\" section of this article. \nCertain operations, such as **rename**, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \u201cSTATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\u201d. This occurs when you perform the operation on a CSV owner node from a process that doesn\u2019t have administrator privilege.| Do one of the following: \n\n * Perform the operation from a process that has administrator privilege.\n * Perform the operation from a node that doesn\u2019t have CSV ownership.\nMicrosoft is working on a resolution and will provide an update in an upcoming release. \nAfter installing updates released March 9, 2021, you might get unexpected results when printing from some apps. Issues might include:\n\n * Elements of the document might print as solid black/color boxes or might be missing, including barcodes, QR codes, and graphics elements, such as logos.\n * Table lines might be missing. Other alignment or formatting issues might also be present.\n * Printing from some apps or to some printers might result in a blank page or label.\n| This issue is resolved in KB5001639. \n \n## How to get this update\n\n### Before installing this update\n\n**IMPORTANT** Customers who have purchased the Extended Security Update (ESU) for on-premises versions of these operating systems must follow the procedures in [KB4522133](<https://support.microsoft.com/help/4522133>) to continue receiving security updates after extended support ends. Extended support ends as follows:\n\n * For Windows 7 Service Pack 1 and Windows Server 2008 R2 Service Pack 1, extended support ends on January 14, 2020.\n * For Windows Embedded Standard 7, extended support ends on October 13, 2020.\nFor more information about ESU and which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>).**Note** For Windows Embedded Standard 7, Windows Management Instrumentation (WMI) must be enabled to get updates from Windows Update or Windows Server Update Services.**Prerequisite:**You must install the updates listed below and **restart your device** before installing the latest Rollup. Installing these updates improves the reliability of the update process and mitigates potential issues while installing the Rollup and applying Microsoft security fixes.\n\n 1. The March 12, 2019 servicing stack update (SSU) ([KB4490628](<https://support.microsoft.com/help/4490628>)). To get the standalone package for this SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). This update is required to install updates that are only SHA-2 signed.\n 2. The latest SHA-2 update ([KB4474419](<https://support.microsoft.com/help/4474419>)) released September 10, 2019. If you are using Windows Update, the latest SHA-2 update will be offered to you automatically. This update is required to install updates that are only SHA-2 signed. For more information on SHA-2 updates, see [2019 SHA-2 Code Signing Support requirement for Windows and WSUS](<https://support.microsoft.com/help/4472027>).\n 3. For Windows Thin PC, you must have the August 11, 2020 SSU ([KB4570673](<https://support.microsoft.com/help/4570673>)) or a later SSU installed to make sure you continue to get the extended security updates starting with the October 13, 2020 updates.\n 4. To get this security update, you must reinstall the \"Extended Security Updates (ESU) Licensing Preparation Package\" ([KB4538483](<https://support.microsoft.com/help/4538483>)) or the \"Update for the Extended Security Updates (ESU) Licensing Preparation Package\" ([KB4575903](<https://support.microsoft.com/help/4575903>)) even if you previously installed the ESU key. The ESU licensing preparation package will be offered to you from WSUS. To get the standalone package for ESU licensing preparation package, search for it in the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/home.aspx>).\nAfter you install the items above, we strongly recommend that you install the latest SSU ([KB4592510](<https://support.microsoft.com/help/4592510>)). If you are using Windows Update, the latest SSU will be offered to you automatically if you are an ESU customer. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/en-us/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/help/4535697>).\n\n### Install this update\n\n**Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update if you are an ESU customer. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB5000841>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows 7 Service Pack 1, Windows Server 2008 R2 Service Pack 1, Windows Embedded Standard 7 Service Pack 1, Windows Embedded POSReady 7, Windows Thin PC**Classification**: Security Updates \n \n## File information\n\nFor a list of the files that are provided in this update, download the [file information for cumulative update 5000841](<https://download.microsoft.com/download/a/9/4/a94093b0-8c1e-47e5-80cc-fa4164b21087/5000841.csv>).\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-03-09T08:00:00", "type": "mskb", "title": "March 9, 2021\u2014KB5000841 (Monthly Rollup)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17049", "CVE-2021-1640"], "modified": "2021-03-09T08:00:00", "id": "KB5000841", "href": "https://support.microsoft.com/en-us/help/5000841", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2022-08-10T14:07:40", "description": "None\n**Important: ** \n \nWindows Server 2012 has reached the end of mainstream support and is now in extended support. Starting in July 2020, there will no longer be optional releases (known as \"C\" or \"D\" releases) for this operating system. Operating systems in extended support have only cumulative monthly security updates (known as the \"B\" or Update Tuesday release). \n \nFor information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following [article](<https://support.microsoft.com/help/824684>). To view other notes and messages, see the Windows Server 2012 update history [home page](<https://support.microsoft.com/help/4009471>).\n\n**Important: ****March 9, 2021** \n \nAs part of the end of support for Adobe Flash, [KB4577586](<https://support.microsoft.com/help/4577586>) is now available as an optional update from Windows Update (WU) and Windows Server Update Services (WSUS). Installing KB4577586 will remove Adobe Flash Player permanently from your Windows device. Once installed, you cannot uninstall KB4577586. For more details about Microsoft\u2019s plans, see [Update on Adobe Flash Player End of Support](<https://blogs.windows.com/msedgedev/2020/09/04/update-adobe-flash-end-support>).\n\n## Improvements and fixes\n\nThis security update includes improvements and fixes that were a part of update [KB4601348](<https://support.microsoft.com/help/4601348>) (released previous February 9, 2021) and addresses the following issues: \n\n * Addresses an elevation of privilege security vulnerability documented in [CVE-2021-1640](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-1640>) related to print jobs submitted to \u201cFILE:\u201d ports. After installing Windows updates from March 9, 2021 and later, print jobs that are in a pending state before restarting the print spooler service or restarting the OS will remain in an error state. Manually delete the affected print jobs and resubmit them to the print queue when the print spooler service is online.\n * Addresses an issue in which a non-native device that is in the same realm does not receive a Kerberos Service ticket from Active Directory DCs. This issue occurs even though Windows Updates are installed that contain [CVE-2020-17049](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17049>) protections released between November 10 and December 8, 2020 and configured **PerfromTicketSignature** to **1** or larger. Ticket acquisition fails with **KRB_GENERIC_ERROR** if callers submit a PAC-less Ticket Granting Ticket (TGT) as an evidence ticket without the **USER_NO_AUTH_DATA_REQUIRED** flag being set for the user in User Account Controls.\n * Security updates to Windows Fundamentals, Windows Shell, Windows UAC, Windows Hybrid Cloud Networking, Windows Graphics, and Windows Media.\nFor more information about the resolved security vulnerabilities, please refer to the new [Security Update Guide](<https://msrc.microsoft.com/update-guide>) website.\n\n## Known issues in this update\n\n**Symptom**| **Workaround** \n---|--- \nCertain operations, such as **rename**, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \u201cSTATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\u201d. This occurs when you perform the operation on a CSV owner node from a process that doesn\u2019t have administrator privilege.| Do one of the following:\n\n * Perform the operation from a process that has administrator privilege.\n * Perform the operation from a node that doesn\u2019t have CSV ownership.\nMicrosoft is working on a resolution and will provide an update in an upcoming release. \nAfter installing updates released March 9, 2021, you might get unexpected results when printing from some apps. Issues might include:\n\n * Elements of the document might print as solid black/color boxes or might be missing, including barcodes, QR codes, and graphics elements, such as logos.\n * Table lines might be missing. Other alignment or formatting issues might also be present.\n * Printing from some apps or to some printers might result in a blank page or label.\n| This issue is resolved in KB5001641. \n \n## How to get this update\n\n### Before installing this update\n\nWe strongly recommend that you install the latest servicing stack update (SSU) for your operating system before installing the latest Rollup. SSUs improve the reliability of the update process to mitigate potential issues while installing the Rollup and applying Microsoft security fixes. For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/en-us/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/help/4535697>).If you use Windows Update, the latest SSU ([KB4566426](<https://support.microsoft.com/help/4566426>)) will be offered to you automatically. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/home.aspx>). \n\n### Install this update\n\n**Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB5000847>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows Server 2012, Windows Embedded 8 Standard**Classification**: Security Updates \n \n## File information\n\nFor a list of the files that are provided in this update, download the [file information for update 5000847](<https://download.microsoft.com/download/4/2/e/42eb70ea-a2d4-40aa-8e15-2694b8dbf658/5000847.csv>).\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-03-09T08:00:00", "type": "mskb", "title": "March 9, 2021\u2014KB5000847 (Monthly Rollup)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17049", "CVE-2021-1640"], "modified": "2021-03-09T08:00:00", "id": "KB5000847", "href": "https://support.microsoft.com/en-us/help/5000847", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2022-08-10T14:06:21", "description": "None\n**IMPORTANT **Adobe Flash Player went out of support on December 31, 2020. For more information, see [Adobe Flash end of support on December 31, 2020](<https://docs.microsoft.com/en-us/lifecycle/announcements/adobe-flash-end-of-support#:~:text=Adobe%20will%20end%20support%20of,site%2Dby%2Dsite%20basis.>). Flash content will be blocked from running in Flash Player beginning January 12, 2021. For more information, see [Adobe Flash Player EOL General Information Page](<https://www.adobe.com/products/flashplayer/end-of-life.html>).\n\n**IMPORTANT** Windows 8.1 and Windows Server 2012 R2 have reached the end of mainstream support and are now in extended support. Starting in July 2020, there will no longer be optional, non-security releases (known as \"C\" releases) for this operating system. Operating systems in extended support have only cumulative monthly security updates (known as the \"B\" or Update Tuesday release).\n\nFor information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following [article](<https://support.microsoft.com/help/824684>). To view other notes and messages, see the Windows 8.1 and Windows Server 2012 R2 update history [home page](<https://support.microsoft.com/help/4009470>).\n\n## Improvements and fixes\n\nThis security update includes improvements and fixes that were a part of update [KB4592484](<https://support.microsoft.com/help/4592484>) (released December 8, 2020) and addresses the following issues:\n\n * Addresses a security bypass vulnerability that exists in the way the Printer Remote Procedure Call (RPC) binding handles authentication for the remote Winspool interface. For more information, see [KB4599464](<https://support.microsoft.com/help/4599464>).\n * Addresses a security vulnerability issue with HTTPS-based intranet servers. After you install this update, HTTPS-based intranet servers cannot leverage a user proxy to detect updates by default. Scans that use these servers will fail if the clients do not have a configured system proxy. \n \nIf you must leverage a user proxy, you must configure the behavior by using the Windows Update policy **Allow user proxy to be used as a fallback if detection using system proxy fails**. To make sure that the highest levels of security, additionally leverage Windows Server Update Services (WSUS) Transport Layer Security (TLS) certificate pinning on all devices. For more information, see [Changes to scans, improved security for Windows devices](<https://aka.ms/WSUS-scans-part2>). \n \n**Note** This change does not affect customers who use HTTP WSUS servers.\n * Addresses an issue in which a principal in a trusted Managed Identity for Application (MIT) realm does not obtain a Kerberos Service ticket from Active Directory domain controllers (DCs). This issue occurs after Windows Updates that contains [CVE-2020-17049](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17049>) protections released between November 10 and December 8, 2020 are installed and **PerfromTicketSignature** is configured to **1** or higher. Ticket acquisition fails with **KRB_GENERIC_ERROR** if callers submit a PAC-less Ticket Granting Ticket (TGT) as an evidence ticket without providing the **USER_NO_AUTH_DATA_REQUIRED** flag.\n * Security updates to Windows App Platform and Frameworks, Windows Graphics, Windows Media, Windows Fundamentals, Windows Cryptography, and Windows Virtualization.\nFor more information about the resolved security vulnerabilities, please refer to the new [Security Update Guide](<https://msrc.microsoft.com/update-guide>) website.\n\n## Known issues in this update\n\n**Symptom**| **Workaround** \n---|--- \nCertain operations, such as **rename**, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \u201cSTATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\u201d. This occurs when you perform the operation on a CSV owner node from a process that doesn\u2019t have administrator privilege.| Do one of the following:\n\n * Perform the operation from a process that has administrator privilege.\n * Perform the operation from a node that doesn\u2019t have CSV ownership.\nMicrosoft is working on a resolution and will provide an update in an upcoming release. \n \n## How to get this update\n\n**Before installing this update**We strongly recommend that you install the latest servicing stack update (SSU) for your operating system before you install the latest Rollup. SSUs improve the reliability of the update process to mitigate potential issues while installing the Rollup and applying Microsoft security fixes. For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/en-us/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/help/4535697>).If you use Windows Update, the latest SSU ([KB4566425](<https://support.microsoft.com/help/4566425>)) will be offered to you automatically. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). **Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB4598285>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows 8.1, Windows Server 2012 R2, Windows Embedded 8.1 Industry Enterprise, Windows Embedded 8.1 Industry Pro**Classification**: Security Updates \n**File information**For a list of the files that are provided in this update, download the [file information for update 4598285](<https://download.microsoft.com/download/c/a/7/ca7841e4-9adc-45ad-9379-c9cb50f3dd0e/4598285.csv>). \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-01-12T08:00:00", "type": "mskb", "title": "January 12, 2021\u2014KB4598285 (Monthly Rollup)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17049", "CVE-2021-1665"], "modified": "2021-01-12T08:00:00", "id": "KB4598285", "href": "https://support.microsoft.com/en-us/help/4598285", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2022-08-10T14:06:21", "description": "None\n**IMPORTANT** Adobe Flash Player went out of support on December 31, 2020. For more information, see [Adobe Flash end of support on December 31, 2020](<https://docs.microsoft.com/en-us/lifecycle/announcements/adobe-flash-end-of-support#:~:text=Adobe%20will%20end%20support%20of,site%2Dby%2Dsite%20basis.>). Flash content will be blocked from running in Flash Player beginning January 12, 2021. For more information, see [Adobe Flash Player EOL General Information Page](<https://www.adobe.com/products/flashplayer/end-of-life.html>).\n\n**IMPORTANT** Windows Server 2012 has reached the end of mainstream support and is now in extended support. Starting in July 2020, there will no longer be optional releases (known as \"C\" or \"D\" releases) for this operating system. Operating systems in extended support have only cumulative monthly security updates (known as the \"B\" or Update Tuesday release).\n\nFor information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following [article](<https://support.microsoft.com/help/824684>). To view other notes and messages, see the Windows Server 2012 update history [home page](<https://support.microsoft.com/help/4009471>).\n\n## Improvements and fixes\n\nThis security update includes improvements and fixes that were a part of update [KB4592468](<https://support.microsoft.com/help/4592468>) (released previous December 8, 2020) and addresses the following issues:\n\n * Addresses a security bypass vulnerability that exists in the way the Printer Remote Procedure Call (RPC) binding handles authentication for the remote Winspool interface. For more information, see [KB4599464](<https://support.microsoft.com/help/4599464>).\n * Addresses a security vulnerability issue with HTTPS-based intranet servers. After you install this update, HTTPS-based intranet servers cannot leverage a user proxy to detect updates by default. Scans that use these servers will fail if the clients do not have a configured system proxy. \n \nIf you must leverage a user proxy, you must configure the behavior by using the Windows Update policy **Allow user proxy to be used as a fallback if detection using system proxy fails**. To make sure that the highest levels of security, additionally leverage Windows Server Update Services (WSUS) Transport Layer Security (TLS) certificate pinning on all devices. For more information, see [Changes to scans, improved security for Windows devices](<https://aka.ms/WSUS-scans-part2>). \n \n**Note** This change does not affect customers who use HTTP WSUS servers.\n * Addresses an issue in which a principal in a trusted Managed Identity for Application (MIT) realm does not obtain a Kerberos Service ticket from Active Directory domain controllers (DCs). This issue occurs after Windows Updates that contains [CVE-2020-17049](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17049>) protections released between November 10 and December 8, 2020 are installed and **PerfromTicketSignature** is configured to **1** or higher. Ticket acquisition fails with **KRB_GENERIC_ERROR** if callers submit a PAC-less Ticket Granting Ticket (TGT) as an evidence ticket without providing the **USER_NO_AUTH_DATA_REQUIRED** flag.\n * Security updates to Windows App Platform and Frameworks, Windows Graphics, Windows Media, Windows Fundamentals, Windows Cryptography, Windows Virtualization, and Windows Hybrid Storage Services.\nFor more information about the resolved security vulnerabilities, please refer to the new [Security Update Guide](<https://msrc.microsoft.com/update-guide>) website.\n\n## Known issues in this update\n\n**Symptom**| **Workaround** \n---|--- \nCertain operations, such as **rename**, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \u201cSTATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\u201d. This occurs when you perform the operation on a CSV owner node from a process that doesn\u2019t have administrator privilege.| Do one of the following:\n\n * Perform the operation from a process that has administrator privilege.\n * Perform the operation from a node that doesn\u2019t have CSV ownership.\nMicrosoft is working on a resolution and will provide an update in an upcoming release. \n \n## How to get this update\n\n**Before installing this update**We strongly recommend that you install the latest servicing stack update (SSU) for your operating system before installing the latest Rollup. SSUs improve the reliability of the update process to mitigate potential issues while installing the Rollup and applying Microsoft security fixes. For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/en-us/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/help/4535697>).If you use Windows Update, the latest SSU ([KB4566426](<https://support.microsoft.com/help/4566426>)) will be offered to you automatically. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). **Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB4598278>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows Server 2012, Windows Embedded 8 Standard**Classification**: Security Updates \n**File information**For a list of the files that are provided in this update, download the [file information for update 4598278](<https://download.microsoft.com/download/2/c/c/2cc78328-eccd-4783-9752-db07d15856f6/4598278.csv>). \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-01-12T08:00:00", "type": "mskb", "title": "January 12, 2021\u2014KB4598278 (Monthly Rollup)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17049", "CVE-2021-1665"], "modified": "2021-01-12T08:00:00", "id": "KB4598278", "href": "https://support.microsoft.com/en-us/help/4598278", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2022-08-10T14:06:21", "description": "None\n**IMPORTANT **Verify that you have installed the required updates listed in the **How to get this update** section _before_ installing this update. \n\n**NEW 11/10/20** \nFor information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following [article](<https://support.microsoft.com/help/824684>). To view other notes and messages, see the Windows 7 SP1 and Windows Server 2008 R2 SP1 update history [home page](<https://support.microsoft.com/help/4009469>).\n\n## Improvements and fixes\n\nThis security update includes improvements and fixes that were a part of update [KB4592471](<https://support.microsoft.com/help/4592471>) (released December 8, 2020) and addresses the following issues:\n\n * Addresses a security bypass vulnerability that exists in the way the Printer Remote Procedure Call (RPC) binding handles authentication for the remote Winspool interface. For more information, see [KB4599464](<https://support.microsoft.com/help/4599464>).\n * Addresses a security vulnerability issue with HTTPS-based intranet servers. After you install this update, HTTPS-based intranet servers cannot leverage a user proxy to detect updates by default. Scans that use these servers will fail if the clients do not have a configured system proxy. \n \nIf you must leverage a user proxy, you must configure the behavior by using the Windows Update policy **Allow user proxy to be used as a fallback if detection using system proxy fails**. To make sure that the highest levels of security, additionally leverage Windows Server Update Services (WSUS) Transport Layer Security (TLS) certificate pinning on all devices. For more information, see [Changes to scans, improved security for Windows devices](<https://aka.ms/WSUS-scans-part2>). \n \n**Note** This change does not affect customers who use HTTP WSUS servers.\n * Addresses an issue in which a principal in a trusted Managed Identity for Application (MIT) realm does not obtain a Kerberos Service ticket from Active Directory domain controllers (DCs). This issue occurs after Windows Updates that contains [CVE-2020-17049](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17049>) protections released between November 10 and December 8, 2020 are installed and **PerfromTicketSignature** is configured to **1** or higher. Ticket acquisition fails with **KRB_GENERIC_ERROR** if callers submit a PAC-less Ticket Granting Ticket (TGT) as an evidence ticket without providing the **USER_NO_AUTH_DATA_REQUIRED** flag.\n * Security updates to Windows App Platform and Frameworks, Windows Graphics, Windows Media, Windows Fundamentals, Windows Cryptography, Windows Virtualization, and Windows Hybrid Storage Services.\nFor more information about the resolved security vulnerabilities, please refer to the new [Security Update Guide](<https://msrc.microsoft.com/update-guide>) website.\n\n## Known issues in this update\n\n**Symptom **| **Workaround ** \n---|--- \nAfter installing this update and restarting your device, you might receive the error, \u201cFailure to configure Windows updates. Reverting Changes. Do not turn off your computer,\u201d and the update might show as **Failed** in **Update History**.| This is expected in the following circumstances:\n\n * If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>).\n * If you do not have an ESU MAK add-on key installed and activated.\nIf you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this [blog](<https://aka.ms/Windows7ESU>) post. For information on the prerequisites, see the \"How to get this update\" section of this article. \nCertain operations, such as **rename**, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \u201cSTATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\u201d. This occurs when you perform the operation on a CSV owner node from a process that doesn\u2019t have administrator privilege.| Do one of the following: \n\n * Perform the operation from a process that has administrator privilege. \n * Perform the operation from a node that doesn\u2019t have CSV ownership. \nMicrosoft is working on a resolution and will provide an update in an upcoming release. \n \n## How to get this update\n\n**Before installing this update****IMPORTANT** Customers who have purchased the Extended Security Update (ESU) for on-premises versions of these operating systems must follow the procedures in [KB4522133](<https://support.microsoft.com/help/4522133>) to continue receiving security updates after extended support ends. Extended support ends as follows:\n\n * For Windows 7 Service Pack 1 and Windows Server 2008 R2 Service Pack 1, extended support ends on January 14, 2020.\n * For Windows Embedded Standard 7, extended support ends on October 13, 2020.\nFor more information about ESU and which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>).**Note** For Windows Embedded Standard 7, Windows Management Instrumentation (WMI) must be enabled to get updates from Windows Update or Windows Server Update Services.**Prerequisite:**You must install the updates listed below and **_restart your device_** before installing the latest Rollup. Installing these updates improves the reliability of the update process and mitigates potential issues while installing the Rollup and applying Microsoft security fixes.\n\n 1. The March 12, 2019 servicing stack update (SSU) ([KB4490628](<https://support.microsoft.com/help/4490628>)). To get the standalone package for this SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). This update is required to install updates that are only SHA-2 signed.\n 2. The latest SHA-2 update ([KB4474419](<https://support.microsoft.com/help/4474419>)) released September 10, 2019. If you are using Windows Update, the latest SHA-2 update will be offered to you automatically. This update is required to install updates that are only SHA-2 signed. For more information on SHA-2 updates, see [2019 SHA-2 Code Signing Support requirement for Windows and WSUS](<https://support.microsoft.com/help/4472027>).\n 3. For Windows Thin PC, you must have the August 11, 2020 SSU ([KB4570673](<https://support.microsoft.com/help/4570673>)) or a later SSU installed to make sure you continue to get the extended security updates starting with the October 13, 2020 updates.\n 4. To get this security update, you must reinstall the \"Extended Security Updates (ESU) Licensing Preparation Package\" ([KB4538483](<https://support.microsoft.com/help/4538483>)) or the \"Update for the Extended Security Updates (ESU) Licensing Preparation Package\" ([KB4575903](<https://support.microsoft.com/help/4575903>)) even if you previously installed the ESU key. The ESU licensing preparation package will be offered to you from WSUS. To get the standalone package for ESU licensing preparation package, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>).\nAfter you install the items above, we strongly recommend that you install the _latest_ SSU ([KB4592510](<https://support.microsoft.com/help/4592510>)). If you are using Windows Update, the latest SSU will be offered to you automatically if you are an ESU customer. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/en-us/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/help/4535697>).**Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update if you are an ESU customer. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB4598279>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows 7 Service Pack 1, Windows Server 2008 R2 Service Pack 1, Windows Embedded Standard 7 Service Pack 1, Windows Embedded POSReady 7, Windows Thin PC**Classification**: Security Updates \n**File information**For a list of the files that are provided in this update, download the [file information for cumulative update 4598279](<https://download.microsoft.com/download/d/e/f/defaf295-b1d8-43af-98ac-a3a9ddf08b8e/4598279.csv>).\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-01-12T08:00:00", "type": "mskb", "title": "January 12, 2021\u2014KB4598279 (Monthly Rollup)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17049", "CVE-2021-1701"], "modified": "2021-01-12T08:00:00", "id": "KB4598279", "href": "https://support.microsoft.com/en-us/help/4598279", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2022-06-16T15:40:39", "description": "None\n## Improvements and fixes\n\nThis security update includes quality improvements. Key changes include:\n\n * Addresses an issue in which a principal in a trusted MIT realm fails to obtain a Kerberos service ticket from Active Directory domain controllers (DC). This occurs on devices that installed Windows Updates that contain CVE-2020-17049 protections and configured PerfromTicketSignature to 1 or higher. These updates were released between November 10, 2020 and December 8, 2020. Ticket acquisition also fails with the error, \u201cKRB_GENERIC_ERROR\u201d, if callers submit a PAC-less Ticket Granting Ticket (TGT) as an evidence ticket without providing the USER_NO_AUTH_DATA_REQUIRED flag.\n * Security updates to the Microsoft Scripting Engine, Windows App Platform and Frameworks, Windows Input and Composition, Windows Management, the Windows Cloud Infrastructure, Windows Fundamentals, Windows Authentication, the Windows Kernel, Windows Remote Desktop, and Windows Storage and Filesystems.\nIf you installed earlier updates, only the new fixes contained in this package will be downloaded and installed on your device.\n\n## How to get this update \n\n### Before installing this update \n\nMicrosoft now combines the latest servicing stack update (SSU) for your operating system with the hotpatch update. For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/en-us/windows/deployment/update/servicing-stack-updates>) and Servicing Stack Updates (SSU): Frequently Asked Questions.If you are using Windows Update or Windows Server Update Services (WSUS), the latest SSU will be installed with this update.\n\n### Install this update\n\nRelease Channel| Available| Next Step \n---|---|--- \nWindows Update| Yes| None. This update will be downloaded and installed automatically from Windows Update. \nMicrosoft Update Catalog| No| To get the standalone package for this update, go to the Microsoft Update Catalog website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure Products and Classifications as follows:Product: Windows Server 2022 Datacenter: Azure Edition HotpatchClassification: Security Updates \n \n## File information\n\nFor a list of the files that are provided in this update, download the [file information for cumulative update 5014677](<https://download.microsoft.com/download/b/1/a/b1ac4197-b142-41d2-b4c3-a545322bf8c6/5014678.csv>).For a list of the files that are provided in the servicing stack update, download the [file information for the SSU - version 20348.770](<https://download.microsoft.com/download/3/f/c/3fca8074-15f9-418b-9561-0f5f1e6798cb/SSU_version_20348_733.csv>).\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-06-14T07:00:00", "type": "mskb", "title": "June 14, 2022\u2014 KB5014677 (OS Build 20348.770)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17049", "CVE-2022-30166"], "modified": "2022-06-14T07:00:00", "id": "KB5014677", "href": "https://support.microsoft.com/en-us/help/5014677", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2021-12-31T15:45:55", "description": "None\n**Important: ** \n \nWindows Server 2012 has reached the end of mainstream support and is now in extended support. Starting in July 2020, there will no longer be optional releases (known as \"C\" or \"D\" releases) for this operating system. Operating systems in extended support have only cumulative monthly security updates (known as the \"B\" or Update Tuesday release). \n \nFor information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following [article](<https://support.microsoft.com/help/824684>). To view other notes and messages, see the Windows Server 2012 update history [home page](<https://support.microsoft.com/help/4009471>).\n\n**Important: ****March 9, 2021** \n \nAs part of the end of support for Adobe Flash, [KB4577586](<https://support.microsoft.com/help/4577586>) is now available as an optional update from Windows Update (WU) and Windows Server Update Services (WSUS). Installing [KB4577586](<https://support.microsoft.com/help/4577586>) will remove Adobe Flash Player permanently from your Windows device. Once installed, you cannot uninstall this update. For more details about Microsoft\u2019s plans, see [Update on Adobe Flash Player End of Support](<https://blogs.windows.com/msedgedev/2020/09/04/update-adobe-flash-end-support>)..\n\n## Improvements and fixes\n\nThis security update includes quality improvements. Key changes include: \n\n * Addresses an issue in which a non-native device that is in the same realm does not receive a Kerberos Service ticket from Active Directory DCs. This issue occurs even though Windows Updates are installed that contain [CVE-2020-17049](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17049>) protections released between November 10 and December 8, 2020 and configured **PerfromTicketSignature** to **1** or larger. Ticket acquisition fails with **KRB_GENERIC_ERROR** if callers submit a PAC-less Ticket Granting Ticket (TGT) as an evidence ticket without the **USER_NO_AUTH_DATA_REQUIRED** flag being set for the user in User Account Controls.\n * Security updates to Windows Fundamentals, Windows Shell, Windows UAC, Windows Hybrid Cloud Networking, Windows Graphics, and Windows Media.\nFor more information about the resolved security vulnerabilities, please refer to the [Security Update Guide](<https://portal.msrc.microsoft.com/security-guidance>).\n\n## Known issues in this update\n\n**Symptom**| **Workaround** \n---|--- \nCertain operations, such as **rename**, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, \u201cSTATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\u201d. This occurs when you perform the operation on a CSV owner node from a process that doesn\u2019t have administrator privilege.| Do one of the following:\n\n * Perform the operation from a process that has administrator privilege.\n * Perform the operation from a node that doesn\u2019t have CSV ownership.\nMicrosoft is working on a resolution and will provide an update in an upcoming release. \nAfter installing updates released March 9, 2021, you might get unexpected results when printing from some apps. Issues might include:\n\n * Elements of the document might print as solid black/color boxes or might be missing, including barcodes, QR codes, and graphics elements, such as logos.\n * Table lines might be missing. Other alignment or formatting issues might also be present.\n * Printing from some apps or to some printers might result in a blank page or label.\n| This issue is resolved in KB5001641. \n \n## How to get this update\n\n### Before installing this update\n\nWe strongly recommend that you install the latest servicing stack update (SSU) for your operating system before installing the latest Rollup. SSUs improve the reliability of the update process to mitigate potential issues while installing the Rollup and applying Microsoft security fixes. For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/en-us/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/help/4535697>).If you use Windows Update, the latest SSU ([KB4566426](<https://support.microsoft.com/help/4566426>)) will be offered to you automatically. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). **REMINDER** If you are using Security-only updates, you will also need to install all previous Security-only updates and the latest cumulative update for Internet Explorer ([KB5000800](<https://support.microsoft.com/help/5000800>)).\n\n### Install this update\n\n**Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| No| See the other options below. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB5000840>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows Server 2012, Windows Embedded 8 Standard**Classification**: Security Update \n \n## File information\n\nFor a list of the files that are provided in this update, download the [file information for cumulative update 5000840](<https://download.microsoft.com/download/0/5/3/0536be84-b1cb-47be-8cae-267f984263e6/5000840.csv>).\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2021-03-09T08:00:00", "type": "mskb", "title": "March 9, 2021\u2014KB5000840 (Security-only update)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-1640", "CVE-2020-17049"], "modified": "2021-03-09T08:00:00", "id": "KB5000840", "href": "https://support.microsoft.com/en-us/help/5000840", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2021-12-31T15:46:05", "description": "None\n**Important: ** \n \nWindows 8.1 and Windows Server 2012 R2 have reached the end of mainstream support and are now in extended support. Starting in July 2020, there will no longer be optional, non-security releases (known as \"C\" releases) for this operating system. Operating systems in extended support have only cumulative monthly security updates (known as the \"B\" or Update Tuesday release). \n \nFor information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following [article](<https://support.microsoft.com/help/824684>). To view other notes and messages, see the Windows 8.1 and Windows Server 2012 R2 update history [home page](<https://support.microsoft.com/help/4009470>).\n\n**Important: ****March 9, 2021** \n \nAs part of the end of support for Adobe Flash, [KB4577586](<https://support.microsoft.com/help/4577586>) is now available as an optional update from Windows Update (WU) and Windows Server Update Services (WSUS). Installing [KB4577586](<https://support.microsoft.com/help/4577586>) will remove Adobe Flash Player permanently from your Windows device. Once installed, you cannot uninstall this update. For more details about Microsoft\u2019s plans, see [Update on Adobe Flash Player End of Support](<https://blogs.windows.com/msedgedev/2020/09/04/update-adobe