Description

We close off our 2020 year of Patch Tuesdays with 58 vulnerabilities being addressed. While it's a higher count than our typical December months (high thirties), it's still a nice breath of fresh air given how the past year has been. We do, however, get to celebrate that none of the reported vulnerabilities covered this month has been publicly exploited nor previously publicly disclosed and only 9 of the 58 vulnerabilities have been marked as Critical by Microsoft.
In terms of actionables, standard procedures can be followed here in terms of how to prioritize which sets of patches to apply first with two exceptions.
## Microsoft Office vulnerabilities
A fair amount of remote code executions targeting Microsoft Excel are being patched up today and while none of them have the Preview Pane set as an attack vector, the volume of remote code execution vulnerabilities pertaining to Microsoft Office this month may suggest a slight re-jig of priorities. That's our first (minor) exception.
The next exception is likely the most notable piece behind this December 2020 Patch Tuesday: Microsoft Exchange Server.
## Microsoft Exchange Server vulnerabilities
While there are a total of six vulnerabilities from Microsoft Exchange Server this month, two of them garner a CVSS score of 9.1 ([CVE-2020-17132](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17132>), [CVE-2020-17142](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17142>)) and one is noted by Microsoft has having a higher chance of exploitability ([CVE-2020-17144](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17144>)). These three warrant an additional examination and may be grounds for prioritizing patching.
There is currently suspicion that [CVE-2020-17132](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17132>) helps address the patch bypass of [CVE-2020-16875](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-16875>) (CVSS 8.4) from September 2020. As well, both [CVE-2020-17132](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17132>) and [CVE-2020-17142](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17142>) are remote code execution vulnerabilities occurring due to improper validation of cmdlet arguments that affect all supported (as of writing) versions of Microsoft Exchange. One important note to consider is while these vulnerabilities have received a CVSS score of 9.1 and do not require additional user interaction, an attacker must be in an authenticated role in order to exploit this vulnerability.
In contrast, [CVE-2020-17144](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17144>) which is another remote code execution vulnerability also stemming from improper validation for cmdlet arguments, this one only affects Exchange Server 2010 SP3 and does require additional user interaction to successfully execute. This is extra interesting as [Microsoft Exchange Server 2010 passed end of life back on October 22, 2020](<https://techcommunity.microsoft.com/t5/exchange-team-blog/microsoft-extending-end-of-support-for-exchange-server-2010-to/ba-p/753591>). The introduction of this post-EOL patch for Microsoft Exchange Server 2010 coupled with Microsoft noting this vulnerability to be more likely exploitable does suggest prioritizing this patch a bit earlier.
## New Summary Tables
In an attempt to provide a bit more summarizing tables, here are this month's patched vulnerabilities split by the product family.
### Azure Vulnerabilities
CVE | Vulnerability Title | Exploited | Disclosed | CVSS3 | has_faq
---|---|---|---|---|---
[CVE-2020-17160](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17160>) | Azure Sphere Security Feature Bypass Vulnerability | False | False | 7.4 | True
[CVE-2020-16971](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16971>) | Azure SDK for Java Security Feature Bypass Vulnerability | False | False | 7.4 | False
### Browser Vulnerabilities
CVE | Vulnerability Title | Exploited | Disclosed | CVSS3 | has_faq
---|---|---|---|---|---
[CVE-2020-17153](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17153>) | Microsoft Edge for Android Spoofing Vulnerability | False | False | 4.3 | True
[CVE-2020-17131](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17131>) | Chakra Scripting Engine Memory Corruption Vulnerability | False | False | 4.2 | False
### Developer Tools Vulnerabilities
CVE | Vulnerability Title | Exploited | Disclosed | CVSS3 | has_faq
---|---|---|---|---|---
[CVE-2020-17148](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17148>) | Visual Studio Code Remote Development Extension Remote Code Execution Vulnerability | False | False | 7.8 | True
[CVE-2020-17150](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17150>) | Visual Studio Code Remote Code Execution Vulnerability | False | False | 7.8 | False
[CVE-2020-17156](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17156>) | Visual Studio Remote Code Execution Vulnerability | False | False | 7.8 | True
[CVE-2020-17159](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17159>) | Visual Studio Code Java Extension Pack Remote Code Execution Vulnerability | False | False | 7.8 | False
[CVE-2020-17002](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17002>) | Azure SDK for C Security Feature Bypass Vulnerability | False | False | 7.4 | False
[CVE-2020-17135](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17135>) | Azure DevOps Server Spoofing Vulnerability | False | False | 6.4 | False
[CVE-2020-17145](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17145>) | Azure DevOps Server and Team Foundation Services Spoofing Vulnerability | False | False | 5.4 | False
### ESU Windows Vulnerabilities
CVE | Vulnerability Title | Exploited | Disclosed | CVSS3 | has_faq
---|---|---|---|---|---
[CVE-2020-17140](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17140>) | Windows SMB Information Disclosure Vulnerability | False | False | 8.1 | True
[CVE-2020-16958](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16958>) | Windows Backup Engine Elevation of Privilege Vulnerability | False | False | 7.8 | False
[CVE-2020-16959](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16959>) | Windows Backup Engine Elevation of Privilege Vulnerability | False | False | 7.8 | False
[CVE-2020-16960](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16960>) | Windows Backup Engine Elevation of Privilege Vulnerability | False | False | 7.8 | False
[CVE-2020-16961](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16961>) | Windows Backup Engine Elevation of Privilege Vulnerability | False | False | 7.8 | False
[CVE-2020-16962](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16962>) | Windows Backup Engine Elevation of Privilege Vulnerability | False | False | 7.8 | False
[CVE-2020-16963](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16963>) | Windows Backup Engine Elevation of Privilege Vulnerability | False | False | 7.8 | False
[CVE-2020-16964](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16964>) | Windows Backup Engine Elevation of Privilege Vulnerability | False | False | 7.8 | False
[CVE-2020-17098](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17098>) | Windows GDI+ Information Disclosure Vulnerability | False | False | 5.5 | True
### Exchange Server Vulnerabilities
CVE | Vulnerability Title | Exploited | Disclosed | CVSS3 | has_faq
---|---|---|---|---|---
[CVE-2020-17132](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17132>) | Microsoft Exchange Remote Code Execution Vulnerability | False | False | 9.1 | True
[CVE-2020-17142](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17142>) | Microsoft Exchange Remote Code Execution Vulnerability | False | False | 9.1 | True
[CVE-2020-17143](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17143>) | Microsoft Exchange Information Disclosure Vulnerability | False | False | 8.8 | True
[CVE-2020-17141](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17141>) | Microsoft Exchange Remote Code Execution Vulnerability | False | False | 8.4 | True
[CVE-2020-17144](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17144>) | Microsoft Exchange Remote Code Execution Vulnerability | False | False | 8.4 | True
[CVE-2020-17117](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17117>) | Microsoft Exchange Remote Code Execution Vulnerability | False | False | 6.6 | False
### Microsoft Dynamics Vulnerabilities
CVE | Vulnerability Title | Exploited | Disclosed | CVSS3 | has_faq
---|---|---|---|---|---
[CVE-2020-17152](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17152>) | Microsoft Dynamics 365 for Finance and Operations (on-premises) Remote Code Execution Vulnerability | False | False | 8.8 | True
[CVE-2020-17158](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17158>) | Microsoft Dynamics 365 for Finance and Operations (on-premises) Remote Code Execution Vulnerability | False | False | 8.8 | True
[CVE-2020-17147](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17147>) | Dynamics CRM Webclient Cross-site Scripting Vulnerability | False | False | 8.7 | True
[CVE-2020-17133](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17133>) | Microsoft Dynamics Business Central/NAV Information Disclosure | False | False | 6.5 | True
### Microsoft Office Vulnerabilities
CVE | Vulnerability Title | Exploited | Disclosed | CVSS3 | has_faq
---|---|---|---|---|---
[CVE-2020-17121](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17121>) | Microsoft SharePoint Remote Code Execution Vulnerability | False | False | 8.8 | True
[CVE-2020-17118](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17118>) | Microsoft SharePoint Remote Code Execution Vulnerability | False | False | 8.1 | False
[CVE-2020-17115](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17115>) | Microsoft SharePoint Spoofing Vulnerability | False | False | 8 | True
[CVE-2020-17122](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17122>) | Microsoft Excel Remote Code Execution Vulnerability | False | False | 7.8 | True
[CVE-2020-17123](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17123>) | Microsoft Excel Remote Code Execution Vulnerability | False | False | 7.8 | True
[CVE-2020-17124](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17124>) | Microsoft PowerPoint Remote Code Execution Vulnerability | False | False | 7.8 | True
[CVE-2020-17125](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17125>) | Microsoft Excel Remote Code Execution Vulnerability | False | False | 7.8 | True
[CVE-2020-17127](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17127>) | Microsoft Excel Remote Code Execution Vulnerability | False | False | 7.8 | True
[CVE-2020-17128](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17128>) | Microsoft Excel Remote Code Execution Vulnerability | False | False | 7.8 | True
[CVE-2020-17129](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17129>) | Microsoft Excel Remote Code Execution Vulnerability | False | False | 7.8 | True
[CVE-2020-17089](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17089>) | Microsoft SharePoint Elevation of Privilege Vulnerability | False | False | 7.1 | False
[CVE-2020-17119](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17119>) | Microsoft Outlook Information Disclosure Vulnerability | False | False | 6.5 | True
[CVE-2020-17130](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17130>) | Microsoft Excel Security Feature Bypass Vulnerability | False | False | 6.5 | True
[CVE-2020-17126](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17126>) | Microsoft Excel Information Disclosure Vulnerability | False | False | 5.5 | True
[CVE-2020-17120](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17120>) | Microsoft SharePoint Information Disclosure Vulnerability | False | False | 5.3 | True
### Windows Vulnerabilities
CVE | Vulnerability Title | Exploited | Disclosed | CVSS3 | has_faq
---|---|---|---|---|---
[CVE-2020-17095](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17095>) | Hyper-V Remote Code Execution Vulnerability | False | False | 8.5 | True
[CVE-2020-17092](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17092>) | Windows Network Connections Service Elevation of Privilege Vulnerability | False | False | 7.8 | False
[CVE-2020-17134](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17134>) | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | False | False | 7.8 | False
[CVE-2020-17136](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17136>) | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | False | False | 7.8 | False
[CVE-2020-17137](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17137>) | DirectX Graphics Kernel Elevation of Privilege Vulnerability | False | False | 7.8 | False
[CVE-2020-17139](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17139>) | Windows Overlay Filter Security Feature Bypass Vulnerability | False | False | 7.8 | False
[CVE-2020-17096](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17096>) | Windows NTFS Remote Code Execution Vulnerability | False | False | 7.5 | True
[CVE-2020-17103](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17103>) | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | False | False | 7 | False
[CVE-2020-17099](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17099>) | Windows Lock Screen Security Feature Bypass Vulnerability | False | False | 6.8 | True
[CVE-2020-16996](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16996>) | Kerberos Security Feature Bypass Vulnerability | False | False | 6.5 | True
[CVE-2020-17094](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17094>) | Windows Error Reporting Information Disclosure Vulnerability | False | False | 5.5 | True
[CVE-2020-17138](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17138>) | Windows Error Reporting Information Disclosure Vulnerability | False | False | 5.5 | True
[CVE-2020-17097](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17097>) | Windows Digital Media Receiver Elevation of Privilege Vulnerability | False | False | 3.3 | False
## Summary Graphs

Related
{"id": "RAPID7BLOG:99D9180FBF3F900ADB0CDC5EF79EC080", "type": "rapid7blog", "bulletinFamily": "info", "title": "Patch Tuesday - December 2020", "description": "\n\nWe close off our 2020 year of Patch Tuesdays with 58 vulnerabilities being addressed. While it's a higher count than our typical December months (high thirties), it's still a nice breath of fresh air given how the past year has been. We do, however, get to celebrate that none of the reported vulnerabilities covered this month has been publicly exploited nor previously publicly disclosed and only 9 of the 58 vulnerabilities have been marked as Critical by Microsoft.\n\nIn terms of actionables, standard procedures can be followed here in terms of how to prioritize which sets of patches to apply first with two exceptions.\n\n## Microsoft Office vulnerabilities\n\nA fair amount of remote code executions targeting Microsoft Excel are being patched up today and while none of them have the Preview Pane set as an attack vector, the volume of remote code execution vulnerabilities pertaining to Microsoft Office this month may suggest a slight re-jig of priorities. That's our first (minor) exception.\n\nThe next exception is likely the most notable piece behind this December 2020 Patch Tuesday: Microsoft Exchange Server.\n\n## Microsoft Exchange Server vulnerabilities\n\nWhile there are a total of six vulnerabilities from Microsoft Exchange Server this month, two of them garner a CVSS score of 9.1 ([CVE-2020-17132](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17132>), [CVE-2020-17142](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17142>)) and one is noted by Microsoft has having a higher chance of exploitability ([CVE-2020-17144](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17144>)). These three warrant an additional examination and may be grounds for prioritizing patching.\n\nThere is currently suspicion that [CVE-2020-17132](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17132>) helps address the patch bypass of [CVE-2020-16875](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-16875>) (CVSS 8.4) from September 2020. As well, both [CVE-2020-17132](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17132>) and [CVE-2020-17142](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17142>) are remote code execution vulnerabilities occurring due to improper validation of cmdlet arguments that affect all supported (as of writing) versions of Microsoft Exchange. One important note to consider is while these vulnerabilities have received a CVSS score of 9.1 and do not require additional user interaction, an attacker must be in an authenticated role in order to exploit this vulnerability.\n\nIn contrast, [CVE-2020-17144](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17144>) which is another remote code execution vulnerability also stemming from improper validation for cmdlet arguments, this one only affects Exchange Server 2010 SP3 and does require additional user interaction to successfully execute. This is extra interesting as [Microsoft Exchange Server 2010 passed end of life back on October 22, 2020](<https://techcommunity.microsoft.com/t5/exchange-team-blog/microsoft-extending-end-of-support-for-exchange-server-2010-to/ba-p/753591>). The introduction of this post-EOL patch for Microsoft Exchange Server 2010 coupled with Microsoft noting this vulnerability to be more likely exploitable does suggest prioritizing this patch a bit earlier.\n\n## New Summary Tables\n\nIn an attempt to provide a bit more summarizing tables, here are this month's patched vulnerabilities split by the product family.\n\n### Azure Vulnerabilities\n\nCVE | Vulnerability Title | Exploited | Disclosed | CVSS3 | has_faq \n---|---|---|---|---|--- \n[CVE-2020-17160](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17160>) | Azure Sphere Security Feature Bypass Vulnerability | False | False | 7.4 | True \n[CVE-2020-16971](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16971>) | Azure SDK for Java Security Feature Bypass Vulnerability | False | False | 7.4 | False \n \n### Browser Vulnerabilities\n\nCVE | Vulnerability Title | Exploited | Disclosed | CVSS3 | has_faq \n---|---|---|---|---|--- \n[CVE-2020-17153](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17153>) | Microsoft Edge for Android Spoofing Vulnerability | False | False | 4.3 | True \n[CVE-2020-17131](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17131>) | Chakra Scripting Engine Memory Corruption Vulnerability | False | False | 4.2 | False \n \n### Developer Tools Vulnerabilities\n\nCVE | Vulnerability Title | Exploited | Disclosed | CVSS3 | has_faq \n---|---|---|---|---|--- \n[CVE-2020-17148](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17148>) | Visual Studio Code Remote Development Extension Remote Code Execution Vulnerability | False | False | 7.8 | True \n[CVE-2020-17150](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17150>) | Visual Studio Code Remote Code Execution Vulnerability | False | False | 7.8 | False \n[CVE-2020-17156](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17156>) | Visual Studio Remote Code Execution Vulnerability | False | False | 7.8 | True \n[CVE-2020-17159](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17159>) | Visual Studio Code Java Extension Pack Remote Code Execution Vulnerability | False | False | 7.8 | False \n[CVE-2020-17002](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17002>) | Azure SDK for C Security Feature Bypass Vulnerability | False | False | 7.4 | False \n[CVE-2020-17135](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17135>) | Azure DevOps Server Spoofing Vulnerability | False | False | 6.4 | False \n[CVE-2020-17145](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17145>) | Azure DevOps Server and Team Foundation Services Spoofing Vulnerability | False | False | 5.4 | False \n \n### ESU Windows Vulnerabilities\n\nCVE | Vulnerability Title | Exploited | Disclosed | CVSS3 | has_faq \n---|---|---|---|---|--- \n[CVE-2020-17140](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17140>) | Windows SMB Information Disclosure Vulnerability | False | False | 8.1 | True \n[CVE-2020-16958](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16958>) | Windows Backup Engine Elevation of Privilege Vulnerability | False | False | 7.8 | False \n[CVE-2020-16959](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16959>) | Windows Backup Engine Elevation of Privilege Vulnerability | False | False | 7.8 | False \n[CVE-2020-16960](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16960>) | Windows Backup Engine Elevation of Privilege Vulnerability | False | False | 7.8 | False \n[CVE-2020-16961](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16961>) | Windows Backup Engine Elevation of Privilege Vulnerability | False | False | 7.8 | False \n[CVE-2020-16962](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16962>) | Windows Backup Engine Elevation of Privilege Vulnerability | False | False | 7.8 | False \n[CVE-2020-16963](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16963>) | Windows Backup Engine Elevation of Privilege Vulnerability | False | False | 7.8 | False \n[CVE-2020-16964](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16964>) | Windows Backup Engine Elevation of Privilege Vulnerability | False | False | 7.8 | False \n[CVE-2020-17098](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17098>) | Windows GDI+ Information Disclosure Vulnerability | False | False | 5.5 | True \n \n### Exchange Server Vulnerabilities\n\nCVE | Vulnerability Title | Exploited | Disclosed | CVSS3 | has_faq \n---|---|---|---|---|--- \n[CVE-2020-17132](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17132>) | Microsoft Exchange Remote Code Execution Vulnerability | False | False | 9.1 | True \n[CVE-2020-17142](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17142>) | Microsoft Exchange Remote Code Execution Vulnerability | False | False | 9.1 | True \n[CVE-2020-17143](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17143>) | Microsoft Exchange Information Disclosure Vulnerability | False | False | 8.8 | True \n[CVE-2020-17141](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17141>) | Microsoft Exchange Remote Code Execution Vulnerability | False | False | 8.4 | True \n[CVE-2020-17144](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17144>) | Microsoft Exchange Remote Code Execution Vulnerability | False | False | 8.4 | True \n[CVE-2020-17117](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17117>) | Microsoft Exchange Remote Code Execution Vulnerability | False | False | 6.6 | False \n \n### Microsoft Dynamics Vulnerabilities\n\nCVE | Vulnerability Title | Exploited | Disclosed | CVSS3 | has_faq \n---|---|---|---|---|--- \n[CVE-2020-17152](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17152>) | Microsoft Dynamics 365 for Finance and Operations (on-premises) Remote Code Execution Vulnerability | False | False | 8.8 | True \n[CVE-2020-17158](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17158>) | Microsoft Dynamics 365 for Finance and Operations (on-premises) Remote Code Execution Vulnerability | False | False | 8.8 | True \n[CVE-2020-17147](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17147>) | Dynamics CRM Webclient Cross-site Scripting Vulnerability | False | False | 8.7 | True \n[CVE-2020-17133](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17133>) | Microsoft Dynamics Business Central/NAV Information Disclosure | False | False | 6.5 | True \n \n### Microsoft Office Vulnerabilities\n\nCVE | Vulnerability Title | Exploited | Disclosed | CVSS3 | has_faq \n---|---|---|---|---|--- \n[CVE-2020-17121](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17121>) | Microsoft SharePoint Remote Code Execution Vulnerability | False | False | 8.8 | True \n[CVE-2020-17118](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17118>) | Microsoft SharePoint Remote Code Execution Vulnerability | False | False | 8.1 | False \n[CVE-2020-17115](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17115>) | Microsoft SharePoint Spoofing Vulnerability | False | False | 8 | True \n[CVE-2020-17122](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17122>) | Microsoft Excel Remote Code Execution Vulnerability | False | False | 7.8 | True \n[CVE-2020-17123](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17123>) | Microsoft Excel Remote Code Execution Vulnerability | False | False | 7.8 | True \n[CVE-2020-17124](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17124>) | Microsoft PowerPoint Remote Code Execution Vulnerability | False | False | 7.8 | True \n[CVE-2020-17125](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17125>) | Microsoft Excel Remote Code Execution Vulnerability | False | False | 7.8 | True \n[CVE-2020-17127](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17127>) | Microsoft Excel Remote Code Execution Vulnerability | False | False | 7.8 | True \n[CVE-2020-17128](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17128>) | Microsoft Excel Remote Code Execution Vulnerability | False | False | 7.8 | True \n[CVE-2020-17129](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17129>) | Microsoft Excel Remote Code Execution Vulnerability | False | False | 7.8 | True \n[CVE-2020-17089](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17089>) | Microsoft SharePoint Elevation of Privilege Vulnerability | False | False | 7.1 | False \n[CVE-2020-17119](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17119>) | Microsoft Outlook Information Disclosure Vulnerability | False | False | 6.5 | True \n[CVE-2020-17130](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17130>) | Microsoft Excel Security Feature Bypass Vulnerability | False | False | 6.5 | True \n[CVE-2020-17126](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17126>) | Microsoft Excel Information Disclosure Vulnerability | False | False | 5.5 | True \n[CVE-2020-17120](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17120>) | Microsoft SharePoint Information Disclosure Vulnerability | False | False | 5.3 | True \n \n### Windows Vulnerabilities\n\nCVE | Vulnerability Title | Exploited | Disclosed | CVSS3 | has_faq \n---|---|---|---|---|--- \n[CVE-2020-17095](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17095>) | Hyper-V Remote Code Execution Vulnerability | False | False | 8.5 | True \n[CVE-2020-17092](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17092>) | Windows Network Connections Service Elevation of Privilege Vulnerability | False | False | 7.8 | False \n[CVE-2020-17134](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17134>) | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | False | False | 7.8 | False \n[CVE-2020-17136](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17136>) | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | False | False | 7.8 | False \n[CVE-2020-17137](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17137>) | DirectX Graphics Kernel Elevation of Privilege Vulnerability | False | False | 7.8 | False \n[CVE-2020-17139](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17139>) | Windows Overlay Filter Security Feature Bypass Vulnerability | False | False | 7.8 | False \n[CVE-2020-17096](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17096>) | Windows NTFS Remote Code Execution Vulnerability | False | False | 7.5 | True \n[CVE-2020-17103](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17103>) | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | False | False | 7 | False \n[CVE-2020-17099](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17099>) | Windows Lock Screen Security Feature Bypass Vulnerability | False | False | 6.8 | True \n[CVE-2020-16996](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16996>) | Kerberos Security Feature Bypass Vulnerability | False | False | 6.5 | True \n[CVE-2020-17094](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17094>) | Windows Error Reporting Information Disclosure Vulnerability | False | False | 5.5 | True \n[CVE-2020-17138](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17138>) | Windows Error Reporting Information Disclosure Vulnerability | False | False | 5.5 | True \n[CVE-2020-17097](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17097>) | Windows Digital Media Receiver Elevation of Privilege Vulnerability | False | False | 3.3 | False \n \n## Summary Graphs\n\n", "published": "2020-12-08T21:36:27", "modified": "2020-12-08T21:36:27", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "href": "https://blog.rapid7.com/2020/12/08/patch-tuesday-december-2020/", "reporter": "Richard Tsang", "references": [], "cvelist": ["CVE-2020-16875", "CVE-2020-16958", "CVE-2020-16959", "CVE-2020-16960", "CVE-2020-16961", "CVE-2020-16962", "CVE-2020-16963", "CVE-2020-16964", "CVE-2020-16971", "CVE-2020-16996", "CVE-2020-17002", "CVE-2020-17089", "CVE-2020-17092", "CVE-2020-17094", "CVE-2020-17095", "CVE-2020-17096", "CVE-2020-17097", "CVE-2020-17098", "CVE-2020-17099", "CVE-2020-17103", "CVE-2020-17115", "CVE-2020-17117", "CVE-2020-17118", "CVE-2020-17119", "CVE-2020-17120", "CVE-2020-17121", "CVE-2020-17122", "CVE-2020-17123", "CVE-2020-17124", "CVE-2020-17125", "CVE-2020-17126", "CVE-2020-17127", "CVE-2020-17128", "CVE-2020-17129", "CVE-2020-17130", "CVE-2020-17131", "CVE-2020-17132", "CVE-2020-17133", "CVE-2020-17134", "CVE-2020-17135", "CVE-2020-17136", "CVE-2020-17137", "CVE-2020-17138", "CVE-2020-17139", "CVE-2020-17140", "CVE-2020-17141", "CVE-2020-17142", "CVE-2020-17143", "CVE-2020-17144", "CVE-2020-17145", "CVE-2020-17147", "CVE-2020-17148", "CVE-2020-17150", "CVE-2020-17152", "CVE-2020-17153", "CVE-2020-17156", "CVE-2020-17158", "CVE-2020-17159", "CVE-2020-17160"], "lastseen": "2020-12-12T10:47:13", "viewCount": 187, "enchantments": {"dependencies": {"references": [{"type": "attackerkb", "idList": ["AKB:33F83CEA-850A-43CD-8CA4-D0DC548F1958", "AKB:3B7AE30E-7135-4027-A5DA-A88A045903F6", "AKB:67DD67D3-33BC-455C-98A3-7DD0E1D4613D", "AKB:90047E82-FDD8-47DB-9552-50D104A34230", "AKB:ED05D93E-5B20-4B44-BAC8-C4CB5B46254A"]}, {"type": "avleonov", "idList": ["AVLEONOV:28E47C69DA4A069031694EB4C2C931BA", "AVLEONOV:93A5CCFA19B815AE15942F533FFD65C4"]}, {"type": "checkpoint_advisories", "idList": ["CPAI-2020-0870", "CPAI-2020-1250", "CPAI-2020-1251", "CPAI-2020-1252", "CPAI-2020-1253", "CPAI-2020-1272", "CPAI-2020-1273"]}, {"type": "cve", "idList": ["CVE-2020-16875", "CVE-2020-16958", "CVE-2020-16959", "CVE-2020-16960", "CVE-2020-16961", "CVE-2020-16962", "CVE-2020-16963", "CVE-2020-16964", "CVE-2020-16971", "CVE-2020-16996", "CVE-2020-17002", "CVE-2020-17089", "CVE-2020-17092", "CVE-2020-17094", "CVE-2020-17095", "CVE-2020-17096", "CVE-2020-17097", "CVE-2020-17098", "CVE-2020-17099", "CVE-2020-17103", "CVE-2020-17115", "CVE-2020-17117", "CVE-2020-17118", "CVE-2020-17119", "CVE-2020-17120", "CVE-2020-17121", "CVE-2020-17122", "CVE-2020-17123", "CVE-2020-17124", "CVE-2020-17125", "CVE-2020-17126", "CVE-2020-17127", "CVE-2020-17128", "CVE-2020-17129", "CVE-2020-17130", "CVE-2020-17131", "CVE-2020-17132", "CVE-2020-17133", "CVE-2020-17134", "CVE-2020-17135", "CVE-2020-17136", "CVE-2020-17137", "CVE-2020-17138", "CVE-2020-17139", "CVE-2020-17140", "CVE-2020-17141", "CVE-2020-17142", "CVE-2020-17143", "CVE-2020-17144", "CVE-2020-17145", "CVE-2020-17147", "CVE-2020-17148", "CVE-2020-17150", "CVE-2020-17152", "CVE-2020-17153", "CVE-2020-17156", "CVE-2020-17158", "CVE-2020-17159", "CVE-2020-17160"]}, {"type": "github", "idList": ["GHSA-QWWG-GC55-QQRV"]}, {"type": "githubexploit", "idList": ["A1463971-12CC-5B11-99E8-018B541F4F71", "AC621762-B940-53F9-B9DB-34B015F55B87", "DAF55AA9-F00A-533A-A843-3EC20DDE6BD0"]}, {"type": "googleprojectzero", "idList": ["GOOGLEPROJECTZERO:1D4D205F47235FA1B34F16AE73563B14"]}, {"type": "hivepro", "idList": ["HIVEPRO:FD730BCAD086DD8C995242D13B38EBC8"]}, {"type": "ibm", "idList": ["F34133DBAC4F6FEF866DB845BED95244FB18E8AD56C9EDC4C9EFFFDFD49046C8"]}, {"type": "kaspersky", "idList": ["KLA11955", "KLA12019", "KLA12020", "KLA12021", "KLA12022", "KLA12023", "KLA12024", "KLA12025", "KLA12026"]}, {"type": "krebs", "idList": ["KREBS:613A537780BD40A6F8E0047CE8D3E6EC", "KREBS:DF8493DA16F49CE6247436830678BA8D"]}, {"type": "metasploit", "idList": ["MSF:EXPLOIT-WINDOWS-HTTP-EXCHANGE_ECP_DLP_POLICY-", "MSF:EXPLOIT-WINDOWS-LOCAL-CVE_2020_17136-"]}, {"type": "mscve", "idList": ["MS:CVE-2020-16875", "MS:CVE-2020-16958", "MS:CVE-2020-16959", "MS:CVE-2020-16960", "MS:CVE-2020-16961", "MS:CVE-2020-16962", "MS:CVE-2020-16963", "MS:CVE-2020-16964", "MS:CVE-2020-16971", "MS:CVE-2020-16996", "MS:CVE-2020-17002", "MS:CVE-2020-17089", "MS:CVE-2020-17092", "MS:CVE-2020-17094", "MS:CVE-2020-17095", "MS:CVE-2020-17096", "MS:CVE-2020-17097", "MS:CVE-2020-17098", "MS:CVE-2020-17099", "MS:CVE-2020-17103", "MS:CVE-2020-17115", "MS:CVE-2020-17117", "MS:CVE-2020-17118", "MS:CVE-2020-17119", "MS:CVE-2020-17120", "MS:CVE-2020-17121", "MS:CVE-2020-17122", "MS:CVE-2020-17123", "MS:CVE-2020-17124", "MS:CVE-2020-17125", "MS:CVE-2020-17126", "MS:CVE-2020-17127", "MS:CVE-2020-17128", "MS:CVE-2020-17129", "MS:CVE-2020-17130", "MS:CVE-2020-17131", "MS:CVE-2020-17132", "MS:CVE-2020-17133", "MS:CVE-2020-17134", "MS:CVE-2020-17135", "MS:CVE-2020-17136", "MS:CVE-2020-17137", "MS:CVE-2020-17138", "MS:CVE-2020-17139", "MS:CVE-2020-17140", "MS:CVE-2020-17141", "MS:CVE-2020-17142", "MS:CVE-2020-17143", "MS:CVE-2020-17144", "MS:CVE-2020-17145", "MS:CVE-2020-17147", "MS:CVE-2020-17148", "MS:CVE-2020-17150", "MS:CVE-2020-17152", "MS:CVE-2020-17153", "MS:CVE-2020-17156", "MS:CVE-2020-17158", "MS:CVE-2020-17159", "MS:CVE-2020-17160", "MS:CVE-2021-26855", "MS:CVE-2021-26857", "MS:CVE-2021-26858", "MS:CVE-2021-27065"]}, {"type": "mskb", "idList": ["KB4484372", "KB4484393", "KB4484468", "KB4486696", "KB4486697", "KB4486698", "KB4486704", "KB4486721", "KB4486732", "KB4486742", "KB4486748", "KB4486750", "KB4486751", "KB4486752", "KB4486753", "KB4486754", "KB4486757", "KB4486760", "KB4493138", "KB4493139", "KB4493140", "KB4493148", "KB4493149", "KB4571787", "KB4571788", "KB4577352", "KB4583556", "KB4592438", "KB4592440", "KB4592446", "KB4592449", "KB4592464", "KB4592468", "KB4592471", "KB4592484", "KB4592495", "KB4592497", "KB4592498", "KB4592503", "KB4592504", "KB4593226", "KB4593465", "KB4593466", "KB4593467", "KB4595459", "KB4595462"]}, {"type": "nessus", "idList": ["MACOS_MS20_DEC_OFFICE.NASL", "SMB_NT_MS20_DEC_4586793.NASL", "SMB_NT_MS20_DEC_4586830.NASL", "SMB_NT_MS20_DEC_4592438.NASL", "SMB_NT_MS20_DEC_4592446.NASL", "SMB_NT_MS20_DEC_4592449.NASL", "SMB_NT_MS20_DEC_4592464.NASL", "SMB_NT_MS20_DEC_4592468.NASL", "SMB_NT_MS20_DEC_4592471.NASL", "SMB_NT_MS20_DEC_4592484.NASL", "SMB_NT_MS20_DEC_4592498.NASL", "SMB_NT_MS20_DEC_EXCEL.NASL", "SMB_NT_MS20_DEC_EXCEL_C2R.NASL", "SMB_NT_MS20_DEC_EXCHANGE.NASL", "SMB_NT_MS20_DEC_EXCHANGE_2010.NASL", "SMB_NT_MS20_DEC_MICROSOFT_DYNAMICS.NASL", "SMB_NT_MS20_DEC_MICROSOFT_DYNAMICS_NAV.NASL", "SMB_NT_MS20_DEC_OFFICE.NASL", "SMB_NT_MS20_DEC_OFFICE_C2R.NASL", "SMB_NT_MS20_DEC_OFFICE_SHAREPOINT_2010.NASL", "SMB_NT_MS20_DEC_OFFICE_SHAREPOINT_2013.NASL", "SMB_NT_MS20_DEC_OFFICE_SHAREPOINT_2016.NASL", "SMB_NT_MS20_DEC_OFFICE_SHAREPOINT_2019.NASL", "SMB_NT_MS20_DEC_OFFICE_WEB.NASL", "SMB_NT_MS20_DEC_OUTLOOK.NASL", "SMB_NT_MS20_DEC_POWERPOINT.NASL", "SMB_NT_MS20_DEC_POWERPOINT_C2R.NASL", "SMB_NT_MS20_DEC_TEAM_FOUNDATION_SERVER.NASL", "SMB_NT_MS20_DEC_VISUAL_STUDIO.NASL", "SMB_NT_MS20_SEP_EXCHANGE.NASL", "WEB_APPLICATION_SCANNING_112730", "WEB_APPLICATION_SCANNING_112731", "WEB_APPLICATION_SCANNING_112732"]}, {"type": "osv", "idList": ["OSV:GHSA-QWWG-GC55-QQRV"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:159210", "PACKETSTORM:160919"]}, {"type": "qualysblog", "idList": ["QUALYSBLOG:0082A77BD8EFFF48B406D107FEFD0DD3", "QUALYSBLOG:69F5E155188CF28043839A251912213A", "QUALYSBLOG:D6BB8795D96ECAD5C95596F19210BB13"]}, {"type": "rapid7blog", "idList": ["RAPID7BLOG:0165B62C20478239D1C1B73C779FA6F0", "RAPID7BLOG:5586742AC0F1C66F56B3583482B0960A", "RAPID7BLOG:8F65784C67333FC453D98DBB9FBEBA4C", "RAPID7BLOG:CBD7A5DA1DAAE9DCFD01F104F4B1B5FB", "RAPID7BLOG:E8EB68630D38C60B7DE4AF696474210D"]}, {"type": "seebug", "idList": ["SSV:99224"]}, {"type": "srcincite", "idList": ["SRC-2020-0019", "SRC-2020-0029", "SRC-2020-0030", "SRC-2020-0031", "SRC-2020-0032", "SRC-2020-0033", "SRC-2020-0034"]}, {"type": "talos", "idList": ["TALOS-2020-1153"]}, {"type": "thn", "idList": ["THN:80D2DBC4130D9FF314BDC4C19EB5CD4E", "THN:8D0E2C792A85A3FB8EC6A823D487FAE6", "THN:BCD236457064C9D8673B1536BE370718", "THN:CDB4261BBCF3D5E2CC872D65E155CC0E"]}, {"type": "threatpost", "idList": ["THREATPOST:02914A68EEB34D94544D5D00BF463BAC", "THREATPOST:A298611BE0D737083D0CFFE084BEC006", "THREATPOST:B25070E6CF075EEA6B20C4D8D25ADBE8"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2020-16996"]}, {"type": "veracode", "idList": ["VERACODE:28554"]}, {"type": "zdi", "idList": ["ZDI-20-1412", "ZDI-20-1413", "ZDI-20-1414", "ZDI-20-1422", "ZDI-20-1424", "ZDI-20-1425"]}, {"type": "zdt", "idList": ["1337DAY-ID-34947", "1337DAY-ID-35669"]}]}, "score": {"value": 0.3, "vector": "NONE"}, "backreferences": {"references": [{"type": "attackerkb", "idList": ["AKB:33F83CEA-850A-43CD-8CA4-D0DC548F1958", "AKB:3B7AE30E-7135-4027-A5DA-A88A045903F6", "AKB:67DD67D3-33BC-455C-98A3-7DD0E1D4613D", "AKB:90047E82-FDD8-47DB-9552-50D104A34230"]}, {"type": "avleonov", "idList": ["AVLEONOV:28E47C69DA4A069031694EB4C2C931BA", "AVLEONOV:93A5CCFA19B815AE15942F533FFD65C4"]}, {"type": "checkpoint_advisories", "idList": ["CPAI-2020-0870", "CPAI-2020-1250", "CPAI-2020-1251", "CPAI-2020-1252", "CPAI-2020-1272", "CPAI-2020-1273"]}, {"type": "cve", "idList": ["CVE-2020-16875", "CVE-2020-16958", "CVE-2020-16959", "CVE-2020-16960", "CVE-2020-16961", "CVE-2020-16962", "CVE-2020-16963", "CVE-2020-16964", "CVE-2020-16971", "CVE-2020-16996", "CVE-2020-17002", "CVE-2020-17089", "CVE-2020-17092", "CVE-2020-17094", "CVE-2020-17095", "CVE-2020-17096", "CVE-2020-17097", "CVE-2020-17098", "CVE-2020-17099", "CVE-2020-17103", "CVE-2020-17115", "CVE-2020-17117", "CVE-2020-17118", "CVE-2020-17119", "CVE-2020-17120", "CVE-2020-17121", "CVE-2020-17122", "CVE-2020-17123", "CVE-2020-17124", "CVE-2020-17125", "CVE-2020-17126", "CVE-2020-17127", "CVE-2020-17128", "CVE-2020-17129", "CVE-2020-17130", "CVE-2020-17131", "CVE-2020-17132", "CVE-2020-17133", "CVE-2020-17134", "CVE-2020-17135", "CVE-2020-17136", "CVE-2020-17137", "CVE-2020-17138", "CVE-2020-17139", "CVE-2020-17140", "CVE-2020-17141", "CVE-2020-17142", "CVE-2020-17143", "CVE-2020-17144", "CVE-2020-17145", "CVE-2020-17147", "CVE-2020-17148", "CVE-2020-17150", "CVE-2020-17152", "CVE-2020-17153", "CVE-2020-17156", "CVE-2020-17158", "CVE-2020-17159", "CVE-2020-17160"]}, {"type": "github", "idList": ["GHSA-QWWG-GC55-QQRV"]}, {"type": "githubexploit", "idList": ["A1463971-12CC-5B11-99E8-018B541F4F71", "AC621762-B940-53F9-B9DB-34B015F55B87", "DAF55AA9-F00A-533A-A843-3EC20DDE6BD0"]}, {"type": "googleprojectzero", "idList": ["GOOGLEPROJECTZERO:1D4D205F47235FA1B34F16AE73563B14"]}, {"type": "hivepro", "idList": ["HIVEPRO:FD730BCAD086DD8C995242D13B38EBC8"]}, {"type": "ibm", "idList": ["F34133DBAC4F6FEF866DB845BED95244FB18E8AD56C9EDC4C9EFFFDFD49046C8"]}, {"type": "kaspersky", "idList": ["KLA12021", "KLA12026"]}, {"type": "krebs", "idList": ["KREBS:613A537780BD40A6F8E0047CE8D3E6EC", "KREBS:DF8493DA16F49CE6247436830678BA8D"]}, {"type": "metasploit", "idList": ["MSF:ILITIES/MICROSOFT-OFFICE-CVE-2020-17123/", "MSF:ILITIES/MICROSOFT-OFFICE-CVE-2020-17130/", "MSF:ILITIES/MSFT-CVE-2020-16875/", "MSF:ILITIES/MSFT-CVE-2020-16963/", "MSF:ILITIES/MSFT-CVE-2020-16964/", "MSF:ILITIES/MSFT-CVE-2020-17103/", "MSF:ILITIES/MSFT-CVE-2020-17117/", "MSF:ILITIES/MSFT-CVE-2020-17118/", "MSF:ILITIES/MSFT-CVE-2020-17132/", "MSF:ILITIES/MSFT-CVE-2020-17142/", "MSF:ILITIES/MSFT-CVE-2020-17143/", "MSF:ILITIES/MSFT-CVE-2020-17144/"]}, {"type": "mscve", "idList": ["MS:CVE-2020-16875", "MS:CVE-2020-16958", "MS:CVE-2020-16959", "MS:CVE-2020-16960", "MS:CVE-2020-16961", "MS:CVE-2020-16962", "MS:CVE-2020-16963", "MS:CVE-2020-16964", "MS:CVE-2020-16971", "MS:CVE-2020-16996", "MS:CVE-2020-17002", "MS:CVE-2020-17089", "MS:CVE-2020-17092", "MS:CVE-2020-17094", "MS:CVE-2020-17095", "MS:CVE-2020-17096", "MS:CVE-2020-17097", "MS:CVE-2020-17098", "MS:CVE-2020-17099", "MS:CVE-2020-17103", "MS:CVE-2020-17115", "MS:CVE-2020-17117", "MS:CVE-2020-17118", "MS:CVE-2020-17119", "MS:CVE-2020-17120", "MS:CVE-2020-17121", "MS:CVE-2020-17122", "MS:CVE-2020-17123", "MS:CVE-2020-17124", "MS:CVE-2020-17125", "MS:CVE-2020-17126", "MS:CVE-2020-17127", "MS:CVE-2020-17128", "MS:CVE-2020-17129", "MS:CVE-2020-17130", "MS:CVE-2020-17131", "MS:CVE-2020-17132", "MS:CVE-2020-17133", "MS:CVE-2020-17134", "MS:CVE-2020-17135", "MS:CVE-2020-17136", "MS:CVE-2020-17137", "MS:CVE-2020-17138", "MS:CVE-2020-17139", "MS:CVE-2020-17140", "MS:CVE-2020-17141", "MS:CVE-2020-17142", "MS:CVE-2020-17143", "MS:CVE-2020-17144", "MS:CVE-2020-17145", "MS:CVE-2020-17147", "MS:CVE-2020-17148", "MS:CVE-2020-17150", "MS:CVE-2020-17152", "MS:CVE-2020-17153", "MS:CVE-2020-17156", "MS:CVE-2020-17158", "MS:CVE-2020-17159", "MS:CVE-2020-17160"]}, {"type": "mskb", "idList": ["KB4583556", "KB4592503", "KB4595459", "KB4595462"]}, {"type": "nessus", "idList": ["SMB_NT_MS20_DEC_4592471.NASL", "SMB_NT_MS20_DEC_4592498.NASL", "SMB_NT_MS20_DEC_EXCHANGE.NASL", "SMB_NT_MS20_DEC_EXCHANGE_2010.NASL", "SMB_NT_MS20_DEC_MICROSOFT_DYNAMICS.NASL", "SMB_NT_MS20_DEC_VISUAL_STUDIO.NASL", "SMB_NT_MS20_SEP_EXCHANGE.NASL", "WEB_APPLICATION_SCANNING_112730", "WEB_APPLICATION_SCANNING_112731", "WEB_APPLICATION_SCANNING_112732"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:159210", "PACKETSTORM:160919"]}, {"type": "qualysblog", "idList": ["QUALYSBLOG:69F5E155188CF28043839A251912213A", "QUALYSBLOG:D6BB8795D96ECAD5C95596F19210BB13"]}, {"type": "rapid7blog", "idList": ["RAPID7BLOG:0165B62C20478239D1C1B73C779FA6F0", "RAPID7BLOG:5586742AC0F1C66F56B3583482B0960A"]}, {"type": "seebug", "idList": ["SSV:99224"]}, {"type": "srcincite", "idList": ["SRC-2020-0019", "SRC-2020-0029", "SRC-2020-0030", "SRC-2020-0031", "SRC-2020-0032", "SRC-2020-0033", "SRC-2020-0034"]}, {"type": "talos", "idList": ["TALOS-2020-1153"]}, {"type": "thn", "idList": ["THN:80D2DBC4130D9FF314BDC4C19EB5CD4E", "THN:BCD236457064C9D8673B1536BE370718", "THN:CDB4261BBCF3D5E2CC872D65E155CC0E"]}, {"type": "threatpost", "idList": ["THREATPOST:02914A68EEB34D94544D5D00BF463BAC", "THREATPOST:A298611BE0D737083D0CFFE084BEC006"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2020-16996"]}, {"type": "zdi", "idList": ["ZDI-20-1412", "ZDI-20-1413", "ZDI-20-1414", "ZDI-20-1422", "ZDI-20-1424", "ZDI-20-1425"]}, {"type": "zdt", "idList": ["1337DAY-ID-34947"]}]}, "exploitation": null, "epss": [{"cve": "CVE-2020-16875", "epss": "0.749620000", "percentile": "0.975740000", "modified": "2023-03-16"}, {"cve": "CVE-2020-16958", "epss": "0.000430000", "percentile": "0.073850000", "modified": "2023-03-16"}, {"cve": "CVE-2020-16959", "epss": "0.000430000", "percentile": "0.073850000", "modified": "2023-03-16"}, {"cve": "CVE-2020-16960", "epss": "0.000430000", "percentile": "0.073850000", "modified": "2023-03-16"}, {"cve": "CVE-2020-16961", "epss": "0.000430000", "percentile": "0.073850000", "modified": "2023-03-16"}, {"cve": "CVE-2020-16962", "epss": "0.000430000", "percentile": "0.073850000", "modified": "2023-03-16"}, {"cve": "CVE-2020-16963", "epss": "0.000430000", "percentile": "0.073850000", "modified": "2023-03-16"}, {"cve": "CVE-2020-16964", "epss": "0.000430000", "percentile": "0.073850000", "modified": "2023-03-16"}, {"cve": "CVE-2020-16971", "epss": "0.001590000", "percentile": "0.507540000", "modified": "2023-03-16"}, {"cve": "CVE-2020-16996", "epss": "0.000640000", "percentile": "0.259640000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17002", "epss": "0.001590000", "percentile": "0.507540000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17089", "epss": "0.001840000", "percentile": "0.539430000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17092", "epss": "0.000430000", "percentile": "0.073850000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17094", "epss": "0.000430000", "percentile": "0.073850000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17095", "epss": "0.023450000", "percentile": "0.880650000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17096", "epss": "0.014860000", "percentile": "0.847870000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17097", "epss": "0.000430000", "percentile": "0.073850000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17098", "epss": "0.000430000", "percentile": "0.073850000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17099", "epss": "0.000550000", "percentile": "0.209460000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17103", "epss": "0.000430000", "percentile": "0.073850000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17115", "epss": "0.001890000", "percentile": "0.546410000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17117", "epss": "0.016730000", "percentile": "0.857030000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17118", "epss": "0.028650000", "percentile": "0.891480000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17119", "epss": "0.006450000", "percentile": "0.761290000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17120", "epss": "0.032630000", "percentile": "0.897350000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17121", "epss": "0.017160000", "percentile": "0.858940000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17122", "epss": "0.011860000", "percentile": "0.829070000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17123", "epss": "0.011860000", "percentile": "0.829070000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17124", "epss": "0.011110000", "percentile": "0.823120000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17125", "epss": "0.011110000", "percentile": "0.823120000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17126", "epss": "0.000430000", "percentile": "0.073850000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17127", "epss": "0.011860000", "percentile": "0.829070000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17128", "epss": "0.003730000", "percentile": "0.684090000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17129", "epss": "0.011860000", "percentile": "0.829070000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17130", "epss": "0.000470000", "percentile": "0.143180000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17131", "epss": "0.003470000", "percentile": "0.671720000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17132", "epss": "0.068750000", "percentile": "0.927840000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17133", "epss": "0.032630000", "percentile": "0.897350000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17134", "epss": "0.000430000", "percentile": "0.073850000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17135", "epss": "0.000530000", "percentile": "0.190530000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17136", "epss": "0.000620000", "percentile": "0.243410000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17137", "epss": "0.000430000", "percentile": "0.073850000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17138", "epss": "0.000430000", "percentile": "0.073850000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17139", "epss": "0.000430000", "percentile": "0.073850000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17140", "epss": "0.061740000", "percentile": "0.923900000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17141", "epss": "0.032800000", "percentile": "0.897600000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17142", "epss": "0.068750000", "percentile": "0.927840000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17143", "epss": "0.004630000", "percentile": "0.715560000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17144", "epss": "0.280130000", "percentile": "0.960970000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17145", "epss": "0.000530000", "percentile": "0.190530000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17147", "epss": "0.000520000", "percentile": "0.180970000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17148", "epss": "0.011860000", "percentile": "0.829070000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17150", "epss": "0.011860000", "percentile": "0.829070000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17152", "epss": "0.014860000", "percentile": "0.847870000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17153", "epss": "0.000870000", "percentile": "0.349610000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17156", "epss": "0.011860000", "percentile": "0.829070000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17158", "epss": "0.014860000", "percentile": "0.847870000", "modified": "2023-03-16"}, {"cve": "CVE-2020-17159", "epss": "0.011860000", "percentile": "0.829070000", "modified": "2023-03-16"}], "vulnersScore": 0.3}, "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1660012827, "score": 1684005285, "epss": 1679050336}, "_internal": {"score_hash": "3f1a32a31e796a676835defbaf33f8fb"}}
{"nessus": [{"lastseen": "2023-05-18T15:25:34", "description": "The remote Windows host is missing security update 4592438.\nIt is, therefore, affected by multiple vulnerabilities:\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2020-17095, CVE-2020-17096)\n\n - An memory corruption vulnerability exists. An attacker can exploit this to corrupt the memory and cause unexpected behaviors within the system/application.\n (CVE-2020-17131)\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive information. (CVE-2020-17094, CVE-2020-17098, CVE-2020-17140)\n\n - A security feature bypass vulnerability exists. An attacker can exploit this and bypass the security feature and perform unauthorized actions compromising the integrity of the system/application.\n (CVE-2020-17139)\n\n - An elevation of privilege vulnerability. An attacker can exploit this to gain elevated privileges.\n (CVE-2020-16958, CVE-2020-16959, CVE-2020-16960, CVE-2020-16961, CVE-2020-16962, CVE-2020-16963, CVE-2020-16964, CVE-2020-17092, CVE-2020-17097, CVE-2020-17103, CVE-2020-17134, CVE-2020-17136, CVE-2020-17137)", "cvss3": {}, "published": "2020-12-08T00:00:00", "type": "nessus", "title": "KB4592438: Windows 10 Version 2004 December 2020 Security Update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-16958", "CVE-2020-16959", "CVE-2020-16960", "CVE-2020-16961", "CVE-2020-16962", "CVE-2020-16963", "CVE-2020-16964", "CVE-2020-16996", "CVE-2020-17092", "CVE-2020-17094", "CVE-2020-17095", "CVE-2020-17096", "CVE-2020-17097", "CVE-2020-17098", "CVE-2020-17103", "CVE-2020-17131", "CVE-2020-17134", "CVE-2020-17136", "CVE-2020-17137", "CVE-2020-17139", "CVE-2020-17140"], "modified": "2022-12-05T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS20_DEC_4592438.NASL", "href": "https://www.tenable.com/plugins/nessus/143558", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(143558);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/05\");\n\n script_cve_id(\n \"CVE-2020-16958\",\n \"CVE-2020-16959\",\n \"CVE-2020-16960\",\n \"CVE-2020-16961\",\n \"CVE-2020-16962\",\n \"CVE-2020-16963\",\n \"CVE-2020-16964\",\n \"CVE-2020-16996\",\n \"CVE-2020-17092\",\n \"CVE-2020-17094\",\n \"CVE-2020-17095\",\n \"CVE-2020-17096\",\n \"CVE-2020-17097\",\n \"CVE-2020-17098\",\n \"CVE-2020-17103\",\n \"CVE-2020-17131\",\n \"CVE-2020-17134\",\n \"CVE-2020-17136\",\n \"CVE-2020-17137\",\n \"CVE-2020-17139\",\n \"CVE-2020-17140\"\n );\n script_xref(name:\"MSKB\", value:\"4592438\");\n script_xref(name:\"MSFT\", value:\"MS20-4592438\");\n script_xref(name:\"IAVA\", value:\"2020-A-0561-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0562-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0555-S\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2020-0138\");\n\n script_name(english:\"KB4592438: Windows 10 Version 2004 December 2020 Security Update\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 4592438.\nIt is, therefore, affected by multiple vulnerabilities:\n\n - A remote code execution vulnerability. An attacker can\n exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2020-17095,\n CVE-2020-17096)\n\n - An memory corruption vulnerability exists. An attacker\n can exploit this to corrupt the memory and cause\n unexpected behaviors within the system/application.\n (CVE-2020-17131)\n\n - An information disclosure vulnerability. An attacker can\n exploit this to disclose potentially sensitive\n information. (CVE-2020-17094, CVE-2020-17098,\n CVE-2020-17140)\n\n - A security feature bypass vulnerability exists. An\n attacker can exploit this and bypass the security\n feature and perform unauthorized actions compromising\n the integrity of the system/application.\n (CVE-2020-17139)\n\n - An elevation of privilege vulnerability. An attacker can\n exploit this to gain elevated privileges.\n (CVE-2020-16958, CVE-2020-16959, CVE-2020-16960,\n CVE-2020-16961, CVE-2020-16962, CVE-2020-16963,\n CVE-2020-16964, CVE-2020-17092, CVE-2020-17097,\n CVE-2020-17103, CVE-2020-17134, CVE-2020-17136,\n CVE-2020-17137)\");\n # https://support.microsoft.com/en-us/help/4592438/windows-10-update-kb4592438\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?b1f576e6\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Cumulative Update KB4592438.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17096\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2020-17095\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = 'MS20-12';\nkbs = make_list('4592438');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10',\n sp:0,\n os_build:'19041',\n rollup_date:'12_2020',\n bulletin:bulletin,\n rollup_kb_list:[4592438])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T14:14:14", "description": "The remote Windows host is missing security update 4592440. It is, therefore, affected by multiple vulnerabilities:\n\n - An elevation of privilege vulnerability. An attacker can exploit this to gain elevated privileges.\n (CVE-2020-16958, CVE-2020-16959, CVE-2020-16960, CVE-2020-16961, CVE-2020-16962, CVE-2020-16963, CVE-2020-16964, CVE-2020-17092, CVE-2020-17097, CVE-2020-17103, CVE-2020-17134, CVE-2020-17136)\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2020-17095, CVE-2020-17096)\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive information. (CVE-2020-17094, CVE-2020-17098, CVE-2020-17140)\n\n - A security feature bypass vulnerability exists. An attacker can exploit this and bypass the security feature and perform unauthorized actions compromising the integrity of the system/application.\n (CVE-2020-16996, CVE-2020-17099, CVE-2020-17139)", "cvss3": {}, "published": "2020-12-08T00:00:00", "type": "nessus", "title": "KB4592440: Windows 10 Version 1809 and Windows Server 2019 December 2020 Security Update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-16958", "CVE-2020-16959", "CVE-2020-16960", "CVE-2020-16961", "CVE-2020-16962", "CVE-2020-16963", "CVE-2020-16964", "CVE-2020-16996", "CVE-2020-17092", "CVE-2020-17094", "CVE-2020-17095", "CVE-2020-17096", "CVE-2020-17097", "CVE-2020-17098", "CVE-2020-17099", "CVE-2020-17103", "CVE-2020-17134", "CVE-2020-17136", "CVE-2020-17139", "CVE-2020-17140"], "modified": "2022-12-05T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS20_DEC_4586793.NASL", "href": "https://www.tenable.com/plugins/nessus/143561", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(143561);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/05\");\n\n script_cve_id(\n \"CVE-2020-16958\",\n \"CVE-2020-16959\",\n \"CVE-2020-16960\",\n \"CVE-2020-16961\",\n \"CVE-2020-16962\",\n \"CVE-2020-16963\",\n \"CVE-2020-16964\",\n \"CVE-2020-16996\",\n \"CVE-2020-17092\",\n \"CVE-2020-17094\",\n \"CVE-2020-17095\",\n \"CVE-2020-17096\",\n \"CVE-2020-17097\",\n \"CVE-2020-17098\",\n \"CVE-2020-17099\",\n \"CVE-2020-17103\",\n \"CVE-2020-17134\",\n \"CVE-2020-17136\",\n \"CVE-2020-17139\",\n \"CVE-2020-17140\"\n );\n script_xref(name:\"MSKB\", value:\"4592440\");\n script_xref(name:\"MSFT\", value:\"MS20-4592440\");\n script_xref(name:\"IAVA\", value:\"2020-A-0561-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0562-S\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2020-0138\");\n\n script_name(english:\"KB4592440: Windows 10 Version 1809 and Windows Server 2019 December 2020 Security Update\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 4592440. \nIt is, therefore, affected by multiple vulnerabilities:\n\n - An elevation of privilege vulnerability. An attacker can\n exploit this to gain elevated privileges.\n (CVE-2020-16958, CVE-2020-16959, CVE-2020-16960,\n CVE-2020-16961, CVE-2020-16962, CVE-2020-16963,\n CVE-2020-16964, CVE-2020-17092, CVE-2020-17097,\n CVE-2020-17103, CVE-2020-17134, CVE-2020-17136)\n\n - A remote code execution vulnerability. An attacker can\n exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2020-17095,\n CVE-2020-17096)\n\n - An information disclosure vulnerability. An attacker can\n exploit this to disclose potentially sensitive\n information. (CVE-2020-17094, CVE-2020-17098,\n CVE-2020-17140)\n\n - A security feature bypass vulnerability exists. An\n attacker can exploit this and bypass the security\n feature and perform unauthorized actions compromising\n the integrity of the system/application.\n (CVE-2020-16996, CVE-2020-17099, CVE-2020-17139)\");\n # https://support.microsoft.com/en-us/help/4592440/windows-10-update-kb4592440\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?1972925b\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Cumulative Update KB4592440.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17096\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2020-17095\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = 'MS20-12';\nkbs = make_list('4592440');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10',\n sp:0,\n os_build:'17763',\n rollup_date:'12_2020',\n bulletin:bulletin,\n rollup_kb_list:[4592440])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:25:34", "description": "The remote Windows host is missing security update 4592449.\nIt is, therefore, affected by multiple vulnerabilities:\n\n - An elevation of privilege vulnerability. An attacker can exploit this to gain elevated privileges.\n (CVE-2020-16958, CVE-2020-16959, CVE-2020-16960, CVE-2020-16961, CVE-2020-16962, CVE-2020-16963, CVE-2020-16964, CVE-2020-17092, CVE-2020-17097, CVE-2020-17103, CVE-2020-17134, CVE-2020-17136)\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2020-17095, CVE-2020-17096)\n\n - A security feature bypass vulnerability exists. An attacker can exploit this and bypass the security feature and perform unauthorized actions compromising the integrity of the system/application.\n (CVE-2020-17139)\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive information. (CVE-2020-17094, CVE-2020-17098, CVE-2020-17140)", "cvss3": {}, "published": "2020-12-08T00:00:00", "type": "nessus", "title": "KB4592449: Windows 10 Version 1903 and Windows 10 Version 1909 December 2020 Security Update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-16958", "CVE-2020-16959", "CVE-2020-16960", "CVE-2020-16961", "CVE-2020-16962", "CVE-2020-16963", "CVE-2020-16964", "CVE-2020-16996", "CVE-2020-17092", "CVE-2020-17094", "CVE-2020-17095", "CVE-2020-17096", "CVE-2020-17097", "CVE-2020-17098", "CVE-2020-17103", "CVE-2020-17131", "CVE-2020-17134", "CVE-2020-17136", "CVE-2020-17139", "CVE-2020-17140"], "modified": "2022-12-05T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS20_DEC_4592449.NASL", "href": "https://www.tenable.com/plugins/nessus/143570", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(143570);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/05\");\n\n script_cve_id(\n \"CVE-2020-16958\",\n \"CVE-2020-16959\",\n \"CVE-2020-16960\",\n \"CVE-2020-16961\",\n \"CVE-2020-16962\",\n \"CVE-2020-16963\",\n \"CVE-2020-16964\",\n \"CVE-2020-16996\",\n \"CVE-2020-17092\",\n \"CVE-2020-17094\",\n \"CVE-2020-17095\",\n \"CVE-2020-17096\",\n \"CVE-2020-17097\",\n \"CVE-2020-17098\",\n \"CVE-2020-17103\",\n \"CVE-2020-17131\",\n \"CVE-2020-17134\",\n \"CVE-2020-17136\",\n \"CVE-2020-17139\",\n \"CVE-2020-17140\"\n );\n script_xref(name:\"MSKB\", value:\"4592449\");\n script_xref(name:\"MSFT\", value:\"MS20-4592449\");\n script_xref(name:\"IAVA\", value:\"2020-A-0561-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0562-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0555-S\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2020-0138\");\n\n script_name(english:\"KB4592449: Windows 10 Version 1903 and Windows 10 Version 1909 December 2020 Security Update\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 4592449.\nIt is, therefore, affected by multiple vulnerabilities:\n\n - An elevation of privilege vulnerability. An attacker can\n exploit this to gain elevated privileges.\n (CVE-2020-16958, CVE-2020-16959, CVE-2020-16960,\n CVE-2020-16961, CVE-2020-16962, CVE-2020-16963,\n CVE-2020-16964, CVE-2020-17092, CVE-2020-17097,\n CVE-2020-17103, CVE-2020-17134, CVE-2020-17136)\n\n - A remote code execution vulnerability. An attacker can\n exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2020-17095,\n CVE-2020-17096)\n\n - A security feature bypass vulnerability exists. An\n attacker can exploit this and bypass the security\n feature and perform unauthorized actions compromising\n the integrity of the system/application.\n (CVE-2020-17139)\n\n - An information disclosure vulnerability. An attacker can\n exploit this to disclose potentially sensitive\n information. (CVE-2020-17094, CVE-2020-17098,\n CVE-2020-17140)\");\n # https://support.microsoft.com/en-us/help/4592449/windows-10-update-kb4592449\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?c49efc98\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Cumulative Update KB4592449.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17096\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2020-17095\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = 'MS20-12';\nkbs = make_list('4592449');\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10',\n sp:0,\n os_build:'18362',\n rollup_date:'12_2020',\n bulletin:bulletin,\n rollup_kb_list:[4592449])\n|| \n smb_check_rollup(os:'10',\n sp:0,\n os_build:'18363',\n rollup_date:'12_2020',\n bulletin:bulletin,\n rollup_kb_list:[4592449])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T14:14:14", "description": "The remote Windows host is missing security update 4592446.\nIt is, therefore, affected by multiple vulnerabilities:\n\n - A security feature bypass vulnerability exists. An attacker can exploit this and bypass the security feature and perform unauthorized actions compromising the integrity of the system/application.\n (CVE-2020-17099)\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2020-17095, CVE-2020-17096)\n\n - An elevation of privilege vulnerability. An attacker can exploit this to gain elevated privileges.\n (CVE-2020-16958, CVE-2020-16959, CVE-2020-16960, CVE-2020-16961, CVE-2020-16962, CVE-2020-16963, CVE-2020-16964, CVE-2020-17092, CVE-2020-17097, CVE-2020-17103, CVE-2020-17134, CVE-2020-17136)\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive information. (CVE-2020-17094, CVE-2020-17098, CVE-2020-17140)", "cvss3": {}, "published": "2020-12-08T00:00:00", "type": "nessus", "title": "KB4592446: Windows 10 Version 1803 December 2020 Security Update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-16958", "CVE-2020-16959", "CVE-2020-16960", "CVE-2020-16961", "CVE-2020-16962", "CVE-2020-16963", "CVE-2020-16964", "CVE-2020-17092", "CVE-2020-17094", "CVE-2020-17095", "CVE-2020-17096", "CVE-2020-17097", "CVE-2020-17098", "CVE-2020-17099", "CVE-2020-17103", "CVE-2020-17134", "CVE-2020-17136", "CVE-2020-17140"], "modified": "2022-12-05T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS20_DEC_4592446.NASL", "href": "https://www.tenable.com/plugins/nessus/143571", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(143571);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/05\");\n\n script_cve_id(\n \"CVE-2020-16958\",\n \"CVE-2020-16959\",\n \"CVE-2020-16960\",\n \"CVE-2020-16961\",\n \"CVE-2020-16962\",\n \"CVE-2020-16963\",\n \"CVE-2020-16964\",\n \"CVE-2020-17092\",\n \"CVE-2020-17094\",\n \"CVE-2020-17095\",\n \"CVE-2020-17096\",\n \"CVE-2020-17097\",\n \"CVE-2020-17098\",\n \"CVE-2020-17099\",\n \"CVE-2020-17103\",\n \"CVE-2020-17134\",\n \"CVE-2020-17136\",\n \"CVE-2020-17140\"\n );\n script_xref(name:\"MSKB\", value:\"4592446\");\n script_xref(name:\"MSFT\", value:\"MS20-4592446\");\n script_xref(name:\"IAVA\", value:\"2020-A-0561-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0562-S\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2020-0138\");\n\n script_name(english:\"KB4592446: Windows 10 Version 1803 December 2020 Security Update\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 4592446.\nIt is, therefore, affected by multiple vulnerabilities:\n\n - A security feature bypass vulnerability exists. An\n attacker can exploit this and bypass the security\n feature and perform unauthorized actions compromising\n the integrity of the system/application.\n (CVE-2020-17099)\n\n - A remote code execution vulnerability. An attacker can\n exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2020-17095,\n CVE-2020-17096)\n\n - An elevation of privilege vulnerability. An attacker can\n exploit this to gain elevated privileges.\n (CVE-2020-16958, CVE-2020-16959, CVE-2020-16960,\n CVE-2020-16961, CVE-2020-16962, CVE-2020-16963,\n CVE-2020-16964, CVE-2020-17092, CVE-2020-17097,\n CVE-2020-17103, CVE-2020-17134, CVE-2020-17136)\n\n - An information disclosure vulnerability. An attacker can\n exploit this to disclose potentially sensitive\n information. (CVE-2020-17094, CVE-2020-17098,\n CVE-2020-17140)\");\n # https://support.microsoft.com/en-us/help/4592446/windows-10-update-kb4592446\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?e51f32b6\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Cumulative Update KB4592446.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17096\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2020-17095\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = 'MS20-12';\nkbs = make_list('4592446');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10',\n sp:0,\n os_build:'17134',\n rollup_date:'12_2020',\n bulletin:bulletin,\n rollup_kb_list:[4592446])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:25:47", "description": "The remote Windows host is missing security update 4593226.\nIt is, therefore, affected by multiple vulnerabilities:\n\n - An elevation of privilege vulnerability. An attacker can exploit this to gain elevated privileges.\n (CVE-2020-16958, CVE-2020-16959, CVE-2020-16960, CVE-2020-16961, CVE-2020-16962, CVE-2020-16963, CVE-2020-16964, CVE-2020-17092, CVE-2020-17097)\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2020-17095, CVE-2020-17096)\n\n - A security feature bypass vulnerability exists. An attacker can exploit this and bypass the security feature and perform unauthorized actions compromising the integrity of the system/application.\n (CVE-2020-16996, CVE-2020-17099)\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive information. (CVE-2020-17098, CVE-2020-17138, CVE-2020-17140)", "cvss3": {}, "published": "2020-12-08T00:00:00", "type": "nessus", "title": "KB4593226: Windows 10 Version 1607 and Windows Server 2016 December 2020 Security Update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-16958", "CVE-2020-16959", "CVE-2020-16960", "CVE-2020-16961", "CVE-2020-16962", "CVE-2020-16963", "CVE-2020-16964", "CVE-2020-16996", "CVE-2020-17092", "CVE-2020-17095", "CVE-2020-17096", "CVE-2020-17097", "CVE-2020-17098", "CVE-2020-17099", "CVE-2020-17138", "CVE-2020-17140"], "modified": "2022-12-05T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS20_DEC_4586830.NASL", "href": "https://www.tenable.com/plugins/nessus/143569", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(143569);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/05\");\n\n script_cve_id(\n \"CVE-2020-16958\",\n \"CVE-2020-16959\",\n \"CVE-2020-16960\",\n \"CVE-2020-16961\",\n \"CVE-2020-16962\",\n \"CVE-2020-16963\",\n \"CVE-2020-16964\",\n \"CVE-2020-16996\",\n \"CVE-2020-17092\",\n \"CVE-2020-17095\",\n \"CVE-2020-17096\",\n \"CVE-2020-17097\",\n \"CVE-2020-17098\",\n \"CVE-2020-17099\",\n \"CVE-2020-17138\",\n \"CVE-2020-17140\"\n );\n script_xref(name:\"MSKB\", value:\"4593226\");\n script_xref(name:\"MSFT\", value:\"MS20-4593226\");\n script_xref(name:\"IAVA\", value:\"2020-A-0561-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0562-S\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2020-0138\");\n\n script_name(english:\"KB4593226: Windows 10 Version 1607 and Windows Server 2016 December 2020 Security Update\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 4593226.\nIt is, therefore, affected by multiple vulnerabilities:\n\n - An elevation of privilege vulnerability. An attacker can\n exploit this to gain elevated privileges.\n (CVE-2020-16958, CVE-2020-16959, CVE-2020-16960,\n CVE-2020-16961, CVE-2020-16962, CVE-2020-16963,\n CVE-2020-16964, CVE-2020-17092, CVE-2020-17097)\n\n - A remote code execution vulnerability. An attacker can\n exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2020-17095,\n CVE-2020-17096)\n\n - A security feature bypass vulnerability exists. An\n attacker can exploit this and bypass the security\n feature and perform unauthorized actions compromising\n the integrity of the system/application.\n (CVE-2020-16996, CVE-2020-17099)\n\n - An information disclosure vulnerability. An attacker can\n exploit this to disclose potentially sensitive\n information. (CVE-2020-17098, CVE-2020-17138,\n CVE-2020-17140)\");\n # https://support.microsoft.com/en-us/help/4593226/windows-10-update-kb4593226\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?779e1d95\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Cumulative Update KB4586830.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:S/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"manual\");\n script_set_attribute(attribute:\"cvss_score_rationale\", value:\"Score based on analysis of the vendor advisory.\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = 'MS20-12';\nkbs = make_list('4593226');\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10',\n sp:0,\n os_build:'14393',\n rollup_date:'12_2020',\n bulletin:bulletin,\n rollup_kb_list:[4593226])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:25:34", "description": "The remote Windows host is missing security update 4592464.\nIt is, therefore, affected by multiple vulnerabilities:\n\n - A security feature bypass vulnerability exists. An attacker can exploit this and bypass the security feature and perform unauthorized actions compromising the integrity of the system/application.\n (CVE-2020-17099)\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive information. (CVE-2020-17098, CVE-2020-17140)\n\n - An elevation of privilege vulnerability. An attacker can exploit this to gain elevated privileges.\n (CVE-2020-16958, CVE-2020-16959, CVE-2020-16960, CVE-2020-16961, CVE-2020-16962, CVE-2020-16963, CVE-2020-16964, CVE-2020-17092, CVE-2020-17097)\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2020-17096)", "cvss3": {}, "published": "2020-12-08T00:00:00", "type": "nessus", "title": "KB4592464: Windows 10 December 2020 Security Update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-16958", "CVE-2020-16959", "CVE-2020-16960", "CVE-2020-16961", "CVE-2020-16962", "CVE-2020-16963", "CVE-2020-16964", "CVE-2020-17092", "CVE-2020-17096", "CVE-2020-17097", "CVE-2020-17098", "CVE-2020-17099", "CVE-2020-17140"], "modified": "2022-12-05T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS20_DEC_4592464.NASL", "href": "https://www.tenable.com/plugins/nessus/143565", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(143565);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/05\");\n\n script_cve_id(\n \"CVE-2020-16958\",\n \"CVE-2020-16959\",\n \"CVE-2020-16960\",\n \"CVE-2020-16961\",\n \"CVE-2020-16962\",\n \"CVE-2020-16963\",\n \"CVE-2020-16964\",\n \"CVE-2020-17092\",\n \"CVE-2020-17096\",\n \"CVE-2020-17097\",\n \"CVE-2020-17098\",\n \"CVE-2020-17099\",\n \"CVE-2020-17140\"\n );\n script_xref(name:\"MSKB\", value:\"4592464\");\n script_xref(name:\"MSFT\", value:\"MS20-4592464\");\n script_xref(name:\"IAVA\", value:\"2020-A-0561-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0562-S\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2020-0138\");\n\n script_name(english:\"KB4592464: Windows 10 December 2020 Security Update\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 4592464.\nIt is, therefore, affected by multiple vulnerabilities:\n\n - A security feature bypass vulnerability exists. An\n attacker can exploit this and bypass the security\n feature and perform unauthorized actions compromising\n the integrity of the system/application.\n (CVE-2020-17099)\n\n - An information disclosure vulnerability. An attacker can\n exploit this to disclose potentially sensitive\n information. (CVE-2020-17098, CVE-2020-17140)\n\n - An elevation of privilege vulnerability. An attacker can\n exploit this to gain elevated privileges.\n (CVE-2020-16958, CVE-2020-16959, CVE-2020-16960,\n CVE-2020-16961, CVE-2020-16962, CVE-2020-16963,\n CVE-2020-16964, CVE-2020-17092, CVE-2020-17097)\n\n - A remote code execution vulnerability. An attacker can\n exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2020-17096)\");\n # https://support.microsoft.com/en-us/help/4592464/windows-10-update-kb4592464\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?3feae7ab\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Cumulative Update KB4592464.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17096\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = 'MS20-12';\nkbs = make_list('4592464');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10',\n sp:0,\n os_build:'10240',\n rollup_date:'12_2020',\n bulletin:bulletin,\n rollup_kb_list:[4592464])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:25:47", "description": "The remote Windows host is missing security update 4592503 or cumulative update 4592471. It is, therefore, affected by multiple vulnerabilities:\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive information. (CVE-2020-17098, CVE-2020-17140)\n\n - An elevation of privilege vulnerability. An attacker can exploit this to gain elevated privileges.\n (CVE-2020-16958, CVE-2020-16959, CVE-2020-16960, CVE-2020-16961, CVE-2020-16962, CVE-2020-16963, CVE-2020-16964)", "cvss3": {}, "published": "2020-12-08T00:00:00", "type": "nessus", "title": "KB4592503: Windows 7 and Windows Server 2008 R2 December 2020 Security Update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-16958", "CVE-2020-16959", "CVE-2020-16960", "CVE-2020-16961", "CVE-2020-16962", "CVE-2020-16963", "CVE-2020-16964", "CVE-2020-17098", "CVE-2020-17140"], "modified": "2021-06-03T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS20_DEC_4592471.NASL", "href": "https://www.tenable.com/plugins/nessus/143572", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(143572);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/06/03\");\n\n script_cve_id(\n \"CVE-2020-16958\",\n \"CVE-2020-16959\",\n \"CVE-2020-16960\",\n \"CVE-2020-16961\",\n \"CVE-2020-16962\",\n \"CVE-2020-16963\",\n \"CVE-2020-16964\",\n \"CVE-2020-17098\",\n \"CVE-2020-17140\"\n );\n script_xref(name:\"MSKB\", value:\"4592471\");\n script_xref(name:\"MSKB\", value:\"4592503\");\n script_xref(name:\"MSFT\", value:\"MS20-4592471\");\n script_xref(name:\"MSFT\", value:\"MS20-4592503\");\n script_xref(name:\"IAVA\", value:\"2020-A-0561-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0562-S\");\n\n script_name(english:\"KB4592503: Windows 7 and Windows Server 2008 R2 December 2020 Security Update\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 4592503\nor cumulative update 4592471. It is, therefore, affected by\nmultiple vulnerabilities:\n\n - An information disclosure vulnerability. An attacker can\n exploit this to disclose potentially sensitive\n information. (CVE-2020-17098, CVE-2020-17140)\n\n - An elevation of privilege vulnerability. An attacker can\n exploit this to gain elevated privileges.\n (CVE-2020-16958, CVE-2020-16959, CVE-2020-16960,\n CVE-2020-16961, CVE-2020-16962, CVE-2020-16963,\n CVE-2020-16964)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/4592471/windows-7-update\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/4592503/windows-7-update\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Only update KB4592503 or Cumulative Update KB4592471.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-16964\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = 'MS20-12';\nkbs = make_list('4592471', '4592503');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win7:'1') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'6.1',\n sp:1,\n rollup_date:'12_2020',\n bulletin:bulletin,\n rollup_kb_list:[4592471, 4592503])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:26:11", "description": "The Microsoft Excel Products are missing security updates.\nIt is, therefore, affected by multiple vulnerabilities:\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2020-17123, CVE-2020-17125, CVE-2020-17127, CVE-2020-17128, CVE-2020-17129)\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive information. (CVE-2020-17126)\n\n - A security feature bypass vulnerability exists. An attacker can exploit this and bypass the security feature and perform unauthorized actions compromising the integrity of the system/application.\n (CVE-2020-17130)", "cvss3": {}, "published": "2020-12-08T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Excel Products (December 2020)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-17123", "CVE-2020-17125", "CVE-2020-17126", "CVE-2020-17127", "CVE-2020-17128", "CVE-2020-17129", "CVE-2020-17130"], "modified": "2022-12-05T00:00:00", "cpe": ["cpe:/a:microsoft:excel"], "id": "SMB_NT_MS20_DEC_EXCEL.NASL", "href": "https://www.tenable.com/plugins/nessus/143564", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(143564);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/05\");\n\n script_cve_id(\n \"CVE-2020-17123\",\n \"CVE-2020-17125\",\n \"CVE-2020-17126\",\n \"CVE-2020-17127\",\n \"CVE-2020-17128\",\n \"CVE-2020-17129\",\n \"CVE-2020-17130\"\n );\n script_xref(name:\"MSKB\", value:\"4493148\");\n script_xref(name:\"MSKB\", value:\"4493139\");\n script_xref(name:\"MSKB\", value:\"4486754\");\n script_xref(name:\"MSFT\", value:\"MS20-4493148\");\n script_xref(name:\"MSFT\", value:\"MS20-4493139\");\n script_xref(name:\"MSFT\", value:\"MS20-4486754\");\n script_xref(name:\"IAVA\", value:\"2020-A-0556-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0017-S\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2020-0138\");\n\n script_name(english:\"Security Updates for Microsoft Excel Products (December 2020)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Excel Products are affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Excel Products are missing security updates.\nIt is, therefore, affected by multiple vulnerabilities:\n\n - A remote code execution vulnerability. An attacker can\n exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2020-17123,\n CVE-2020-17125, CVE-2020-17127, CVE-2020-17128,\n CVE-2020-17129)\n\n - An information disclosure vulnerability. An attacker can\n exploit this to disclose potentially sensitive\n information. (CVE-2020-17126)\n\n - A security feature bypass vulnerability exists. An\n attacker can exploit this and bypass the security\n feature and perform unauthorized actions compromising\n the integrity of the system/application.\n (CVE-2020-17130)\");\n # https://support.microsoft.com/en-us/help/4493148/security-update-for-excel-2010-december-8-2020\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?68d763c5\");\n # https://support.microsoft.com/en-us/help/4486754/security-update-for-excel-2016-december-8-2020\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?64d44384\");\n # https://support.microsoft.com/en-us/help/4493139/security-update-for-excel-2013-december-8-2020\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?7ded81b7\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue: \n -KB4493148\n -KB4486754\n -KB4493139\n\nFor Office 365, Office 2016 C2R, or Office 2019, ensure automatic\nupdates are enabled or open any office app and manually perform an\nupdate.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17123\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:excel\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"office_installed.nasl\", \"microsoft_office_compatibility_pack_installed.nbin\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\ninclude('install_func.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS20-12';\n\nkbs = make_list(\n 'kb4493148', //14\n 'kb4493139', //15\n 'kb4486754' //16\n);\n\nif (get_kb_item('Host/patch_management_checks'))\n hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated', exit_code:1);\n\nport = kb_smb_transport();\n\nchecks = make_array(\n '14.0', make_array('sp', 2, 'version', '14.0.7263.5000', 'kb', '4493148'),\n '15.0', make_array('sp', 1, 'version', '15.0.5301.1000', 'kb', '4493139'),\n '16.0', make_nested_list(make_array('sp', 0, 'version', '16.0.5095.1000', 'channel', 'MSI', 'kb', '4486754')\n )\n);\n\nif (hotfix_check_office_product(product:'Excel', checks:checks, bulletin:bulletin))\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-17T18:30:46", "description": "The Microsoft Excel Products are missing security updates.\nIt is, therefore, affected by multiple vulnerabilities:\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2020-17123, CVE-2020-17125, CVE-2020-17127, CVE-2020-17128, CVE-2020-17129)\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive information. (CVE-2020-17126)\n\n - A security feature bypass vulnerability exists. An attacker can exploit this and bypass the security feature and perform unauthorized actions compromising the integrity of the system/application.\n (CVE-2020-17130)", "cvss3": {}, "published": "2022-06-10T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Excel Products C2R (December 2020)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-17123", "CVE-2020-17125", "CVE-2020-17126", "CVE-2020-17127", "CVE-2020-17128", "CVE-2020-17129", "CVE-2020-17130"], "modified": "2022-12-14T00:00:00", "cpe": ["cpe:/a:microsoft:excel"], "id": "SMB_NT_MS20_DEC_EXCEL_C2R.NASL", "href": "https://www.tenable.com/plugins/nessus/162119", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(162119);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/14\");\n\n script_cve_id(\n \"CVE-2020-17123\",\n \"CVE-2020-17125\",\n \"CVE-2020-17126\",\n \"CVE-2020-17127\",\n \"CVE-2020-17128\",\n \"CVE-2020-17129\",\n \"CVE-2020-17130\"\n );\n script_xref(name:\"IAVA\", value:\"2020-A-0556-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0017-S\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2020-0138\");\n\n script_name(english:\"Security Updates for Microsoft Excel Products C2R (December 2020)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Excel Products are affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Excel Products are missing security updates.\nIt is, therefore, affected by multiple vulnerabilities:\n\n - A remote code execution vulnerability. An attacker can\n exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2020-17123,\n CVE-2020-17125, CVE-2020-17127, CVE-2020-17128,\n CVE-2020-17129)\n\n - An information disclosure vulnerability. An attacker can\n exploit this to disclose potentially sensitive\n information. (CVE-2020-17126)\n\n - A security feature bypass vulnerability exists. An\n attacker can exploit this and bypass the security\n feature and perform unauthorized actions compromising\n the integrity of the system/application.\n (CVE-2020-17130)\");\n # https://docs.microsoft.com/en-us/officeupdates/update-history-microsoft365-apps-by-date\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?fd4508ff\");\n script_set_attribute(attribute:\"solution\", value:\n\"For Office 365, Office 2016 C2R, or Office 2019, ensure automatic\nupdates are enabled or open any office app and manually perform an\nupdate.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17123\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/06/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:excel\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"office_installed.nasl\", \"microsoft_office_compatibility_pack_installed.nbin\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('vcf_extras_office.inc');\n\nvar bulletin = 'MS20-12';\n\nvar constraints = [\n {'fixed_version':'16.0.12527.21416','channel': 'Microsoft 365 Apps on Windows 7'},\n {'fixed_version':'16.0.12527.21416','channel': 'Deferred','channel_version': '2002'},\n {'fixed_version':'16.0.11929.20984','channel': 'Deferred'},\n {'fixed_version':'16.0.13328.20478','channel': 'Enterprise Deferred','channel_version': '2010'},\n {'fixed_version':'16.0.13231.20620','channel': 'Enterprise Deferred'},\n {'fixed_version':'16.0.13127.20910','channel': 'First Release for Deferred'},\n {'fixed_version':'16.0.13426.20332','channel': '2016 Retail'},\n {'fixed_version':'16.0.13426.20332','channel': 'Current'},\n {'fixed_version':'16.0.13426.20332','channel': '2019 Retail'},\n {'fixed_version':'16.0.10369.20032','channel': '2019 Volume'}\n];\n\nvcf::microsoft::office_product::check_version_and_report(\n constraints:constraints,\n severity:SECURITY_HOLE,\n bulletin:bulletin,\n subproduct:'Excel'\n);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:25:55", "description": "The Microsoft SharePoint Server 2010 installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities :\n\n - An elevation of privilege vulnerability. An attacker can exploit this to gain elevated privileges.\n (CVE-2020-17089)\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive information. (CVE-2020-17120)\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2020-17118, CVE-2020-17121, CVE-2020-17122)\n\n - A session spoofing vulnerability exists. An attacker can exploit this to perform actions with the privileges of another user. (CVE-2020-17115)", "cvss3": {}, "published": "2020-12-10T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft SharePoint Server 2010 (December 2020)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-17089", "CVE-2020-17115", "CVE-2020-17118", "CVE-2020-17120", "CVE-2020-17121", "CVE-2020-17122"], "modified": "2022-12-05T00:00:00", "cpe": ["cpe:/a:microsoft:sharepoint_server", "cpe:/a:microsoft:sharepoint_foundation"], "id": "SMB_NT_MS20_DEC_OFFICE_SHAREPOINT_2010.NASL", "href": "https://www.tenable.com/plugins/nessus/144058", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(144058);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/05\");\n\n script_cve_id(\n \"CVE-2020-17089\",\n \"CVE-2020-17115\",\n \"CVE-2020-17118\",\n \"CVE-2020-17120\",\n \"CVE-2020-17121\",\n \"CVE-2020-17122\"\n );\n script_xref(name:\"MSKB\", value:\"4493149\");\n script_xref(name:\"MSKB\", value:\"4486697\");\n script_xref(name:\"MSFT\", value:\"MS20-4493149\");\n script_xref(name:\"MSFT\", value:\"MS20-4486697\");\n script_xref(name:\"IAVA\", value:\"2020-A-0560-S\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2020-0138\");\n\n script_name(english:\"Security Updates for Microsoft SharePoint Server 2010 (December 2020)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft SharePoint Server 2010 installation on the remote host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft SharePoint Server 2010 installation on the\nremote host is missing security updates. It is, therefore,\naffected by multiple vulnerabilities :\n\n - An elevation of privilege vulnerability. An attacker can\n exploit this to gain elevated privileges.\n (CVE-2020-17089)\n\n - An information disclosure vulnerability. An attacker can\n exploit this to disclose potentially sensitive\n information. (CVE-2020-17120)\n\n - A remote code execution vulnerability. An attacker can\n exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2020-17118,\n CVE-2020-17121, CVE-2020-17122)\n\n - A session spoofing vulnerability exists. An attacker can\n exploit this to perform actions with the privileges of\n another user. (CVE-2020-17115)\");\n # https://support.microsoft.com/en-us/help/4493149/security-update-for-sharepoint-foundation-2010-dec-8-2020\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?ec272826\");\n # https://support.microsoft.com/en-us/help/4486697/security-update-for-sharepoint-server-2010-december-8-2020\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?d938e849\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue: \n -KB4493149\n -KB4486697\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17118\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:sharepoint_server\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:sharepoint_foundation\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"microsoft_sharepoint_installed.nbin\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\ninclude('install_func.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS20-12';\n\nkbs = make_list(\n '4493149',\n '4486697'\n );\n\nif (get_kb_item('Host/patch_management_checks'))\n hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated', exit_code:1);\n\n# Get path information for Windows.\nwindir = hotfix_get_systemroot();\nif (isnull(windir)) exit(1, 'Failed to determine the location of %windir%.');\n\nregistry_init();\n\ninstall = get_single_install(app_name:'Microsoft SharePoint Server');\n\nkb_checks =\n{\n '2010':\n { '2': \n {'Foundation':\n [{\n 'kb' : '4486697',\n 'path' : hotfix_get_commonfilesdir(),\n 'append' : 'microsoft shared\\\\web server extensions\\\\14\\\\bin',\n 'file' : 'onetutil.dll',\n 'version' : '14.0.7263.5000',\n 'product_name' : 'Microsoft SharePoint Foundation Server 2010 SP 2'\n }],\n 'Server':\n [{\n 'kb' : '4493149',\n 'path' : install['path'],\n 'append' : 'webservices\\\\wordserver\\\\core',\n 'file' : 'msoserver.dll',\n 'version' : '14.0.7263.5000',\n 'product_name' : 'Microsoft SharePoint Enterprise Server 2010 SP 2'\n }]\n }\n }\n};\n\n# Get the specific product / path\nparam_list = kb_checks[install['Product']][install['SP']][install['Edition']];\n# audit if not affected\nif(isnull(param_list)) audit(AUDIT_INST_VER_NOT_VULN, 'Microsoft SharePoint Server');\nvuln = FALSE;\nxss = FALSE;\nport = kb_smb_transport();\n# grab the path otherwise\nforeach check (param_list)\n{\n if (!isnull(check['version']))\n {\n path = hotfix_append_path(path:check['path'], value:check['append']);\n are_we_vuln = hotfix_check_fversion(\n file:check['file'],\n version:check['version'],\n path:path,\n kb:check['kb'],\n product:check['product_name']\n );\n }\n else\n {\n report = '\\n';\n if (check['product_name'])\n report += ' Product : ' + check['product_name'] + '\\n';\n if (check['kb'])\n report += ' KB : ' + check['kb'] + '\\n';\n hotfix_add_report(report, kb:check['kb']);\n }\n\n if(are_we_vuln == HCF_OLDER) vuln = TRUE;\n\n}\nif (vuln)\n{\n port = kb_smb_transport();\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:25:34", "description": "The remote Windows host is missing security update 4592495 or cumulative update 4592484. It is, therefore, affected by multiple vulnerabilities:\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive information. (CVE-2020-17098, CVE-2020-17140)\n\n - A security feature bypass vulnerability exists. An attacker can exploit this and bypass the security feature and perform unauthorized actions compromising the integrity of the system/application.\n (CVE-2020-16996)\n\n - An elevation of privilege vulnerability. An attacker can exploit this to gain elevated privileges.\n (CVE-2020-17092, CVE-2020-17097)\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2020-17096)", "cvss3": {}, "published": "2020-12-08T00:00:00", "type": "nessus", "title": "KB4592495: Windows 8.1 and Windows Server 2012 R2 December 2020 Security Update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-16996", "CVE-2020-17092", "CVE-2020-17096", "CVE-2020-17097", "CVE-2020-17098", "CVE-2020-17140"], "modified": "2022-12-05T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS20_DEC_4592484.NASL", "href": "https://www.tenable.com/plugins/nessus/143560", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(143560);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/05\");\n\n script_cve_id(\n \"CVE-2020-16996\",\n \"CVE-2020-17092\",\n \"CVE-2020-17096\",\n \"CVE-2020-17097\",\n \"CVE-2020-17098\",\n \"CVE-2020-17140\"\n );\n script_xref(name:\"MSKB\", value:\"4592495\");\n script_xref(name:\"MSKB\", value:\"4592484\");\n script_xref(name:\"MSFT\", value:\"MS20-4592495\");\n script_xref(name:\"MSFT\", value:\"MS20-4592484\");\n script_xref(name:\"IAVA\", value:\"2020-A-0561-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0562-S\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2020-0138\");\n\n script_name(english:\"KB4592495: Windows 8.1 and Windows Server 2012 R2 December 2020 Security Update\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 4592495\nor cumulative update 4592484. It is, therefore, affected by\nmultiple vulnerabilities:\n\n - An information disclosure vulnerability. An attacker can\n exploit this to disclose potentially sensitive\n information. (CVE-2020-17098, CVE-2020-17140)\n\n - A security feature bypass vulnerability exists. An\n attacker can exploit this and bypass the security\n feature and perform unauthorized actions compromising\n the integrity of the system/application.\n (CVE-2020-16996)\n\n - An elevation of privilege vulnerability. An attacker can\n exploit this to gain elevated privileges.\n (CVE-2020-17092, CVE-2020-17097)\n\n - A remote code execution vulnerability. An attacker can\n exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2020-17096)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/4592495/windows-8-1-update\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/4592484/windows-8-1-update\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Only update KB4592495 or Cumulative Update KB4592484.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17096\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS20-12';\nkbs = make_list('4592495', '4592484');\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win81:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\n# Windows 8 EOL\nproductname = get_kb_item_or_exit('SMB/ProductName', exit_code:1);\nif ('Windows 8' >< productname && '8.1' >!< productname)\n audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'6.3',\n sp:0,\n rollup_date:'12_2020',\n bulletin:bulletin,\n rollup_kb_list:[4592495, 4592484])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T14:13:35", "description": "The remote Windows host is missing security update 4592497 or cumulative update 4592468. It is, therefore, affected by multiple vulnerabilities:\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive information. (CVE-2020-17098, CVE-2020-17140)\n\n - A security feature bypass vulnerability exists. An attacker can exploit this and bypass the security feature and perform unauthorized actions compromising the integrity of the system/application.\n (CVE-2020-16996)\n\n - An elevation of privilege vulnerability. An attacker can exploit this to gain elevated privileges.\n (CVE-2020-17092, CVE-2020-17097)\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2020-17096)", "cvss3": {}, "published": "2020-12-08T00:00:00", "type": "nessus", "title": "KB4592497: Windows Server 2012 December 2020 Security Update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-16996", "CVE-2020-17092", "CVE-2020-17096", "CVE-2020-17097", "CVE-2020-17098", "CVE-2020-17140"], "modified": "2022-12-05T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS20_DEC_4592468.NASL", "href": "https://www.tenable.com/plugins/nessus/143559", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(143559);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/05\");\n\n script_cve_id(\n \"CVE-2020-16996\",\n \"CVE-2020-17092\",\n \"CVE-2020-17096\",\n \"CVE-2020-17097\",\n \"CVE-2020-17098\",\n \"CVE-2020-17140\"\n );\n script_xref(name:\"MSKB\", value:\"4592497\");\n script_xref(name:\"MSKB\", value:\"4592468\");\n script_xref(name:\"MSFT\", value:\"MS20-4592497\");\n script_xref(name:\"MSFT\", value:\"MS20-4592468\");\n script_xref(name:\"IAVA\", value:\"2020-A-0561-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0562-S\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2020-0138\");\n\n script_name(english:\"KB4592497: Windows Server 2012 December 2020 Security Update\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 4592497\nor cumulative update 4592468. It is, therefore, affected by\nmultiple vulnerabilities:\n\n - An information disclosure vulnerability. An attacker can\n exploit this to disclose potentially sensitive\n information. (CVE-2020-17098, CVE-2020-17140)\n\n - A security feature bypass vulnerability exists. An\n attacker can exploit this and bypass the security\n feature and perform unauthorized actions compromising\n the integrity of the system/application.\n (CVE-2020-16996)\n\n - An elevation of privilege vulnerability. An attacker can\n exploit this to gain elevated privileges.\n (CVE-2020-17092, CVE-2020-17097)\n\n - A remote code execution vulnerability. An attacker can\n exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2020-17096)\");\n # https://support.microsoft.com/en-us/help/4592497/windows-server-2012-update\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?d639ba48\");\n # https://support.microsoft.com/en-us/help/4592468/windows-server-2012-update\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?d79ac842\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Only update KB4592497 or Cumulative Update KB4592468.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17096\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = 'MS20-12';\nkbs = make_list('4592497', '4592468');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win8:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\n# Windows 8 EOL\nproductname = get_kb_item_or_exit('SMB/ProductName', exit_code:1);\nif ('Windows 8' >< productname) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'6.2',\n sp:0,\n rollup_date:'12_2020',\n bulletin:bulletin,\n rollup_kb_list:[4592497, 4592468])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:25:47", "description": "The Microsoft Office Online Server or Microsoft Office Web Apps installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities :\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2020-17122, CVE-2020-17123, CVE-2020-17125, CVE-2020-17128, CVE-2020-17129)\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive information. (CVE-2020-17126)", "cvss3": {}, "published": "2020-12-08T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Office Online Server and Microsoft Office Web Apps (December 2020)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-17122", "CVE-2020-17123", "CVE-2020-17125", "CVE-2020-17126", "CVE-2020-17128", "CVE-2020-17129"], "modified": "2022-12-05T00:00:00", "cpe": ["cpe:/a:microsoft:office_online_server", "cpe:/a:microsoft:office_web_apps"], "id": "SMB_NT_MS20_DEC_OFFICE_WEB.NASL", "href": "https://www.tenable.com/plugins/nessus/143556", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(143556);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/05\");\n\n script_cve_id(\n \"CVE-2020-17122\",\n \"CVE-2020-17123\",\n \"CVE-2020-17125\",\n \"CVE-2020-17126\",\n \"CVE-2020-17128\",\n \"CVE-2020-17129\"\n );\n script_xref(name:\"MSKB\", value:\"4486750\");\n script_xref(name:\"MSKB\", value:\"4486760\");\n script_xref(name:\"MSKB\", value:\"4486704\");\n script_xref(name:\"MSFT\", value:\"MS20-4486750\");\n script_xref(name:\"MSFT\", value:\"MS20-4486760\");\n script_xref(name:\"MSFT\", value:\"MS20-4486704\");\n script_xref(name:\"IAVA\", value:\"2021-A-0017-S\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2020-0138\");\n\n script_name(english:\"Security Updates for Microsoft Office Online Server and Microsoft Office Web Apps (December 2020)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Office Online Server or Microsoft Office Web Apps installation on the remote host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Office Online Server or Microsoft Office Web\nApps installation on the remote host is missing security\nupdates. It is, therefore, affected by multiple\nvulnerabilities :\n\n - A remote code execution vulnerability. An attacker can\n exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2020-17122,\n CVE-2020-17123, CVE-2020-17125, CVE-2020-17128,\n CVE-2020-17129)\n\n - An information disclosure vulnerability. An attacker can\n exploit this to disclose potentially sensitive\n information. (CVE-2020-17126)\");\n # https://support.microsoft.com/en-us/help/4486750/security-update-for-office-online-server-december-8-2020\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?69a90119\");\n # https://support.microsoft.com/en-us/help/4486760/security-update-for-office-web-apps-server-2013-dec-8-2020\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?c437eece\");\n # https://support.microsoft.com/en-us/help/4486704/security-update-for-sharepoint-server-2010-office-web-apps-dec-8-2020\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?d1ad1c4f\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue: \n -KB4486750\n -KB4486760\n -KB4486704\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17129\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:office_online_server\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:office_web_apps\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"office_installed.nasl\", \"microsoft_owa_installed.nbin\", \"microsoft_office_compatibility_pack_installed.nbin\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('install_func.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS20-12';\nkbs = make_list('4486704', '4486750', '4486760');\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated', exit_code:1);\n\nport = kb_smb_transport();\n\n# Get installs of Office Web Apps\nowa_installs = get_installs(app_name:'Microsoft Office Web Apps');\n\nif (!empty_or_null(owa_installs))\n{\n foreach owa_install (owa_installs[1])\n {\n if (owa_install['Product'] == '2010')\n {\n owa_2010_path = owa_install['path'];\n owa_2010_sp = owa_install['SP'];\n }\n if (owa_install['Product'] == '2013')\n {\n owa_2013_path = owa_install['path'];\n owa_2013_sp = owa_install['SP'];\n }\n else if (owa_install['Product'] == '2016')\n {\n oos_path = owa_install['path'];\n oos_sp = owa_install['SP'];\n }\n }\n}\nvuln = FALSE;\n\n####################################################################\n# Office Web Apps 2010 SP2\n####################################################################\nif (owa_2010_path && (!isnull(owa_2010_sp) && owa_2010_sp == '2'))\n{\n path = hotfix_append_path(path:owa_2010_path, value:'14.0\\\\WebServices\\\\ConversionService\\\\Bin\\\\Converter');\n if (hotfix_check_fversion(file:'sword.dll', version:'14.0.7262.5000', min_version:'14.0.0.0', path:path, kb:'4486704', product:'Office Web Apps 2010') == HCF_OLDER)\n vuln = TRUE;\n}\n\n####################################################################\n# Office Web Apps 2013 SP1\n####################################################################\nif (owa_2013_path && (!isnull(owa_2013_sp) && owa_2013_sp == '1'))\n{\n path = hotfix_append_path(path:owa_2013_path, value:'WordConversionService\\\\bin\\\\Converter');\n if (hotfix_check_fversion(file:'sword.dll', version:'15.0.5301.1000', min_version:'15.0.0.0', path:path, kb:'4486760', product:'Office Web Apps 2013') == HCF_OLDER)\n vuln = TRUE;\n}\n\n####################################################################\n# Office Online Server\n####################################################################\nif (oos_path && (!isnull(oos_sp) && oos_sp == '0'))\n{\n path = hotfix_append_path(path:oos_path, value:'WordConversionService\\\\bin\\\\Converter');\n if (hotfix_check_fversion(file:'sword.dll', version:'16.0.10369.20000', min_version:'16.0.0.0', path:path, kb:'4486750', product:'Office Online Server') == HCF_OLDER)\n vuln = TRUE;\n}\n\nif (vuln)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:25:55", "description": "The Microsoft SharePoint Server 2013 installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities :\n\n - An elevation of privilege vulnerability. An attacker can exploit this to gain elevated privileges.\n (CVE-2020-17089)\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2020-17118, CVE-2020-17121)\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive information. (CVE-2020-17120)\n\n - A session spoofing vulnerability exists. An attacker can exploit this to perform actions with the privileges of another user. (CVE-2020-17115)", "cvss3": {}, "published": "2020-12-10T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft SharePoint Server 2013 (December 2020)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-17089", "CVE-2020-17115", "CVE-2020-17118", "CVE-2020-17120", "CVE-2020-17121"], "modified": "2022-12-05T00:00:00", "cpe": ["cpe:/a:microsoft:sharepoint_foundation", "cpe:/a:microsoft:sharepoint_server"], "id": "SMB_NT_MS20_DEC_OFFICE_SHAREPOINT_2013.NASL", "href": "https://www.tenable.com/plugins/nessus/144057", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(144057);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/05\");\n\n script_cve_id(\n \"CVE-2020-17089\",\n \"CVE-2020-17115\",\n \"CVE-2020-17118\",\n \"CVE-2020-17120\",\n \"CVE-2020-17121\"\n );\n script_xref(name:\"MSKB\", value:\"4486696\");\n script_xref(name:\"MSKB\", value:\"4493138\");\n script_xref(name:\"MSKB\", value:\"4493231\");\n script_xref(name:\"MSFT\", value:\"MS20-4486696\");\n script_xref(name:\"MSFT\", value:\"MS20-4493138\");\n script_xref(name:\"MSFT\", value:\"MS20-4493231\");\n script_xref(name:\"IAVA\", value:\"2020-A-0560-S\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2020-0138\");\n\n script_name(english:\"Security Updates for Microsoft SharePoint Server 2013 (December 2020)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft SharePoint Server 2013 installation on the remote host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft SharePoint Server 2013 installation on the\nremote host is missing security updates. It is, therefore,\naffected by multiple vulnerabilities :\n\n - An elevation of privilege vulnerability. An attacker can\n exploit this to gain elevated privileges.\n (CVE-2020-17089)\n\n - A remote code execution vulnerability. An attacker can\n exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2020-17118,\n CVE-2020-17121)\n\n - An information disclosure vulnerability. An attacker can\n exploit this to disclose potentially sensitive\n information. (CVE-2020-17120)\n\n - A session spoofing vulnerability exists. An attacker can\n exploit this to perform actions with the privileges of\n another user. (CVE-2020-17115)\");\n # https://support.microsoft.com/en-us/help/4486696/security-update-for-sharepoint-foundation-2013-dec-8-2020\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?825b878e\");\n # https://support.microsoft.com/en-us/help/4493138/security-update-for-sharepoint-foundation-2013-dec-8-2020\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?80118cc6\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue: \n -KB4486696\n -KB4493138\n -KB4493231\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17118\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:sharepoint_foundation\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:sharepoint_server\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"microsoft_sharepoint_installed.nbin\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\ninclude('install_func.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS20-12';\n\nkbs = make_list(\n '4486696',\n '4493138',\n '4493231'\n);\n\nif (get_kb_item('Host/patch_management_checks'))\n hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated', exit_code:1);\n\n# Get path information for Windows.\nwindir = hotfix_get_systemroot();\nif (isnull(windir)) exit(1, 'Failed to determine the location of %windir%.');\n\nregistry_init();\napp_name = 'Microsoft SharePoint Server';\ninstall = get_single_install(app_name:app_name);\n\nkb_checks =\n{\n '2013':\n { '1':\n {'Foundation':\n [{\n 'kb' : '4493138',\n 'path' : hotfix_get_commonfilesdir(),\n 'append' : 'microsoft shared\\\\web server extensions\\\\15\\\\bin',\n 'file' : 'onetutil.dll',\n 'version' : '15.0.5301.1000',\n 'product_name' : 'Microsoft SharePoint Foundation Server 2013 SP1'\n },\n {\n 'kb' : '4486696',\n #'path' : hotfix_get_commonfilesdir(),\n #'append' : 'microsoft shared\\\\web server extensions\\\\15\\\\bin',\n #'file' : 'onetutil.dll',\n #'version' : '15.0.5301.1000',\n 'product_name' : 'Microsoft SharePoint Foundation Server 2013 SP1'\n },\n { #Commented out for ease of adding in later, if a file check can be determined.\n 'kb' : '4493231',\n #'path' : hotfix_get_commonfilesdir(),\n #'append' : 'microsoft shared\\\\web server extensions\\\\15\\\\bin',\n #'file' : 'onetutil.dll',\n #'version' : '15.0.5301.1000',\n 'product_name' : 'Microsoft SharePoint Foundation Server 2013 SP1'\n }]\n }\n }\n};\n\n# Get the specific product / path\nparam_list = kb_checks[install['Product']][install['SP']][install['Edition']];\n# audit if not affected\nif(isnull(param_list)) audit(AUDIT_INST_VER_NOT_VULN, 'Microsoft SharePoint Server');\nparanoid_audit = FALSE;\nport = kb_smb_transport();\nreg_keys = get_kb_list('SMB/Registry/HKLM/SOFTWARE/Microsoft/Windows/CurrentVersion/Uninstall/*/DisplayName');\n\n# grab the path otherwise\nforeach check (param_list)\n{\n if (check['kb'] == '4493231')\n {\n are_we_vuln = HCF_OLDER;\n foreach display_name (reg_keys)\n {\n if ('KB'+check['kb'] >< display_name || 'KB4493231' >< display_name)\n {\n are_we_vuln = HCF_OK;\n break;\n }\n }\n }\n else if (check['kb'] == '4486696')\n {\n are_we_vuln = HCF_OLDER;\n foreach display_name (reg_keys)\n {\n if ('KB'+check['kb'] >< display_name || 'KB4486761' >< display_name)\n {\n are_we_vuln = HCF_OK;\n break;\n }\n }\n if (report_paranoia < 2 && are_we_vuln != HCF_OK)\n {\n paranoid_audit = TRUE;\n are_we_vuln = HCF_OK;\n report = '\\n';\n if (check['product_name'])\n report += ' Product : ' + check['product_name'] + '\\n';\n report += ' KB : ' + check['kb'] + ' was not confirmed due to Paranoid Check settings \\n';\n hotfix_add_report(report, kb:check['kb']);\n break;\n }\n }\n if (!isnull(check['version']))\n {\n path = hotfix_append_path(path:check['path'], value:check['append']);\n are_we_vuln = hotfix_check_fversion(\n file:check['file'],\n version:check['version'],\n path:path,\n kb:check['kb'],\n product:check['product_name']\n );\n }\n else\n {\n if (are_we_vuln != HCF_OLDER) break;\n\n report = '\\n';\n if (check['product_name'])\n report += ' Product : ' + check['product_name'] + '\\n';\n if (check['kb'])\n report += ' KB : ' + check['kb'] + '\\n';\n\n hotfix_add_report(report, kb:check['kb']);\n }\n}\n\nif (are_we_vuln == HCF_OLDER)\n{\n port = kb_smb_transport();\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n if (paranoid_audit == TRUE) audit(AUDIT_POTENTIAL_VULN, app_name);\n audit(AUDIT_INST_VER_NOT_VULN, app_name);\n}\n\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:26:19", "description": "The Microsoft SharePoint Server 2019 installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities :\n\n - An elevation of privilege vulnerability. An attacker can exploit this to gain elevated privileges.\n (CVE-2020-17089)\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2020-17118, CVE-2020-17121)\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive information. (CVE-2020-17120)\n\n - A session spoofing vulnerability exists. An attacker can exploit this to perform actions with the privileges of another user. (CVE-2020-17115)", "cvss3": {}, "published": "2020-12-10T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft SharePoint Server 2019 (December 2020)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-17089", "CVE-2020-17115", "CVE-2020-17118", "CVE-2020-17120", "CVE-2020-17121"], "modified": "2022-12-05T00:00:00", "cpe": ["cpe:/a:microsoft:sharepoint_server"], "id": "SMB_NT_MS20_DEC_OFFICE_SHAREPOINT_2019.NASL", "href": "https://www.tenable.com/plugins/nessus/144056", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(144056);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/05\");\n\n script_cve_id(\n \"CVE-2020-17089\",\n \"CVE-2020-17115\",\n \"CVE-2020-17118\",\n \"CVE-2020-17120\",\n \"CVE-2020-17121\"\n );\n script_xref(name:\"MSKB\", value:\"4486751\");\n script_xref(name:\"MSKB\", value:\"4486752\");\n script_xref(name:\"MSKB\", value:\"4493231\");\n script_xref(name:\"MSFT\", value:\"MS20-4486751\");\n script_xref(name:\"MSFT\", value:\"MS20-4486752\");\n script_xref(name:\"MSFT\", value:\"MS20-4493231\");\n script_xref(name:\"IAVA\", value:\"2020-A-0560-S\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2020-0138\");\n\n script_name(english:\"Security Updates for Microsoft SharePoint Server 2019 (December 2020)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft SharePoint Server 2019 installation on the remote host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft SharePoint Server 2019 installation on the\nremote host is missing security updates. It is, therefore,\naffected by multiple vulnerabilities :\n\n - An elevation of privilege vulnerability. An attacker can\n exploit this to gain elevated privileges.\n (CVE-2020-17089)\n\n - A remote code execution vulnerability. An attacker can\n exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2020-17118,\n CVE-2020-17121)\n\n - An information disclosure vulnerability. An attacker can\n exploit this to disclose potentially sensitive\n information. (CVE-2020-17120)\n\n - A session spoofing vulnerability exists. An attacker can\n exploit this to perform actions with the privileges of\n another user. (CVE-2020-17115)\");\n # https://support.microsoft.com/en-us/help/4486751/security-update-for-sharepoint-server-2019-dec-8-2020\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?c153ce68\");\n # https://support.microsoft.com/en-us/help/4486752/security-update-for-sharepoint-server-2019-language-pack-dec-8-2020\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?e3432e77\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue: \n -KB4486751\n -KB4486752\n -KB4493231\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17118\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:sharepoint_server\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"microsoft_sharepoint_installed.nbin\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\ninclude('install_func.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS20-12';\n\nkbs = make_list(\n '4486751',\n '4486752',\n '4493231'\n);\n\nif (get_kb_item('Host/patch_management_checks'))\n hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated', exit_code:1);\n\n# Get path information for Windows.\nwindir = hotfix_get_systemroot();\nif (isnull(windir)) exit(1, 'Failed to determine the location of %windir%.');\n\nregistry_init();\napp_name = 'Microsoft SharePoint Server';\ninstall = get_single_install(app_name:app_name);\n\nkb_checks =\n{\n '2019':\n { '0':\n {'Server':\n [{\n 'kb' : '4486751',\n 'path' : install['path'],\n 'append' : 'bin',\n 'file' : 'ascalc.dll',\n 'version' : '16.0.10369.20000',\n 'product_name' : 'Microsoft SharePoint Server 2019'\n },\n { #Commented out for ease of adding in later, if a file check can be determined.\n 'kb' : '4486752',\n #'path' : install['path'],\n #'append' : 'bin',\n #'file' : 'ascalc.dll',\n #'version' : '16.0.10368.20000',\n 'product_name' : 'Microsoft SharePoint Server 2019'\n },\n { #Commented out for ease of adding in later, if a file check can be determined.\n 'kb' : '4493231',\n #'path' : install['path'],\n #'append' : 'bin',\n #'file' : 'ascalc.dll',\n #'version' : '16.0.10368.20000',\n 'product_name' : 'Microsoft SharePoint Server 2019'\n }]\n }\n }\n};\n\n# Get the specific product / path\nparam_list = kb_checks[install['Product']][install['SP']][install['Edition']];\n# audit if not affected\nif(isnull(param_list)) audit(AUDIT_INST_VER_NOT_VULN, 'Microsoft SharePoint Server');\nparanoid_audit = FALSE;\nport = kb_smb_transport();\nreg_keys = get_kb_list('SMB/Registry/HKLM/SOFTWARE/Microsoft/Windows/CurrentVersion/Uninstall/*/DisplayName');\n# grab the path otherwise\nforeach check (param_list)\n{\n if (check['kb'] == '4486752')\n { \n are_we_vuln = HCF_OLDER;\n foreach display_name (reg_keys)\n {\n if ('KB'+check['kb'] >< display_name || 'KB4493161' >< display_name)\n {\n are_we_vuln = HCF_OK;\n break;\n }\n }\n }\n else if (check['kb'] == '4493231')\n {\n are_we_vuln = HCF_OLDER;\n foreach display_name (reg_keys)\n {\n if ('KB'+check['kb'] >< display_name || 'KB4493231' >< display_name)\n {\n are_we_vuln = HCF_OK;\n break;\n }\n }\n if (report_paranoia < 2 && are_we_vuln != HCF_OK)\n {\n paranoid_audit = TRUE;\n are_we_vuln = HCF_OK;\n report = '\\n';\n if (check['product_name'])\n report += ' Product : ' + check['product_name'] + '\\n';\n report += ' KB : ' + check['kb'] + ' was not confirmed due to Paranoid Check settings \\n';\n hotfix_add_report(report, kb:check['kb']);\n break;\n }\n }\n if (!isnull(check['version']))\n {\n path = hotfix_append_path(path:check['path'], value:check['append']);\n are_we_vuln = hotfix_check_fversion(\n file:check['file'],\n version:check['version'],\n path:path,\n kb:check['kb'],\n product:check['product_name']\n );\n }\n else\n {\n if (are_we_vuln != HCF_OLDER) break;\n\n report = '\\n';\n if (check['product_name'])\n report += ' Product : ' + check['product_name'] + '\\n';\n if (check['kb'])\n report += ' KB : ' + check['kb'] + '\\n';\n \n hotfix_add_report(report, kb:check['kb']);\n }\n}\nif (are_we_vuln == HCF_OLDER)\n{\n port = kb_smb_transport();\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n if (paranoid_audit == TRUE) audit(AUDIT_POTENTIAL_VULN, app_name);\n audit(AUDIT_INST_VER_NOT_VULN, app_name);\n}\n\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:25:37", "description": "The Microsoft SharePoint Server 2016 installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities :\n\n - An elevation of privilege vulnerability. An attacker can exploit this to gain elevated privileges.\n (CVE-2020-17089)\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2020-17118, CVE-2020-17121)\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive information. (CVE-2020-17120)\n\n - A session spoofing vulnerability exists. An attacker can exploit this to perform actions with the privileges of another user. (CVE-2020-17115)", "cvss3": {}, "published": "2020-12-10T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft SharePoint Server 2016 (December 2020)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-17089", "CVE-2020-17115", "CVE-2020-17118", "CVE-2020-17120", "CVE-2020-17121"], "modified": "2022-12-05T00:00:00", "cpe": ["cpe:/a:microsoft:sharepoint_server"], "id": "SMB_NT_MS20_DEC_OFFICE_SHAREPOINT_2016.NASL", "href": "https://www.tenable.com/plugins/nessus/144059", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(144059);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/05\");\n\n script_cve_id(\n \"CVE-2020-17089\",\n \"CVE-2020-17115\",\n \"CVE-2020-17118\",\n \"CVE-2020-17120\",\n \"CVE-2020-17121\"\n );\n script_xref(name:\"MSKB\", value:\"4486753\");\n script_xref(name:\"MSFT\", value:\"MS20-4486753\");\n script_xref(name:\"IAVA\", value:\"2020-A-0560-S\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2020-0138\");\n\n script_name(english:\"Security Updates for Microsoft SharePoint Server 2016 (December 2020)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft SharePoint Server 2016 installation on the remote host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft SharePoint Server 2016 installation on the\nremote host is missing security updates. It is, therefore,\naffected by multiple vulnerabilities :\n\n - An elevation of privilege vulnerability. An attacker can\n exploit this to gain elevated privileges.\n (CVE-2020-17089)\n\n - A remote code execution vulnerability. An attacker can\n exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2020-17118,\n CVE-2020-17121)\n\n - An information disclosure vulnerability. An attacker can\n exploit this to disclose potentially sensitive\n information. (CVE-2020-17120)\n\n - A session spoofing vulnerability exists. An attacker can\n exploit this to perform actions with the privileges of\n another user. (CVE-2020-17115)\");\n # https://support.microsoft.com/en-us/help/4486753/security-update-for-sharepoint-enterprise-server-2016-dec-8-2020\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?4aa34a4b\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue:\n -KB4486753\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17118\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:sharepoint_server\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"microsoft_sharepoint_installed.nbin\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\ninclude('install_func.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nvar bulletin = 'MS20-12';\nvar app_name = 'Microsoft SharePoint Server';\n\nvar kbs = make_list(\n '4486753'\n);\n\nif (get_kb_item('Host/patch_management_checks'))\n hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated', exit_code:1);\n\n# Get path information for Windows.\nvar windir = hotfix_get_systemroot();\nif (isnull(windir)) exit(1, 'Failed to determine the location of %windir%.');\n\nregistry_init();\nvar install = get_single_install(app_name:app_name);\nvar kb_checks =\n{\n '2016':\n { '0':\n {'Server':\n [\n {\n 'kb' : '4486753',\n 'path' : hotfix_get_commonfilesdir(),\n 'append' : 'microsoft shared\\\\web server extensions\\\\16\\\\bin',\n 'file' : 'csisrv.dll',\n 'version' : '16.0.5095.1000',\n 'product_name' : 'Microsoft SharePoint Enterprise Server 2016'\n }\n ]\n }\n }\n};\n\n# Get the specific product / path\nvar param_list = kb_checks[install['Product']][install['SP']][install['Edition']];\n# audit if not affected\nif(isnull(param_list)) audit(AUDIT_HOST_NOT, 'affected');\nvar port = kb_smb_transport();\n# grab the path otherwise\nvar are_we_vuln = FALSE;\nvar vuln = FALSE;\nvar check, path, report;\n\nforeach check (param_list)\n{\n if (!isnull(check['version']))\n {\n path = check['path'];\n if (!empty_or_null(check['append']))\n path = hotfix_append_path(path:check['path'], value:check['append']);\n are_we_vuln = hotfix_check_fversion(\n file:check['file'],\n version:check['version'],\n path:path,\n kb:check['kb'],\n product:check['product_name']\n );\n }\n else\n {\n report = '\\n';\n if (check['product_name'])\n report += ' Product : ' + check['product_name'] + '\\n';\n if (check['kb'])\n report += ' KB : ' + check['kb'] + '\\n';\n hotfix_add_report(report, kb:check['kb']);\n }\n\n if(are_we_vuln == HCF_OLDER) vuln = TRUE;\n\n}\nif (vuln)\n{\n port = kb_smb_transport();\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_INST_VER_NOT_VULN, app_name);\n}", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T14:59:54", "description": "The Microsoft Office product installed on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities:\n\n - Microsoft Excel Remote Code Execution Vulnerability (CVE-2020-17123, CVE-2020-17128)\n\n - Microsoft Excel Information Disclosure Vulnerability (CVE-2020-17126)\n\n - Microsoft Outlook Information Disclosure Vulnerability (CVE-2020-17119)\n\n - Microsoft PowerPoint Remote Code Execution Vulnerability (CVE-2020-17124)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-01-25T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Office (December 2020) (macOS)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-17119", "CVE-2020-17123", "CVE-2020-17124", "CVE-2020-17126", "CVE-2020-17128"], "modified": "2022-12-05T00:00:00", "cpe": ["cpe:/a:microsoft:office", "cpe:/a:microsoft:excel", "cpe:/a:microsoft:outlook", "cpe:/a:microsoft:powerpoint"], "id": "MACOS_MS20_DEC_OFFICE.NASL", "href": "https://www.tenable.com/plugins/nessus/145269", "sourceData": "##\n# (C) Tenable Network Security, Inc.\n##\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(145269);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/05\");\n\n script_cve_id(\n \"CVE-2020-17119\",\n \"CVE-2020-17123\",\n \"CVE-2020-17124\",\n \"CVE-2020-17126\",\n \"CVE-2020-17128\"\n );\n script_xref(name:\"IAVA\", value:\"2020-A-0556-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0559-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0017-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0558-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0557-S\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2020-0138\");\n\n script_name(english:\"Security Updates for Microsoft Office (December 2020) (macOS)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Office product installed on the remote host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Office product installed on the remote host is missing security updates. It is, therefore, affected by\nmultiple vulnerabilities:\n\n - Microsoft Excel Remote Code Execution Vulnerability (CVE-2020-17123, CVE-2020-17128)\n\n - Microsoft Excel Information Disclosure Vulnerability (CVE-2020-17126)\n\n - Microsoft Outlook Information Disclosure Vulnerability (CVE-2020-17119)\n\n - Microsoft PowerPoint Remote Code Execution Vulnerability (CVE-2020-17124)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n # https://docs.microsoft.com/en-us/officeupdates/update-history-office-for-mac\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?43ed1b90\");\n # https://docs.microsoft.com/en-us/officeupdates/release-notes-office-for-mac#december-15-2020\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?97475468\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released a set of patches for Microsoft Office for Mac.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17128\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/12/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/01/25\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:office\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:excel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:outlook\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:powerpoint\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_office_installed.nbin\");\n script_require_keys(\"Host/MacOSX/Version\");\n script_require_ports(\"installed_sw/Microsoft Excel\", \"installed_sw/Microsoft Word\", \"Microsoft PowerPoint\");\n\n exit(0);\n}\n\ninclude('vcf.inc');\n\nos = get_kb_item_or_exit('Host/MacOSX/Version');\napps = make_list(\n 'Microsoft Excel',\n 'Microsoft Outlook',\n 'Microsoft PowerPoint'\n);\nreport = '';\n\n#2019\nmin_ver_19 = '16.17.0';\nfix_ver_19 = '16.44';\nfix_disp_19 = '16.44 (20121301)';\n\nforeach app (apps)\n{\n installs = get_installs(app_name:app);\n if (isnull(installs[1]))\n continue;\n\n foreach install (installs[1])\n {\n version = install['version'];\n\n if (ver_compare(ver:version, minver:min_ver_19, fix:fix_ver_19, strict:FALSE) < 0)\n {\n app_label = app + ' for Mac 2019';\n report +=\n '\\n\\n Product : ' + app_label +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix_disp_19;\n }\n }\n}\nif (empty(report))\n audit(AUDIT_HOST_NOT, 'affected');\n\nif (os =~ \"^Mac OS X 10\\.([0-9]([^0-9]|$)|1[0-3])\")\n report += '\\n Note : Update will require Mac OS X 10.14.0 or later.\\n';\n\nsecurity_report_v4(severity:SECURITY_HOLE, port:0, extra:report);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:25:47", "description": "The Microsoft Exchange Server installed on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities:\n\n - A remote code execution vulnerability. An attacker could exploit this to execute unauthorized arbitrary code. (CVE-2020-17117, CVE-2020-17132, CVE-2020-17141, CVE-2020-17142)\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive information. (CVE-2020-17143)", "cvss3": {}, "published": "2020-12-08T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Exchange Server (December 2020)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-17117", "CVE-2020-17132", "CVE-2020-17141", "CVE-2020-17142", "CVE-2020-17143"], "modified": "2022-12-05T00:00:00", "cpe": ["cpe:/a:microsoft:exchange_server"], "id": "SMB_NT_MS20_DEC_EXCHANGE.NASL", "href": "https://www.tenable.com/plugins/nessus/143557", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(143557);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/05\");\n\n script_cve_id(\n \"CVE-2020-17117\",\n \"CVE-2020-17132\",\n \"CVE-2020-17141\",\n \"CVE-2020-17142\",\n \"CVE-2020-17143\"\n );\n script_xref(name:\"MSKB\", value:\"4593465\");\n script_xref(name:\"MSKB\", value:\"4593466\");\n script_xref(name:\"MSFT\", value:\"MS20-4593465\");\n script_xref(name:\"MSFT\", value:\"MS20-4593466\");\n script_xref(name:\"IAVA\", value:\"2020-A-0554-S\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2020-0138\");\n\n script_name(english:\"Security Updates for Microsoft Exchange Server (December 2020)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Exchange Server installed on the remote host is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Exchange Server installed on the remote host\nis missing security updates. It is, therefore, affected by\nmultiple vulnerabilities:\n\n - A remote code execution vulnerability. An attacker could exploit this to\n execute unauthorized arbitrary code. (CVE-2020-17117, CVE-2020-17132,\n CVE-2020-17141, CVE-2020-17142)\n\n - An information disclosure vulnerability. An attacker can exploit this to\n disclose potentially sensitive information. (CVE-2020-17143)\");\n # https://support.microsoft.com/en-us/help/4593465/description-of-the-security-update-for-microsoft-exchange-server-2019\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?923093df\");\n # https://support.microsoft.com/en-us/help/4593466/description-of-the-security-update-for-microsoft-exchange-server-2013\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?6a67cb27\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue:\n -KB4593465\n -KB4593466\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17117\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2020-17142\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Microsoft Exchange Server DlpUtils AddTenantDlpPolicy RCE');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:exchange_server\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ms_bulletin_checks_possible.nasl\", \"microsoft_exchange_installed.nbin\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('vcf_extras_microsoft.inc');\n\nvar app_info = vcf::microsoft::exchange::get_app_info();\n\nvar constraints =\n[\n {\n 'product' : '2013',\n 'unsupported_cu' : 22,\n 'cu' : 23,\n 'min_version': '15.00.1497.0',\n 'fixed_version': '15.00.1497.10',\n 'kb': '4593466'\n },\n {\n 'product': '2016',\n 'unsupported_cu': 16,\n 'cu' : 17,\n 'min_version': '15.01.2044.0',\n 'fixed_version': '15.01.2044.12',\n 'kb': '4593465'\n },\n {\n 'product' : '2016',\n 'unsupported_cu' : 16,\n 'cu' : 18,\n 'min_version': '15.01.2106.0',\n 'fixed_version': '15.01.2106.6',\n 'kb': '4593465'\n },\n {\n 'product' : '2019',\n 'unsupported_cu' : 5,\n 'cu' : 6,\n 'min_version': '15.02.659.0',\n 'fixed_version': '15.02.659.11',\n 'kb': '4593465'\n },\n {\n 'product' : '2019',\n 'unsupported_cu' : 5,\n 'cu' : 7,\n 'min_version': '15.02.721.0',\n 'fixed_version': '15.02.721.6',\n 'kb': '4593465'\n }\n];\n\nvcf::microsoft::exchange::check_version_and_report\n(\n app_info:app_info,\n bulletin:'MS20-12',\n constraints:constraints,\n severity:SECURITY_WARNING\n);", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T14:13:35", "description": "The Microsoft Office Products are missing security updates. It is, therefore, affected by multiple remote code execution vulnerabilities. An attacker can exploit these to bypass authentication and execute unauthorized arbitrary commands.\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2020-12-08T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Office Products (December 2020)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-17122", "CVE-2020-17128"], "modified": "2022-12-05T00:00:00", "cpe": ["cpe:/a:microsoft:office"], "id": "SMB_NT_MS20_DEC_OFFICE.NASL", "href": "https://www.tenable.com/plugins/nessus/143555", "sourceData": "##\n# (C) Tenable Network Security, Inc.\n##\n\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(143555);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/05\");\n\n script_cve_id(\"CVE-2020-17122\", \"CVE-2020-17128\");\n script_xref(name:\"MSKB\", value:\"4486698\");\n script_xref(name:\"MSKB\", value:\"4493140\");\n script_xref(name:\"MSKB\", value:\"4486757\");\n script_xref(name:\"MSFT\", value:\"MS20-4486698\");\n script_xref(name:\"MSFT\", value:\"MS20-4493140\");\n script_xref(name:\"MSFT\", value:\"MS20-4486757\");\n script_xref(name:\"IAVA\", value:\"2020-A-0557-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0017-S\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2020-0138\");\n\n script_name(english:\"Security Updates for Microsoft Office Products (December 2020)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Office Products are affected by multiple remote code execution vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Office Products are missing security updates. It is, therefore, affected by multiple remote code\nexecution vulnerabilities. An attacker can exploit these to bypass authentication and execute unauthorized arbitrary\ncommands.\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n # https://support.microsoft.com/en-us/help/4486698/security-update-for-office-2010-december-8-2020\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?8b5beafd\");\n # https://support.microsoft.com/en-us/help/4493140/security-update-for-office-2010-december-8-2020\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?c6f9bfee\");\n # https://support.microsoft.com/en-us/help/4486757/security-update-for-office-2016-december-8-2020\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?f71d8d98\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address these issues: \n -KB4486698\n -KB4493140\n -KB4486757\n\nFor Office 365, Office 2016 C2R, or Office 2019, ensure automatic updates are enabled or open any office app and manually\nperform an update.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17128\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:office\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"office_installed.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\ninclude('install_func.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS20-12';\nkbs = make_list(\n '4486698',\n '4493140',\n '4486757'\n);\n\nif (get_kb_item('Host/patch_management_checks'))\n hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated', exit_code:1);\n\nvuln = FALSE;\nport = kb_smb_transport();\n\noffice_vers = hotfix_check_office_version();\n\n# Office 2010 SP2\nif (office_vers['14.0'])\n{\n office_sp = get_kb_item('SMB/Office/2010/SP');\n if (!isnull(office_sp) && office_sp == 2)\n {\n prod = 'Microsoft Office 2010 SP2';\n\n path = hotfix_get_officecommonfilesdir(officever:'14.0');\n path = hotfix_append_path(path:path, value:'Microsoft Shared\\\\Office14');\n kb = '4486698';\n file = 'mso.dll';\n version = '14.0.7263.5000';\n if (hotfix_check_fversion(file:file, version:version, path:path, kb:kb, bulletin:bulletin, product:prod) == HCF_OLDER)\n vuln = TRUE;\n\n path = hotfix_get_officeprogramfilesdir(officever:'14.0');\n path = hotfix_append_path(path:path, value:'Microsoft Office\\\\Office14');\n kb = '4493140';\n file = 'graph.exe';\n version = '14.0.7263.5000';\n if (hotfix_check_fversion(file:file, version:version, path:path, kb:kb, bulletin:bulletin, product:prod) == HCF_OLDER)\n vuln = TRUE;\n }\n}\n\n# Office 2016\nif (office_vers['16.0'])\n{\n office_sp = get_kb_item('SMB/Office/2016/SP');\n if (!isnull(office_sp) && office_sp == 0)\n {\n prod = 'Microsoft Office 2016';\n \n path = hotfix_get_officeprogramfilesdir(officever:'16.0');\n path = hotfix_append_path(path:path, value:'Microsoft Office\\\\Office16');\n\n # MSI graph.exe\n if (hotfix_check_fversion(file:'graph.exe', version:'16.0.5095.1000', channel:'MSI', channel_product:'Office', path:path, kb:'4486757', bulletin:bulletin, product:prod) == HCF_OLDER)\n vuln = TRUE;\n }\n}\n\nif (vuln)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-17T16:31:24", "description": "The Microsoft Office Products are missing security updates. It is, therefore, affected by multiple remote code execution vulnerabilities. An attacker can exploit these to bypass authentication and execute unauthorized arbitrary commands.\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-06-10T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Office Products C2R (December 2020)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-17122", "CVE-2020-17128"], "modified": "2022-12-14T00:00:00", "cpe": ["cpe:/a:microsoft:office"], "id": "SMB_NT_MS20_DEC_OFFICE_C2R.NASL", "href": "https://www.tenable.com/plugins/nessus/162086", "sourceData": "##\n# (C) Tenable Network Security, Inc.\n##\n\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(162086);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/14\");\n\n script_cve_id(\"CVE-2020-17122\", \"CVE-2020-17128\");\n script_xref(name:\"IAVA\", value:\"2020-A-0557-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0017-S\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2020-0138\");\n\n script_name(english:\"Security Updates for Microsoft Office Products C2R (December 2020)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Office Products are affected by multiple remote code execution vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Office Products are missing security updates. It is, therefore, affected by multiple remote code\nexecution vulnerabilities. An attacker can exploit these to bypass authentication and execute unauthorized arbitrary\ncommands.\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n # https://docs.microsoft.com/en-us/officeupdates/update-history-microsoft365-apps-by-date\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?fd4508ff\");\n script_set_attribute(attribute:\"solution\", value:\n\"For Office 365, Office 2016 C2R, or Office 2019, ensure automatic\nupdates are enabled or open any office app and manually perform an\nupdate.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17128\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/06/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:office\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"office_installed.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('vcf_extras_office.inc');\n\nvar bulletin = 'MS20-12';\n\nvar app_info = vcf::microsoft::office::get_app_info(app:'Microsoft Office');\n\nvar constraints = [\n \n {'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.12527.21416','channel': 'Microsoft 365 Apps on Windows 7'},\n {'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.12527.21416','channel': 'Deferred','channel_version': '2002'},\n {'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.11929.20984','channel': 'Deferred'},\n {'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.13328.20478','channel': 'Enterprise Deferred','channel_version': '2010'},\n {'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.13231.20620','channel': 'Enterprise Deferred'},\n {'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.13127.20910','channel': 'First Release for Deferred'},\n {'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.13426.20332','channel': '2016 Retail'},\n {'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.13426.20332','channel': 'Current'},\n {'product':'Microsoft Office 2019','file':'graph.exe','fixed_version':'16.0.13426.20332','channel': '2019 Retail'},\n {'product':'Microsoft Office 2019','file':'graph.exe','fixed_version':'16.0.10369.20032','channel': '2019 Volume'}\n];\n\nvcf::microsoft::office::check_version_and_report(\n app_info:app_info,\n constraints:constraints,\n severity:SECURITY_HOLE,\n bulletin:bulletin,\n subproduct:'Office'\n);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T14:13:35", "description": "The Microsoft Team Foundation Server or Azure DevOps install is missing security updates. It is, therefore, affected by multiple spoofing vulnerabilities. An attacker can exploit these to perform actions with the privileges of another user.\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2020-12-08T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Team Foundation Server and Azure DevOps Server (December 2020)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-1325", "CVE-2020-17135", "CVE-2020-17145"], "modified": "2022-05-11T00:00:00", "cpe": ["cpe:/o:microsoft:azure_devops_server", "cpe:/a:microsoft:visual_studio_team_foundation_server"], "id": "SMB_NT_MS20_DEC_TEAM_FOUNDATION_SERVER.NASL", "href": "https://www.tenable.com/plugins/nessus/143568", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n##\n\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(143568);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/11\");\n\n script_cve_id(\"CVE-2020-1325\", \"CVE-2020-17135\", \"CVE-2020-17145\");\n\n script_name(english:\"Security Updates for Microsoft Team Foundation Server and Azure DevOps Server (December 2020)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Team Foundation Server or Azure DevOps is affected by multiple spoofing vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Team Foundation Server or Azure DevOps install is missing security updates. It is, therefore, affected by\nmultiple spoofing vulnerabilities. An attacker can exploit these to perform actions with the privileges of another user.\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n # https://devblogs.microsoft.com/devops/december-patches-for-azure-devops-server-and-team-foundation-server/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?164aac14\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following updates to address these issues:\n - Team Foundation Server 2015 Update 4.2 with patch 7\n - Team Foundation Server 2017 Update 3.1 with patch 12\n - Team Foundation Server 2018 Update 1.2 with patch 9\n - Team Foundation Server 2018 Update 3.2 with patch 14\n - Azure DevOps Server 2019 Update 0.1 with patch 9\n - Azure DevOps Server 2019 Update 1.1 with patch 6\n - Azure DevOps Server 2020 with patch 1\n\nPlease refer to the vendor guidance to determine the version and patch to apply.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-1325\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2020-17145\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:azure_devops_server\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:visual_studio_team_foundation_server\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"microsoft_team_foundation_server_installed.nasl\");\n script_require_keys(\"installed_sw/Microsoft Team Foundation Server\");\n\n exit(0);\n}\n\ninclude('vcf_extras_microsoft.inc');\n\nvar app_info = vcf::microsoft::azure_devops_server::get_app_info();\n\nvar ado_constraints = [\n {\n 'release' : '2015',\n 'update_min_ver' : '0',\n 'update_max_ver' : '4.2',\n 'append_path' : 'Application Tier\\\\Web Services\\\\bin',\n 'file' : 'Microsoft.TeamFoundation.Framework.Server.dll',\n 'file_min_ver' : '14.0.0.0',\n 'file_fix_ver' : '14.114.30730.0',\n 'note' : 'Team Foundation Server 2015 prior to Update 4.2 patch 7 is vulnerable. Ensure\\n' +\n 'the installation is updated to Update 4.2 patch 7'\n },\n {\n 'release' : '2017',\n 'update_min_ver' : '0',\n 'update_max_ver' : '3.1',\n 'append_path' : 'Application Tier\\\\Web Services\\\\bin',\n 'file' : 'Microsoft.TeamFoundation.Server.WebAccess.Admin.dll',\n 'file_min_ver' : '15.0.0.0',\n 'file_fix_ver' : '15.117.30801.0',\n 'note' : 'Team Foundation Server 2017 prior to Update 3.1 patch 12 is vulnerable. Ensure\\n' +\n 'the installation is updated to Update 3.1 patch 12'\n },\n {\n 'release' : '2018',\n 'update_min_ver' : '0',\n 'update_max_ver' : '1.2',\n 'append_path' : 'Application Tier\\\\Web Services\\\\bin',\n 'file' : 'Microsoft.TeamFoundation.Server.WebAccess.Admin.dll',\n 'file_min_ver' : '16.0.0.0',\n 'file_fix_ver' : '16.122.30723.1',\n 'note' : 'Team Foundation Server 2018 prior to Update 1.2 patch 9 is vulnerable. Ensure\\n' +\n 'the installation is updated to Update 1.2 patch 9'\n },\n {\n 'release' : '2018',\n 'update_min_ver' : '2',\n 'update_max_ver' : '3.2',\n 'append_path' : 'Application Tier\\\\Web Services\\\\bin',\n 'file' : 'Microsoft.TeamFoundation.WorkItemTracking.Web.dll',\n 'file_min_ver' : '16.0.0.0',\n 'file_fix_ver' : '16.131.30724.3',\n 'note' : 'Team Foundation Server 2018 prior to Update 3.2 patch 14 is vulnerable. Ensure\\n' +\n 'the installation is updated to Update 3.2 patch 14',\n },\n {\n 'release' : '2019',\n 'update_min_ver' : '0',\n 'update_max_ver' : '0.1',\n 'append_path' : 'Application Tier\\\\Web Services\\\\bin',\n 'file' : 'Microsoft.TeamFoundation.Framework.Server.dll',\n 'file_min_ver' : '17.0.0.0',\n 'file_fix_ver' : '17.143.30723.4',\n 'note' : 'Azure DevOps Server 2019 prior to 2019.0.1 patch 9 is vulnerable. Ensure\\n' +\n 'the installation is updated to 2019.0.1 patch 9.'\n }, \n {\n 'release' : '2019',\n 'update_min_ver' : '1.0',\n 'update_max_ver' : '1.1',\n 'append_path' : 'Application Tier\\\\Web Services\\\\bin',\n 'file' : 'Microsoft.VisualStudio.Services.Feed.Server.dll',\n 'file_min_ver' : '17.0.0.0',\n 'file_fix_ver' : '17.153.30723.5',\n 'note' : 'Azure DevOps Server 2019 prior to 2019.1.1 patch 6 is vulnerable. Ensure\\n' +\n 'the installation is updated to 2019.1.1 patch 6.'\n },\n {\n 'release' : '2020',\n 'update_min_ver' : '0',\n 'update_max_ver' : '0',\n 'append_path' : 'Application Tier\\\\Web Services\\\\bin',\n 'file' : 'Microsoft.TeamFoundation.Framework.Server.dll',\n 'file_min_ver' : '18.0.0.0',\n 'file_fix_ver' : '18.170.30723.6',\n 'note' : 'Azure DevOps Server 2020 prior to 2020 patch 1 is vulnerable. Ensure\\n' +\n 'the installation is updated to 2020 patch 1.'\n }\n];\n\nvcf::microsoft::azure_devops_server::check_version_and_report\n(\n app_info:app_info, \n bulletin:'MS20-12',\n constraints:ado_constraints, \n severity:SECURITY_WARNING,\n flags:{'xss':TRUE}\n);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T14:14:14", "description": "The Microsoft Visual Studio Products are missing security updates. It is, therefore, affected by the following vulnerability:\n\n - An unspecified remote code execution vulnerability exists in Visual Studio. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2020-17156)", "cvss3": {}, "published": "2020-12-08T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Visual Studio Products (December 2020)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-17156"], "modified": "2022-06-27T00:00:00", "cpe": ["cpe:/a:microsoft:visual_studio"], "id": "SMB_NT_MS20_DEC_VISUAL_STUDIO.NASL", "href": "https://www.tenable.com/plugins/nessus/143573", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(143573);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/06/27\");\n\n script_cve_id(\"CVE-2020-17156\");\n script_xref(name:\"IAVA\", value:\"2020-A-0553\");\n\n script_name(english:\"Security Updates for Microsoft Visual Studio Products (December 2020)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Visual Studio Products are missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Visual Studio Products are missing security\nupdates. It is, therefore, affected by the following\nvulnerability:\n\n - An unspecified remote code execution vulnerability\n exists in Visual Studio. An attacker can exploit\n this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2020-17156)\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue:\n - Update 15.9.30 for Visual Studio 2017\n - Update 16.0.21 for Visual Studio 2019\n - Update 16.4.16 for Visual Studio 2019\n - Update 16.7.9 for Visual Studio 2019\n - Update 16.8.3 for Visual Studio 2019\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17156\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:visual_studio\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ms_bulletin_checks_possible.nasl\", \"microsoft_visual_studio_installed.nbin\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\", \"installed_sw/Microsoft Visual Studio\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('install_func.inc');\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\n\nget_kb_item_or_exit('installed_sw/Microsoft Visual Studio');\n\nport = kb_smb_transport();\nappname = 'Microsoft Visual Studio';\n\ninstalls = get_installs(app_name:appname, exit_if_not_found:TRUE);\n\nreport = '';\n\nforeach install (installs[1])\n{\n version = install['version'];\n path = install['path'];\n prod = install['product_version'];\n\n fix = '';\n\n # https://docs.microsoft.com/en-us/visualstudio/install/visual-studio-build-numbers-and-release-dates?view=vs-2017\n #\n # VS 2017\n if (prod == '2017')\n {\n fix = '15.9.28307.1321';\n\n if (ver_compare(ver: version, fix: fix, strict:FALSE) < 0)\n {\n report +=\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\n }\n }\n # https://docs.microsoft.com/en-us/visualstudio/install/visual-studio-build-numbers-and-release-dates?view=vs-2019\n #\n # VS 2019 Version 16.0\n else if (prod == '2019' && version =~ \"^16\\.0\\.\")\n {\n fix = '16.0.28803.902';\n if (ver_compare(ver: version, fix: fix, strict:FALSE) < 0)\n {\n report +=\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\n }\n }\n # VS 2019 Version 16.4\n else if (prod == '2019' && version =~ \"^16\\.[1-4]\\.\")\n {\n fix = '16.4.30802.185';\n if (ver_compare(ver: version, fix: fix, strict:FALSE) < 0)\n {\n report +=\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\n }\n }\n # VS 2019 Version 16.7\n else if (prod == '2019' && version =~ \"^16\\.[5-7]\\.\")\n {\n fix = '16.7.30802.117';\n if (ver_compare(ver: version, fix: fix, strict:FALSE) < 0)\n {\n report +=\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\n }\n }\n # VS 2019 Version 16.8\n else if (prod == '2019' && version =~ \"^16\\.8\\.\")\n {\n fix = '16.8.30804.86';\n if (ver_compare(ver: version, fix: fix, strict:FALSE) < 0)\n {\n report +=\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\n }\n }\n}\n\nhotfix_check_fversion_end();\n\nif (empty(report))\n audit(AUDIT_INST_VER_NOT_VULN, appname);\n\nsecurity_report_v4(port:port, severity:SECURITY_WARNING, extra:report);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:25:34", "description": "The Microsoft Outlook application installed on the remote host is missing a security update. It is, therefore, affected by the following vulnerability:\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive information. (CVE-2020-17119)", "cvss3": {}, "published": "2020-12-08T00:00:00", "type": "nessus", "title": "Security Updates for Outlook (December 2020)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-17119"], "modified": "2021-06-03T00:00:00", "cpe": ["cpe:/a:microsoft:outlook"], "id": "SMB_NT_MS20_DEC_OUTLOOK.NASL", "href": "https://www.tenable.com/plugins/nessus/143563", "sourceData": "##\n# (C) Tenable Network Security, Inc.\n##\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(143563);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/06/03\");\n\n script_cve_id(\"CVE-2020-17119\");\n script_xref(name:\"MSKB\", value:\"4486742\");\n script_xref(name:\"MSKB\", value:\"4486732\");\n script_xref(name:\"MSKB\", value:\"4486748\");\n script_xref(name:\"MSFT\", value:\"MS20-4486742\");\n script_xref(name:\"MSFT\", value:\"MS20-4486732\");\n script_xref(name:\"MSFT\", value:\"MS20-4486748\");\n script_xref(name:\"IAVA\", value:\"2020-A-0558-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0017-S\");\n\n script_name(english:\"Security Updates for Outlook (December 2020)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Outlook application installed on the remote host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Outlook application installed on the remote\nhost is missing a security update. It is, therefore,\naffected by the following vulnerability:\n\n - An information disclosure vulnerability. An attacker can\n exploit this to disclose potentially sensitive\n information. (CVE-2020-17119)\");\n # https://support.microsoft.com/en-us/help/4486732/security-update-for-outlook-2013-december-8-2020\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?133eeec0\");\n # https://support.microsoft.com/en-us/help/4486742/security-update-for-outlook-2010-december-8-2020\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?030e821e\");\n # https://support.microsoft.com/en-us/help/4486748/security-update-for-outlook-2016-december-8-2020\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?7faebb8f\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue: \n -KB4486732\n -KB4486742\n -KB4486748\n\nFor Office 365, Office 2016 C2R, or Office 2019, ensure automatic\nupdates are enabled or open any office app and manually perform an\nupdate.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17119\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:outlook\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"office_installed.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\ninclude('install_func.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS20-12';\nkbs = make_list(\n '4486742', //14, outlookloc\n '4486732', //15\n '4486748' //16\n);\n\nif (get_kb_item('Host/patch_management_checks'))\n hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated', exit_code:1);\n\nport = kb_smb_transport();\n\nchecks = make_array(\n '14.0', make_array('sp', 2, 'version', '14.0.7261.5000', 'kb', '4486742'), // outlookloc\n '15.0', make_array('sp', 1, 'version', '15.0.5285.1000', 'kb', '4486732'),\n '16.0', make_nested_list(make_array('sp', 0, 'version', '16.0.5095.1000', 'channel', 'MSI', 'kb', '4486748'))\n );\n\nif (hotfix_check_office_product(product:'Outlook', checks:checks, bulletin:bulletin))\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_warning();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T14:13:36", "description": "The Microsoft Dynamics 365 (on-premises) is missing a security update. It is, therefore, affected by a cross-site scripting (XSS) vulnerability due to improper validation of user-supplied input before returning it to users. An attacker can exploit this by convincing a user to click a specially crafted URL, to execute arbitrary script code in a user's browser session.\n\nNote that Nessus has not attempted to exploit this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2020-12-09T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Dynamics 365 (on-premises) (December 2020)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-17147"], "modified": "2020-12-14T00:00:00", "cpe": ["cpe:/a:microsoft:dynamics_365"], "id": "SMB_NT_MS20_DEC_MICROSOFT_DYNAMICS.NASL", "href": "https://www.tenable.com/plugins/nessus/143608", "sourceData": "##\n# (C) Tenable Network Security, Inc.\n##\n\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(143608);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/12/14\");\n\n script_cve_id(\"CVE-2020-17147\");\n script_xref(name:\"MSKB\", value:\"4595459\");\n script_xref(name:\"MSKB\", value:\"4595462\");\n script_xref(name:\"MSFT\", value:\"MS20-4595459\");\n script_xref(name:\"MSFT\", value:\"MS20-4595462\");\n script_xref(name:\"IAVA\", value:\"2020-A-0552\");\n\n script_name(english:\"Security Updates for Microsoft Dynamics 365 (on-premises) (December 2020)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Dynamics 365 (on-premises) is affected by a cross-site scripting vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Dynamics 365 (on-premises) is missing a security update. It is, therefore, affected by a cross-site \nscripting (XSS) vulnerability due to improper validation of user-supplied input before returning it to users. An \nattacker can exploit this by convincing a user to click a specially crafted URL, to execute arbitrary script code in a \nuser's browser session.\n\nNote that Nessus has not attempted to exploit this issue but has instead relied only on the application's self-reported\nversion number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/4595459\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/4595462\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue: \n -KB4595459\n -KB4595462\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17147\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:dynamics_365\");\n script_set_attribute(attribute:\"stig_severity\", value:\"II\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"microsoft_dynamics_365_detect.nbin\");\n script_require_keys(\"installed_sw/Microsoft Dynamics 365 Server\");\n script_require_ports(139, 445);\n\n exit(0);\n}\n\ninclude('vcf.inc');\n\napp_info = vcf::get_app_info(app:'Microsoft Dynamics 365 Server', win_local:TRUE);\n\nconstraints = [\n { 'min_version' : '8.0', 'fixed_version' : '8.2.25.16' },\n { 'min_version' : '9.0', 'fixed_version' : '9.0.23.7' }\n];\n\nvcf::check_version_and_report(\n app_info:app_info,\n constraints:constraints,\n severity:SECURITY_NOTE,\n flags:{xss:TRUE}\n);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-17T16:33:55", "description": "The Microsoft SharePoint Server 2016 installation on the remote host is missing language security updates. It is, therefore, affected by a Microsoft SharePoint Information Disclosure Vulnerability (CVE-2020-17089)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-08-17T00:00:00", "type": "nessus", "title": "Language Security Updates for Microsoft SharePoint Server 2016 (December 2020)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-17089"], "modified": "2023-03-23T00:00:00", "cpe": ["cpe:/a:microsoft:sharepoint_server"], "id": "SMB_NT_MS20_DEC_OFFICE_SHAREPOINT_2016_LANGUAGE.NASL", "href": "https://www.tenable.com/plugins/nessus/164176", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(164176);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/03/23\");\n\n script_cve_id(\"CVE-2020-17089\");\n script_xref(name:\"MSKB\", value:\"4486721\");\n script_xref(name:\"MSFT\", value:\"MS20-4486721\");\n\n script_name(english:\"Language Security Updates for Microsoft SharePoint Server 2016 (December 2020)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft SharePoint Server 2016 installation on the remote host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft SharePoint Server 2016 installation on the remote host is missing language security updates. It is, therefore,\naffected by a Microsoft SharePoint Information Disclosure Vulnerability (CVE-2020-17089)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n # https://support.microsoft.com/en-us/help/4486721/security-update-for-sharepoint-enterprise-server-2016-dec-8-2020\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?cbb10cce\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue:\n -KB4486721\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-17089\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/08/17\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:sharepoint_server\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"microsoft_sharepoint_installed.nbin\", \"smb_language_detection.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\", \"SMB/base_language_installs\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\ninclude('install_func.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nvar bulletin = 'MS20-12';\nvar app_name = 'Microsoft SharePoint Server';\n\nvar kbs = make_list(\n '4486721'\n);\n\nif (get_kb_item('Host/patch_management_checks'))\n hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated', exit_code:1);\n\nvar all_language_lists = get_kb_list('SMB/base_language_installs');\nif (isnull(all_language_lists)) exit(1, 'Language File Scan Information not found');\n\nall_language_lists = make_list(all_language_lists);\n\nvar item;\nvar language_lists = [];\nif (!empty_or_null(all_language_lists))\n{\n foreach item (all_language_lists)\n {\n # English and Spanish (Mexico) contain an older version of wwintl.dll\n if (item == \"1033\" || item == \"2058\") continue;\n append_element(var:language_lists, value:item);\n }\n}\nif (isnull(language_lists)) exit(1, 'No Affected Language Packs were found');\n\n# Get path information for Windows.\nvar windir = hotfix_get_systemroot();\nif (isnull(windir)) exit(1, 'Failed to determine the location of %windir%.');\n\nregistry_init();\nvar install = get_single_install(app_name:app_name);\n\nvar kb_checks =\n{\n '2016':\n { '0':\n {'Server':\n [\n {\n 'kb' : '4486721',\n 'path' : install['path'],\n 'append' : 'webservices\\\\conversionservices\\\\*',\n 'file' : 'wwintl.dll',\n 'version' : '16.0.5095.1000',\n 'product_name' : 'Microsoft SharePoint Enterprise Server 2016'\n }\n ]\n }\n }\n};\n\n# Get the specific product / path\nvar param_list = kb_checks[install['Product']][install['SP']][install['Edition']];\n# audit if not affected\nif(isnull(param_list)) audit(AUDIT_HOST_NOT, 'affected');\nvar port = kb_smb_transport();\nvar check, path, path_list, are_we_vuln, report;\n# grab the path otherwise\nforeach check (param_list)\n{\n if (!isnull(check['version']))\n {\n path = check['path'];\n path_list = hotfix_append_path(path:check['path'], value:check['append']);\n path_list = language_pack_iterate(language_lists:language_lists, file_directory:path_list);\n\n are_we_vuln = hotfix_check_fversion_multipath(\n file_name:check['file'],\n version:check['version'],\n path_list:path_list,\n kb:check['kb'],\n product:check['product_name']\n );\n }\n}\n\nif (are_we_vuln == HCF_OLDER) vuln = TRUE;\n\nif (vuln)\n{\n port = kb_smb_transport();\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_warning();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse if (!vuln)\n{\n hotfix_check_fversion_end();\n audit(AUDIT_INST_VER_NOT_VULN, app_name);\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}], "kaspersky": [{"lastseen": "2023-06-06T15:22:45", "description": "### *Detect date*:\n12/08/2020\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, bypass security restrictions, execute arbitrary code.\n\n### *Affected products*:\nWindows Server, version 2004 (Server Core installation) \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) \nWindows Server 2012 \nWindows Server 2012 R2 (Server Core installation) \nWindows Server, version 1909 (Server Core installation) \nWindows 10 Version 1607 for 32-bit Systems \nWindows Server 2016 \nWindows Server 2019 (Server Core installation) \nWindows 10 Version 20H2 for 32-bit Systems \nWindows 7 for 32-bit Systems Service Pack 1 \nWindows 10 Version 20H2 for ARM64-based Systems \nWindows 10 Version 2004 for 32-bit Systems \nWindows 10 Version 1809 for x64-based Systems \nWindows 8.1 for 32-bit systems \nWindows 10 for x64-based Systems \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 \nWindows Server 2008 for 32-bit Systems Service Pack 2 \nWindows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) \nWindows 10 Version 20H2 for x64-based Systems \nWindows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) \nWindows 10 Version 1903 for x64-based Systems \nWindows 10 Version 1909 for x64-based Systems \nWindows 10 Version 1809 for 32-bit Systems \nWindows 10 Version 1903 for ARM64-based Systems \nWindows 10 Version 1909 for ARM64-based Systems \nWindows 10 Version 1809 for ARM64-based Systems \nWindows 10 Version 1607 for x64-based Systems \nWindows 7 for x64-based Systems Service Pack 1 \nWindows RT 8.1 \nWindows 10 Version 1803 for 32-bit Systems \nWindows Server 2016 (Server Core installation) \nWindows Server 2012 (Server Core installation) \nWindows Server 2019 \nWindows 10 Version 1909 for 32-bit Systems \nWindows 8.1 for x64-based systems \nWindows 10 Version 2004 for ARM64-based Systems \nWindows 10 Version 1903 for 32-bit Systems \nWindows 10 for 32-bit Systems \nWindows 10 Version 2004 for x64-based Systems \nWindows Server 2008 for x64-based Systems Service Pack 2 \nWindows Server 2012 R2 \nWindows Server, version 1903 (Server Core installation) \nWindows 10 Version 1803 for ARM64-based Systems \nWindows 10 Version 1803 for x64-based Systems \nWindows Server, version 20H2 (Server Core Installation)\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2020-17103](<https://nvd.nist.gov/vuln/detail/CVE-2020-17103>) \n[CVE-2020-16964](<https://nvd.nist.gov/vuln/detail/CVE-2020-16964>) \n[CVE-2020-16960](<https://nvd.nist.gov/vuln/detail/CVE-2020-16960>) \n[CVE-2020-17140](<https://nvd.nist.gov/vuln/detail/CVE-2020-17140>) \n[CVE-2020-16962](<https://nvd.nist.gov/vuln/detail/CVE-2020-16962>) \n[CVE-2020-16963](<https://nvd.nist.gov/vuln/detail/CVE-2020-16963>) \n[CVE-2020-16961](<https://nvd.nist.gov/vuln/detail/CVE-2020-16961>) \n[CVE-2020-17099](<https://nvd.nist.gov/vuln/detail/CVE-2020-17099>) \n[CVE-2020-17098](<https://nvd.nist.gov/vuln/detail/CVE-2020-17098>) \n[CVE-2020-17097](<https://nvd.nist.gov/vuln/detail/CVE-2020-17097>) \n[CVE-2020-17096](<https://nvd.nist.gov/vuln/detail/CVE-2020-17096>) \n[CVE-2020-17095](<https://nvd.nist.gov/vuln/detail/CVE-2020-17095>) \n[CVE-2020-17094](<https://nvd.nist.gov/vuln/detail/CVE-2020-17094>) \n[CVE-2020-17092](<https://nvd.nist.gov/vuln/detail/CVE-2020-17092>) \n[CVE-2020-17138](<https://nvd.nist.gov/vuln/detail/CVE-2020-17138>) \n[CVE-2020-17139](<https://nvd.nist.gov/vuln/detail/CVE-2020-17139>) \n[CVE-2020-17134](<https://nvd.nist.gov/vuln/detail/CVE-2020-17134>) \n[CVE-2020-17136](<https://nvd.nist.gov/vuln/detail/CVE-2020-17136>) \n[CVE-2020-17137](<https://nvd.nist.gov/vuln/detail/CVE-2020-17137>) \n[CVE-2020-16996](<https://nvd.nist.gov/vuln/detail/CVE-2020-16996>) \n[CVE-2020-16959](<https://nvd.nist.gov/vuln/detail/CVE-2020-16959>) \n[CVE-2020-16958](<https://nvd.nist.gov/vuln/detail/CVE-2020-16958>) \n[ADV200013](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/ADV200013>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Windows](<https://threats.kaspersky.com/en/product/Microsoft-Windows/>)\n\n### *CVE-IDS*:\n[CVE-2020-17103](<https://vulners.com/cve/CVE-2020-17103>)7.2High \n[CVE-2020-16964](<https://vulners.com/cve/CVE-2020-16964>)7.2High \n[CVE-2020-16960](<https://vulners.com/cve/CVE-2020-16960>)7.2High \n[CVE-2020-17140](<https://vulners.com/cve/CVE-2020-17140>)4.0Warning \n[CVE-2020-16962](<https://vulners.com/cve/CVE-2020-16962>)7.2High \n[CVE-2020-16963](<https://vulners.com/cve/CVE-2020-16963>)7.2High \n[CVE-2020-16961](<https://vulners.com/cve/CVE-2020-16961>)7.2High \n[CVE-2020-17099](<https://vulners.com/cve/CVE-2020-17099>)4.6Warning \n[CVE-2020-17098](<https://vulners.com/cve/CVE-2020-17098>)2.1Warning \n[CVE-2020-17097](<https://vulners.com/cve/CVE-2020-17097>)4.6Warning \n[CVE-2020-17096](<https://vulners.com/cve/CVE-2020-17096>)9.0Critical \n[CVE-2020-17095](<https://vulners.com/cve/CVE-2020-17095>)9.0Critical \n[CVE-2020-17094](<https://vulners.com/cve/CVE-2020-17094>)2.1Warning \n[CVE-2020-17092](<https://vulners.com/cve/CVE-2020-17092>)7.2High \n[CVE-2020-17138](<https://vulners.com/cve/CVE-2020-17138>)2.1Warning \n[CVE-2020-17139](<https://vulners.com/cve/CVE-2020-17139>)4.6Warning \n[CVE-2020-17134](<https://vulners.com/cve/CVE-2020-17134>)4.6Warning \n[CVE-2020-17136](<https://vulners.com/cve/CVE-2020-17136>)4.6Warning \n[CVE-2020-17137](<https://vulners.com/cve/CVE-2020-17137>)4.6Warning \n[CVE-2020-16996](<https://vulners.com/cve/CVE-2020-16996>)4.0Warning \n[CVE-2020-16959](<https://vulners.com/cve/CVE-2020-16959>)7.2High \n[CVE-2020-16958](<https://vulners.com/cve/CVE-2020-16958>)7.2High\n\n### *KB list*:\n[4592449](<http://support.microsoft.com/kb/4592449>) \n[4592440](<http://support.microsoft.com/kb/4592440>) \n[4592438](<http://support.microsoft.com/kb/4592438>) \n[4592484](<http://support.microsoft.com/kb/4592484>) \n[4593226](<http://support.microsoft.com/kb/4593226>) \n[4592495](<http://support.microsoft.com/kb/4592495>) \n[4592497](<http://support.microsoft.com/kb/4592497>) \n[4592446](<http://support.microsoft.com/kb/4592446>) \n[4592464](<http://support.microsoft.com/kb/4592464>) \n[4592468](<http://support.microsoft.com/kb/4592468>) \n[5000822](<http://support.microsoft.com/kb/5000822>) \n[5000847](<http://support.microsoft.com/kb/5000847>) \n[5000808](<http://support.microsoft.com/kb/5000808>) \n[5000803](<http://support.microsoft.com/kb/5000803>) \n[5000848](<http://support.microsoft.com/kb/5000848>) \n[5000802](<http://support.microsoft.com/kb/5000802>) \n[5000853](<http://support.microsoft.com/kb/5000853>) \n[5000840](<http://support.microsoft.com/kb/5000840>)\n\n### *Microsoft official advisories*:", "cvss3": {"exploitabilityScore": 3.1, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 9.9, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 6.0}, "published": "2020-12-08T00:00:00", "type": "kaspersky", "title": "KLA12024 Multiple vulnerabilities in Microsoft Windows", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16958", "CVE-2020-16959", "CVE-2020-16960", "CVE-2020-16961", "CVE-2020-16962", "CVE-2020-16963", "CVE-2020-16964", "CVE-2020-16996", "CVE-2020-17092", "CVE-2020-17094", "CVE-2020-17095", "CVE-2020-17096", "CVE-2020-17097", "CVE-2020-17098", "CVE-2020-17099", "CVE-2020-17103", "CVE-2020-17134", "CVE-2020-17136", "CVE-2020-17137", "CVE-2020-17138", "CVE-2020-17139", "CVE-2020-17140"], "modified": "2021-03-24T00:00:00", "id": "KLA12024", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12024/", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2023-06-06T15:22:45", "description": "### *Detect date*:\n12/08/2020\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface, obtain sensitive information, bypass security restrictions, gain privileges.\n\n### *Exploitation*:\nMalware exists for this vulnerability. Usually such malware is classified as Exploit. [More details](<https://threats.kaspersky.com/en/class/Exploit/>).\n\n### *Affected products*:\nMicrosoft SharePoint Server 2019 \nMicrosoft PowerPoint 2016 (32-bit edition) \nMicrosoft Excel 2010 Service Pack 2 (32-bit editions) \nMicrosoft PowerPoint 2013 Service Pack 1 (32-bit editions) \nMicrosoft Excel 2016 (64-bit edition) \nOffice Online Server \nMicrosoft Office 2019 for Mac \nMicrosoft Excel 2013 Service Pack 1 (64-bit editions) \nMicrosoft Office 2016 (32-bit edition) \nMicrosoft Office 2019 for 64-bit editions \nMicrosoft Excel 2013 RT Service Pack 1 \nMicrosoft SharePoint Enterprise Server 2016 \nMicrosoft Outlook 2013 Service Pack 1 (32-bit editions) \nMicrosoft Office 2010 Service Pack 2 (64-bit editions) \nMicrosoft PowerPoint 2016 (64-bit edition) \nMicrosoft Excel 2010 Service Pack 2 (64-bit editions) \nMicrosoft Outlook 2010 Service Pack 2 (32-bit editions) \nMicrosoft Office 2019 for 32-bit editions \nMicrosoft Office 2016 (64-bit edition) \nMicrosoft Outlook 2010 Service Pack 2 (64-bit editions) \nMicrosoft PowerPoint 2010 Service Pack 2 (64-bit editions) \nMicrosoft SharePoint Foundation 2010 Service Pack 2 \nMicrosoft Office 2010 Service Pack 2 (32-bit editions) \nMicrosoft SharePoint Server 2010 Service Pack 2 \nMicrosoft Outlook 2013 Service Pack 1 (64-bit editions) \nMicrosoft PowerPoint 2013 RT Service Pack 1 \nMicrosoft Office Web Apps 2010 Service Pack 2 \nMicrosoft Office Web Apps 2013 Service Pack 1 \nMicrosoft Excel 2013 Service Pack 1 (32-bit editions) \nMicrosoft SharePoint Foundation 2013 Service Pack 1 \nMicrosoft 365 Apps for Enterprise for 64-bit Systems \nMicrosoft Excel 2016 (32-bit edition) \nMicrosoft 365 Apps for Enterprise for 32-bit Systems \nMicrosoft PowerPoint 2013 Service Pack 1 (64-bit editions) \nMicrosoft PowerPoint 2010 Service Pack 2 (32-bit editions) \nMicrosoft Office Online Server \nMicrosoft Outlook 2016 (64-bit edition) \nMicrosoft Outlook 2013 RT Service Pack 1 \nMicrosoft Outlook 2016 (32-bit edition)\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2020-17129](<https://nvd.nist.gov/vuln/detail/CVE-2020-17129>) \n[CVE-2020-17128](<https://nvd.nist.gov/vuln/detail/CVE-2020-17128>) \n[CVE-2020-17115](<https://nvd.nist.gov/vuln/detail/CVE-2020-17115>) \n[CVE-2020-17123](<https://nvd.nist.gov/vuln/detail/CVE-2020-17123>) \n[CVE-2020-17122](<https://nvd.nist.gov/vuln/detail/CVE-2020-17122>) \n[CVE-2020-17121](<https://nvd.nist.gov/vuln/detail/CVE-2020-17121>) \n[CVE-2020-17120](<https://nvd.nist.gov/vuln/detail/CVE-2020-17120>) \n[CVE-2020-17130](<https://nvd.nist.gov/vuln/detail/CVE-2020-17130>) \n[CVE-2020-17126](<https://nvd.nist.gov/vuln/detail/CVE-2020-17126>) \n[CVE-2020-17125](<https://nvd.nist.gov/vuln/detail/CVE-2020-17125>) \n[CVE-2020-17124](<https://nvd.nist.gov/vuln/detail/CVE-2020-17124>) \n[CVE-2020-17127](<https://nvd.nist.gov/vuln/detail/CVE-2020-17127>) \n[CVE-2020-17089](<https://nvd.nist.gov/vuln/detail/CVE-2020-17089>) \n[CVE-2020-17118](<https://nvd.nist.gov/vuln/detail/CVE-2020-17118>) \n[CVE-2020-17119](<https://nvd.nist.gov/vuln/detail/CVE-2020-17119>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Office](<https://threats.kaspersky.com/en/product/Microsoft-Office/>)\n\n### *CVE-IDS*:\n[CVE-2020-17129](<https://vulners.com/cve/CVE-2020-17129>)9.3Critical \n[CVE-2020-17128](<https://vulners.com/cve/CVE-2020-17128>)9.3Critical \n[CVE-2020-17115](<https://vulners.com/cve/CVE-2020-17115>)6.0High \n[CVE-2020-17123](<https://vulners.com/cve/CVE-2020-17123>)9.3Critical \n[CVE-2020-17122](<https://vulners.com/cve/CVE-2020-17122>)9.3Critical \n[CVE-2020-17121](<https://vulners.com/cve/CVE-2020-17121>)6.5High \n[CVE-2020-17120](<https://vulners.com/cve/CVE-2020-17120>)4.0Warning \n[CVE-2020-17130](<https://vulners.com/cve/CVE-2020-17130>)6.0High \n[CVE-2020-17126](<https://vulners.com/cve/CVE-2020-17126>)2.1Warning \n[CVE-2020-17125](<https://vulners.com/cve/CVE-2020-17125>)9.3Critical \n[CVE-2020-17124](<https://vulners.com/cve/CVE-2020-17124>)9.3Critical \n[CVE-2020-17127](<https://vulners.com/cve/CVE-2020-17127>)9.3Critical \n[CVE-2020-17089](<https://vulners.com/cve/CVE-2020-17089>)6.0High \n[CVE-2020-17119](<https://vulners.com/cve/CVE-2020-17119>)5.0Critical\n\n### *KB list*:\n[4493139](<http://support.microsoft.com/kb/4493139>) \n[4493138](<http://support.microsoft.com/kb/4493138>) \n[4486732](<http://support.microsoft.com/kb/4486732>) \n[4484468](<http://support.microsoft.com/kb/4484468>) \n[4484372](<http://support.microsoft.com/kb/4484372>) \n[4484393](<http://support.microsoft.com/kb/4484393>) \n[4486750](<http://support.microsoft.com/kb/4486750>) \n[4486753](<http://support.microsoft.com/kb/4486753>) \n[4486752](<http://support.microsoft.com/kb/4486752>) \n[4486754](<http://support.microsoft.com/kb/4486754>) \n[4486757](<http://support.microsoft.com/kb/4486757>) \n[4486698](<http://support.microsoft.com/kb/4486698>) \n[4493140](<http://support.microsoft.com/kb/4493140>) \n[4486748](<http://support.microsoft.com/kb/4486748>) \n[4493148](<http://support.microsoft.com/kb/4493148>) \n[4493149](<http://support.microsoft.com/kb/4493149>) \n[4486696](<http://support.microsoft.com/kb/4486696>) \n[4486697](<http://support.microsoft.com/kb/4486697>) \n[4486721](<http://support.microsoft.com/kb/4486721>) \n[4486742](<http://support.microsoft.com/kb/4486742>) \n[4486704](<http://support.microsoft.com/kb/4486704>) \n[4486760](<http://support.microsoft.com/kb/4486760>) \n[4486751](<http://support.microsoft.com/kb/4486751>)\n\n### *Microsoft official advisories*:", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-08T00:00:00", "type": "kaspersky", "title": "KLA12023 Multiple vulnerabilities in Microsoft Office", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17089", "CVE-2020-17115", "CVE-2020-17118", "CVE-2020-17119", "CVE-2020-17120", "CVE-2020-17121", "CVE-2020-17122", "CVE-2020-17123", "CVE-2020-17124", "CVE-2020-17125", "CVE-2020-17126", "CVE-2020-17127", "CVE-2020-17128", "CVE-2020-17129", "CVE-2020-17130"], "modified": "2021-02-16T00:00:00", "id": "KLA12023", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12023/", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-06-06T15:22:44", "description": "### *Detect date*:\n12/08/2020\n\n### *Severity*:\nHigh\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information.\n\n### *Affected products*:\nWindows Server, version 2004 (Server Core installation) \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) \nWindows Server 2012 \nWindows Server 2012 R2 (Server Core installation) \nWindows Server, version 1909 (Server Core installation) \nWindows 10 Version 1607 for 32-bit Systems \nWindows Server 2016 \nWindows Server 2019 (Server Core installation) \nWindows 10 Version 20H2 for 32-bit Systems \nWindows 7 for 32-bit Systems Service Pack 1 \nWindows 10 Version 20H2 for ARM64-based Systems \nWindows 10 Version 2004 for 32-bit Systems \nWindows 10 Version 1809 for x64-based Systems \nWindows 8.1 for 32-bit systems \nWindows 10 for x64-based Systems \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 \nWindows Server 2008 for 32-bit Systems Service Pack 2 \nWindows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) \nWindows 10 Version 20H2 for x64-based Systems \nWindows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) \nWindows 10 Version 1903 for x64-based Systems \nWindows 10 Version 1909 for x64-based Systems \nWindows 10 Version 1809 for 32-bit Systems \nWindows 10 Version 1903 for ARM64-based Systems \nWindows 10 Version 1909 for ARM64-based Systems \nWindows 10 Version 1809 for ARM64-based Systems \nWindows 10 Version 1607 for x64-based Systems \nWindows 7 for x64-based Systems Service Pack 1 \nWindows RT 8.1 \nWindows 10 Version 1803 for 32-bit Systems \nWindows Server 2016 (Server Core installation) \nWindows Server 2012 (Server Core installation) \nWindows Server 2019 \nWindows 10 Version 1909 for 32-bit Systems \nWindows 8.1 for x64-based systems \nWindows 10 Version 2004 for ARM64-based Systems \nWindows 10 Version 1903 for 32-bit Systems \nWindows 10 for 32-bit Systems \nWindows 10 Version 2004 for x64-based Systems \nWindows Server 2008 for x64-based Systems Service Pack 2 \nWindows Server 2012 R2 \nWindows Server, version 1903 (Server Core installation) \nWindows 10 Version 1803 for ARM64-based Systems \nWindows 10 Version 1803 for x64-based Systems \nWindows Server, version 20H2 (Server Core Installation)\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2020-16959](<https://nvd.nist.gov/vuln/detail/CVE-2020-16959>) \n[CVE-2020-16958](<https://nvd.nist.gov/vuln/detail/CVE-2020-16958>) \n[CVE-2020-16961](<https://nvd.nist.gov/vuln/detail/CVE-2020-16961>) \n[CVE-2020-17098](<https://nvd.nist.gov/vuln/detail/CVE-2020-17098>) \n[CVE-2020-16964](<https://nvd.nist.gov/vuln/detail/CVE-2020-16964>) \n[CVE-2020-16960](<https://nvd.nist.gov/vuln/detail/CVE-2020-16960>) \n[CVE-2020-17140](<https://nvd.nist.gov/vuln/detail/CVE-2020-17140>) \n[CVE-2020-16962](<https://nvd.nist.gov/vuln/detail/CVE-2020-16962>) \n[CVE-2020-16963](<https://nvd.nist.gov/vuln/detail/CVE-2020-16963>) \n[ADV200013](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/ADV200013>) \n\n\n### *Impacts*:\nOSI \n\n### *Related products*:\n[Microsoft Windows](<https://threats.kaspersky.com/en/product/Microsoft-Windows/>)\n\n### *CVE-IDS*:\n[CVE-2020-16964](<https://vulners.com/cve/CVE-2020-16964>)7.2High \n[CVE-2020-16960](<https://vulners.com/cve/CVE-2020-16960>)7.2High \n[CVE-2020-17140](<https://vulners.com/cve/CVE-2020-17140>)4.0Warning \n[CVE-2020-16962](<https://vulners.com/cve/CVE-2020-16962>)7.2High \n[CVE-2020-16963](<https://vulners.com/cve/CVE-2020-16963>)7.2High \n[CVE-2020-16961](<https://vulners.com/cve/CVE-2020-16961>)7.2High \n[CVE-2020-17098](<https://vulners.com/cve/CVE-2020-17098>)2.1Warning \n[CVE-2020-16959](<https://vulners.com/cve/CVE-2020-16959>)7.2High \n[CVE-2020-16958](<https://vulners.com/cve/CVE-2020-16958>)7.2High\n\n### *KB list*:\n[4592504](<http://support.microsoft.com/kb/4592504>) \n[4592471](<http://support.microsoft.com/kb/4592471>) \n[4592498](<http://support.microsoft.com/kb/4592498>) \n[4592503](<http://support.microsoft.com/kb/4592503>)\n\n### *Microsoft official advisories*:", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-08T00:00:00", "type": "kaspersky", "title": "KLA12025 Multiple vulnerabilities in Microsoft Products (ESU)", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16958", "CVE-2020-16959", "CVE-2020-16960", "CVE-2020-16961", "CVE-2020-16962", "CVE-2020-16963", "CVE-2020-16964", "CVE-2020-17098", "CVE-2020-17140"], "modified": "2020-12-16T00:00:00", "id": "KLA12025", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12025/", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-06-06T15:22:47", "description": "### *Detect date*:\n12/08/2020\n\n### *Severity*:\nHigh\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Developer Tools. Malicious users can exploit these vulnerabilities to spoof user interface, execute arbitrary code, bypass security restrictions.\n\n### *Affected products*:\nVisual Studio Code TS-Lint Extension \nMicrosoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) \nMicrosoft Visual Studio 2019 version 16.0 \nMicrosoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3) \nTeam Foundation Server 2017 Update 3.1 \nAzure DevOps Server 2019 Update 1.1 \nMicrosoft Visual Studio 2019 version 16.7 (includes 16.0 \u2013 16.6) \nAzure DevOps Server 2020 \nTeam Foundation Server 2018 Update 3.2 \nTeam Foundation Server 2015 Update 4.2 \nC SDK for Azure IoT \nTeam Foundation Server 2018 Update 1.2 \nAzure DevOps Server 2019.0.1 \nMicrosoft Visual Studio 2019 version 16.8 \nVisual Studio Code Remote - SSH Extension \nVisual Studio Code Language Support for Java Extension\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2020-17135](<https://nvd.nist.gov/vuln/detail/CVE-2020-17135>) \n[CVE-2020-17156](<https://nvd.nist.gov/vuln/detail/CVE-2020-17156>) \n[CVE-2020-17148](<https://nvd.nist.gov/vuln/detail/CVE-2020-17148>) \n[CVE-2020-17159](<https://nvd.nist.gov/vuln/detail/CVE-2020-17159>) \n[CVE-2020-17145](<https://nvd.nist.gov/vuln/detail/CVE-2020-17145>) \n[CVE-2020-17002](<https://nvd.nist.gov/vuln/detail/CVE-2020-17002>) \n[CVE-2020-17150](<https://nvd.nist.gov/vuln/detail/CVE-2020-17150>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Visual Studio](<https://threats.kaspersky.com/en/product/Microsoft-Visual-Studio/>)\n\n### *CVE-IDS*:\n[CVE-2020-17135](<https://vulners.com/cve/CVE-2020-17135>)4.9Warning \n[CVE-2020-17156](<https://vulners.com/cve/CVE-2020-17156>)6.8High \n[CVE-2020-17148](<https://vulners.com/cve/CVE-2020-17148>)6.8High \n[CVE-2020-17159](<https://vulners.com/cve/CVE-2020-17159>)6.8High \n[CVE-2020-17145](<https://vulners.com/cve/CVE-2020-17145>)4.9Warning \n[CVE-2020-17002](<https://vulners.com/cve/CVE-2020-17002>)9.4Critical \n[CVE-2020-17150](<https://vulners.com/cve/CVE-2020-17150>)6.8High\n\n### *Microsoft official advisories*:", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2020-12-08T00:00:00", "type": "kaspersky", "title": "KLA12020 Multiple vulnerabilities in Microsoft Developer Tools", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "COMPLETE", "baseScore": 9.4, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 9.2, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17002", "CVE-2020-17135", "CVE-2020-17145", "CVE-2020-17148", "CVE-2020-17150", "CVE-2020-17156", "CVE-2020-17159"], "modified": "2020-12-16T00:00:00", "id": "KLA12020", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12020/", "cvss": {"score": 9.4, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:N"}}, {"lastseen": "2023-06-06T15:22:46", "description": "### *Detect date*:\n12/08/2020\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Exchange Server. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information.\n\n### *Exploitation*:\nMalware exists for this vulnerability. Usually such malware is classified as Exploit. [More details](<https://threats.kaspersky.com/en/class/Exploit/>).\n\n### *Affected products*:\nMicrosoft Exchange Server 2013 Cumulative Update 23 \nMicrosoft Exchange Server 2016 Cumulative Update 18 \nMicrosoft Exchange Server 2016 Cumulative Update 17 \nMicrosoft Exchange Server 2010 Service Pack 3 Update Rollup 31 \nMicrosoft Exchange Server 2019 Cumulative Update 7 \nMicrosoft Exchange Server 2019 Cumulative Update 6\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2020-17132](<https://nvd.nist.gov/vuln/detail/CVE-2020-17132>) \n[CVE-2020-17117](<https://nvd.nist.gov/vuln/detail/CVE-2020-17117>) \n[CVE-2020-17144](<https://nvd.nist.gov/vuln/detail/CVE-2020-17144>) \n[CVE-2020-17141](<https://nvd.nist.gov/vuln/detail/CVE-2020-17141>) \n[CVE-2020-17143](<https://nvd.nist.gov/vuln/detail/CVE-2020-17143>) \n[CVE-2020-17142](<https://nvd.nist.gov/vuln/detail/CVE-2020-17142>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Exchange Server](<https://threats.kaspersky.com/en/product/Microsoft-Exchange-Server/>)\n\n### *CVE-IDS*:\n[CVE-2020-17132](<https://vulners.com/cve/CVE-2020-17132>)6.5High \n[CVE-2020-17117](<https://vulners.com/cve/CVE-2020-17117>)9.0Critical \n[CVE-2020-17144](<https://vulners.com/cve/CVE-2020-17144>)6.0High \n[CVE-2020-17141](<https://vulners.com/cve/CVE-2020-17141>)6.0High \n[CVE-2020-17143](<https://vulners.com/cve/CVE-2020-17143>)6.5High \n[CVE-2020-17142](<https://vulners.com/cve/CVE-2020-17142>)6.5High\n\n### *KB list*:\n[4593466](<http://support.microsoft.com/kb/4593466>) \n[4593465](<http://support.microsoft.com/kb/4593465>) \n[4593467](<http://support.microsoft.com/kb/4593467>)\n\n### *Microsoft official advisories*:", "cvss3": {"exploitabilityScore": 2.3, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 9.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 6.0}, "published": "2020-12-08T00:00:00", "type": "kaspersky", "title": "KLA12022 Multiple vulnerabilities in Microsoft Exchange Server", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17117", "CVE-2020-17132", "CVE-2020-17141", "CVE-2020-17142", "CVE-2020-17143", "CVE-2020-17144"], "modified": "2021-02-16T00:00:00", "id": "KLA12022", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12022/", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2023-06-06T15:22:43", "description": "### *Detect date*:\n12/08/2020\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Dynamics. Malicious users can exploit these vulnerabilities to spoof user interface, execute arbitrary code, obtain sensitive information.\n\n### *Affected products*:\nMicrosoft Dynamics 365 (on-premises) version 8.2 \nDynamics 365 for Finance and Operations \nMicrosoft Dynamics 365 (on-premises) version 9.0\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2020-17147](<https://nvd.nist.gov/vuln/detail/CVE-2020-17147>) \n[CVE-2020-17152](<https://nvd.nist.gov/vuln/detail/CVE-2020-17152>) \n[CVE-2020-17158](<https://nvd.nist.gov/vuln/detail/CVE-2020-17158>) \n[CVE-2020-17133](<https://nvd.nist.gov/vuln/detail/CVE-2020-17133>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Dynamics 365](<https://threats.kaspersky.com/en/product/Microsoft-Dynamics-365/>)\n\n### *CVE-IDS*:\n[CVE-2020-17147](<https://vulners.com/cve/CVE-2020-17147>)3.5Warning \n[CVE-2020-17152](<https://vulners.com/cve/CVE-2020-17152>)6.5High \n[CVE-2020-17158](<https://vulners.com/cve/CVE-2020-17158>)6.5High \n[CVE-2020-17133](<https://vulners.com/cve/CVE-2020-17133>)4.0Warning\n\n### *KB list*:\n[4595462](<http://support.microsoft.com/kb/4595462>) \n[4595459](<http://support.microsoft.com/kb/4595459>) \n[4583556](<http://support.microsoft.com/kb/4583556>)\n\n### *Microsoft official advisories*:", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-08T00:00:00", "type": "kaspersky", "title": "KLA12026 Multiple vulnerabilities in Microsoft Dynamics", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17133", "CVE-2020-17147", "CVE-2020-17152", "CVE-2020-17158"], "modified": "2020-12-16T00:00:00", "id": "KLA12026", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12026/", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-06T15:22:47", "description": "### *Detect date*:\n12/08/2020\n\n### *Severity*:\nHigh\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Azure. Malicious users can exploit these vulnerabilities to bypass security restrictions.\n\n### *Affected products*:\nAzure Sphere \nAzure SDK for Java\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2020-16971](<https://nvd.nist.gov/vuln/detail/CVE-2020-16971>) \n[CVE-2020-17160](<https://nvd.nist.gov/vuln/detail/CVE-2020-17160>) \n\n\n### *Impacts*:\nSB \n\n### *Related products*:\n[Microsoft Azure](<https://threats.kaspersky.com/en/product/Microsoft-Azure/>)\n\n### *CVE-IDS*:\n[CVE-2020-16971](<https://vulners.com/cve/CVE-2020-16971>)6.4High \n[CVE-2020-17160](<https://vulners.com/cve/CVE-2020-17160>)5.0Critical\n\n### *Microsoft official advisories*:", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2020-12-08T00:00:00", "type": "kaspersky", "title": "KLA12021 Multiple vulnerabilities in Microsoft Azure", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 6.4, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16971", "CVE-2020-17160"], "modified": "2020-12-16T00:00:00", "id": "KLA12021", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12021/", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-06-06T15:22:48", "description": "### *Detect date*:\n12/08/2020\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to spoof user interface, execute arbitrary code.\n\n### *Affected products*:\nChakraCore \nMicrosoft Edge (EdgeHTML-based) \nMicrosoft Edge for Android\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2020-17153](<https://nvd.nist.gov/vuln/detail/CVE-2020-17153>) \n[CVE-2020-17131](<https://nvd.nist.gov/vuln/detail/CVE-2020-17131>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Edge](<https://threats.kaspersky.com/en/product/Microsoft-Edge/>)\n\n### *CVE-IDS*:\n[CVE-2020-17153](<https://vulners.com/cve/CVE-2020-17153>)5.8High \n[CVE-2020-17131](<https://vulners.com/cve/CVE-2020-17131>)5.1High\n\n### *KB list*:\n[4592449](<http://support.microsoft.com/kb/4592449>) \n[4592440](<http://support.microsoft.com/kb/4592440>) \n[4592438](<http://support.microsoft.com/kb/4592438>)\n\n### *Microsoft official advisories*:", "cvss3": {"exploitabilityScore": 1.6, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-12-08T00:00:00", "type": "kaspersky", "title": "KLA12019 Multiple vulnerabilities in Microsoft Browsers", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17131", "CVE-2020-17153"], "modified": "2020-12-16T00:00:00", "id": "KLA12019", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12019/", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}], "threatpost": [{"lastseen": "2020-12-08T20:30:01", "description": "Microsoft has addressed 58 CVEs (nine of them critical) for its December 2020 Patch Tuesday update. This brings the computing giant\u2019s patch tally to 1,250 for the year \u2013 well beyond 2019\u2019s 840.\n\nThis month\u2019s security bugs affect Microsoft Windows, Edge (EdgeHTML-based), ChakraCore, Microsoft Office and Office Services and Web Apps, Exchange Server, Azure DevOps, Microsoft Dynamics, Visual Studio, Azure SDK and Azure Sphere, according to the update. None are listed as publicly known or under active attack. Also, no vulnerability was assigned a CVSSv3 severity score of 9.0 or higher.\n\n## **Critical Bug Breakdown**\n\nThree of the critical flaws are found in Microsoft Exchange (CVE-2020-17117, CVE-2020-17132 and CVE-2020-17142), all allowing remote code execution (RCE). [One of these](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17132>) occurs due to improper validation of cmdlet arguments, according to Microsoft, which doesn\u2019t provide an attack scenario but does note that the attacker needs be authenticated with privileges.\n\n\u201cThis indicates that if you take over someone\u2019s mailbox, you can take over the entire Exchange server,\u201d according to Dustin Childs at Trend Micro\u2019s Zero Day Initiative (ZDI), writing in a [Tuesday analysis](<https://www.zerodayinitiative.com/blog/2020/12/8/the-december-2020-security-update-review>). \u201cWith all of the other Exchange bugs, definitely prioritize your Exchange test and deployment.\u201d\n\n[](<https://threatpost.com/newsletter-sign/>)\n\nAlso on the Exchange front, [CVE-2020-17132](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17132>) addresses a patch bypass for CVE-2020-16875, which was reported and patched in September\u2019s Patch Tuesday release. While not critical, it\u2019s of note, Childs said.\n\nChilds also flagged [CVE-2020-17121](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17121>), one of two critical RCE bugs in Microsoft SharePoint (the other is [CVE-2020-17118](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17118>)). Originally reported through ZDI program, the bug could allow an authenticated user to execute arbitrary .NET code on an affected server in the context of the SharePoint Web Application service account.\n\n\u201cIn its default configuration, authenticated SharePoint users are able to create sites that provide all of the necessary permissions that are prerequisites for launching an attack,\u201d Childs explained. \u201cSimilar bugs [patched earlier this year](<https://threatpost.com/microsofts-patch-tuesday-critical-rce-bugs/159044/>) received quite a bit of attention. We suspect this one will, too.\u201d\n\nIn fact, the Sharepoint CVEs should take patching priority, Immersive Labs\u2019 Kevin Breen, director of cyberthreat research, said via email. \u201cBoth are rated as critical as they have RCE, and Sharepoint can be used like a watering hole inside large organizations by an attacker,\u201d he said. \u201cAll it takes is for a few weaponized documents to be placed for malicious code to spread across an organization.\u201d\n\nAnother critical bug of note is tracked as [CVE-2020-17095](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17095>), a Hyper-V RCE vulnerability that allows an attacker to escalate privileges from code execution in a Hyper-V guest to code execution on the Hyper-V host by passing invalid vSMB packet data. The flaw carries the highest CVSS score in the update, coming in at 8.5, since no special permissions are needed to exploit it.\n\n\u201cTo exploit this vulnerability, an adversary could run a custom application on a Hyper-V guest that would cause the Hyper-V host operating system to allow arbitrary code execution when it fails to properly validate vSMB packet data,\u201d explained Automox researcher Jay Goodman, via email. \u201cThe vulnerability is present on most builds of Windows 10 and Windows Server 2004 and forward.\u201d\n\nTwo post-authentication RCE flaws in Microsoft Dynamics 365 for Finance and Operations (on-premises) ([CVE-2020-17158](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17158>) and [CVE-2020-17152](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17152>)) round out the critical patches, along with a memory-corruption issue in the Chakra Scripting Engine, which impacts the Edge browser ([CVE-2020-17131](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17131>)).\n\n\u201cOnly one [of the critical-rated updates] (surprisingly) impacts the browser,\u201d Childs said. \u201cThat patch corrects a bug within the JIT compiler. By performing actions in JavaScript, an attacker can trigger a memory-corruption condition, which leads to code execution. The lack of browser updates could also be a conscious decision by Microsoft to ensure a bad patch for a browser does not disrupt online shopping during the holiday season.\u201d\n\nThough it\u2019s a lighter than usual month for the volume of patches, the steady flow of critical RCE bugs present a great deal of risk, said Justin Knapp, researcher at Automox, via email.\n\n\u201cInstead of having to manipulate a user to click a malicious link or attachment, bad actors merely have to target an unpatched system to gain initial access, at which point a number of methods can be employed to increase access to valuable assets,\u201d he said, referring to this month\u2019s critical RCE problems. \u201cIt goes without saying that the speed at which an organization can deploy these fixes will dictate the level of risk they take on.\u201d\n\n## **Other Bugs, Patching **\n\nIn addition to the critical bugs, a full 46 of the bugs are rated as important, and three are rated moderate in severity. The important bugs include 10 Office issues bugs impacting Outlook, PowerPoint and Excel \u2014 for these, Office 2019 versions for Mac do not have patches yet.\n\n\u201cThis is a book-end to a year that began with Microsoft addressing 49 CVEs in January of 2020, followed by eight consecutive months with over 90 CVEs addressed. In 2020, Microsoft released patches for over 1,200 CVEs,\u201d Satnam Narang, principal research engineer, Tenable, told Threatpost.\n\nPatching may be more difficult than ever going forward. \u201cOne of the things that stands out is that Microsoft has removed a lot of the detail they usually share with such advisories,\u201d Breen said. \u201cFor me, this could lead to some issues. Patching is not as easy as just clicking an update button and security teams like to gain a deeper understanding of what they are doing. Instead, however, they are expected to operate with less information.\u201d\n\nElsewhere, [Adobe issued patches](<https://threatpost.com/adobe-windows-macos-critical-severity-flaws/162007/>) for flaws tied to one important-rated and three critical-severity CVEs, during its regularly scheduled December security updates.\n\n\u201cWhile lighter than usual, the most severe allow for arbitrary code execution including three critical severity CVEs and one less severe (important-rated) flaw identified,\u201d Nick Colyer, researcher from Automox said. \u201cThe holidays present unique challenges to security teams\u2019 upcoming out-of-office time and the severity of the vulnerabilities Adobe has addressed are non-trivial against those challenges. It is important to prioritize any major vulnerabilities during holidays to reduce the threat surface exposed to would-be attackers.\u201d\n\n**_Put Ransomware on the Run: Save your spot for \u201cWhat\u2019s Next for Ransomware,\u201d a _**[**_FREE Threatpost webinar_**](<https://threatpost.com/webinars/whats-next-for-ransomware/?utm_source=ART&utm_medium=ART&utm_campaign=Dec_webinar>)**_ on Dec. 16 at 2 p.m. ET. Find out what\u2019s coming in the ransomware world and how to fight back. _**\n\n**_Get the latest from John (Austin) Merritt, Cyber Threat Intelligence Analyst at Digital Shadows; Limor Kessem, Executive Security Advisor, IBM Security; and Israel Barak, CISO at Cybereason, on new kinds of attacks. Topics will include the most dangerous ransomware threat actors, their evolving TTPs and what your organization needs to do to get ahead of the next, inevitable ransomware attack. _**[**_Register here_**](<https://threatpost.com/webinars/whats-next-for-ransomware/?utm_source=ART&utm_medium=ART&utm_campaign=Dec_webinar>)**_ for the Wed., Dec. 16 for this LIVE webinar._**\n\n**BONUS CONTENT: Download our exclusive **[**FREE Threatpost Insider eBook,**](<https://threatpost.com/ebooks/healthcare-security-woes-balloon-in-a-covid-era-world/?utm_source=FEATURE&utm_medium=FEATURE&utm_campaign=Nov_eBook>) [_**Healthcare Security Woes Balloon in a Covid-Era World**_](<https://threatpost.com/ebooks/healthcare-security-woes-balloon-in-a-covid-era-world/?utm_source=ART&utm_medium=ART&utm_campaign=Nov_eBook>)**, sponsored by ZeroNorth.**\n", "cvss3": {}, "published": "2020-12-08T20:23:30", "type": "threatpost", "title": "Microsoft Wraps Up a Lighter Patch Tuesday for the Holidays", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2020-16875", "CVE-2020-17095", "CVE-2020-17117", "CVE-2020-17118", "CVE-2020-17121", "CVE-2020-17131", "CVE-2020-17132", "CVE-2020-17142", "CVE-2020-17152", "CVE-2020-17158"], "modified": "2020-12-08T20:23:30", "id": "THREATPOST:02914A68EEB34D94544D5D00BF463BAC", "href": "https://threatpost.com/microsoft-patch-tuesday-holidays/162041/", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}], "qualysblog": [{"lastseen": "2020-12-12T10:20:59", "description": "This month\u2019s Microsoft Patch Tuesday addresses 58 vulnerabilities with 9 of them labeled as Critical. The 9 Critical vulnerabilities cover Exchange, SharePoint, Hyper-V, Chakra Scripting, and several other workstation vulnerabilities. Adobe released patches today for Experience Manager, Prelude, Lightroom and [pre-notification security advisory for Acrobat and Reader](<https://blogs.adobe.com/psirt/?p=1957>).\n\n### Workstation Patches\n\nToday\u2019s Patch Tuesday fixes vulnerabilities that would impact workstations. The Office, Edge, Chakra vulnerabilities should be prioritized for workstation-type devices, meaning any system that is used for email or to access the internet via a browser. This includes multi-user servers that are used as remote desktops for users.\n\n### Microsoft Exchange RCE\n\nMicrosoft patched five Remote Code Execution vulnerabilities in Exchange ([CVE-2020-17141](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17141>), [](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17142>)[CVE-2020-17142](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17142>), [CVE-2020-17144,](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17144>) [CVE-2020-17117](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17117>), [CVE-2020-17132](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17132>)), which would allow an attacker to run code as system by sending a malicious email. Microsoft does rank them as \u201cExploitation Less Likely,\u201d but due to the open attack vector, these patches should be prioritized on all Exchange Servers.\n\n### SharePoint RCE\n\nMicrosoft patched two RCEs ([CVE-2020-17121](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17121>) and [CVE-2020-17118](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17118>)) in SharePoint. [CVE-2020-17121](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17121>) allows an authenticated attacker to gain access to create a site and execute code remotely within the kernel. Because of this, it is highly recommended to prioritize these patches across all SharePoint deployments.\n\n### Hyper-V RCE\n\nMicrosoft also patched an RCE vulnerability in Hyper-V ([CVE-2020-17095](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17095>)) which allows an attacker to run malicious programs on Hyper-V virtual machine to execute arbitrary code on the host system when it fails to properly validate vSMB packet data. This should be prioritized on all Hyper-V systems.\n\n### Windows NTFS RCE\n\nWhile listed as Important, there is a RCE vulnerability ([CVE-2020-17096](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17096>)) in Microsoft Windows. A local attacker could exploit this vulnerability to elevate the attacker's privileges or a remote attacker with SMBv2 access to affected system could send malicious requests over the network. \n\n### Windows Lock Screen Security Bypass\n\nAn important vulnerability is patched by Microsoft ([CVE-2020-17099](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17099>)) where an attacker with physical access to the target system could perform actions on a locked system, thereby executing code from Windows lock screen in the context of the active user session. This patch should be prioritized across all Windows devices.\n\n### Adobe\n\nAdobe issued patches today covering multiple vulnerabilities in [Adobe Experience Manager](<https://helpx.adobe.com/security/products/experience-manager/apsb20-72.html>), [Lightroom](<https://helpx.adobe.com/security/products/lightroom/apsb20-74.html>), [Prelude](<https://helpx.adobe.com/security/products/reader-mobile/apsb20-71.htmlhttps://helpx.adobe.com/security/products/prelude/apsb20-70.html>) and [Pre-notification Security Advisory for Acrobat and Reader](<https://helpx.adobe.com/security/products/acrobat/apsb20-75.html>). The patches for Experience Manager and Acrobat/Reader are labeled as [Priority 2 ](<https://helpx.adobe.com/security/severity-ratings.html>), while the remaining patches are set to [Priority 3](<https://helpx.adobe.com/security/severity-ratings.html>).\n\nWhile none of the vulnerabilities disclosed in Adobe\u2019s release are known to be Actively Attacked today, all patches should be prioritized on systems with these products installed.\n\n### About Patch Tuesday\n\nPatch Tuesday QIDs are published at [Security Alerts](<https://www.qualys.com/research/security-alerts/>), typically late in the evening of [Patch Tuesday](<https://blog.qualys.com/tag/patch-tuesday>).", "cvss3": {}, "published": "2020-12-08T20:26:44", "type": "qualysblog", "title": "December 2020 Patch Tuesday \u2013 58 Vulnerabilities, 9 Critical, Windows Exchange, Hyper-V, SharePoint, Adobe", "bulletinFamily": "blog", "cvss2": {}, "cvelist": ["CVE-2020-17095", "CVE-2020-17096", "CVE-2020-17099", "CVE-2020-17117", "CVE-2020-17118", "CVE-2020-17121", "CVE-2020-17132", "CVE-2020-17141", "CVE-2020-17142", "CVE-2020-17144"], "modified": "2020-12-08T20:26:44", "id": "QUALYSBLOG:D6BB8795D96ECAD5C95596F19210BB13", "href": "https://blog.qualys.com/category/vulnerabilities-research", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "mscve": [{"lastseen": "2023-06-14T15:26:57", "description": "Windows Backup Engine Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-16958, CVE-2020-16959, CVE-2020-16960, CVE-2020-16961, CVE-2020-16963, CVE-2020-16964.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Windows Backup Engine Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16958", "CVE-2020-16959", "CVE-2020-16960", "CVE-2020-16961", "CVE-2020-16962", "CVE-2020-16963", "CVE-2020-16964"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-16962", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-16962", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-06-14T15:26:58", "description": "Windows Backup Engine Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-16958, CVE-2020-16960, CVE-2020-16961, CVE-2020-16962, CVE-2020-16963, CVE-2020-16964.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Windows Backup Engine Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16958", "CVE-2020-16959", "CVE-2020-16960", "CVE-2020-16961", "CVE-2020-16962", "CVE-2020-16963", "CVE-2020-16964"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-16959", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-16959", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-06-14T15:26:57", "description": "Windows Backup Engine Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-16958, CVE-2020-16959, CVE-2020-16960, CVE-2020-16961, CVE-2020-16962, CVE-2020-16964.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Windows Backup Engine Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16958", "CVE-2020-16959", "CVE-2020-16960", "CVE-2020-16961", "CVE-2020-16962", "CVE-2020-16963", "CVE-2020-16964"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-16963", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-16963", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-06-14T15:26:58", "description": "Windows Backup Engine Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-16959, CVE-2020-16960, CVE-2020-16961, CVE-2020-16962, CVE-2020-16963, CVE-2020-16964.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Windows Backup Engine Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16958", "CVE-2020-16959", "CVE-2020-16960", "CVE-2020-16961", "CVE-2020-16962", "CVE-2020-16963", "CVE-2020-16964"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-16958", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-16958", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-06-14T15:26:58", "description": "Windows Backup Engine Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-16958, CVE-2020-16959, CVE-2020-16960, CVE-2020-16962, CVE-2020-16963, CVE-2020-16964.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Windows Backup Engine Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16958", "CVE-2020-16959", "CVE-2020-16960", "CVE-2020-16961", "CVE-2020-16962", "CVE-2020-16963", "CVE-2020-16964"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-16961", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-16961", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-06-14T15:26:58", "description": "Windows Backup Engine Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-16958, CVE-2020-16959, CVE-2020-16961, CVE-2020-16962, CVE-2020-16963, CVE-2020-16964.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Windows Backup Engine Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16958", "CVE-2020-16959", "CVE-2020-16960", "CVE-2020-16961", "CVE-2020-16962", "CVE-2020-16963", "CVE-2020-16964"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-16960", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-16960", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-06-14T15:26:57", "description": "Windows Backup Engine Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-16958, CVE-2020-16959, CVE-2020-16960, CVE-2020-16961, CVE-2020-16962, CVE-2020-16963.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Windows Backup Engine Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16958", "CVE-2020-16959", "CVE-2020-16960", "CVE-2020-16961", "CVE-2020-16962", "CVE-2020-16963", "CVE-2020-16964"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-16964", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-16964", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-06-14T15:26:55", "description": "Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17122, CVE-2020-17123, CVE-2020-17125, CVE-2020-17127, CVE-2020-17129.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Microsoft Excel Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17122", "CVE-2020-17123", "CVE-2020-17125", "CVE-2020-17127", "CVE-2020-17128", "CVE-2020-17129"], "modified": "2020-12-15T08:00:00", "id": "MS:CVE-2020-17128", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17128", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-06-14T15:26:55", "description": "Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17122, CVE-2020-17123, CVE-2020-17125, CVE-2020-17128, CVE-2020-17129.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Microsoft Excel Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17122", "CVE-2020-17123", "CVE-2020-17125", "CVE-2020-17127", "CVE-2020-17128", "CVE-2020-17129"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17127", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17127", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-06-14T15:26:56", "description": "Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17123, CVE-2020-17125, CVE-2020-17127, CVE-2020-17128, CVE-2020-17129.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Microsoft Excel Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17122", "CVE-2020-17123", "CVE-2020-17125", "CVE-2020-17127", "CVE-2020-17128", "CVE-2020-17129"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17122", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17122", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-06-14T15:26:56", "description": "Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17122, CVE-2020-17125, CVE-2020-17127, CVE-2020-17128, CVE-2020-17129.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Microsoft Excel Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17122", "CVE-2020-17123", "CVE-2020-17125", "CVE-2020-17127", "CVE-2020-17128", "CVE-2020-17129"], "modified": "2020-12-15T08:00:00", "id": "MS:CVE-2020-17123", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17123", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-06-14T15:26:55", "description": "Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17122, CVE-2020-17123, CVE-2020-17127, CVE-2020-17128, CVE-2020-17129.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Microsoft Excel Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17122", "CVE-2020-17123", "CVE-2020-17125", "CVE-2020-17127", "CVE-2020-17128", "CVE-2020-17129"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17125", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17125", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-06-14T15:26:55", "description": "Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17122, CVE-2020-17123, CVE-2020-17125, CVE-2020-17127, CVE-2020-17128.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Microsoft Excel Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17122", "CVE-2020-17123", "CVE-2020-17125", "CVE-2020-17127", "CVE-2020-17128", "CVE-2020-17129"], "modified": "2020-12-10T08:00:00", "id": "MS:CVE-2020-17129", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17129", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-06-14T15:27:02", "description": "Microsoft Exchange Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17132, CVE-2020-17141, CVE-2020-17142, CVE-2020-17144.", "cvss3": {"exploitabilityScore": 1.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 7.2, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Microsoft Exchange Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17117", "CVE-2020-17132", "CVE-2020-17141", "CVE-2020-17142", "CVE-2020-17144"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17117", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17117", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2023-06-14T15:27:00", "description": "Microsoft Exchange Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17117, CVE-2020-17132, CVE-2020-17142, CVE-2020-17144.", "cvss3": {"exploitabilityScore": 1.7, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 8.4, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 6.0}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Microsoft Exchange Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.0, "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17117", "CVE-2020-17132", "CVE-2020-17141", "CVE-2020-17142", "CVE-2020-17144"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17141", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17141", "cvss": {"score": 6.0, "vector": "AV:N/AC:M/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-14T15:27:00", "description": "Microsoft Exchange Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17117, CVE-2020-17132, CVE-2020-17141, CVE-2020-17144.", "cvss3": {"exploitabilityScore": 2.3, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 9.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 6.0}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Microsoft Exchange Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17117", "CVE-2020-17132", "CVE-2020-17141", "CVE-2020-17142", "CVE-2020-17144"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17142", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17142", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-14T15:27:00", "description": "Microsoft Exchange Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17117, CVE-2020-17132, CVE-2020-17141, CVE-2020-17142.", "cvss3": {"exploitabilityScore": 1.7, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 8.4, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 6.0}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Microsoft Exchange Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.0, "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17117", "CVE-2020-17132", "CVE-2020-17141", "CVE-2020-17142", "CVE-2020-17144"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17144", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17144", "cvss": {"score": 6.0, "vector": "AV:N/AC:M/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-14T15:27:01", "description": "Microsoft Exchange Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17117, CVE-2020-17141, CVE-2020-17142, CVE-2020-17144.", "cvss3": {"exploitabilityScore": 2.3, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 9.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 6.0}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Microsoft Exchange Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17117", "CVE-2020-17132", "CVE-2020-17141", "CVE-2020-17142", "CVE-2020-17144"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17132", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17132", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-14T15:27:01", "description": "Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17103, CVE-2020-17136.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17103", "CVE-2020-17134", "CVE-2020-17136"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17134", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17134", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-14T15:27:01", "description": "Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17103, CVE-2020-17134.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17103", "CVE-2020-17134", "CVE-2020-17136"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17136", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17136", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-14T15:27:02", "description": "Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17134, CVE-2020-17136.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17103", "CVE-2020-17134", "CVE-2020-17136"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17103", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17103", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-06-14T15:26:59", "description": "Microsoft Dynamics 365 for Finance and Operations (on-premises) Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17152.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Microsoft Dynamics 365 for Finance and Operations (on-premises) Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17152", "CVE-2020-17158"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17158", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17158", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-14T15:26:58", "description": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "RETRACTED", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "COMPLETE", "baseScore": 9.4, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 9.2, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17002", "CVE-2020-17160"], "modified": "2020-12-09T08:00:00", "id": "MS:CVE-2020-17160", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17160", "cvss": {"score": 9.4, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:N"}}, {"lastseen": "2023-06-14T15:27:03", "description": "Windows Error Reporting Information Disclosure Vulnerability This CVE ID is unique from CVE-2020-17138.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Windows Error Reporting Information Disclosure Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17094", "CVE-2020-17138"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17094", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17094", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2023-06-14T15:26:59", "description": "Microsoft Dynamics 365 for Finance and Operations (on-premises) Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17158.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Microsoft Dynamics 365 for Finance and Operations (on-premises) Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17152", "CVE-2020-17158"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17152", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17152", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-14T15:27:00", "description": "Windows Error Reporting Information Disclosure Vulnerability This CVE ID is unique from CVE-2020-17094.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Windows Error Reporting Information Disclosure Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17094", "CVE-2020-17138"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17138", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17138", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2023-06-14T15:26:56", "description": "Microsoft SharePoint Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17118.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Microsoft SharePoint Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17118", "CVE-2020-17121"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17121", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17121", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-14T15:27:01", "description": "Microsoft SharePoint Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17121.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Microsoft SharePoint Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17118", "CVE-2020-17121"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17118", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17118", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-06-14T15:27:00", "description": "DirectX Graphics Kernel Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "DirectX Graphics Kernel Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17137"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17137", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17137", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-14T15:26:57", "description": "Azure SDK for Java Security Feature Bypass Vulnerability", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Azure SDK for Java Security Feature Bypass Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 6.4, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16971"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-16971", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-16971", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-06-14T15:26:54", "description": "Azure DevOps Server and Team Foundation Services Spoofing Vulnerability", "cvss3": {"exploitabilityScore": 2.3, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "baseScore": 5.4, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Azure DevOps Server and Team Foundation Services Spoofing Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.9, "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17145"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17145", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17145", "cvss": {"score": 4.9, "vector": "AV:N/AC:M/Au:S/C:P/I:P/A:N"}}, {"lastseen": "2023-06-14T15:26:59", "description": "Visual Studio Code Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "CVE-2020-17150", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17150"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17150", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17150", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-14T15:27:02", "description": "Windows Lock Screen Security Feature Bypass Vulnerability", "cvss3": {"exploitabilityScore": 0.9, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 6.8, "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Windows Lock Screen Security Feature Bypass Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17099"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17099", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17099", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-08-05T21:02:06", "description": "Visual Studio Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Visual Studio Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17156"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17156", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17156", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-14T15:26:54", "description": "Microsoft Edge for Android Spoofing Vulnerability", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 6.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Microsoft Edge for Android Spoofing Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17153"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17153", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17153", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2023-06-14T15:26:56", "description": "Microsoft SharePoint Spoofing Vulnerability", "cvss3": {"exploitabilityScore": 2.1, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.0, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Microsoft SharePoint Server Spoofing Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.0, "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17115"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17115", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17115", "cvss": {"score": 6.0, "vector": "AV:N/AC:M/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-14T15:27:01", "description": "Azure DevOps Server Spoofing Vulnerability", "cvss3": {"exploitabilityScore": 2.3, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "baseScore": 5.4, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Azure DevOps Server Spoofing Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.9, "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17135"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17135", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17135", "cvss": {"score": 4.9, "vector": "AV:N/AC:M/Au:S/C:P/I:P/A:N"}}, {"lastseen": "2023-06-14T15:26:56", "description": "Microsoft SharePoint Information Disclosure Vulnerability", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 6.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Microsoft SharePoint Information Disclosure Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17120"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17120", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17120", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}}, {"lastseen": "2023-06-14T15:27:01", "description": "Microsoft Outlook Information Disclosure Vulnerability", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Microsoft Outlook Information Disclosure Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17119"], "modified": "2020-12-15T08:00:00", "id": "MS:CVE-2020-17119", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17119", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2023-06-14T15:26:55", "description": "Microsoft Excel Information Disclosure Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Microsoft Excel Information Disclosure Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17126"], "modified": "2020-12-15T08:00:00", "id": "MS:CVE-2020-17126", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17126", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2023-06-14T15:26:54", "description": "Chakra Scripting Engine Memory Corruption Vulnerability", "cvss3": {"exploitabilityScore": 1.6, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Chakra Scripting Engine Memory Corruption Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 5.1, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17131"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17131", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17131", "cvss": {"score": 5.1, "vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-14T15:26:57", "description": "Azure SDK for C Security Feature Bypass Vulnerability", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Azure SDK for C Security Feature Bypass Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "COMPLETE", "baseScore": 9.4, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 9.2, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17002"], "modified": "2020-12-10T08:00:00", "id": "MS:CVE-2020-17002", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17002", "cvss": {"score": 9.4, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:N"}}, {"lastseen": "2023-06-14T15:27:00", "description": "Windows Overlay Filter Security Feature Bypass Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Windows Overlay Filter Security Feature Bypass Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17139"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17139", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17139", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-14T15:27:03", "description": "Windows Network Connections Service Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Windows Network Connections Service Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17092"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17092", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17092", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-06-14T15:27:03", "description": "Microsoft SharePoint Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 2.1, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.0, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Microsoft SharePoint Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.0, "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17089"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17089", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17089", "cvss": {"score": 6.0, "vector": "AV:N/AC:M/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-14T15:26:55", "description": "Microsoft Excel Security Feature Bypass Vulnerability", "cvss3": {"exploitabilityScore": 0.6, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 6.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Microsoft Excel Security Feature Bypass Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.0, "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17130"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17130", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17130", "cvss": {"score": 6.0, "vector": "AV:N/AC:M/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-14T15:26:58", "description": "Visual Studio Code Java Extension Pack Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Visual Studio Code Java Extension Pack Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17159"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17159", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17159", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-14T15:26:57", "description": "Kerberos Security Feature Bypass Vulnerability", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 6.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Kerberos Security Feature Bypass Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16996"], "modified": "2021-03-12T08:00:00", "id": "MS:CVE-2020-16996", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-16996", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:P/A:N"}}, {"lastseen": "2023-06-14T15:26:59", "description": "Dynamics CRM Webclient Cross-site Scripting Vulnerability", "cvss3": {"exploitabilityScore": 2.3, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "baseScore": 5.4, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Dynamics CRM Webclient Cross-site Scripting Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "LOW", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 3.5, "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17147"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17147", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17147", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N"}}, {"lastseen": "2023-06-14T15:26:59", "description": "Visual Studio Code Remote Development Extension Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Visual Studio Code Remote Development Extension Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17148"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17148", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17148", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-14T15:26:54", "description": "Windows SMB Information Disclosure Vulnerability", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 6.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Windows SMB Information Disclosure Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17140"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17140", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17140", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}}, {"lastseen": "2023-06-14T15:26:55", "description": "Microsoft PowerPoint Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Microsoft PowerPoint Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17124"], "modified": "2020-12-15T08:00:00", "id": "MS:CVE-2020-17124", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17124", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-06-14T15:27:02", "description": "Windows NTFS Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mscve", "title": "Windows NTFS Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17096"], "modified": "2020-12-08T08:00:00", "id": "MS:CVE-2020-17096", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17096", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}], "cve": [{"lastseen": "2023-06-06T14:30:14", "description": "Windows Backup Engine Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-16958, CVE-2020-16959, CVE-2020-16960, CVE-2020-16961, CVE-2020-16963, CVE-2020-16964.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-16962", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16958", "CVE-2020-16959", "CVE-2020-16960", "CVE-2020-16961", "CVE-2020-16962", "CVE-2020-16963", "CVE-2020-16964"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_7:-", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2016:1903", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2016:-"], "id": "CVE-2020-16962", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16962", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:x64:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:13", "description": "Windows Backup Engine Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-16958, CVE-2020-16960, CVE-2020-16961, CVE-2020-16962, CVE-2020-16963, CVE-2020-16964.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-16959", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16958", "CVE-2020-16959", "CVE-2020-16960", "CVE-2020-16961", "CVE-2020-16962", "CVE-2020-16963", "CVE-2020-16964"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_7:-", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2016:1903", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2016:-"], "id": "CVE-2020-16959", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16959", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:x64:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:15", "description": "Windows Backup Engine Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-16958, CVE-2020-16959, CVE-2020-16961, CVE-2020-16962, CVE-2020-16963, CVE-2020-16964.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-16960", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16958", "CVE-2020-16959", "CVE-2020-16960", "CVE-2020-16961", "CVE-2020-16962", "CVE-2020-16963", "CVE-2020-16964"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_7:-", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2016:1903", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2016:-"], "id": "CVE-2020-16960", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16960", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:x64:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:17", "description": "Windows Backup Engine Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-16958, CVE-2020-16959, CVE-2020-16960, CVE-2020-16962, CVE-2020-16963, CVE-2020-16964.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-16961", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16958", "CVE-2020-16959", "CVE-2020-16960", "CVE-2020-16961", "CVE-2020-16962", "CVE-2020-16963", "CVE-2020-16964"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_7:-", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2016:1903", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2016:-"], "id": "CVE-2020-16961", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16961", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:x64:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:15", "description": "Windows Backup Engine Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-16958, CVE-2020-16959, CVE-2020-16960, CVE-2020-16961, CVE-2020-16962, CVE-2020-16964.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-16963", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16958", "CVE-2020-16959", "CVE-2020-16960", "CVE-2020-16961", "CVE-2020-16962", "CVE-2020-16963", "CVE-2020-16964"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_7:-", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2016:1903", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2016:-"], "id": "CVE-2020-16963", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16963", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:x64:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:13", "description": "Windows Backup Engine Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-16959, CVE-2020-16960, CVE-2020-16961, CVE-2020-16962, CVE-2020-16963, CVE-2020-16964.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-16958", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16958", "CVE-2020-16959", "CVE-2020-16960", "CVE-2020-16961", "CVE-2020-16962", "CVE-2020-16963", "CVE-2020-16964"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_7:-", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2016:1903", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2016:-"], "id": "CVE-2020-16958", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16958", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:x64:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:15", "description": "Windows Backup Engine Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-16958, CVE-2020-16959, CVE-2020-16960, CVE-2020-16961, CVE-2020-16962, CVE-2020-16963.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-16964", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16958", "CVE-2020-16959", "CVE-2020-16960", "CVE-2020-16961", "CVE-2020-16962", "CVE-2020-16963", "CVE-2020-16964"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_7:-", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2016:1903", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2016:-"], "id": "CVE-2020-16964", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16964", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:x64:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:46", "description": "Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17122, CVE-2020-17123, CVE-2020-17125, CVE-2020-17128, CVE-2020-17129.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17127", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17122", "CVE-2020-17123", "CVE-2020-17125", "CVE-2020-17127", "CVE-2020-17128", "CVE-2020-17129"], "modified": "2021-03-03T21:31:00", "cpe": ["cpe:/a:microsoft:excel:2010"], "id": "CVE-2020-17127", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17127", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:48", "description": "Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17122, CVE-2020-17123, CVE-2020-17125, CVE-2020-17127, CVE-2020-17128.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17129", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17122", "CVE-2020-17123", "CVE-2020-17125", "CVE-2020-17127", "CVE-2020-17128", "CVE-2020-17129"], "modified": "2021-03-03T21:41:00", "cpe": ["cpe:/a:microsoft:office_web_apps:2013", "cpe:/a:microsoft:office:2019", "cpe:/a:microsoft:excel:2016", "cpe:/a:microsoft:excel:2010", "cpe:/a:microsoft:365_apps:-", "cpe:/a:microsoft:excel:2013", "cpe:/a:microsoft:office_online_server:-"], "id": "CVE-2020-17129", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17129", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_online_server:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_web_apps:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:-:*:*", "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:44", "description": "Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17122, CVE-2020-17123, CVE-2020-17127, CVE-2020-17128, CVE-2020-17129.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17125", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17122", "CVE-2020-17123", "CVE-2020-17125", "CVE-2020-17127", "CVE-2020-17128", "CVE-2020-17129"], "modified": "2021-03-03T21:32:00", "cpe": ["cpe:/a:microsoft:office_web_apps:2013", "cpe:/a:microsoft:office:2019", "cpe:/a:microsoft:excel:2016", "cpe:/a:microsoft:excel:2010", "cpe:/a:microsoft:365_apps:-", "cpe:/a:microsoft:excel:2013", "cpe:/a:microsoft:office_online_server:-"], "id": "CVE-2020-17125", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17125", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_online_server:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_web_apps:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:-:*:*", "cpe:2.3:a:microsoft:excel:2010:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:44", "description": "Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17122, CVE-2020-17125, CVE-2020-17127, CVE-2020-17128, CVE-2020-17129.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17123", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17122", "CVE-2020-17123", "CVE-2020-17125", "CVE-2020-17127", "CVE-2020-17128", "CVE-2020-17129"], "modified": "2021-03-03T21:43:00", "cpe": ["cpe:/a:microsoft:office_web_apps:2013", "cpe:/a:microsoft:excel:2016", "cpe:/a:microsoft:excel:2019", "cpe:/a:microsoft:excel:2010", "cpe:/a:microsoft:365_apps:-", "cpe:/a:microsoft:excel:2013", "cpe:/a:microsoft:office_online_server:-"], "id": "CVE-2020-17123", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17123", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_online_server:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_web_apps:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:excel:2019:*:*:*:*:-:*:*", "cpe:2.3:a:microsoft:excel:2019:*:*:*:*:macos:*:*", "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:44", "description": "Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17123, CVE-2020-17125, CVE-2020-17127, CVE-2020-17128, CVE-2020-17129.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17122", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17122", "CVE-2020-17123", "CVE-2020-17125", "CVE-2020-17127", "CVE-2020-17128", "CVE-2020-17129"], "modified": "2021-03-03T21:52:00", "cpe": ["cpe:/a:microsoft:office_web_apps:2010", "cpe:/a:microsoft:office:2010", "cpe:/a:microsoft:sharepoint_server:2010"], "id": "CVE-2020-17122", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17122", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_web_apps:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:44", "description": "Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17122, CVE-2020-17123, CVE-2020-17125, CVE-2020-17127, CVE-2020-17129.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17128", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17122", "CVE-2020-17123", "CVE-2020-17125", "CVE-2020-17127", "CVE-2020-17128", "CVE-2020-17129"], "modified": "2021-03-04T18:25:00", "cpe": ["cpe:/a:microsoft:office_web_apps:2013", "cpe:/a:microsoft:office:2016", "cpe:/a:microsoft:office:2019", "cpe:/a:microsoft:excel:2016", "cpe:/a:microsoft:excel:2010", "cpe:/a:microsoft:365_apps:-", "cpe:/a:microsoft:office:2010", "cpe:/a:microsoft:excel:2013", "cpe:/a:microsoft:office_online_server:-"], "id": "CVE-2020-17128", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17128", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:microsoft:office_online_server:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2016:*:-:*:-:*:-:*", "cpe:2.3:a:microsoft:office_web_apps:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:-:*:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:macos:*:*", "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:46", "description": "Microsoft Exchange Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17117, CVE-2020-17141, CVE-2020-17142, CVE-2020-17144.", "cvss3": {"exploitabilityScore": 2.3, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 9.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 6.0}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17132", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17117", "CVE-2020-17132", "CVE-2020-17141", "CVE-2020-17142", "CVE-2020-17144"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/a:microsoft:exchange_server:2019", "cpe:/a:microsoft:exchange_server:2013", "cpe:/a:microsoft:exchange_server:2016"], "id": "CVE-2020-17132", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17132", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_6:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_18:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_7:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_17:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:47", "description": "Microsoft Exchange Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17117, CVE-2020-17132, CVE-2020-17141, CVE-2020-17144.", "cvss3": {"exploitabilityScore": 2.3, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 9.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 6.0}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17142", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17117", "CVE-2020-17132", "CVE-2020-17141", "CVE-2020-17142", "CVE-2020-17144"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/a:microsoft:exchange_server:2019", "cpe:/a:microsoft:exchange_server:2013", "cpe:/a:microsoft:exchange_server:2016"], "id": "CVE-2020-17142", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17142", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_6:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_18:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_7:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_17:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:42", "description": "Microsoft Exchange Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17132, CVE-2020-17141, CVE-2020-17142, CVE-2020-17144.", "cvss3": {"exploitabilityScore": 1.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 7.2, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17117", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17117", "CVE-2020-17132", "CVE-2020-17141", "CVE-2020-17142", "CVE-2020-17144"], "modified": "2021-03-04T18:30:00", "cpe": ["cpe:/a:microsoft:exchange_server:2019", "cpe:/a:microsoft:exchange_server:2013", "cpe:/a:microsoft:exchange_server:2016"], "id": "CVE-2020-17117", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17117", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_6:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_18:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_7:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_17:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:47", "description": "Microsoft Exchange Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17117, CVE-2020-17132, CVE-2020-17142, CVE-2020-17144.", "cvss3": {"exploitabilityScore": 1.7, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 8.4, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 6.0}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17141", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.0, "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17117", "CVE-2020-17132", "CVE-2020-17141", "CVE-2020-17142", "CVE-2020-17144"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/a:microsoft:exchange_server:2019", "cpe:/a:microsoft:exchange_server:2016"], "id": "CVE-2020-17141", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17141", "cvss": {"score": 6.0, "vector": "AV:N/AC:M/Au:S/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_7:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_17:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_18:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_6:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:47", "description": "Microsoft Exchange Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17117, CVE-2020-17132, CVE-2020-17141, CVE-2020-17142.", "cvss3": {"exploitabilityScore": 1.7, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 8.4, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 6.0}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17144", "cwe": ["CWE-502"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.0, "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17117", "CVE-2020-17132", "CVE-2020-17141", "CVE-2020-17142", "CVE-2020-17144"], "modified": "2022-07-12T17:42:00", "cpe": ["cpe:/a:microsoft:exchange_server:2010"], "id": "CVE-2020-17144", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17144", "cvss": {"score": 6.0, "vector": "AV:N/AC:M/Au:S/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_31:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:45", "description": "Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17134, CVE-2020-17136.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17103", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17103", "CVE-2020-17134", "CVE-2020-17136"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2016:1903", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2016:-"], "id": "CVE-2020-17103", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17103", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:46", "description": "Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17103, CVE-2020-17134.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17136", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17103", "CVE-2020-17134", "CVE-2020-17136"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2016:1903", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2016:20h2"], "id": "CVE-2020-17136", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17136", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*"]}, {"lastseen": "2023-06-06T14:30:46", "description": "Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17103, CVE-2020-17136.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17134", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17103", "CVE-2020-17134", "CVE-2020-17136"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2016:1903", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2016:20h2"], "id": "CVE-2020-17134", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17134", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*"]}, {"lastseen": "2023-06-06T14:30:49", "description": "Microsoft Dynamics 365 for Finance and Operations (on-premises) Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17152.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17158", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17152", "CVE-2020-17158"], "modified": "2021-07-21T11:39:00", "cpe": [], "id": "CVE-2020-17158", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17158", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": []}, {"lastseen": "2023-06-06T14:30:48", "description": "Microsoft Dynamics 365 for Finance and Operations (on-premises) Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17158.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17152", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17152", "CVE-2020-17158"], "modified": "2021-07-21T11:39:00", "cpe": [], "id": "CVE-2020-17152", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17152", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": []}, {"lastseen": "2023-06-06T14:30:47", "description": "Windows Error Reporting Information Disclosure Vulnerability This CVE ID is unique from CVE-2020-17094.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17138", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17094", "CVE-2020-17138"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_10:1607"], "id": "CVE-2020-17138", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17138", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:39", "description": "Windows Error Reporting Information Disclosure Vulnerability This CVE ID is unique from CVE-2020-17138.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17094", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17094", "CVE-2020-17138"], "modified": "2021-03-03T21:34:00", "cpe": ["cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2016:1903", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2016:-"], "id": "CVE-2020-17094", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17094", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:43", "description": "Microsoft SharePoint Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17121.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17118", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17118", "CVE-2020-17121"], "modified": "2021-03-03T21:42:00", "cpe": ["cpe:/a:microsoft:sharepoint_server:2016", "cpe:/a:microsoft:sharepoint_foundation:2010", "cpe:/a:microsoft:sharepoint_server:2019", "cpe:/a:microsoft:sharepoint_foundation:2013"], "id": "CVE-2020-17118", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17118", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*", "cpe:2.3:a:microsoft:sharepoint_foundation:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:42", "description": "Microsoft SharePoint Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17118.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17121", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17118", "CVE-2020-17121"], "modified": "2021-03-04T18:30:00", "cpe": ["cpe:/a:microsoft:sharepoint_server:2016", "cpe:/a:microsoft:sharepoint_foundation:2010", "cpe:/a:microsoft:sharepoint_server:2019", "cpe:/a:microsoft:sharepoint_foundation:2013"], "id": "CVE-2020-17121", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17121", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*", "cpe:2.3:a:microsoft:sharepoint_foundation:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:43", "description": "Microsoft Outlook Information Disclosure Vulnerability", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17119", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17119"], "modified": "2021-08-30T14:28:00", "cpe": ["cpe:/a:microsoft:outlook:2010", "cpe:/a:microsoft:office:2019", "cpe:/a:microsoft:outlook:2016", "cpe:/a:microsoft:365_apps:-", "cpe:/a:microsoft:outlook:2013"], "id": "CVE-2020-17119", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17119", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:microsoft:outlook:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", "cpe:2.3:a:microsoft:outlook:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:macos:*:*", "cpe:2.3:a:microsoft:outlook:2013:sp1:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:50", "description": "DirectX Graphics Kernel Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17137", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17137"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_10:2004"], "id": "CVE-2020-17137", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17137", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:49", "description": "Microsoft Edge for Android Spoofing Vulnerability", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 6.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17153", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17153"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/a:microsoft:edge:-"], "id": "CVE-2020-17153", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17153", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}, "cpe23": ["cpe:2.3:a:microsoft:edge:-:*:*:*:*:android:*:*"]}, {"lastseen": "2023-06-06T14:30:49", "description": "Visual Studio Code Java Extension Pack Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17159", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17159"], "modified": "2021-07-21T11:39:00", "cpe": [], "id": "CVE-2020-17159", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17159", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": []}, {"lastseen": "2023-06-06T14:30:48", "description": "Visual Studio Code Remote Development Extension Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17148", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17148"], "modified": "2021-07-21T11:39:00", "cpe": [], "id": "CVE-2020-17148", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17148", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": []}, {"lastseen": "2023-06-06T14:30:47", "description": "Azure DevOps Server and Team Foundation Services Spoofing Vulnerability", "cvss3": {"exploitabilityScore": 2.3, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "baseScore": 5.4, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17145", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.9, "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17145"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:azure_devops_server:2020", "cpe:/a:microsoft:team_foundation_server:2015", "cpe:/a:microsoft:team_foundation_server:2018", "cpe:/a:microsoft:team_foundation_server:2017", "cpe:/o:microsoft:azure_devops_server:2019.0.1", "cpe:/o:microsoft:azure_devops_server:2019"], "id": "CVE-2020-17145", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17145", "cvss": {"score": 4.9, "vector": "AV:N/AC:M/Au:S/C:P/I:P/A:N"}, "cpe23": ["cpe:2.3:a:microsoft:team_foundation_server:2015:4.2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:team_foundation_server:2017:3.1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:team_foundation_server:2018:3.2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:azure_devops_server:2019:update1.1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:azure_devops_server:2020:-:*:*:*:*:*:*", "cpe:2.3:a:microsoft:team_foundation_server:2018:1.2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:azure_devops_server:2019.0.1:-:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T14:35:46", "description": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.", "cvss3": {}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17160", "cwe": [], "bulletinFamily": "NVD", "cvss2": {}, "cvelist": ["CVE-2020-17160"], "modified": "2021-02-05T16:15:00", "cpe": [], "id": "CVE-2020-17160", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17160", "cvss": {"score": 0.0, "vector": "NONE"}, "cpe23": []}, {"lastseen": "2023-06-06T14:30:18", "description": "Azure SDK for Java Security Feature Bypass Vulnerability", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-16971", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 6.4, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16971"], "modified": "2021-03-03T21:33:00", "cpe": ["cpe:/a:microsoft:azure_sdk_for_java:-"], "id": "CVE-2020-16971", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16971", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:N"}, "cpe23": ["cpe:2.3:a:microsoft:azure_sdk_for_java:-:*:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:40", "description": "Windows Lock Screen Security Feature Bypass Vulnerability", "cvss3": {"exploitabilityScore": 0.9, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 6.8, "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17099", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17099"], "modified": "2021-03-03T21:51:00", "cpe": ["cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_server_2016:-"], "id": "CVE-2020-17099", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17099", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:54", "description": "Visual Studio Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17156", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17156"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/a:microsoft:visual_studio_2017:15.9", "cpe:/a:microsoft:visual_studio_2019:16.8"], "id": "CVE-2020-17156", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17156", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:microsoft:visual_studio_2017:15.9:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_studio_2019:16.8:*:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:51", "description": "Azure DevOps Server Spoofing Vulnerability", "cvss3": {"exploitabilityScore": 2.3, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "baseScore": 5.4, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17135", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.9, "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17135"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:azure_devops_server:2019.0.1", "cpe:/o:microsoft:azure_devops_server:2019"], "id": "CVE-2020-17135", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17135", "cvss": {"score": 4.9, "vector": "AV:N/AC:M/Au:S/C:P/I:P/A:N"}, "cpe23": ["cpe:2.3:o:microsoft:azure_devops_server:2019:update1.1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:azure_devops_server:2019.0.1:-:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:44", "description": "Microsoft Excel Security Feature Bypass Vulnerability", "cvss3": {"exploitabilityScore": 0.6, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 6.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17130", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.0, "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17130"], "modified": "2021-03-04T18:24:00", "cpe": ["cpe:/a:microsoft:excel:2016", "cpe:/a:microsoft:365_apps:-"], "id": "CVE-2020-17130", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17130", "cvss": {"score": 6.0, "vector": "AV:N/AC:M/Au:S/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:47", "description": "Windows SMB Information Disclosure Vulnerability", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 6.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17140", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17140"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_7:-", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2016:1903", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1909"], "id": "CVE-2020-17140", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17140", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*"]}, {"lastseen": "2023-06-06T14:30:21", "description": "Kerberos Security Feature Bypass Vulnerability", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 6.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-16996", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16996"], "modified": "2021-03-03T21:13:00", "cpe": ["cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2016:1903", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2016:-"], "id": "CVE-2020-16996", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16996", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:51", "description": "Visual Studio Code Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17150", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17150"], "modified": "2021-07-21T11:39:00", "cpe": [], "id": "CVE-2020-17150", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17150", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": []}, {"lastseen": "2023-06-06T14:30:47", "description": "Windows Overlay Filter Security Feature Bypass Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17139", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17139"], "modified": "2021-03-03T21:17:00", "cpe": ["cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2016:1903", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2016:20h2"], "id": "CVE-2020-17139", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17139", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*"]}, {"lastseen": "2023-06-06T14:30:48", "description": "Dynamics CRM Webclient Cross-site Scripting Vulnerability", "cvss3": {"exploitabilityScore": 2.3, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "baseScore": 5.4, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17147", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 3.5, "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17147"], "modified": "2021-03-03T21:14:00", "cpe": ["cpe:/a:microsoft:dynamics_365:8.2", "cpe:/a:microsoft:dynamics_365:9.0"], "id": "CVE-2020-17147", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17147", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:microsoft:dynamics_365:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:dynamics_365:8.2:*:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:42", "description": "Microsoft SharePoint Spoofing Vulnerability", "cvss3": {"exploitabilityScore": 2.1, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.0, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17115", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.0, "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17115"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/a:microsoft:sharepoint_server:2016", "cpe:/a:microsoft:sharepoint_foundation:2010", "cpe:/a:microsoft:sharepoint_server:2019", "cpe:/a:microsoft:sharepoint_foundation:2013"], "id": "CVE-2020-17115", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17115", "cvss": {"score": 6.0, "vector": "AV:N/AC:M/Au:S/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*", "cpe:2.3:a:microsoft:sharepoint_foundation:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:43", "description": "Microsoft SharePoint Information Disclosure Vulnerability", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 6.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17120", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17120"], "modified": "2021-03-04T18:30:00", "cpe": ["cpe:/a:microsoft:sharepoint_server:2016", "cpe:/a:microsoft:sharepoint_foundation:2010", "cpe:/a:microsoft:sharepoint_server:2019", "cpe:/a:microsoft:sharepoint_foundation:2013"], "id": "CVE-2020-17120", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17120", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*", "cpe:2.3:a:microsoft:sharepoint_foundation:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:44", "description": "Microsoft Excel Information Disclosure Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17126", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17126"], "modified": "2021-03-04T21:15:00", "cpe": ["cpe:/a:microsoft:office_web_apps:2013", "cpe:/a:microsoft:office:2019", "cpe:/a:microsoft:excel:2016", "cpe:/a:microsoft:excel:2010", "cpe:/a:microsoft:365_apps:-", "cpe:/a:microsoft:excel:2013", "cpe:/a:microsoft:office_online_server:-"], "id": "CVE-2020-17126", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17126", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_online_server:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_web_apps:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:-:*:*", "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:42", "description": "Microsoft SharePoint Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 2.1, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.0, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17089", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.0, "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17089"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/a:microsoft:sharepoint_server:2016", "cpe:/a:microsoft:sharepoint_foundation:2010", "cpe:/a:microsoft:sharepoint_server:2019", "cpe:/a:microsoft:sharepoint_foundation:2013"], "id": "CVE-2020-17089", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17089", "cvss": {"score": 6.0, "vector": "AV:N/AC:M/Au:S/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*", "cpe:2.3:a:microsoft:sharepoint_foundation:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:46", "description": "Chakra Scripting Engine Memory Corruption Vulnerability", "cvss3": {"exploitabilityScore": 1.6, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17131", "cwe": ["CWE-787"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 5.1, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17131"], "modified": "2021-03-04T18:28:00", "cpe": ["cpe:/a:microsoft:edge:-"], "id": "CVE-2020-17131", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17131", "cvss": {"score": 5.1, "vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:42", "description": "Windows NTFS Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17096", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17096"], "modified": "2021-03-04T18:26:00", "cpe": ["cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2016:1903", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_10:1607"], "id": "CVE-2020-17096", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17096", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:24", "description": "Azure SDK for C Security Feature Bypass Vulnerability", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17002", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "COMPLETE", "baseScore": 9.4, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 9.2, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17002"], "modified": "2021-03-03T21:33:00", "cpe": [], "id": "CVE-2020-17002", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17002", "cvss": {"score": 9.4, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:N"}, "cpe23": []}, {"lastseen": "2023-06-06T14:30:39", "description": "Windows Network Connections Service Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17092", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17092"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2016:1909", "cpe:/o:microsoft:windows_server_2016:1903", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:1903", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_10:1607"], "id": "CVE-2020-17092", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17092", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*"]}, {"lastseen": "2023-06-06T14:30:43", "description": "Microsoft PowerPoint Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-12-10T00:15:00", "type": "cve", "title": "CVE-2020-17124", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17124"], "modified": "2021-03-04T18:25:00", "cpe": ["cpe:/a:microsoft:office:2019", "cpe:/a:microsoft:powerpoint:2010", "cpe:/a:microsoft:powerpoint:2016", "cpe:/a:microsoft:powerpoint:2013", "cpe:/a:microsoft:365_apps:-"], "id": "CVE-2020-17124", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-17124", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:microsoft:powerpoint:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:powerpoint:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", "cpe:2.3:a:microsoft:powerpoint:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:powerpoint:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:macos:*:*"]}], "mskb": [{"lastseen": "2023-06-23T19:21:42", "description": "None\n## Summary\n\nThis security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following security advisories:\n\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-17123](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17123>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-17125](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17125>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-17126](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17126>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-17128](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17128>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-17129](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17129>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-17130](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17130>)\n**Note** To apply this security update, you must have the release version of Excel 2016 installed on the computer.Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2016. It doesn't apply to the Office 2016 Click-to-Run editions, such as Microsoft Office 365 Home (see [What version of Office am I using?](<https://support.office.com/article/About-Office-What-version-of-Office-am-I-using-932788B8-A3CE-44BF-BB09-E334518B8B19>)).\n\n## Improvements and fixes\n\nThis security update contains the following improvement:\n\n * Adds security enhancements that provide a more secure version of the signature scheme for Visual Basic for Applications (VBA) projects. For more information, see Upgrade signed Office VBA macro projects to V3 signature. \n \n**Note** To enable this improvement, you have to install [KB 4486746](<https://support.microsoft.com/help/4486746>), [KB 4486747](<https://support.microsoft.com/help/4486747>), and [KB 4486716](<https://support.microsoft.com/help/4486716>) together with this update.\n\n## How to get and install the update\n\n### Method 1: Microsoft Update\n\nThis update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see [Windows Update: FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>).\n\n### Method 2: Microsoft Update Catalog\n\nTo get the standalone package for this update, go to the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/Search.aspx?q=KB4486754>) website.\n\n### Method 3: Microsoft Download Center\n\nYou can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.\n\n * [Download security update 4486754 for the 32-bit version of Excel 2016](<http://www.microsoft.com/download/details.aspx?familyid=69396647-9152-4e8c-a917-782940551aee>)\n * [Download security update 4486754 for the 64-bit version of Excel 2016](<http://www.microsoft.com/download/details.aspx?familyid=e32a912c-ae7c-4efe-b049-e2ab41a48032>)\n\n## More information\n\n### Security update deployment information\n\nFor deployment information about this update, see [security update deployment information: December 8, 2020](<https://support.microsoft.com/en-us/help/20201208>).\n\n### Security update replacement information\n\nThis security update replaces previously released security update [4486718](<http://support.microsoft.com/kb/4486718>).\n\n### File hash information\n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nexcel2016-kb4486754-fullfile-x86-glb.exe| B8FD3A9CA9649378A653D8277B4562B2342FB31A| E334FD38944031BC11BAFA0DD1C29F354C9286A8210F12F969445C5D4E6B3462 \nexcel2016-kb4486754-fullfile-x64-glb.exe| E669E0B49CAEF17A2F3830543BC53818CB114117| F9CBA45F7A0F34A2ED007B968336AB5DC9546997EAF4528081F8F86BE14F43C8 \n \n### \nFile information\n\nThe English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.\n\n### \n\n__\n\nFor all supported x86-based versions of Excel 2016\n\nFile identifier| File name| File version| File size| Date| Time \n---|---|---|---|---|--- \nxlintl32.dll_1025| xlintl32.dll| 16.0.4807.1000| 17105192| 12-Nov-20| 04:35 \nxlintl32.dll_1026| xlintl32.dll| 16.0.4807.1000| 17149528| 12-Nov-20| 04:35 \nxlintl32.dll_1029| xlintl32.dll| 16.0.4807.1000| 17182856| 12-Nov-20| 04:35 \nxlintl32.dll_1030| xlintl32.dll| 16.0.4834.1000| 17085064| 12-Nov-20| 04:35 \nxllex.dll_1030| xllex.dll| 16.0.4684.1000| 46312| 12-Nov-20| 04:35 \nxlintl32.dll_1031| xlintl32.dll| 16.0.4996.1000| 17225568| 12-Nov-20| 04:35 \nxlintl32.dll_1032| xlintl32.dll| 16.0.4807.1000| 17255512| 12-Nov-20| 04:35 \nxlintl32.dll_3082| xlintl32.dll| 16.0.4807.1000| 17134240| 12-Nov-20| 04:35 \nxlintl32.dll_1061| xlintl32.dll| 16.0.4807.1000| 17072504| 12-Nov-20| 04:35 \nxlintl32.dll_1035| xlintl32.dll| 16.0.4849.1000| 17083000| 12-Nov-20| 04:35 \nxlintl32.dll_1036| xlintl32.dll| 16.0.4807.1000| 17205392| 12-Nov-20| 04:35 \nxlintl32.dll_1037| xlintl32.dll| 16.0.4807.1000| 17039960| 12-Nov-20| 04:35 \nxlintl32.dll_1081| xlintl32.dll| 16.0.4807.1000| 17187416| 12-Nov-20| 04:35 \nxlintl32.dll_1050| xlintl32.dll| 16.0.4807.1000| 17109688| 12-Nov-20| 04:35 \nxlintl32.dll_1038| xlintl32.dll| 16.0.4807.1000| 17194632| 12-Nov-20| 04:35 \nxlintl32.dll_1057| xlintl32.dll| 16.0.4807.1000| 17077392| 12-Nov-20| 04:35 \nxlintl32.dll_1040| xlintl32.dll| 16.0.4807.1000| 17120416| 12-Nov-20| 04:35 \nxlintl32.dll_1041| xlintl32.dll| 16.0.4807.1000| 17137744| 12-Nov-20| 04:35 \nxlintl32.dll_1087| xlintl32.dll| 16.0.4807.1000| 17206056| 12-Nov-20| 04:35 \nxlintl32.dll_1042| xlintl32.dll| 16.0.4807.1000| 17121368| 12-Nov-20| 04:35 \nxlintl32.dll_1063| xlintl32.dll| 16.0.4807.1000| 17154712| 12-Nov-20| 04:35 \nxlintl32.dll_1062| xlintl32.dll| 16.0.4807.1000| 17129624| 12-Nov-20| 04:35 \nxlintl32.dll_1086| xlintl32.dll| 16.0.4807.1000| 17082000| 12-Nov-20| 04:35 \nxlintl32.dll_1044| xlintl32.dll| 16.0.4807.1000| 17069712| 12-Nov-20| 04:35 \nxlintl32.dll_1043| xlintl32.dll| 16.0.4807.1000| 17129104| 12-Nov-20| 04:35 \nxlintl32.dll_1045| xlintl32.dll| 16.0.4807.1000| 17200304| 12-Nov-20| 04:35 \nxlintl32.dll_1046| xlintl32.dll| 16.0.4807.1000| 17148576| 12-Nov-20| 04:36 \nxlintl32.dll_2070| xlintl32.dll| 16.0.4807.1000| 17150112| 12-Nov-20| 04:36 \nxlintl32.dll_1048| xlintl32.dll| 16.0.4807.1000| 17205904| 12-Nov-20| 04:36 \nxlintl32.dll_1049| xlintl32.dll| 16.0.4849.1000| 17140816| 12-Nov-20| 04:36 \nxlintl32.dll_1051| xlintl32.dll| 16.0.4807.1000| 17195160| 12-Nov-20| 04:36 \nxlintl32.dll_1060| xlintl32.dll| 16.0.4807.1000| 17118392| 12-Nov-20| 04:36 \nxlintl32.dll_2074| xlintl32.dll| 16.0.4807.1000| 17133240| 12-Nov-20| 04:36 \nxlintl32.dll_9242| xlintl32.dll| 16.0.4807.1000| 17132728| 12-Nov-20| 04:36 \nxlintl32.dll_1053| xlintl32.dll| 16.0.4807.1000| 17075856| 12-Nov-20| 04:36 \nxlintl32.dll_1054| xlintl32.dll| 16.0.4807.1000| 17142872| 12-Nov-20| 04:36 \nxlintl32.dll_1055| xlintl32.dll| 16.0.4807.1000| 17181840| 12-Nov-20| 04:36 \nxlintl32.dll_1058| xlintl32.dll| 16.0.4807.1000| 17145432| 12-Nov-20| 04:36 \nxlintl32.dll_1066| xlintl32.dll| 16.0.4807.1000| 17197144| 12-Nov-20| 04:36 \nxlintl32.dll_2052| xlintl32.dll| 16.0.4807.1000| 16973912| 12-Nov-20| 04:36 \nxlintl32.dll_1028| xlintl32.dll| 16.0.4807.1000| 16987736| 12-Nov-20| 04:36 \nclient.models.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.models.dll| | 142816| 11-Nov-20| 04:00 \nclient.windows.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.dll| | 0| 11-Nov-20| 04:00 \ncontainer35.exe.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.container.exe| | 27376| 11-Nov-20| 04:00 \ncontainer35.exe.config.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.container.exe.config| | 137| 11-Nov-20| 04:00 \ncontainer40.exe.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.container.netfx40.exe| | 27384| 11-Nov-20| 04:00 \ncontainer40.exe.config.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.container.netfx40.exe.config| | 137| 11-Nov-20| 04:00 \ncontainer45.exe.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.container.netfx45.exe| | 28800| 11-Nov-20| 04:00 \ncontainer45.exe.config.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.container.netfx45.exe.config| | 137| 11-Nov-20| 04:00 \ndocument.af_za.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 224928| 11-Nov-20| 04:00 \ndocument.am_et.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 275496| 11-Nov-20| 04:00 \ndocument.ar_sa.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 271400| 11-Nov-20| 04:00 \ndocument.as_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 332880| 11-Nov-20| 04:00 \ndocument.az_latn_az.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 241312| 11-Nov-20| 04:00 \ndocument.be_by.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 279632| 11-Nov-20| 04:00 \ndocument.bg_bg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 287824| 11-Nov-20| 04:00 \ndocument.bn_bd.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 332880| 11-Nov-20| 04:00 \ndocument.bn_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 339608| 11-Nov-20| 04:00 \ndocument.bs_latn_ba.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 229016| 11-Nov-20| 04:00 \ndocument.ca_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 234608| 11-Nov-20| 04:00 \ndocument.ca_es_valencia.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 233112| 11-Nov-20| 04:00 \ndocument.cs_cz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 234536| 11-Nov-20| 04:00 \ndocument.cy_gb.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 229024| 11-Nov-20| 04:00 \ndocument.da_dk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 229016| 11-Nov-20| 04:00 \ndocument.de_de.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 238680| 11-Nov-20| 04:00 \ndocument.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.dll| | 2663464| 11-Nov-20| 04:00 \ndocument.el_gr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 304208| 11-Nov-20| 04:00 \ndocument.es_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 233112| 11-Nov-20| 04:00 \ndocument.et_ee.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 226392| 11-Nov-20| 04:00 \ndocument.eu_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 230440| 11-Nov-20| 04:00 \ndocument.fa_ir.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 261792| 11-Nov-20| 04:00 \ndocument.fi_fi.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 230440| 11-Nov-20| 04:00 \ndocument.fil_ph.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 238664| 11-Nov-20| 04:00 \ndocument.fr_fr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 241304| 11-Nov-20| 04:00 \ndocument.ga_ie.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 238672| 11-Nov-20| 04:00 \ndocument.gd_gb.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 246824| 11-Nov-20| 04:00 \ndocument.gl_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 234536| 11-Nov-20| 04:00 \ndocument.gu_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 324688| 11-Nov-20| 04:00 \ndocument.he_il.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 257688| 11-Nov-20| 04:00 \ndocument.hi_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 323232| 11-Nov-20| 04:00 \ndocument.hr_hr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 231904| 11-Nov-20| 04:00 \ndocument.hu_hu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 238632| 11-Nov-20| 04:00 \ndocument.hy_am.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 287784| 11-Nov-20| 04:00 \ndocument.id_id.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 226416| 11-Nov-20| 04:00 \ndocument.is_is.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 230480| 11-Nov-20| 04:00 \ndocument.it_it.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 233112| 11-Nov-20| 04:00 \ndocument.ja_jp.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 255056| 11-Nov-20| 04:00 \ndocument.ka_ge.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 347800| 11-Nov-20| 04:00 \ndocument.kk_kz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 281056| 11-Nov-20| 04:00 \ndocument.km_kh.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 332880| 11-Nov-20| 04:00 \ndocument.kn_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 341064| 11-Nov-20| 04:00 \ndocument.ko_kr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 238672| 11-Nov-20| 04:00 \ndocument.kok_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 328784| 11-Nov-20| 04:00 \ndocument.ky_kg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 285152| 11-Nov-20| 04:00 \ndocument.lb_lu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 237216| 11-Nov-20| 04:00 \ndocument.lt_lt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 233120| 11-Nov-20| 04:00 \ndocument.lv_lv.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 234576| 11-Nov-20| 04:00 \ndocument.mi_nz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 233112| 11-Nov-20| 04:00 \ndocument.mk_mk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 291920| 11-Nov-20| 04:00 \ndocument.ml_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 365648| 11-Nov-20| 04:00 \ndocument.mn_mn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 283688| 11-Nov-20| 04:00 \ndocument.mr_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 324648| 11-Nov-20| 04:00 \ndocument.ms_my.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 227808| 11-Nov-20| 04:00 \ndocument.mt_mt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 230440| 11-Nov-20| 04:00 \ndocument.nb_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 226344| 11-Nov-20| 04:00 \ndocument.ne_np.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 339616| 11-Nov-20| 04:00 \ndocument.nl_nl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 233120| 11-Nov-20| 04:00 \ndocument.nn_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 226344| 11-Nov-20| 04:00 \ndocument.or_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 349256| 11-Nov-20| 04:00 \ndocument.pa_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 320552| 11-Nov-20| 04:00 \ndocument.pl_pl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 238672| 11-Nov-20| 04:00 \ndocument.prs_af.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 265880| 11-Nov-20| 04:00 \ndocument.pt_br.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 234568| 11-Nov-20| 04:00 \ndocument.pt_pt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 234576| 11-Nov-20| 04:00 \ndocument.quz_pe.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 234536| 11-Nov-20| 04:00 \ndocument.ro_ro.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 236000| 11-Nov-20| 04:00 \ndocument.ru_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 286368| 11-Nov-20| 04:00 \ndocument.sd_arab_pk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 261784| 11-Nov-20| 04:00 \ndocument.si_lk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 322016| 11-Nov-20| 04:00 \ndocument.sk_sk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 234536| 11-Nov-20| 04:00 \ndocument.sl_si.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 234536| 11-Nov-20| 04:00 \ndocument.sq_al.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 238632| 11-Nov-20| 04:00 \ndocument.sr_cyrl_ba.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 281056| 11-Nov-20| 04:00 \ndocument.sr_cyrl_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 281056| 11-Nov-20| 04:00 \ndocument.sr_latn_cs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 231904| 11-Nov-20| 04:00 \nunity.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.practices.unity.dll| | 133328| 11-Nov-20| 04:00 \ndocument.sr_latn_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 230440| 11-Nov-20| 04:00 \ndocument.sv_se.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 229024| 11-Nov-20| 04:00 \ndocument.sw_ke.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 230480| 11-Nov-20| 04:00 \ndocument.ta_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 361512| 11-Nov-20| 04:00 \ndocument.te_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 341032| 11-Nov-20| 04:00 \ndocument.th_th.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 326112| 11-Nov-20| 04:00 \ndocument.tk_tm.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 230480| 11-Nov-20| 04:00 \ndocument.tr_tr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 230480| 11-Nov-20| 04:00 \ndocument.tt_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 279632| 11-Nov-20| 04:00 \ndocument.ug_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 279592| 11-Nov-20| 04:00 \ndocument.uk_ua.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 283728| 11-Nov-20| 04:00 \ndocument.ur_pk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 271440| 11-Nov-20| 04:00 \ndocument.uz_latn_uz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 238632| 11-Nov-20| 04:00 \ndocument.vi_vn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 250920| 11-Nov-20| 04:00 \ndocument.xmlserializers.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.xmlserializers.dll| | 1007256| 11-Nov-20| 04:00 \ndocument.zh_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 216728| 11-Nov-20| 04:00 \ndocument.zh_tw.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 222248| 11-Nov-20| 04:00 \ndocumentformat.openxml.dll.07275332_82e4_4820_9fdd_2423cd8daa85| documentformat.openxml.dll| | 0| 11-Nov-20| 04:00 \ndocumentservices.af_za.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52936| 11-Nov-20| 04:00 \ndocumentservices.am_et.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 59872| 11-Nov-20| 04:00 \ndocumentservices.ar_sa.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52904| 11-Nov-20| 04:00 \ndocumentservices.as_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 62504| 11-Nov-20| 04:00 \ndocumentservices.az_latn_az.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:00 \ndocumentservices.be_by.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 57016| 11-Nov-20| 04:00 \ndocumentservices.bg_bg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 56992| 11-Nov-20| 04:00 \ndocumentservices.bn_bd.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 59872| 11-Nov-20| 04:00 \ndocumentservices.bn_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 61104| 11-Nov-20| 04:00 \ndocumentservices.bs_latn_ba.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52896| 11-Nov-20| 04:00 \ndocumentservices.ca_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52896| 11-Nov-20| 04:00 \ndocumentservices.ca_es_valencia.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54312| 11-Nov-20| 04:00 \ndocumentservices.cs_cz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:00 \ndocumentservices.cy_gb.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54360| 11-Nov-20| 04:00 \ndocumentservices.da_dk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54312| 11-Nov-20| 04:00 \ndocumentservices.de_de.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52888| 11-Nov-20| 04:00 \ndocumentservices.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.dll| | 409128| 11-Nov-20| 04:00 \ndocumentservices.el_gr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 59872| 11-Nov-20| 04:00 \ndocumentservices.es_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54312| 11-Nov-20| 04:00 \ndocumentservices.et_ee.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52888| 11-Nov-20| 04:00 \ndocumentservices.eu_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54312| 11-Nov-20| 04:00 \ndocumentservices.fa_ir.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:00 \ndocumentservices.fi_fi.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52896| 11-Nov-20| 04:00 \ndocumentservices.fil_ph.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:00 \ndocumentservices.fr_fr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:00 \ndocumentservices.ga_ie.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54352| 11-Nov-20| 04:00 \ndocumentservices.gd_gb.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54352| 11-Nov-20| 04:00 \ndocumentservices.gl_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52888| 11-Nov-20| 04:00 \ndocumentservices.gu_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 57008| 11-Nov-20| 04:00 \ndocumentservices.he_il.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:00 \ndocumentservices.hi_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 62544| 11-Nov-20| 04:00 \ndocumentservices.hr_hr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52888| 11-Nov-20| 04:00 \ndocumentservices.hu_hu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 55776| 11-Nov-20| 04:00 \ndocumentservices.hy_am.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 57008| 11-Nov-20| 04:00 \ndocumentservices.id_id.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52896| 11-Nov-20| 04:00 \ndocumentservices.is_is.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52896| 11-Nov-20| 04:00 \ndocumentservices.it_it.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54312| 11-Nov-20| 04:00 \ndocumentservices.ja_jp.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:00 \ndocumentservices.ka_ge.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 61128| 11-Nov-20| 04:00 \ndocumentservices.kk_kz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 58408| 11-Nov-20| 04:00 \ndocumentservices.km_kh.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 61088| 11-Nov-20| 04:00 \ndocumentservices.kn_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 62504| 11-Nov-20| 04:00 \ndocumentservices.ko_kr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52896| 11-Nov-20| 04:00 \ndocumentservices.kok_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 62544| 11-Nov-20| 04:00 \ndocumentservices.ky_kg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 57008| 11-Nov-20| 04:00 \ndocumentservices.lb_lu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:00 \ndocumentservices.lt_lt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52888| 11-Nov-20| 04:00 \ndocumentservices.lv_lv.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54352| 11-Nov-20| 04:00 \ndocumentservices.mi_nz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:00 \ndocumentservices.mk_mk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 58440| 11-Nov-20| 04:00 \ndocumentservices.ml_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 61104| 11-Nov-20| 04:00 \ndocumentservices.mn_mn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 57008| 11-Nov-20| 04:00 \ndocumentservices.mr_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 61080| 11-Nov-20| 04:00 \ndocumentservices.ms_my.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54312| 11-Nov-20| 04:00 \ndocumentservices.mt_mt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:00 \ndocumentservices.nb_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:00 \ndocumentservices.ne_np.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 57008| 11-Nov-20| 04:00 \ndocumentservices.nl_nl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52896| 11-Nov-20| 04:00 \ndocumentservices.nn_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54352| 11-Nov-20| 04:00 \ndocumentservices.or_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 61104| 11-Nov-20| 04:00 \ndocumentservices.pa_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 61104| 11-Nov-20| 04:00 \ndocumentservices.pl_pl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52888| 11-Nov-20| 04:00 \ndocumentservices.prs_af.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:00 \ndocumentservices.pt_br.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:00 \ndocumentservices.pt_pt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54312| 11-Nov-20| 04:00 \ndocumentservices.quz_pe.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54312| 11-Nov-20| 04:00 \ndocumentservices.ro_ro.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54312| 11-Nov-20| 04:00 \ndocumentservices.ru_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 56984| 11-Nov-20| 04:00 \ndocumentservices.sd_arab_pk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 55776| 11-Nov-20| 04:00 \ndocumentservices.si_lk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 57008| 11-Nov-20| 04:00 \ndocumentservices.sk_sk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:00 \ndocumentservices.sl_si.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:00 \ndocumentservices.sq_al.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52896| 11-Nov-20| 04:00 \ndocumentservices.sr_cyrl_ba.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 56984| 11-Nov-20| 04:00 \ndocumentservices.sr_cyrl_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 59872| 11-Nov-20| 04:00 \ndocumentservices.sr_latn_cs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54352| 11-Nov-20| 04:00 \ndocumentservices.sr_latn_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52888| 11-Nov-20| 04:00 \ndocumentservices.sv_se.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54352| 11-Nov-20| 04:00 \ndocumentservices.sw_ke.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:00 \ndocumentservices.ta_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 62552| 11-Nov-20| 04:00 \ndocumentservices.te_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 61104| 11-Nov-20| 04:00 \ndocumentservices.th_th.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 61080| 11-Nov-20| 04:00 \ndocumentservices.tk_tm.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52936| 11-Nov-20| 04:00 \ndocumentservices.tr_tr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54352| 11-Nov-20| 04:00 \ndocumentservices.tt_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 57008| 11-Nov-20| 04:00 \ndocumentservices.ug_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 57008| 11-Nov-20| 04:00 \ndocumentservices.uk_ua.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 58408| 11-Nov-20| 04:00 \ndocumentservices.ur_pk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54352| 11-Nov-20| 04:00 \ndocumentservices.uz_latn_uz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:00 \ndocumentservices.vi_vn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 55776| 11-Nov-20| 04:00 \ndocumentservices.zh_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54352| 11-Nov-20| 04:00 \ndocumentservices.zh_tw.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52896| 11-Nov-20| 04:00 \neventsource.dll.07275332_82e4_4820_9fdd_2423cd8daa85| eventsource.dll| | 0| 11-Nov-20| 04:00 \nexcel.af_za.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 11-Nov-20| 04:00 \nexcel.am_et.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 85664| 11-Nov-20| 04:00 \nexcel.ar_sa.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 82984| 11-Nov-20| 04:00 \nexcel.as_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 104928| 11-Nov-20| 04:00 \nexcel.az_latn_az.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 80352| 11-Nov-20| 04:00 \nexcel.be_by.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 87080| 11-Nov-20| 04:00 \nexcel.bg_bg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 92640| 11-Nov-20| 04:00 \nexcel.bn_bd.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 109024| 11-Nov-20| 04:00 \nexcel.bn_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 106144| 11-Nov-20| 04:00 \nexcel.bs_latn_ba.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74832| 11-Nov-20| 04:00 \nexcel.ca_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 78888| 11-Nov-20| 04:00 \nexcel.ca_es_valencia.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 78888| 11-Nov-20| 04:00 \nanalys32.xll_1041| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_1042| analys32.xll| | 212656| 11-Nov-20| 03:59 \nexcel.cs_cz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74832| 11-Nov-20| 04:00 \nexcel.cy_gb.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 73368| 11-Nov-20| 04:00 \nexcel.da_dk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 11-Nov-20| 04:00 \nexcel.de_de.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 77472| 11-Nov-20| 04:00 \nexcel.editorribbon.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.editorribbon.dll| | 42672| 11-Nov-20| 04:00 \nexcel.el_gr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 95320| 11-Nov-20| 04:00 \nexcel.es_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74832| 11-Nov-20| 04:00 \nexcel.et_ee.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 73376| 11-Nov-20| 04:00 \nexcel.eu_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 11-Nov-20| 04:00 \nexcel.extensions.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.extensions.dll| | 288416| 11-Nov-20| 04:00 \nexcel.fa_ir.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 81568| 11-Nov-20| 04:00 \nexcel.fi_fi.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 11-Nov-20| 04:00 \nexcel.fil_ph.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 78936| 11-Nov-20| 04:00 \nexcel.fr_fr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 77464| 11-Nov-20| 04:00 \nexcel.ga_ie.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 78888| 11-Nov-20| 04:00 \nexcel.gd_gb.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 77464| 11-Nov-20| 04:00 \nexcel.gl_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 76256| 11-Nov-20| 04:00 \nexcel.gu_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 103464| 11-Nov-20| 04:00 \nexcel.he_il.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 105704| 11-Nov-20| 04:00 \nexcel.hi_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 102048| 11-Nov-20| 04:00 \nexcel.hr_hr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 11-Nov-20| 04:00 \nexcel.hu_hu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 78888| 11-Nov-20| 04:00 \nexcel.hy_am.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 91176| 11-Nov-20| 04:00 \nexcel.id_id.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 73376| 11-Nov-20| 04:00 \nexcel.is_is.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 11-Nov-20| 04:00 \nexcel.it_it.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 78888| 11-Nov-20| 04:00 \nexcel.ja_jp.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 82984| 11-Nov-20| 04:00 \nexcel.ka_ge.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 106144| 11-Nov-20| 04:00 \nexcel.kk_kz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 87128| 11-Nov-20| 04:00 \nexcel.km_kh.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 103504| 11-Nov-20| 04:00 \nexcel.kn_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 107608| 11-Nov-20| 04:00 \nexcel.ko_kr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 78888| 11-Nov-20| 04:00 \nexcel.kok_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 103464| 11-Nov-20| 04:00 \nexcel.ky_kg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 87080| 11-Nov-20| 04:00 \nexcel.lb_lu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 78928| 11-Nov-20| 04:00 \nexcel.lt_lt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 11-Nov-20| 04:00 \nexcel.lv_lv.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74832| 11-Nov-20| 04:00 \nexcel.mi_nz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74832| 11-Nov-20| 04:00 \nexcel.mk_mk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 89760| 11-Nov-20| 04:00 \nexcel.ml_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 117216| 11-Nov-20| 04:00 \nexcel.mn_mn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 91216| 11-Nov-20| 04:00 \nexcel.mr_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 103464| 11-Nov-20| 04:00 \nexcel.ms_my.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74840| 11-Nov-20| 04:00 \nexcel.mt_mt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 73376| 11-Nov-20| 04:00 \nexcel.nb_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74840| 11-Nov-20| 04:00 \nexcel.ne_np.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 102040| 11-Nov-20| 04:00 \nexcel.nl_nl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 73368| 11-Nov-20| 04:00 \nexcel.nn_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 11-Nov-20| 04:00 \nexcel.or_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 107600| 11-Nov-20| 04:00 \nexcel.pa_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 102048| 11-Nov-20| 04:00 \nexcel.pl_pl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 77464| 11-Nov-20| 04:00 \nexcel.prs_af.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 87128| 11-Nov-20| 04:00 \nexcel.pt_br.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 11-Nov-20| 04:00 \nexcel.pt_pt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 77472| 11-Nov-20| 04:00 \nexcel.quz_pe.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 78928| 11-Nov-20| 04:00 \nexcel.ro_ro.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 77496| 11-Nov-20| 04:00 \nexcel.ru_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 85664| 11-Nov-20| 04:00 \nexcel.sd_arab_pk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 85656| 11-Nov-20| 04:00 \nexcel.si_lk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 99408| 11-Nov-20| 04:00 \nexcel.sk_sk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 73368| 11-Nov-20| 04:00 \nexcel.sl_si.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 11-Nov-20| 04:00 \nexcel.sq_al.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 77472| 11-Nov-20| 04:00 \nexcel.sr_cyrl_ba.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 89760| 11-Nov-20| 04:00 \nexcel.sr_cyrl_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 91176| 11-Nov-20| 04:00 \nexcel.sr_latn_cs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74832| 11-Nov-20| 04:00 \nexcel.sr_latn_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 11-Nov-20| 04:00 \nexcel.sv_se.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 73376| 11-Nov-20| 04:00 \nexcel.sw_ke.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 73376| 11-Nov-20| 04:00 \nexcel.ta_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 111656| 11-Nov-20| 04:00 \nexcel.te_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 103464| 11-Nov-20| 04:00 \nexcel.th_th.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 97952| 11-Nov-20| 04:00 \nexcel.themes.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.themes.dll| | 67407000| 11-Nov-20| 04:00 \nexcel.tk_tm.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 73368| 11-Nov-20| 04:00 \nexcel.tr_tr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 73376| 11-Nov-20| 04:00 \nexcel.tt_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 85664| 11-Nov-20| 04:00 \nexcel.ug_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 87128| 11-Nov-20| 04:00 \nexcel.uk_ua.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 87080| 11-Nov-20| 04:00 \nexcel.ur_pk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 85664| 11-Nov-20| 04:00 \nexcel.uz_latn_uz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 76256| 11-Nov-20| 04:00 \nexcel.vi_vn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 84448| 11-Nov-20| 04:00 \nexcel.zh_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 70736| 11-Nov-20| 04:00 \nexcel.zh_tw.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 70744| 11-Nov-20| 04:00 \nfil9270b25a9451a19a141d6fe93a590a7c.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.dll| | 1535528| 11-Nov-20| 04:00 \nhis.connectors.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.hostintegration.connectors.dll| | 5224528| 11-Nov-20| 04:00 \nlocalytics.dll.07275332_82e4_4820_9fdd_2423cd8daa85| localytics.dll| | 0| 11-Nov-20| 04:00 \nmashup.addintelemetry.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.addintelemetry.dll| | 37928| 11-Nov-20| 04:00 \nmashupcompression.dll.07275332_82e4_4820_9fdd_2423cd8daa85| mashupcompression.dll| | 127648| 11-Nov-20| 04:00 \nmashupengine.ar_sa.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 709712| 11-Nov-20| 04:00 \nmashupengine.bg_bg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 813536| 11-Nov-20| 04:00 \nmashupengine.ca_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 599080| 11-Nov-20| 04:00 \nmashupengine.cs_cz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 585376| 11-Nov-20| 04:00 \nmashupengine.da_dk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 590888| 11-Nov-20| 04:00 \nmashupengine.de_de.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 629216| 11-Nov-20| 04:00 \nmashupengine.el_gr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 881704| 11-Nov-20| 04:00 \nmashupengine.es_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 603176| 11-Nov-20| 04:00 \nmashupengine.et_ee.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 558160| 11-Nov-20| 04:00 \nmashupengine.eu_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 578632| 11-Nov-20| 04:00 \nmashupengine.fi_fi.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 581280| 11-Nov-20| 04:00 \nmashupengine.fr_fr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 622240| 11-Nov-20| 04:00 \nmashupengine.gl_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 589472| 11-Nov-20| 04:00 \nmashupengine.he_il.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 659104| 11-Nov-20| 04:00 \nanalys32.xll_1043| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_1044| analys32.xll| | 212656| 11-Nov-20| 03:59 \nmashupengine.hi_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 999072| 11-Nov-20| 04:00 \nmashupengine.hr_hr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 573088| 11-Nov-20| 04:00 \nmashupengine.hu_hu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 635944| 11-Nov-20| 04:00 \nmashupengine.id_id.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 573088| 11-Nov-20| 04:00 \nmashupengine.it_it.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 607320| 11-Nov-20| 04:00 \nmashupengine.ja_jp.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 652368| 11-Nov-20| 04:00 \nmashupengine.kk_kz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 779304| 11-Nov-20| 04:00 \nmashupengine.ko_kr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 615464| 11-Nov-20| 04:00 \nmashupengine.lt_lt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 586832| 11-Nov-20| 04:00 \nmashupengine.lv_lv.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 604640| 11-Nov-20| 04:00 \nmashupengine.ms_my.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 577176| 11-Nov-20| 04:00 \nmashupengine.nb_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 574504| 11-Nov-20| 04:00 \nmashupengine.nl_nl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 612832| 11-Nov-20| 04:00 \nmashupengine.pl_pl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 615464| 11-Nov-20| 04:00 \nmashupengine.pt_br.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 594984| 11-Nov-20| 04:00 \nmashupengine.pt_pt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 599120| 11-Nov-20| 04:00 \nmashupengine.ro_ro.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 611368| 11-Nov-20| 04:00 \nmashupengine.ru_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 812072| 11-Nov-20| 04:00 \nmashupengine.sk_sk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 616240| 11-Nov-20| 04:00 \nmashupengine.sl_si.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 570448| 11-Nov-20| 04:00 \nmashupengine.sr_cyrl_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 775208| 11-Nov-20| 04:00 \nmashupengine.sr_latn_cs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 570408| 11-Nov-20| 04:00 \nmashupengine.sr_latn_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 570440| 11-Nov-20| 04:00 \nmashupengine.sv_se.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 578648| 11-Nov-20| 04:00 \nmashupengine.th_th.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 937632| 11-Nov-20| 04:00 \nmashupengine.tr_tr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 594984| 11-Nov-20| 04:00 \nmashupengine.uk_ua.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 803920| 11-Nov-20| 04:00 \nmashupengine.vi_vn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 659104| 11-Nov-20| 04:00 \nmashupengine.zh_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 521296| 11-Nov-20| 04:00 \nmashupengine.zh_tw.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 528024| 11-Nov-20| 04:00 \nmicrosoft.data.edm.netfx35.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.edm.netfx35.dll| | 667864| 11-Nov-20| 04:00 \nmicrosoft.data.odata.netfx35.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.odata.netfx35.dll| | 1461472| 11-Nov-20| 04:00 \nmicrosoft.data.odata.qu.35.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.odata.query.netfx35.dll| | 188152| 11-Nov-20| 04:00 \nmicrosoft.data.sapclient.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.dll| | 927408| 11-Nov-20| 04:00 \nmicrosoft.mashup.client.initialize.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.initialization.dll| | 0| 11-Nov-20| 04:00 \nmicrosoft.mashup.client.ui.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.dll| | 43292712| 11-Nov-20| 04:00 \nmicrosoft.mashup.eventsource.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.eventsource.dll| | 160808| 11-Nov-20| 04:00 \nmicrosoft.mashup.sapbwprovider.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.sapbwprovider.dll| | 317600| 11-Nov-20| 04:00 \nmicrosoft.mashup.shims.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.shims.dll| | 31200| 11-Nov-20| 04:00 \nmicrosoft.mashupengine.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.dll| | 13881384| 11-Nov-20| 04:00 \nmicrosoft.odata.core.netfx35.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.odata.core.netfx35.dll| | 1444576| 11-Nov-20| 04:00 \nmicrosoft.odata.core.netfx35.v7.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.odata.core.netfx35.v7.dll| | 1267944| 11-Nov-20| 04:00 \nmicrosoft.odata.edm.netfx35.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.odata.edm.netfx35.dll| | 785632| 11-Nov-20| 04:00 \nmicrosoft.odata.edm.netfx35.v7.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.odata.edm.netfx35.v7.dll| | 751840| 11-Nov-20| 04:00 \nmicrosoft.powerbi.adomdclient.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.powerbi.adomdclient.dll| | 1111232| 11-Nov-20| 04:00 \nmicrosoft.spatial.netfx35.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.spatial.netfx35.dll| | 133336| 11-Nov-20| 04:00 \nmicrosoft.spatial.netfx35.v7.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.spatial.netfx35.v7.dll| | 131296| 11-Nov-20| 04:00 \nmicrsoft.mashup.internallibrary.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.internallibrary.dll| | 166952| 11-Nov-20| 04:00 \noauth.ar_sa.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 22192| 11-Nov-20| 04:00 \noauth.bg_bg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 22192| 11-Nov-20| 04:00 \noauth.ca_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 11-Nov-20| 04:00 \noauth.cs_cz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 11-Nov-20| 04:00 \noauth.da_dk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 11-Nov-20| 04:00 \noauth.de_de.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 11-Nov-20| 04:00 \noauth.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.dll| | 89760| 11-Nov-20| 04:00 \noauth.el_gr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 22704| 11-Nov-20| 04:00 \noauth.es_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 11-Nov-20| 04:00 \noauth.et_ee.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 11-Nov-20| 04:00 \noauth.eu_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 11-Nov-20| 04:00 \noauth.fi_fi.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 11-Nov-20| 04:00 \noauth.fr_fr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 11-Nov-20| 04:00 \noauth.gl_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 11-Nov-20| 04:00 \noauth.he_il.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 11-Nov-20| 04:00 \noauth.hi_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 22704| 11-Nov-20| 04:00 \noauth.hr_hr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 11-Nov-20| 04:00 \noauth.hu_hu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 11-Nov-20| 04:00 \nanalys32.xll_1045| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_1046| analys32.xll| | 212656| 11-Nov-20| 03:59 \noauth.id_id.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 11-Nov-20| 04:00 \noauth.it_it.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 11-Nov-20| 04:00 \noauth.ja_jp.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 22184| 11-Nov-20| 04:00 \noauth.kk_kz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 22192| 11-Nov-20| 04:00 \noauth.ko_kr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 11-Nov-20| 04:00 \noauth.lt_lt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 11-Nov-20| 04:00 \noauth.lv_lv.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 11-Nov-20| 04:00 \noauth.ms_my.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 11-Nov-20| 04:00 \noauth.nb_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 11-Nov-20| 04:00 \noauth.nl_nl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 11-Nov-20| 04:00 \noauth.pl_pl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 11-Nov-20| 04:00 \noauth.pt_br.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 11-Nov-20| 04:00 \noauth.pt_pt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 11-Nov-20| 04:00 \noauth.ro_ro.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 11-Nov-20| 04:00 \noauth.ru_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 22704| 11-Nov-20| 04:00 \noauth.sk_sk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 11-Nov-20| 04:00 \noauth.sl_si.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 11-Nov-20| 04:00 \noauth.sr_cyrl_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 22192| 11-Nov-20| 04:00 \noauth.sr_latn_cs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 11-Nov-20| 04:00 \noauth.sr_latn_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 11-Nov-20| 04:00 \noauth.sv_se.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 11-Nov-20| 04:00 \noauth.th_th.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 23216| 11-Nov-20| 04:00 \noauth.tr_tr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 11-Nov-20| 04:00 \noauth.uk_ua.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 22192| 11-Nov-20| 04:00 \noauth.vi_vn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 22192| 11-Nov-20| 04:00 \noauth.zh_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21168| 11-Nov-20| 04:00 \noauth.zh_tw.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21168| 11-Nov-20| 04:00 \noledbinteropdll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbinterop.dll| | 147616| 11-Nov-20| 04:00 \noledbprovider.ar_sa.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.bg_bg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.ca_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.cs_cz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.da_dk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.de_de.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.el_gr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.es_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.et_ee.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.eu_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.fi_fi.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.fr_fr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.gl_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.he_il.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.hi_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.hr_hr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.hu_hu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.id_id.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.it_it.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.ja_jp.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.kk_kz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.ko_kr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.lt_lt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.lv_lv.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.ms_my.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.nb_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.nl_nl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.pl_pl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.pt_br.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.pt_pt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.ro_ro.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.ru_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.sk_sk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.sl_si.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.sr_cyrl_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.sr_latn_cs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.sr_latn_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \nanalys32.xll_1048| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_1049| analys32.xll| | 212656| 11-Nov-20| 03:59 \noledbprovider.sv_se.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.th_th.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.tr_tr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.uk_ua.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.vi_vn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.zh_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbprovider.zh_tw.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 11-Nov-20| 04:00 \noledbproviderdll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.dll| | 69160| 11-Nov-20| 04:00 \npackaging.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.packaging.dll| | 52384| 11-Nov-20| 04:00 \nprivate_odbc32.dll.07275332_82e4_4820_9fdd_2423cd8daa85| private_odbc32.dll| | 657088| 11-Nov-20| 04:00 \nprovidershared.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.providershared.dll| | 55456| 11-Nov-20| 04:00 \nsapclient.ar_sa.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 44720| 11-Nov-20| 04:00 \nsapclient.bg_bg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 35504| 11-Nov-20| 04:00 \nsapclient.ca_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 32432| 11-Nov-20| 04:00 \nsapclient.cs_cz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31920| 11-Nov-20| 04:00 \nsapclient.da_dk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31920| 11-Nov-20| 04:00 \nsapclient.de_de.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 32432| 11-Nov-20| 04:00 \nsapclient.el_gr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 48816| 11-Nov-20| 04:00 \nsapclient.es_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 32432| 11-Nov-20| 04:00 \nsapclient.et_ee.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31408| 11-Nov-20| 04:00 \nsapclient.eu_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31920| 11-Nov-20| 04:00 \nsapclient.fi_fi.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31920| 11-Nov-20| 04:00 \nsapclient.fr_fr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 32432| 11-Nov-20| 04:00 \nsapclient.gl_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31920| 11-Nov-20| 04:00 \nsapclient.he_il.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 32944| 11-Nov-20| 04:00 \nsapclient.hi_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 48816| 11-Nov-20| 04:00 \nsapclient.hr_hr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31920| 11-Nov-20| 04:00 \nsapclient.hu_hu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 32432| 11-Nov-20| 04:00 \nsapclient.id_id.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31408| 11-Nov-20| 04:00 \nsapclient.it_it.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 32944| 11-Nov-20| 04:00 \nsapclient.ja_jp.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 44720| 11-Nov-20| 04:00 \nsapclient.kk_kz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 44720| 11-Nov-20| 04:00 \nsapclient.ko_kr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 32432| 11-Nov-20| 04:00 \nsapclient.lt_lt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31920| 11-Nov-20| 04:00 \nsapclient.lv_lv.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31920| 11-Nov-20| 04:00 \nsapclient.ms_my.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31408| 11-Nov-20| 04:00 \nsapclient.nb_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31408| 11-Nov-20| 04:00 \nsapclient.nl_nl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 32432| 11-Nov-20| 04:00 \nsapclient.pl_pl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 32944| 11-Nov-20| 04:00 \nsapclient.pt_br.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 32432| 11-Nov-20| 04:00 \nsapclient.pt_pt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31920| 11-Nov-20| 04:00 \nsapclient.ro_ro.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31920| 11-Nov-20| 04:00 \nsapclient.ru_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 35504| 11-Nov-20| 04:00 \nsapclient.sk_sk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 32432| 11-Nov-20| 04:00 \nsapclient.sl_si.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31920| 11-Nov-20| 04:00 \nsapclient.sr_cyrl_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 35504| 11-Nov-20| 04:00 \nsapclient.sr_latn_cs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31920| 11-Nov-20| 04:00 \nsapclient.sr_latn_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31920| 11-Nov-20| 04:00 \nsapclient.sv_se.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31920| 11-Nov-20| 04:00 \nsapclient.th_th.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 48816| 11-Nov-20| 04:00 \nanalys32.xll_1050| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_1051| analys32.xll| | 212656| 11-Nov-20| 03:59 \nsapclient.tr_tr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 32432| 11-Nov-20| 04:00 \nsapclient.uk_ua.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 48816| 11-Nov-20| 04:00 \nsapclient.vi_vn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 32944| 11-Nov-20| 04:00 \nsapclient.zh_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 30896| 11-Nov-20| 04:00 \nsapclient.zh_tw.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 30896| 11-Nov-20| 04:00 \nscriptdom.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.scriptdom.dll| | 2371760| 11-Nov-20| 04:00 \nsqmapi.dll.07275332_82e4_4820_9fdd_2423cd8daa85| sqmapi_x86.dll| | 0| 11-Nov-20| 04:00 \nstorage.xmlserializers.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.storage.xmlserializers.dll| | 151216| 11-Nov-20| 04:00 \nstorageclient.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.windowsazure.storageclient.dll| | 0| 11-Nov-20| 04:00 \nsystem.spatial.netfx35.dll.07275332_82e4_4820_9fdd_2423cd8daa85| system.spatial.netfx35.dll| | 124624| 11-Nov-20| 04:00 \ntransformdatabyexample.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.dataintegration.transformdatabyexample.dll| | 62016| 11-Nov-20| 04:00 \nui.af_za.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 242776| 11-Nov-20| 04:00 \nui.am_et.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 294560| 11-Nov-20| 04:00 \nui.ar_sa.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 279632| 11-Nov-20| 04:00 \nui.as_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 357416| 11-Nov-20| 04:00 \nui.az_latn_az.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 255016| 11-Nov-20| 04:00 \nui.be_by.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 304168| 11-Nov-20| 04:00 \nanalys32.xll_1053| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_1054| analys32.xll| | 212656| 11-Nov-20| 03:59 \nui.bg_bg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 315008| 11-Nov-20| 04:00 \nui.bn_bd.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 360096| 11-Nov-20| 04:00 \nui.bn_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 368280| 11-Nov-20| 04:00 \nui.bs_latn_ba.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 242768| 11-Nov-20| 04:00 \nui.ca_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 249464| 11-Nov-20| 04:00 \nui.ca_es_valencia.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 249496| 11-Nov-20| 04:00 \nui.cs_cz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 246832| 11-Nov-20| 04:00 \nui.cy_gb.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 244192| 11-Nov-20| 04:00 \nui.da_dk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 246792| 11-Nov-20| 04:00 \nui.de_de.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 254984| 11-Nov-20| 04:00 \nui.el_gr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 332808| 11-Nov-20| 04:00 \nui.es_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 249472| 11-Nov-20| 04:00 \nui.et_ee.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 238600| 11-Nov-20| 04:00 \nui.eu_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 241280| 11-Nov-20| 04:00 \nui.fa_ir.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 287784| 11-Nov-20| 04:00 \nui.fi_fi.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 242736| 11-Nov-20| 04:00 \nui.fil_ph.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 250920| 11-Nov-20| 04:00 \nui.fr_fr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 254984| 11-Nov-20| 04:00 \nui.ga_ie.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 255016| 11-Nov-20| 04:00 \nui.gd_gb.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 255016| 11-Nov-20| 04:00 \nui.gl_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 248256| 11-Nov-20| 04:00 \nui.gu_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 347808| 11-Nov-20| 04:00 \nui.he_il.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 268768| 11-Nov-20| 04:00 \nui.hi_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 351904| 11-Nov-20| 04:00 \nui.hr_hr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 244160| 11-Nov-20| 04:00 \nui.hu_hu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 260544| 11-Nov-20| 04:00 \nui.hy_am.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 312408| 11-Nov-20| 04:00 \nui.id_id.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 237184| 11-Nov-20| 04:00 \nui.is_is.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 241312| 11-Nov-20| 04:00 \nui.it_it.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 250888| 11-Nov-20| 04:00 \nui.ja_jp.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 263256| 11-Nov-20| 04:00 \nui.ka_ge.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 381992| 11-Nov-20| 04:00 \nui.kk_kz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 300040| 11-Nov-20| 04:00 \nui.km_kh.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 365648| 11-Nov-20| 04:00 \nanalys32.xll_1055| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_1057| analys32.xll| | 212656| 11-Nov-20| 03:59 \nui.kn_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 373800| 11-Nov-20| 04:00 \nui.ko_kr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 245376| 11-Nov-20| 04:00 \nui.kok_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 355992| 11-Nov-20| 04:00 \nui.ky_kg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 309728| 11-Nov-20| 04:00 \nui.lb_lu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 255056| 11-Nov-20| 04:00 \nui.lt_lt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 249472| 11-Nov-20| 04:00 \nui.lv_lv.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 250928| 11-Nov-20| 04:00 \nui.mi_nz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 246824| 11-Nov-20| 04:00 \nui.mk_mk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 310944| 11-Nov-20| 04:00 \nui.ml_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 402512| 11-Nov-20| 04:00 \nui.mn_mn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 304216| 11-Nov-20| 04:00 \nui.mr_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 357416| 11-Nov-20| 04:00 \nui.ms_my.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 242696| 11-Nov-20| 04:00 \nui.mt_mt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 246864| 11-Nov-20| 04:00 \nui.nb_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 242744| 11-Nov-20| 04:00 \nui.ne_np.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 376472| 11-Nov-20| 04:00 \nui.nl_nl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 246792| 11-Nov-20| 04:00 \nui.nn_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 242776| 11-Nov-20| 04:00 \nui.or_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 386128| 11-Nov-20| 04:00 \nui.pa_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 346592| 11-Nov-20| 04:00 \nui.pl_pl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 249472| 11-Nov-20| 04:00 \nui.prs_af.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 294560| 11-Nov-20| 04:00 \nui.pt_br.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 246792| 11-Nov-20| 04:00 \nui.pt_pt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 249472| 11-Nov-20| 04:00 \nui.quz_pe.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 246896| 11-Nov-20| 04:00 \nui.ro_ro.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 250888| 11-Nov-20| 04:00 \nui.ru_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 312376| 11-Nov-20| 04:00 \nui.sd_arab_pk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 279632| 11-Nov-20| 04:00 \nui.si_lk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 343704| 11-Nov-20| 04:00 \nui.sk_sk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 245376| 11-Nov-20| 04:00 \nui.sl_si.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 242696| 11-Nov-20| 04:00 \nui.sq_al.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 255048| 11-Nov-20| 04:00 \nui.sr_cyrl_ba.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 304168| 11-Nov-20| 04:00 \nui.sr_cyrl_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 298624| 11-Nov-20| 04:00 \nui.sr_latn_cs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 241272| 11-Nov-20| 04:00 \nui.sr_latn_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 242696| 11-Nov-20| 04:00 \nui.sv_se.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 241272| 11-Nov-20| 04:00 \nui.sw_ke.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 242768| 11-Nov-20| 04:00 \nui.ta_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 406568| 11-Nov-20| 04:00 \nui.te_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 373840| 11-Nov-20| 04:00 \nui.th_th.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 349264| 11-Nov-20| 04:00 \nui.tk_tm.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 242728| 11-Nov-20| 04:00 \nui.tr_tr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 248248| 11-Nov-20| 04:00 \nui.tt_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 308304| 11-Nov-20| 04:00 \nui.ug_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 300072| 11-Nov-20| 04:00 \nui.uk_ua.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 305600| 11-Nov-20| 04:00 \nui.ur_pk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 296016| 11-Nov-20| 04:00 \nui.uz_latn_uz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 250920| 11-Nov-20| 04:00 \nui.vi_vn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 263208| 11-Nov-20| 04:00 \nui.zh_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 224920| 11-Nov-20| 04:00 \nui.zh_tw.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 229024| 11-Nov-20| 04:00 \nwindows.af_za.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.am_et.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.ar_sa.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.as_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.az_latn_az.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.be_by.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.bg_bg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.bn_bd.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.bn_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.bs_latn_ba.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.ca_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.ca_es_valencia.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.cs_cz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.cy_gb.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.da_dk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.de_de.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.el_gr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.es_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.et_ee.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.eu_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.fa_ir.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.fi_fi.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.fil_ph.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.fr_fr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.ga_ie.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.gd_gb.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.gl_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.gu_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.he_il.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.hi_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.hr_hr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.hu_hu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.hy_am.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.id_id.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.is_is.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.it_it.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.ja_jp.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.ka_ge.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.kk_kz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.km_kh.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.kn_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.ko_kr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.kok_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.ky_kg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.lb_lu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.lt_lt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.lv_lv.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.mi_nz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.mk_mk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.ml_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.mn_mn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.mr_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.ms_my.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.mt_mt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.nb_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.ne_np.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.nl_nl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.nn_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.or_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.pa_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.pl_pl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.prs_af.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.pt_br.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.pt_pt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.quz_pe.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.ro_ro.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.ru_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.sd_arab_pk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.si_lk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.sk_sk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.sl_si.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.sq_al.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.sr_cyrl_ba.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.sr_cyrl_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.sr_latn_cs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.sr_latn_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.sv_se.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.sw_ke.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.ta_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.te_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.th_th.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.tk_tm.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.tr_tr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.tt_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.ug_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.uk_ua.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.ur_pk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.uz_latn_uz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.vi_vn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.zh_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nwindows.zh_tw.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:00 \nxlintl32.dll_1033| xlintl32.dll| 16.0.4807.1000| 16993632| 11-Nov-20| 03:59 \nexcel.exe| excel.exe| 16.0.5095.1000| 27125048| 13-Nov-20| 12:17 \nxl12cnv.exe| excelcnv.exe| 16.0.5095.1000| 23760688| 13-Nov-20| 12:17 \nanalys32.xll_1025| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_1026| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_1028| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_1029| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_1030| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_1031| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_1032| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_1033| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_1035| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_1036| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_1037| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_1038| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_1040| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_1058| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_1060| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_1061| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_1062| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_1063| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_1066| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_1081| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_1086| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_1087| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_2052| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_2070| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_2074| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_3082| analys32.xll| | 212656| 11-Nov-20| 03:59 \nanalys32.xll_9242| analys32.xll| | 212656| 11-Nov-20| 03:59 \nsolver32.dll_1025| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1026| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1028| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1029| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1030| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1031| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1032| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1033| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1035| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1036| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1037| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1038| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1040| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1041| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1042| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1043| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1044| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1045| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1046| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1048| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1049| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1050| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1051| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1053| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1054| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1055| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1057| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1058| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1060| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1061| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1062| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1063| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1066| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1081| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1086| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_1087| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_2052| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_2070| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_2074| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_3082| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \nsolver32.dll_9242| solver32.dll| 16.0.4684.1000| 188576| 11-Nov-20| 03:59 \n \n## \n\n__\n\nFor all supported x64-based versions of Excel 2016\n\nFile identifier| File name| File version| File size| Date| Time \n---|---|---|---|---|--- \nxlintl32.dll_1025| xlintl32.dll| 16.0.5095.1000| 17202488| 13-Nov-20| 12:20 \nxlintl32.dll_1026| xlintl32.dll| 16.0.5095.1000| 17212712| 13-Nov-20| 12:20 \nxlintl32.dll_1029| xlintl32.dll| 16.0.5095.1000| 17246568| 13-Nov-20| 12:20 \nxlintl32.dll_1030| xlintl32.dll| 16.0.5095.1000| 17148792| 13-Nov-20| 12:20 \nxllex.dll_1030| xllex.dll| 16.0.4666.1000| 46312| 12-Nov-20| 04:38 \nxlintl32.dll_1031| xlintl32.dll| 16.0.5095.1000| 17287544| 13-Nov-20| 12:20 \nxlintl32.dll_1032| xlintl32.dll| 16.0.5095.1000| 17319208| 13-Nov-20| 12:20 \nxlintl32.dll_3082| xlintl32.dll| 16.0.5095.1000| 17197936| 13-Nov-20| 12:20 \nxlintl32.dll_1061| xlintl32.dll| 16.0.5095.1000| 17135984| 13-Nov-20| 12:20 \nxlintl32.dll_1035| xlintl32.dll| 16.0.5095.1000| 17146704| 13-Nov-20| 12:20 \nxlintl32.dll_1036| xlintl32.dll| 16.0.5095.1000| 17268576| 13-Nov-20| 12:20 \nxlintl32.dll_1037| xlintl32.dll| 16.0.5095.1000| 17137464| 13-Nov-20| 12:20 \nxlintl32.dll_1081| xlintl32.dll| 16.0.5095.1000| 17250616| 13-Nov-20| 12:20 \nxlintl32.dll_1050| xlintl32.dll| 16.0.5095.1000| 17173408| 13-Nov-20| 12:20 \nxlintl32.dll_1038| xlintl32.dll| 16.0.5095.1000| 17258352| 13-Nov-20| 12:20 \nxlintl32.dll_1057| xlintl32.dll| 16.0.5095.1000| 17141104| 13-Nov-20| 12:20 \nxlintl32.dll_1040| xlintl32.dll| 16.0.5095.1000| 17184120| 13-Nov-20| 12:20 \nxlintl32.dll_1041| xlintl32.dll| 16.0.5095.1000| 17201464| 13-Nov-20| 12:20 \nxlintl32.dll_1087| xlintl32.dll| 16.0.5095.1000| 17269560| 13-Nov-20| 12:20 \nxlintl32.dll_1042| xlintl32.dll| 16.0.5095.1000| 17185080| 13-Nov-20| 12:20 \nxlintl32.dll_1063| xlintl32.dll| 16.0.5095.1000| 17218432| 13-Nov-20| 12:20 \nxlintl32.dll_1062| xlintl32.dll| 16.0.5095.1000| 17193312| 13-Nov-20| 12:20 \nxlintl32.dll_1086| xlintl32.dll| 16.0.5095.1000| 17145712| 13-Nov-20| 12:20 \nxlintl32.dll_1044| xlintl32.dll| 16.0.5095.1000| 17133424| 13-Nov-20| 12:20 \nxlintl32.dll_1043| xlintl32.dll| 16.0.5095.1000| 17192816| 13-Nov-20| 12:20 \nxlintl32.dll_1045| xlintl32.dll| 16.0.5095.1000| 17264024| 13-Nov-20| 12:20 \nxlintl32.dll_1046| xlintl32.dll| 16.0.5095.1000| 17212280| 13-Nov-20| 12:20 \nxlintl32.dll_2070| xlintl32.dll| 16.0.5095.1000| 17213296| 13-Nov-20| 12:20 \nxlintl32.dll_1048| xlintl32.dll| 16.0.5095.1000| 17269120| 13-Nov-20| 12:20 \nxlintl32.dll_1049| xlintl32.dll| 16.0.5095.1000| 17204536| 13-Nov-20| 12:20 \nxlintl32.dll_1051| xlintl32.dll| 16.0.5095.1000| 17258360| 13-Nov-20| 12:20 \nxlintl32.dll_1060| xlintl32.dll| 16.0.5095.1000| 17182112| 13-Nov-20| 12:20 \nxlintl32.dll_2074| xlintl32.dll| 16.0.5095.1000| 17196960| 13-Nov-20| 12:20 \nxlintl32.dll_9242| xlintl32.dll| 16.0.5095.1000| 17195936| 13-Nov-20| 12:20 \nxlintl32.dll_1053| xlintl32.dll| 16.0.5095.1000| 17139568| 13-Nov-20| 12:20 \nxlintl32.dll_1054| xlintl32.dll| 16.0.5095.1000| 17206584| 13-Nov-20| 12:20 \nxlintl32.dll_1055| xlintl32.dll| 16.0.5095.1000| 17245552| 13-Nov-20| 12:20 \nxlintl32.dll_1058| xlintl32.dll| 16.0.5095.1000| 17208640| 13-Nov-20| 12:20 \nxlintl32.dll_1066| xlintl32.dll| 16.0.5095.1000| 17260848| 13-Nov-20| 12:20 \nxlintl32.dll_2052| xlintl32.dll| 16.0.5095.1000| 17037632| 13-Nov-20| 12:21 \nxlintl32.dll_1028| xlintl32.dll| 16.0.5095.1000| 17051448| 13-Nov-20| 12:21 \nclient.models.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.models.dll| | 139936| 11-Nov-20| 04:10 \nclient.windows.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.dll| | 0| 11-Nov-20| 04:10 \ncontainer35.exe.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.container.exe| | 28288| 11-Nov-20| 04:10 \ncontainer35.exe.config.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.container.exe.config| | 137| 11-Nov-20| 04:10 \ncontainer40.exe.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.container.netfx40.exe| | 26872| 11-Nov-20| 04:10 \ncontainer40.exe.config.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.container.netfx40.exe.config| | 137| 11-Nov-20| 04:10 \ncontainer45.exe.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.container.netfx45.exe| | 26864| 11-Nov-20| 04:10 \ncontainer45.exe.config.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.container.netfx45.exe.config| | 137| 11-Nov-20| 04:10 \ndocument.af_za.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 224928| 11-Nov-20| 04:10 \ndocument.am_et.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 275536| 11-Nov-20| 04:10 \ndocument.ar_sa.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 269976| 11-Nov-20| 04:10 \ndocument.as_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 331424| 11-Nov-20| 04:10 \ndocument.az_latn_az.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 244192| 11-Nov-20| 04:10 \ndocument.be_by.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 278176| 11-Nov-20| 04:10 \ndocument.bg_bg.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 287816| 11-Nov-20| 04:10 \ndocument.bn_bd.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 331424| 11-Nov-20| 04:10 \ndocument.bn_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 339616| 11-Nov-20| 04:10 \ndocument.bs_latn_ba.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 230440| 11-Nov-20| 04:10 \ndocument.ca_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 234576| 11-Nov-20| 04:10 \ndocument.ca_es_valencia.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 233112| 11-Nov-20| 04:10 \ndocument.cs_cz.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 233120| 11-Nov-20| 04:10 \ndocument.cy_gb.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 229024| 11-Nov-20| 04:10 \ndocument.da_dk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 230488| 11-Nov-20| 04:10 \ndocument.de_de.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 238632| 11-Nov-20| 04:10 \ndocument.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.dll| | 2662048| 11-Nov-20| 04:10 \ndocument.el_gr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 304216| 11-Nov-20| 04:10 \ndocument.es_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 233120| 11-Nov-20| 04:10 \ndocument.et_ee.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 224952| 11-Nov-20| 04:10 \ndocument.eu_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 230440| 11-Nov-20| 04:10 \ndocument.fa_ir.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 261784| 11-Nov-20| 04:10 \ndocument.fi_fi.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 229048| 11-Nov-20| 04:10 \ndocument.fil_ph.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 238632| 11-Nov-20| 04:10 \ndocument.fr_fr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 242728| 11-Nov-20| 04:10 \ndocument.ga_ie.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 238632| 11-Nov-20| 04:10 \ndocument.gd_gb.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 246824| 11-Nov-20| 04:10 \ndocument.gl_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 233120| 11-Nov-20| 04:10 \ndocument.gu_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 323232| 11-Nov-20| 04:10 \ndocument.he_il.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 257696| 11-Nov-20| 04:10 \ndocument.hi_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 324696| 11-Nov-20| 04:10 \ndocument.hr_hr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 229016| 11-Nov-20| 04:10 \ndocument.hu_hu.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 237216| 11-Nov-20| 04:10 \ndocument.hy_am.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 289248| 11-Nov-20| 04:10 \ndocument.id_id.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 224952| 11-Nov-20| 04:10 \ndocument.is_is.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 230480| 11-Nov-20| 04:10 \ndocument.it_it.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 233112| 11-Nov-20| 04:10 \ndocument.ja_jp.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 256480| 11-Nov-20| 04:10 \ndocument.ka_ge.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 347808| 11-Nov-20| 04:10 \ndocument.kk_kz.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 278176| 11-Nov-20| 04:10 \ndocument.km_kh.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 332888| 11-Nov-20| 04:10 \ndocument.kn_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 339616| 11-Nov-20| 04:10 \nanalys32.xll_9242| analys32.xll| | 257216| 11-Nov-20| 04:09 \nsolver32.dll_1025| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \ndocument.ko_kr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 238680| 11-Nov-20| 04:10 \ndocument.kok_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 327328| 11-Nov-20| 04:10 \ndocument.ky_kg.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 285152| 11-Nov-20| 04:10 \ndocument.lb_lu.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 237216| 11-Nov-20| 04:10 \ndocument.lt_lt.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 236000| 11-Nov-20| 04:10 \ndocument.lv_lv.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 233120| 11-Nov-20| 04:10 \ndocument.mi_nz.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 234576| 11-Nov-20| 04:10 \ndocument.mk_mk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 290464| 11-Nov-20| 04:10 \ndocument.ml_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 364192| 11-Nov-20| 04:10 \ndocument.mn_mn.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 285152| 11-Nov-20| 04:10 \ndocument.mr_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 324696| 11-Nov-20| 04:10 \ndocument.ms_my.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 224928| 11-Nov-20| 04:10 \ndocument.mt_mt.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 229024| 11-Nov-20| 04:10 \ndocument.nb_no.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 224928| 11-Nov-20| 04:10 \ndocument.ne_np.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 339616| 11-Nov-20| 04:10 \ndocument.nl_nl.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 233120| 11-Nov-20| 04:10 \nsolver32.dll_1026| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsolver32.dll_1028| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \ndocument.nn_no.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 224928| 11-Nov-20| 04:10 \ndocument.or_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 349272| 11-Nov-20| 04:10 \ndocument.pa_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 320552| 11-Nov-20| 04:10 \ndocument.pl_pl.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 240096| 11-Nov-20| 04:10 \ndocument.prs_af.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 267376| 11-Nov-20| 04:10 \ndocument.pt_br.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 236000| 11-Nov-20| 04:10 \ndocument.pt_pt.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 233120| 11-Nov-20| 04:10 \ndocument.quz_pe.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 234584| 11-Nov-20| 04:10 \ndocument.ro_ro.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 234576| 11-Nov-20| 04:10 \ndocument.ru_ru.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 287832| 11-Nov-20| 04:10 \ndocument.sd_arab_pk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 261784| 11-Nov-20| 04:10 \ndocument.si_lk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 319128| 11-Nov-20| 04:10 \ndocument.sk_sk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 234536| 11-Nov-20| 04:10 \ndocument.sl_si.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 233120| 11-Nov-20| 04:10 \ndocument.sq_al.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 238632| 11-Nov-20| 04:10 \ndocument.sr_cyrl_ba.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 279640| 11-Nov-20| 04:10 \nsolver32.dll_1029| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsolver32.dll_1030| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \ndocument.sr_cyrl_rs.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 279664| 11-Nov-20| 04:10 \ndocument.sr_latn_cs.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 229024| 11-Nov-20| 04:10 \ndocument.sr_latn_rs.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 231904| 11-Nov-20| 04:10 \ndocument.sv_se.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 231904| 11-Nov-20| 04:10 \ndocument.sw_ke.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 231904| 11-Nov-20| 04:10 \ndocument.ta_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 361512| 11-Nov-20| 04:10 \ndocument.te_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 342496| 11-Nov-20| 04:10 \ndocument.th_th.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 323224| 11-Nov-20| 04:10 \ndocument.tk_tm.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 231904| 11-Nov-20| 04:10 \ndocument.tr_tr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 230480| 11-Nov-20| 04:10 \ndocument.tt_ru.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 279632| 11-Nov-20| 04:10 \ndocument.ug_cn.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 278176| 11-Nov-20| 04:10 \ndocument.uk_ua.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 285152| 11-Nov-20| 04:10 \ndocument.ur_pk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 269984| 11-Nov-20| 04:10 \ndocument.uz_latn_uz.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 237216| 11-Nov-20| 04:10 \ndocument.vi_vn.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 249504| 11-Nov-20| 04:10 \ndocument.xmlserializers.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.xmlserializers.dll| | 1007264| 11-Nov-20| 04:10 \ndocument.zh_cn.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 216736| 11-Nov-20| 04:10 \ndocument.zh_tw.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.document.resources.dll| | 222248| 11-Nov-20| 04:10 \ndocumentformat.openxml.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| documentformat.openxml.dll| | 0| 11-Nov-20| 04:10 \ndocumentservices.af_za.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:10 \ndocumentservices.am_et.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 56992| 11-Nov-20| 04:10 \ndocumentservices.ar_sa.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:10 \ndocumentservices.as_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 62504| 11-Nov-20| 04:10 \ndocumentservices.az_latn_az.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:10 \ndocumentservices.be_by.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 57008| 11-Nov-20| 04:10 \ndocumentservices.bg_bg.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 57016| 11-Nov-20| 04:10 \ndocumentservices.bn_bd.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 58408| 11-Nov-20| 04:10 \ndocumentservices.bn_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 61112| 11-Nov-20| 04:10 \ndocumentservices.bs_latn_ba.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 54352| 11-Nov-20| 04:10 \ndocumentservices.ca_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 54360| 11-Nov-20| 04:10 \ndocumentservices.ca_es_valencia.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52896| 11-Nov-20| 04:10 \ndocumentservices.cs_cz.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:10 \ndocumentservices.cy_gb.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 54360| 11-Nov-20| 04:10 \ndocumentservices.da_dk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52888| 11-Nov-20| 04:10 \ndocumentservices.de_de.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52896| 11-Nov-20| 04:10 \ndocumentservices.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.dll| | 409128| 11-Nov-20| 04:10 \ndocumentservices.el_gr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 56992| 11-Nov-20| 04:10 \ndocumentservices.es_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 54360| 11-Nov-20| 04:10 \ndocumentservices.et_ee.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 54312| 11-Nov-20| 04:10 \ndocumentservices.eu_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52896| 11-Nov-20| 04:10 \ndocumentservices.fa_ir.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:10 \ndocumentservices.fi_fi.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52896| 11-Nov-20| 04:10 \ndocumentservices.fil_ph.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:10 \ndocumentservices.fr_fr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:10 \ndocumentservices.ga_ie.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52896| 11-Nov-20| 04:10 \ndocumentservices.gd_gb.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52896| 11-Nov-20| 04:10 \ndocumentservices.gl_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52896| 11-Nov-20| 04:10 \ndocumentservices.gu_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 57008| 11-Nov-20| 04:10 \ndocumentservices.he_il.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:10 \ndocumentservices.hi_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 63968| 11-Nov-20| 04:10 \ndocumentservices.hr_hr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 55776| 11-Nov-20| 04:10 \ndocumentservices.hu_hu.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 54312| 11-Nov-20| 04:10 \ndocumentservices.hy_am.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 57008| 11-Nov-20| 04:10 \ndocumentservices.id_id.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52896| 11-Nov-20| 04:10 \ndocumentservices.is_is.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52896| 11-Nov-20| 04:10 \ndocumentservices.it_it.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52896| 11-Nov-20| 04:10 \ndocumentservices.ja_jp.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:10 \ndocumentservices.ka_ge.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 61104| 11-Nov-20| 04:10 \ndocumentservices.kk_kz.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 56992| 11-Nov-20| 04:10 \ndocumentservices.km_kh.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 61088| 11-Nov-20| 04:10 \ndocumentservices.kn_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 61088| 11-Nov-20| 04:10 \ndocumentservices.ko_kr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 55776| 11-Nov-20| 04:10 \ndocumentservices.kok_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 61112| 11-Nov-20| 04:10 \ndocumentservices.ky_kg.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 57008| 11-Nov-20| 04:10 \ndocumentservices.lb_lu.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:10 \ndocumentservices.lt_lt.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 54312| 11-Nov-20| 04:10 \ndocumentservices.lv_lv.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 54312| 11-Nov-20| 04:10 \ndocumentservices.mi_nz.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:10 \ndocumentservices.mk_mk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 56992| 11-Nov-20| 04:10 \ndocumentservices.ml_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 61104| 11-Nov-20| 04:10 \ndocumentservices.mn_mn.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 57008| 11-Nov-20| 04:10 \ndocumentservices.mr_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 61088| 11-Nov-20| 04:10 \ndocumentservices.ms_my.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 54312| 11-Nov-20| 04:10 \ndocumentservices.mt_mt.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:10 \ndocumentservices.nb_no.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:10 \ndocumentservices.ne_np.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 57008| 11-Nov-20| 04:10 \ndocumentservices.nl_nl.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52896| 11-Nov-20| 04:10 \ndocumentservices.nn_no.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 54352| 11-Nov-20| 04:10 \ndocumentservices.or_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 61104| 11-Nov-20| 04:10 \ndocumentservices.pa_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 61112| 11-Nov-20| 04:10 \ndocumentservices.pl_pl.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 54360| 11-Nov-20| 04:10 \ndocumentservices.prs_af.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52936| 11-Nov-20| 04:10 \ndocumentservices.pt_br.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52920| 11-Nov-20| 04:10 \ndocumentservices.pt_pt.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52896| 11-Nov-20| 04:10 \ndocumentservices.quz_pe.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52896| 11-Nov-20| 04:10 \ndocumentservices.ro_ro.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52896| 11-Nov-20| 04:10 \ndocumentservices.ru_ru.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 59872| 11-Nov-20| 04:10 \ndocumentservices.sd_arab_pk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52888| 11-Nov-20| 04:10 \ndocumentservices.si_lk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 57032| 11-Nov-20| 04:10 \ndocumentservices.sk_sk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:10 \ndocumentservices.sl_si.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52920| 11-Nov-20| 04:10 \ndocumentservices.sq_al.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 55776| 11-Nov-20| 04:10 \ndocumentservices.sr_cyrl_ba.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 58448| 11-Nov-20| 04:10 \ndocumentservices.sr_cyrl_rs.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 58448| 11-Nov-20| 04:10 \ndocumentservices.sr_latn_cs.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52896| 11-Nov-20| 04:10 \ndocumentservices.sr_latn_rs.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 55776| 11-Nov-20| 04:10 \ndocumentservices.sv_se.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 54312| 11-Nov-20| 04:10 \ndocumentservices.sw_ke.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52936| 11-Nov-20| 04:10 \ndocumentservices.ta_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 62552| 11-Nov-20| 04:10 \ndocumentservices.te_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 61104| 11-Nov-20| 04:10 \ndocumentservices.th_th.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 61112| 11-Nov-20| 04:10 \ndocumentservices.tk_tm.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:10 \ndocumentservices.tr_tr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 54312| 11-Nov-20| 04:10 \ndocumentservices.tt_ru.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 57008| 11-Nov-20| 04:10 \ndocumentservices.ug_cn.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 57008| 11-Nov-20| 04:10 \ndocumentservices.uk_ua.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 58448| 11-Nov-20| 04:10 \ndocumentservices.ur_pk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52920| 11-Nov-20| 04:10 \ndocumentservices.uz_latn_uz.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52912| 11-Nov-20| 04:10 \ndocumentservices.vi_vn.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 54312| 11-Nov-20| 04:10 \ndocumentservices.zh_cn.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 54352| 11-Nov-20| 04:10 \ndocumentservices.zh_tw.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.documentservices.resources.dll| | 52896| 11-Nov-20| 04:10 \neventsource.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| eventsource.dll| | 0| 11-Nov-20| 04:10 \nexcel.af_za.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 74792| 11-Nov-20| 04:10 \nexcel.am_et.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 85656| 11-Nov-20| 04:10 \nexcel.ar_sa.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 81568| 11-Nov-20| 04:10 \nexcel.as_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 103504| 11-Nov-20| 04:10 \nexcel.az_latn_az.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 78888| 11-Nov-20| 04:10 \nexcel.be_by.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 85656| 11-Nov-20| 04:10 \nexcel.bg_bg.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 89760| 11-Nov-20| 04:10 \nexcel.bn_bd.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 106144| 11-Nov-20| 04:10 \nexcel.bn_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 109024| 11-Nov-20| 04:10 \nexcel.bs_latn_ba.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 74792| 11-Nov-20| 04:10 \nexcel.ca_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 77472| 11-Nov-20| 04:10 \nexcel.ca_es_valencia.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 77496| 11-Nov-20| 04:10 \nexcel.cs_cz.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 73376| 11-Nov-20| 04:10 \nexcel.cy_gb.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 73376| 11-Nov-20| 04:10 \nexcel.da_dk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 74832| 11-Nov-20| 04:10 \nexcel.de_de.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 78888| 11-Nov-20| 04:10 \nexcel.editorribbon.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.editorribbon.dll| | 42672| 11-Nov-20| 04:10 \nexcel.el_gr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 93856| 11-Nov-20| 04:10 \nexcel.es_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 74832| 11-Nov-20| 04:10 \nexcel.et_ee.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 74792| 11-Nov-20| 04:10 \nexcel.eu_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 73368| 11-Nov-20| 04:10 \nexcel.extensions.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.extensions.dll| | 288808| 11-Nov-20| 04:10 \nexcel.fa_ir.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 84448| 11-Nov-20| 04:10 \nexcel.fi_fi.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 76256| 11-Nov-20| 04:10 \nexcel.fil_ph.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 78888| 11-Nov-20| 04:10 \nexcel.fr_fr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 77472| 11-Nov-20| 04:10 \nexcel.ga_ie.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 77472| 11-Nov-20| 04:10 \nexcel.gd_gb.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 78928| 11-Nov-20| 04:10 \nexcel.gl_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 73376| 11-Nov-20| 04:10 \nexcel.gu_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 103504| 11-Nov-20| 04:10 \nexcel.he_il.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 81568| 11-Nov-20| 04:10 \nexcel.hi_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 102048| 11-Nov-20| 04:10 \nexcel.hr_hr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 74832| 11-Nov-20| 04:10 \nexcel.hu_hu.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 78936| 11-Nov-20| 04:10 \nexcel.hy_am.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 89760| 11-Nov-20| 04:10 \nexcel.id_id.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 73376| 11-Nov-20| 04:10 \nexcel.is_is.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 76256| 11-Nov-20| 04:10 \nexcel.it_it.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 77464| 11-Nov-20| 04:10 \nexcel.ja_jp.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 83024| 11-Nov-20| 04:10 \nexcel.ka_ge.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 107608| 11-Nov-20| 04:10 \nexcel.kk_kz.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 85656| 11-Nov-20| 04:10 \nexcel.km_kh.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 103512| 11-Nov-20| 04:10 \nexcel.kn_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 106144| 11-Nov-20| 04:10 \nexcel.ko_kr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 77464| 11-Nov-20| 04:10 \nexcel.kok_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 103512| 11-Nov-20| 04:10 \nexcel.ky_kg.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 87120| 11-Nov-20| 04:10 \nexcel.lb_lu.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 78928| 11-Nov-20| 04:10 \nexcel.lt_lt.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 73376| 11-Nov-20| 04:10 \nexcel.lv_lv.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 74864| 11-Nov-20| 04:10 \nexcel.mi_nz.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 74792| 11-Nov-20| 04:10 \nexcel.mk_mk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 91176| 11-Nov-20| 04:10 \nexcel.ml_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 117216| 11-Nov-20| 04:10 \nexcel.mn_mn.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 91248| 11-Nov-20| 04:10 \nexcel.mr_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 102040| 11-Nov-20| 04:10 \nexcel.ms_my.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 73400| 11-Nov-20| 04:10 \nexcel.mt_mt.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 74840| 11-Nov-20| 04:10 \nexcel.nb_no.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 73376| 11-Nov-20| 04:10 \nexcel.ne_np.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 103464| 11-Nov-20| 04:10 \nexcel.nl_nl.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 73376| 11-Nov-20| 04:10 \nexcel.nn_no.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 73376| 11-Nov-20| 04:10 \nexcel.or_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 106144| 11-Nov-20| 04:10 \nexcel.pa_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 103504| 11-Nov-20| 04:10 \nexcel.pl_pl.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 77472| 11-Nov-20| 04:10 \nexcel.prs_af.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 87120| 11-Nov-20| 04:10 \nexcel.pt_br.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 74832| 11-Nov-20| 04:10 \nexcel.pt_pt.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 77472| 11-Nov-20| 04:10 \nexcel.quz_pe.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 78888| 11-Nov-20| 04:10 \nexcel.ro_ro.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 78928| 11-Nov-20| 04:10 \nexcel.ru_ru.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 87080| 11-Nov-20| 04:10 \nexcel.sd_arab_pk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 87152| 11-Nov-20| 04:10 \nexcel.si_lk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 99368| 11-Nov-20| 04:10 \nexcel.sk_sk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 73376| 11-Nov-20| 04:10 \nexcel.sl_si.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 73376| 11-Nov-20| 04:10 \nexcel.sq_al.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 77472| 11-Nov-20| 04:10 \nexcel.sr_cyrl_ba.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 91216| 11-Nov-20| 04:10 \nexcel.sr_cyrl_rs.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 89760| 11-Nov-20| 04:10 \nsolver32.dll_1031| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsolver32.dll_1032| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nexcel.sr_latn_cs.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 74832| 11-Nov-20| 04:10 \nexcel.sr_latn_rs.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 73376| 11-Nov-20| 04:10 \nexcel.sv_se.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 73376| 11-Nov-20| 04:10 \nexcel.sw_ke.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 73376| 11-Nov-20| 04:10 \nexcel.ta_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 110240| 11-Nov-20| 04:10 \nexcel.te_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 102072| 11-Nov-20| 04:10 \nexcel.th_th.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 97952| 11-Nov-20| 04:10 \nexcel.themes.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.themes.dll| | 67408464| 11-Nov-20| 04:10 \nexcel.tk_tm.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 73376| 11-Nov-20| 04:10 \nexcel.tr_tr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 74792| 11-Nov-20| 04:10 \nexcel.tt_ru.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 85664| 11-Nov-20| 04:10 \nexcel.ug_cn.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 88544| 11-Nov-20| 04:10 \nexcel.uk_ua.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 87080| 11-Nov-20| 04:10 \nexcel.ur_pk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 85656| 11-Nov-20| 04:10 \nexcel.uz_latn_uz.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 74832| 11-Nov-20| 04:10 \nexcel.vi_vn.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 81568| 11-Nov-20| 04:10 \nexcel.zh_cn.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 69280| 11-Nov-20| 04:10 \nexcel.zh_tw.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.resources.dll| | 69280| 11-Nov-20| 04:10 \nfil9270b25a9451a19a141d6fe93a590a7c.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.excel.dll| | 1535056| 11-Nov-20| 04:10 \nhis.connectors.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.hostintegration.connectors.dll| | 5225952| 11-Nov-20| 04:10 \nlocalytics.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| localytics.dll| | 0| 11-Nov-20| 04:10 \nmashup.addintelemetry.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.addintelemetry.dll| | 35992| 11-Nov-20| 04:10 \nmashupcompression.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| mashupcompression.dll| | 145488| 11-Nov-20| 04:10 \nmashupengine.ar_sa.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 709720| 11-Nov-20| 04:10 \nmashupengine.bg_bg.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 812120| 11-Nov-20| 04:10 \nmashupengine.ca_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 597664| 11-Nov-20| 04:10 \nmashupengine.cs_cz.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 585376| 11-Nov-20| 04:10 \nmashupengine.da_dk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 589472| 11-Nov-20| 04:10 \nmashupengine.de_de.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 627752| 11-Nov-20| 04:10 \nmashupengine.el_gr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 880288| 11-Nov-20| 04:10 \nmashupengine.es_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 601760| 11-Nov-20| 04:10 \nmashupengine.et_ee.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 558120| 11-Nov-20| 04:10 \nmashupengine.eu_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 580064| 11-Nov-20| 04:10 \nmashupengine.fi_fi.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 582696| 11-Nov-20| 04:10 \nmashupengine.fr_fr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 622240| 11-Nov-20| 04:10 \nmashupengine.gl_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 592352| 11-Nov-20| 04:10 \nmashupengine.he_il.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 660520| 11-Nov-20| 04:10 \nmashupengine.hi_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 999072| 11-Nov-20| 04:10 \nmashupengine.hr_hr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 574504| 11-Nov-20| 04:10 \nmashupengine.hu_hu.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 635992| 11-Nov-20| 04:10 \nmashupengine.id_id.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 574504| 11-Nov-20| 04:10 \nmashupengine.it_it.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 605856| 11-Nov-20| 04:10 \nmashupengine.ja_jp.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 650912| 11-Nov-20| 04:10 \nmashupengine.kk_kz.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 777888| 11-Nov-20| 04:10 \nmashupengine.ko_kr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 615464| 11-Nov-20| 04:10 \nmashupengine.lt_lt.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 586792| 11-Nov-20| 04:10 \nmashupengine.lv_lv.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 601760| 11-Nov-20| 04:10 \nmashupengine.ms_my.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 577184| 11-Nov-20| 04:10 \nmashupengine.nb_no.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 574504| 11-Nov-20| 04:10 \nmashupengine.nl_nl.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 611440| 11-Nov-20| 04:10 \nmashupengine.pl_pl.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 615512| 11-Nov-20| 04:10 \nmashupengine.pt_br.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 593568| 11-Nov-20| 04:10 \nmashupengine.pt_pt.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 599128| 11-Nov-20| 04:10 \nmashupengine.ro_ro.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 609952| 11-Nov-20| 04:10 \nmashupengine.ru_ru.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 813536| 11-Nov-20| 04:10 \nmashupengine.sk_sk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 596448| 11-Nov-20| 04:10 \nmashupengine.sl_si.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 568992| 11-Nov-20| 04:10 \nmashupengine.sr_cyrl_rs.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 773784| 11-Nov-20| 04:10 \nmashupengine.sr_latn_cs.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 568992| 11-Nov-20| 04:10 \nmashupengine.sr_latn_rs.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 568992| 11-Nov-20| 04:10 \nmashupengine.sv_se.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 577184| 11-Nov-20| 04:10 \nmashupengine.th_th.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 937632| 11-Nov-20| 04:10 \nmashupengine.tr_tr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 593568| 11-Nov-20| 04:10 \nmashupengine.uk_ua.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 802456| 11-Nov-20| 04:10 \nmashupengine.vi_vn.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 659104| 11-Nov-20| 04:10 \nmashupengine.zh_cn.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 521296| 11-Nov-20| 04:10 \nmashupengine.zh_tw.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.resources.dll| | 529488| 11-Nov-20| 04:10 \nmicrosoft.data.edm.netfx35.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.edm.netfx35.dll| | 667880| 11-Nov-20| 04:10 \nmicrosoft.data.odata.netfx35.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.odata.netfx35.dll| | 1461488| 11-Nov-20| 04:10 \nmicrosoft.data.odata.qu.35.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.odata.query.netfx35.dll| | 188168| 11-Nov-20| 04:10 \nmicrosoft.data.sapclient.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.dll| | 927432| 11-Nov-20| 04:10 \nmicrosoft.mashup.client.initialize.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.initialization.dll| | 0| 11-Nov-20| 04:10 \nmicrosoft.mashup.client.ui.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.dll| | 43292784| 11-Nov-20| 04:10 \nmicrosoft.mashup.eventsource.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.eventsource.dll| | 160848| 11-Nov-20| 04:10 \nmicrosoft.mashup.sapbwprovider.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.sapbwprovider.dll| | 317600| 11-Nov-20| 04:10 \nmicrosoft.mashup.shims.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.shims.dll| | 28312| 11-Nov-20| 04:10 \nmicrosoft.mashupengine.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashupengine.dll| | 13879960| 11-Nov-20| 04:10 \nmicrosoft.odata.core.netfx35.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.odata.core.netfx35.dll| | 1444592| 11-Nov-20| 04:10 \nmicrosoft.odata.core.netfx35.v7.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.odata.core.netfx35.v7.dll| | 1267936| 11-Nov-20| 04:10 \nmicrosoft.odata.edm.netfx35.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.odata.edm.netfx35.dll| | 785648| 11-Nov-20| 04:10 \nmicrosoft.odata.edm.netfx35.v7.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.odata.edm.netfx35.v7.dll| | 751840| 11-Nov-20| 04:10 \nmicrosoft.powerbi.adomdclient.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.powerbi.adomdclient.dll| | 1111240| 11-Nov-20| 04:10 \nmicrosoft.spatial.netfx35.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.spatial.netfx35.dll| | 133352| 11-Nov-20| 04:10 \nmicrosoft.spatial.netfx35.v7.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.spatial.netfx35.v7.dll| | 131296| 11-Nov-20| 04:10 \nmicrsoft.mashup.internallibrary.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.internallibrary.dll| | 166952| 11-Nov-20| 04:10 \noauth.ar_sa.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 22208| 11-Nov-20| 04:10 \noauth.bg_bg.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 22216| 11-Nov-20| 04:10 \noauth.ca_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21696| 11-Nov-20| 04:10 \noauth.cs_cz.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21696| 11-Nov-20| 04:10 \noauth.da_dk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21704| 11-Nov-20| 04:10 \noauth.de_de.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21704| 11-Nov-20| 04:10 \noauth.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.dll| | 89760| 11-Nov-20| 04:10 \noauth.el_gr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 22720| 11-Nov-20| 04:10 \noauth.es_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21696| 11-Nov-20| 04:10 \noauth.et_ee.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21672| 11-Nov-20| 04:10 \noauth.eu_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21696| 11-Nov-20| 04:10 \noauth.fi_fi.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21696| 11-Nov-20| 04:10 \noauth.fr_fr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21696| 11-Nov-20| 04:10 \noauth.gl_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21696| 11-Nov-20| 04:10 \noauth.he_il.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21696| 11-Nov-20| 04:10 \noauth.hi_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 22728| 11-Nov-20| 04:10 \noauth.hr_hr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21696| 11-Nov-20| 04:10 \noauth.hu_hu.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21704| 11-Nov-20| 04:10 \noauth.id_id.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21696| 11-Nov-20| 04:10 \noauth.it_it.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21696| 11-Nov-20| 04:10 \noauth.ja_jp.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 22208| 11-Nov-20| 04:10 \noauth.kk_kz.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 22208| 11-Nov-20| 04:10 \noauth.ko_kr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21696| 11-Nov-20| 04:10 \noauth.lt_lt.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21696| 11-Nov-20| 04:10 \noauth.lv_lv.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21696| 11-Nov-20| 04:10 \noauth.ms_my.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21696| 11-Nov-20| 04:10 \noauth.nb_no.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21696| 11-Nov-20| 04:10 \noauth.nl_nl.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21704| 11-Nov-20| 04:10 \noauth.pl_pl.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21696| 11-Nov-20| 04:10 \noauth.pt_br.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21696| 11-Nov-20| 04:10 \noauth.pt_pt.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21704| 11-Nov-20| 04:10 \noauth.ro_ro.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21696| 11-Nov-20| 04:10 \noauth.ru_ru.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 22720| 11-Nov-20| 04:10 \noauth.sk_sk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21696| 11-Nov-20| 04:10 \noauth.sl_si.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21696| 11-Nov-20| 04:10 \noauth.sr_cyrl_rs.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 22208| 11-Nov-20| 04:10 \noauth.sr_latn_cs.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21696| 11-Nov-20| 04:10 \noauth.sr_latn_rs.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21696| 11-Nov-20| 04:10 \noauth.sv_se.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21696| 11-Nov-20| 04:10 \noauth.th_th.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 23232| 11-Nov-20| 04:10 \noauth.tr_tr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21696| 11-Nov-20| 04:10 \noauth.uk_ua.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 22208| 11-Nov-20| 04:10 \noauth.vi_vn.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 22208| 11-Nov-20| 04:10 \noauth.zh_cn.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21184| 11-Nov-20| 04:10 \noauth.zh_tw.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oauth.resources.dll| | 21184| 11-Nov-20| 04:10 \noledbinteropdll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbinterop.dll| | 182352| 11-Nov-20| 04:10 \noledbprovider.ar_sa.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20160| 11-Nov-20| 04:10 \noledbprovider.bg_bg.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20160| 11-Nov-20| 04:10 \noledbprovider.ca_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20168| 11-Nov-20| 04:10 \noledbprovider.cs_cz.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20168| 11-Nov-20| 04:10 \noledbprovider.da_dk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20160| 11-Nov-20| 04:10 \noledbprovider.de_de.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20168| 11-Nov-20| 04:10 \noledbprovider.el_gr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20168| 11-Nov-20| 04:10 \noledbprovider.es_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20168| 11-Nov-20| 04:10 \noledbprovider.et_ee.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20168| 11-Nov-20| 04:10 \noledbprovider.eu_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20168| 11-Nov-20| 04:10 \noledbprovider.fi_fi.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20168| 11-Nov-20| 04:10 \noledbprovider.fr_fr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20168| 11-Nov-20| 04:10 \noledbprovider.gl_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20160| 11-Nov-20| 04:10 \noledbprovider.he_il.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20168| 11-Nov-20| 04:10 \noledbprovider.hi_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20168| 11-Nov-20| 04:10 \noledbprovider.hr_hr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20160| 11-Nov-20| 04:10 \noledbprovider.hu_hu.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20168| 11-Nov-20| 04:10 \noledbprovider.id_id.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20168| 11-Nov-20| 04:10 \nsolver32.dll_1033| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsolver32.dll_1035| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \noledbprovider.it_it.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20168| 11-Nov-20| 04:10 \noledbprovider.ja_jp.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20168| 11-Nov-20| 04:10 \noledbprovider.kk_kz.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20168| 11-Nov-20| 04:10 \noledbprovider.ko_kr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20168| 11-Nov-20| 04:10 \noledbprovider.lt_lt.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20168| 11-Nov-20| 04:10 \noledbprovider.lv_lv.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20160| 11-Nov-20| 04:10 \noledbprovider.ms_my.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20168| 11-Nov-20| 04:10 \noledbprovider.nb_no.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20160| 11-Nov-20| 04:10 \noledbprovider.nl_nl.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20168| 11-Nov-20| 04:10 \noledbprovider.pl_pl.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20160| 11-Nov-20| 04:10 \noledbprovider.pt_br.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20168| 11-Nov-20| 04:10 \noledbprovider.pt_pt.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20168| 11-Nov-20| 04:10 \noledbprovider.ro_ro.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20168| 11-Nov-20| 04:10 \noledbprovider.ru_ru.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20168| 11-Nov-20| 04:10 \noledbprovider.sk_sk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20168| 11-Nov-20| 04:10 \nsolver32.dll_1036| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsolver32.dll_1037| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \noledbprovider.sl_si.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20160| 11-Nov-20| 04:10 \noledbprovider.sr_cyrl_rs.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20168| 11-Nov-20| 04:10 \noledbprovider.sr_latn_cs.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20168| 11-Nov-20| 04:10 \noledbprovider.sr_latn_rs.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20160| 11-Nov-20| 04:10 \noledbprovider.sv_se.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20160| 11-Nov-20| 04:10 \noledbprovider.th_th.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20168| 11-Nov-20| 04:10 \noledbprovider.tr_tr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20168| 11-Nov-20| 04:10 \noledbprovider.uk_ua.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20168| 11-Nov-20| 04:10 \noledbprovider.vi_vn.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20168| 11-Nov-20| 04:10 \noledbprovider.zh_cn.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20168| 11-Nov-20| 04:10 \noledbprovider.zh_tw.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.resources.dll| | 20160| 11-Nov-20| 04:10 \noledbproviderdll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.oledbprovider.dll| | 67744| 11-Nov-20| 04:10 \npackaging.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.packaging.dll| | 52384| 11-Nov-20| 04:10 \nprivate_odbc32.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| private_odbc32.dll| | 735440| 11-Nov-20| 04:10 \nprovidershared.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.providershared.dll| | 56872| 11-Nov-20| 04:10 \nsapclient.ar_sa.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 44736| 11-Nov-20| 04:10 \nsapclient.bg_bg.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 35520| 11-Nov-20| 04:10 \nsapclient.ca_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 32448| 11-Nov-20| 04:10 \nsapclient.cs_cz.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 31936| 11-Nov-20| 04:10 \nsapclient.da_dk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 31936| 11-Nov-20| 04:10 \nsapclient.de_de.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 32448| 11-Nov-20| 04:10 \nsapclient.el_gr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 48832| 11-Nov-20| 04:10 \nsapclient.es_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 32448| 11-Nov-20| 04:10 \nsapclient.et_ee.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 31424| 11-Nov-20| 04:10 \nsapclient.eu_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 31936| 11-Nov-20| 04:10 \nsapclient.fi_fi.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 31936| 11-Nov-20| 04:10 \nsapclient.fr_fr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 32456| 11-Nov-20| 04:10 \nsapclient.gl_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 31936| 11-Nov-20| 04:10 \nsapclient.he_il.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 32960| 11-Nov-20| 04:10 \nsapclient.hi_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 48832| 11-Nov-20| 04:10 \nsapclient.hr_hr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 31936| 11-Nov-20| 04:10 \nsapclient.hu_hu.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 32456| 11-Nov-20| 04:10 \nsolver32.dll_1038| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsolver32.dll_1040| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsapclient.id_id.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 31424| 11-Nov-20| 04:10 \nsapclient.it_it.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 32968| 11-Nov-20| 04:10 \nsapclient.ja_jp.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 44736| 11-Nov-20| 04:10 \nsapclient.kk_kz.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 44736| 11-Nov-20| 04:10 \nsapclient.ko_kr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 32448| 11-Nov-20| 04:10 \nsapclient.lt_lt.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 31944| 11-Nov-20| 04:10 \nsapclient.lv_lv.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 31936| 11-Nov-20| 04:10 \nsapclient.ms_my.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 31424| 11-Nov-20| 04:10 \nsapclient.nb_no.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 31424| 11-Nov-20| 04:10 \nsapclient.nl_nl.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 32448| 11-Nov-20| 04:10 \nsapclient.pl_pl.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 32960| 11-Nov-20| 04:10 \nsapclient.pt_br.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 32456| 11-Nov-20| 04:10 \nsapclient.pt_pt.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 31936| 11-Nov-20| 04:10 \nsapclient.ro_ro.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 31936| 11-Nov-20| 04:10 \nsapclient.ru_ru.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 35520| 11-Nov-20| 04:10 \nsapclient.sk_sk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 32456| 11-Nov-20| 04:10 \nsolver32.dll_1041| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsolver32.dll_1042| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsapclient.sl_si.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 31936| 11-Nov-20| 04:10 \nsapclient.sr_cyrl_rs.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 35520| 11-Nov-20| 04:10 \nsapclient.sr_latn_cs.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 31936| 11-Nov-20| 04:10 \nsapclient.sr_latn_rs.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 31936| 11-Nov-20| 04:10 \nsapclient.sv_se.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 31936| 11-Nov-20| 04:10 \nsapclient.th_th.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 48832| 11-Nov-20| 04:10 \nsapclient.tr_tr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 32448| 11-Nov-20| 04:10 \nsapclient.uk_ua.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 48832| 11-Nov-20| 04:10 \nsapclient.vi_vn.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 32960| 11-Nov-20| 04:10 \nsapclient.zh_cn.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 30912| 11-Nov-20| 04:10 \nsapclient.zh_tw.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.data.sapclient.resources.dll| | 30920| 11-Nov-20| 04:10 \nscriptdom.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.scriptdom.dll| | 2371784| 11-Nov-20| 04:10 \nsqmapi.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| sqmapi_x64.dll| | 0| 11-Nov-20| 04:10 \nstorage.xmlserializers.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.storage.xmlserializers.dll| | 151240| 11-Nov-20| 04:10 \nstorageclient.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.windowsazure.storageclient.dll| | 0| 11-Nov-20| 04:10 \nsystem.spatial.netfx35.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| system.spatial.netfx35.dll| | 124640| 11-Nov-20| 04:10 \ntransformdatabyexample.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.dataintegration.transformdatabyexample.dll| | 60560| 11-Nov-20| 04:10 \nui.af_za.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 241312| 11-Nov-20| 04:10 \nui.am_et.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 294560| 11-Nov-20| 04:10 \nui.ar_sa.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 278176| 11-Nov-20| 04:10 \nui.as_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 358880| 11-Nov-20| 04:10 \nui.az_latn_az.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 255056| 11-Nov-20| 04:10 \nui.be_by.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 304168| 11-Nov-20| 04:10 \nui.bg_bg.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 316464| 11-Nov-20| 04:10 \nui.bn_bd.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 361552| 11-Nov-20| 04:10 \nui.bn_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 369704| 11-Nov-20| 04:10 \nui.bs_latn_ba.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 241312| 11-Nov-20| 04:10 \nui.ca_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 249464| 11-Nov-20| 04:10 \nui.ca_es_valencia.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 249504| 11-Nov-20| 04:10 \nui.cs_cz.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 245376| 11-Nov-20| 04:10 \nui.cy_gb.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 241304| 11-Nov-20| 04:10 \nui.da_dk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 246792| 11-Nov-20| 04:10 \nui.de_de.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 253568| 11-Nov-20| 04:10 \nui.el_gr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 331416| 11-Nov-20| 04:10 \nui.es_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 249472| 11-Nov-20| 04:10 \nui.et_ee.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 237184| 11-Nov-20| 04:10 \nui.eu_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 242736| 11-Nov-20| 04:10 \nui.fa_ir.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 286368| 11-Nov-20| 04:10 \nui.fi_fi.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 241280| 11-Nov-20| 04:10 \nui.fil_ph.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 249504| 11-Nov-20| 04:10 \nui.fr_fr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 255024| 11-Nov-20| 04:10 \nui.ga_ie.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 255064| 11-Nov-20| 04:10 \nui.gd_gb.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 253624| 11-Nov-20| 04:10 \nui.gl_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 246832| 11-Nov-20| 04:10 \nui.gu_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 347800| 11-Nov-20| 04:10 \nui.he_il.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 267304| 11-Nov-20| 04:10 \nui.hi_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 351896| 11-Nov-20| 04:10 \nui.hr_hr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 241280| 11-Nov-20| 04:10 \nui.hu_hu.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 259112| 11-Nov-20| 04:10 \nui.hy_am.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 310944| 11-Nov-20| 04:10 \nui.id_id.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 240064| 11-Nov-20| 04:10 \nui.is_is.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 242728| 11-Nov-20| 04:10 \nui.it_it.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 249472| 11-Nov-20| 04:10 \nui.ja_jp.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 263208| 11-Nov-20| 04:10 \nui.ka_ge.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 380576| 11-Nov-20| 04:10 \nui.kk_kz.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 300040| 11-Nov-20| 04:10 \nui.km_kh.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 365648| 11-Nov-20| 04:10 \nui.kn_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 373840| 11-Nov-20| 04:10 \nui.ko_kr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 246832| 11-Nov-20| 04:10 \nui.kok_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 357456| 11-Nov-20| 04:10 \nui.ky_kg.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 306848| 11-Nov-20| 04:10 \nui.lb_lu.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 253600| 11-Nov-20| 04:10 \nui.lt_lt.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 250888| 11-Nov-20| 04:10 \nui.lv_lv.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 252352| 11-Nov-20| 04:10 \nui.mi_nz.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 246864| 11-Nov-20| 04:10 \nui.mk_mk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 312360| 11-Nov-20| 04:10 \nui.ml_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 401048| 11-Nov-20| 04:10 \nui.mn_mn.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 304216| 11-Nov-20| 04:10 \nui.mr_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 358880| 11-Nov-20| 04:10 \nui.ms_my.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 242768| 11-Nov-20| 04:10 \nui.mt_mt.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 245408| 11-Nov-20| 04:10 \nui.nb_no.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 241272| 11-Nov-20| 04:10 \nui.ne_np.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 376480| 11-Nov-20| 04:10 \nui.nl_nl.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 245376| 11-Nov-20| 04:10 \nui.nn_no.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 241312| 11-Nov-20| 04:10 \nui.or_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 387552| 11-Nov-20| 04:10 \nui.pa_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 345168| 11-Nov-20| 04:10 \nui.pl_pl.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 250928| 11-Nov-20| 04:10 \nui.prs_af.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 294560| 11-Nov-20| 04:10 \nui.pt_br.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 245376| 11-Nov-20| 04:10 \nui.pt_pt.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 249472| 11-Nov-20| 04:10 \nui.quz_pe.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 245408| 11-Nov-20| 04:10 \nui.ro_ro.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 250936| 11-Nov-20| 04:10 \nui.ru_ru.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 310912| 11-Nov-20| 04:10 \nui.sd_arab_pk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 278176| 11-Nov-20| 04:10 \nui.si_lk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 346592| 11-Nov-20| 04:10 \nui.sk_sk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 246832| 11-Nov-20| 04:10 \nui.sl_si.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 242744| 11-Nov-20| 04:10 \nui.sq_al.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 253600| 11-Nov-20| 04:10 \nui.sr_cyrl_ba.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 302776| 11-Nov-20| 04:10 \nui.sr_cyrl_rs.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 298624| 11-Nov-20| 04:10 \nui.sr_latn_cs.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 242736| 11-Nov-20| 04:10 \nui.sr_latn_rs.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 242744| 11-Nov-20| 04:10 \nui.sv_se.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 242736| 11-Nov-20| 04:10 \nui.sw_ke.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 241312| 11-Nov-20| 04:10 \nui.ta_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 406608| 11-Nov-20| 04:10 \nui.te_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 375264| 11-Nov-20| 04:10 \nui.th_th.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 350688| 11-Nov-20| 04:10 \nui.tk_tm.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 244192| 11-Nov-20| 04:10 \nui.tr_tr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 245400| 11-Nov-20| 04:10 \nui.tt_ru.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 306848| 11-Nov-20| 04:10 \nui.ug_cn.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 298648| 11-Nov-20| 04:10 \nui.uk_ua.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 302720| 11-Nov-20| 04:10 \nui.ur_pk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 297440| 11-Nov-20| 04:10 \nui.uz_latn_uz.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 249528| 11-Nov-20| 04:10 \nui.vi_vn.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 261792| 11-Nov-20| 04:10 \nui.zh_cn.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 224928| 11-Nov-20| 04:10 \nui.zh_tw.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.ui.resources.dll| | 229024| 11-Nov-20| 04:10 \nunity.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.practices.unity.dll| | 133344| 11-Nov-20| 04:10 \nwindows.af_za.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.am_et.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.ar_sa.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.as_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.az_latn_az.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.be_by.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.bg_bg.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.bn_bd.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.bn_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.bs_latn_ba.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.ca_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.ca_es_valencia.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.cs_cz.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.cy_gb.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.da_dk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.de_de.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.el_gr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.es_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.et_ee.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.eu_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.fa_ir.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.fi_fi.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.fil_ph.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.fr_fr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.ga_ie.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.gd_gb.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.gl_es.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.gu_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.he_il.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.hi_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.hr_hr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.hu_hu.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.hy_am.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.id_id.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.is_is.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.it_it.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.ja_jp.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.ka_ge.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.kk_kz.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.km_kh.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.kn_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.ko_kr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.kok_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.ky_kg.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.lb_lu.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.lt_lt.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.lv_lv.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.mi_nz.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.mk_mk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.ml_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.mn_mn.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.mr_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.ms_my.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.mt_mt.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.nb_no.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.ne_np.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.nl_nl.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.nn_no.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.or_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.pa_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.pl_pl.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.prs_af.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.pt_br.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.pt_pt.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.quz_pe.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.ro_ro.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.ru_ru.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.sd_arab_pk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.si_lk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.sk_sk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.sl_si.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.sq_al.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.sr_cyrl_ba.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.sr_cyrl_rs.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.sr_latn_cs.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.sr_latn_rs.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.sv_se.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.sw_ke.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.ta_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.te_in.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.th_th.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.tk_tm.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.tr_tr.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.tt_ru.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.ug_cn.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.uk_ua.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.ur_pk.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.uz_latn_uz.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.vi_vn.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.zh_cn.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nwindows.zh_tw.resources.dll.45d2aedc_4ff2_445c_8cd5_529af550c4a9| microsoft.mashup.client.windows.resources.dll| | 0| 11-Nov-20| 04:10 \nxlintl32.dll_1033| xlintl32.dll| 16.0.4807.1000| 17055888| 11-Nov-20| 04:05 \nxlintl32.fallback.dll.1033| xlintl32.dll| 16.0.4807.1000| 17055888| | \nexcel.exe| excel.exe| 16.0.5095.1000| 34510128| 13-Nov-20| 12:20 \nxl12cnv.exe| excelcnv.exe| 16.0.5095.1000| 30231344| 13-Nov-20| 12:20 \nxlsrv.ecs.excelcnv.exe| excelcnv.exe| 16.0.5095.1000| 30231344| | \nanalys32.xll_1025| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1026| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1028| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1029| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1030| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1031| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1032| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1033| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1035| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1036| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1037| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1038| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1040| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1041| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1042| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1043| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1044| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1045| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1046| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1048| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1049| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1050| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1051| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1053| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1054| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1055| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1057| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1058| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1060| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1061| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1062| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1063| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1066| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1081| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1086| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_1087| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_2052| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_2070| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_2074| analys32.xll| | 257216| 11-Nov-20| 04:09 \nanalys32.xll_3082| analys32.xll| | 257216| 11-Nov-20| 04:09 \nsolver32.dll_1043| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsolver32.dll_1044| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsolver32.dll_1045| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsolver32.dll_1046| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsolver32.dll_1048| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsolver32.dll_1049| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsolver32.dll_1050| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsolver32.dll_1051| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsolver32.dll_1053| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsolver32.dll_1054| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsolver32.dll_1055| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsolver32.dll_1057| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsolver32.dll_1058| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsolver32.dll_1060| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsolver32.dll_1061| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsolver32.dll_1062| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsolver32.dll_1063| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsolver32.dll_1066| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsolver32.dll_1081| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsolver32.dll_1086| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsolver32.dll_1087| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsolver32.dll_2052| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsolver32.dll_2070| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsolver32.dll_2074| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsolver32.dll_3082| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \nsolver32.dll_9242| solver32.dll| 16.0.4288.1000| 218168| 11-Nov-20| 04:09 \n \nInformation about protection and securityProtect yourself online: [Windows Security support](<https://support.microsoft.com/hub/4099151>)Learn how we guard against cyber threats: [Microsoft Security](<https://www.microsoft.com/security>)\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mskb", "title": "Description of the security update for Excel 2016: December 8, 2020", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17123", "CVE-2020-17125", "CVE-2020-17126", "CVE-2020-17128", "CVE-2020-17129", "CVE-2020-17130"], "modified": "2020-12-08T08:00:00", "id": "KB4486754", "href": "https://support.microsoft.com/en-us/help/4486754", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-06-23T19:22:14", "description": "None\n## Summary\n\nThis security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following security advisories:\n\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-17123](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17123>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-17125](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17125>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-17126](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17126>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-17127](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17127>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-17128](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17128>)\n**Note** To apply this security update, you must have the release version of [Service Pack 2 for Office 2010](<http://support.microsoft.com/kb/2687455>) installed on the computer.Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2010. It doesn't apply to the Office 2010 Click-to-Run editions, such as Microsoft Office 2010 Home and Student (see [What version of Office am I using?](<https://support.office.com/article/About-Office-What-version-of-Office-am-I-using-932788B8-A3CE-44BF-BB09-E334518B8B19>)).\n\n## How to get and install the update\n\n### Method 1: Microsoft Update\n\nThis update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see [Windows Update: FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>).\n\n### Method 2: Microsoft Update Catalog\n\nTo get the standalone package for this update, go to the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/Search.aspx?q=KB4493148>) website.\n\n### Method 3: Microsoft Download Center\n\nYou can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.\n\n * [Download security update 4493148 for the 32-bit version of Excel 2010](<http://www.microsoft.com/download/details.aspx?familyid=f8adf8be-1608-41cf-8fbd-fc6f2bc2b84b>)\n * [Download security update 4493148 for the 64-bit version of Excel 2010](<http://www.microsoft.com/download/details.aspx?familyid=4540f5bf-a3dc-4211-b276-527c12b6b285>)\n\n## More information\n\n### Security update deployment information\n\nFor deployment information about this update, see [security update deployment information: December 8, 2020](<https://support.microsoft.com/en-us/help/20201208>).\n\n### Security update replacement information\n\nThis security update replaces previously released security update [4486743](<http://support.microsoft.com/kb/4486743>).\n\n### File hash information\n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nexcel2010-kb4493148-fullfile-x86-glb.exe| 55B58DE816CEF94F52129C46416FBDF46D12CE05| 8F07DF7C9E99C8E68AECD3E7D347340645D2F91BC34646D3060F29A8C4B5A7E9 \nexcel2010-kb4493148-fullfile-x64-glb.exe| 628F9B7808194CDA8122E03058BA9AAE12513F66| 15D66CB22F4C9B2EC6D5FE1850C8E16A6EA23144E048B24E03BD1BEEDF579634 \n \nFile informationThe English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.\n\n## \n\n__\n\nFor all supported x86-based versions of Excel 2010\n\nFile identifier| File name| File version| File size| Date| Time \n---|---|---|---|---|--- \nexcel.exe| excel.exe| 14.0.7263.5000| 20,420,224| 17-Nov-2020| 08:04 \nexcel.man| excel.exe.manifest| | 1,194| 06-Nov-2009| 12:00 \nxl12cnv.exe| excelcnv.exe| 14.0.7263.5000| 17,857,152| 12-Nov-2020| 04:17 \nxlcall32.dll| xlcall32.dll| 14.0.7162.5000| 10,432| 13-Oct-2015| 07:52 \nxlicons.exe| xlicons.exe| 14.0.7120.5000| 1,480,360| 05-Mar-2014| 07:06 \n \n## \n\n__\n\nFor all supported x64-based versions of Excel 2010\n\nFile identifier| File name| File version| File size| Date| Time \n---|---|---|---|---|--- \nexcel.exe| excel.exe| 14.0.7263.5000| 27,677,816| 17-Nov-2020| 08:05 \nexcel.man| excel.exe.manifest| | 1,196| 06-Nov-2009| 12:23 \nxl12cnv.exe| excelcnv.exe| 14.0.7263.5000| 25,072,760| 12-Nov-2020| 04:30 \nxlcall32.dll| xlcall32.dll| 14.0.7162.5000| 10,944| 13-Oct-2015| 08:00 \nxlicons.exe| xlicons.exe| 14.0.7120.5000| 1,480,360| 05-Mar-2014| 07:06 \n \nInformation about protection and securityProtect yourself online: [Windows Security support](<https://support.microsoft.com/hub/4099151>)Learn how we guard against cyber threats: [Microsoft Security](<https://www.microsoft.com/security>)\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-12-08T08:00:00", "type": "mskb", "title": "Description of the security update for Excel 2010: December 8, 2020", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-17123", "CVE-2020-17125", "CVE-2020-17126", "CVE-2020-17127", "CVE-2020-17128", "CVE-2020-17129"], "modified": "2020-12-08T08:00:00", "id": "KB4493148", "href": "https://support.microsoft.com/en-us/help/4493148", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-06-23T19:22:14", "description": "None\n## Summary\n\nThis security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following security advisories:\n\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-17089](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17089>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-17115](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17115>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-17118](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17118>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-17120](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17120>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-17121](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17121>)\n**Note** To apply this security update, you must have the release version of [Service Pack 2 for Microsoft SharePoint Foundation 2010](<https://support.microsoft.com/help/2687464>) installed on the computer.\n\n## How to get and install the update\n\n### Method 1: Microsoft Update\n\nThis update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see [Windows Update: FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>).\n\n### Method 2: Microsoft Update Catalog\n\nTo get the standalone package for this update, go to the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/Search.aspx?q=KB4493149>) website.\n\n### Method 3: Microsoft Download Center\n\nYou can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.\n\n * [Download security update 4493149 for the 64-bit version of SharePoint Foundation 2010](<http://www.microsoft.com/download/details.aspx?familyid=4abefe8e-b03a-47b2-be74-e57a2a7610a4>)\n\n## More information\n\n### Security update deployment information\n\nFor deployment information about this update, see [security update deployment information: December 8, 2020](<https://support.microsoft.com/en-us/help/20201208>).\n\n### Security update replacement information\n\nThis security update replaces previously released security update [4486744](<http://support.microsoft.com/kb/4486744>).\n\n### File hash information\n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nwssloc2010-kb4493149-fullfile-x64-glb.exe| 8759CFF7343A6A0F3F0DB87D77E09572E2D14EB6| F4E5E5CC22695A486CC80DBFEDCBC7A682FE3294AF6DBC6FC4108D267BC2484E \n \nFile informationThe English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your lo