- 기고 | 빠르게 변화하는 시대에 대응하는 IT리더의 특징 4가지
- Francisco Gonzalo, CIO de Sacyr: “Hemos identificado más de 70 casos de uso de IA generativa"
- 칼럼 | 클라우드 컴퓨팅 현실, 10년 전보다 나쁘다?
- The Apple Watch Ultra 2 just dropped to its lowest price yet for Black Friday
- The best Black Friday 2024 Kindle deals: Shop sales available now
Tripwire Patch Priority Index for December 2020 VERT
Tripwire‘s December 2020 Patch Priority Index (PPI) brings together important vulnerabilities from Microsoft, Pulse Secure, and Oracle.
First on the patch priority list this month are two vulnerabilities that have recently been included within the Metasploit exploit framework. One is a vulnerability in Pulse Secure Desktop Client and the other is a vulnerability that impacts Oracle Solaris versions 10 and 11.
Up next on the patch priority list this month are patches for Microsoft Edge, Excel, Outlook, and PowerPoint. These patches resolve 11 vulnerabilities that exist due to issues such as memory corruption, information disclosure, security feature bypass, and remote code execution vulnerabilities.
Next are patches that affect components of the Windows operating systems. They resolve over 20 vulnerabilities, including elevation of privilege, information disclosure, remote code execution, and memory corruption vulnerabilities. These vulnerabilities affect core Windows, GDI, Kerberos, Error Reporting, Hyper-V, DirectX, Backup Engine, Cloud Files Mini Filter Driver, and others.
Finally, administrators should focus on server-side patches for Microsoft, which resolve issues in Microsoft Dynamics, Microsoft Exchange, and Microsoft SharePoint. These patches resolve several issues, including cross-site scripting, information disclosure, spoofing, and remote code execution vulnerabilities.
BULLETIN | CVE |
Exploit Framework: Metasploit | CVE-2020-8956, CVE-2020-14871 |
Microsoft Edge | CVE-2020-17131 |
Microsoft Office | CVE-2020-17126, CVE-2020-17128, CVE-2020-17123, CVE-2020-17127, CVE-2020-17125, CVE-2020-17122, CVE-2020-17129, CVE-2020-17130, CVE-2020-17119, CVE-2020-17124 |
Microsoft Windows | CVE-2020-16996, CVE-2020-17103, CVE-2020-17134, CVE-2020-17136, CVE-2020-17138, CVE-2020-17092, CVE-2020-17139, CVE-2020-17095, CVE-2020-17094, CVE-2020-17137, CVE-2020-17098, CVE-2020-17099, CVE-2020-17097, CVE-2020-16964, CVE-2020-16961, CVE-2020-16960, CVE-2020-16962, CVE-2020-16963, CVE-2020-16959, CVE-2020-16958, CVE-2020-17096, CVE-2020-17140 |
Microsoft Exchange Server | CVE-2020-17143, CVE-2020-17141, CVE-2020-17142, CVE-2020-17132, CVE-2020-17117 |
Microsoft Dynamics | CVE-2020-17147, CVE-2020-17133 |
Microsoft Office SharePoint | CVE-2020-17089, CVE-2020-17120, CVE-2020-17121, CVE-2020-17118, CVE-2020-17115 |