
CVE-2020-16911 – GDI+ Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2020-16911
16 Oct 2020 —
A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.<... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16911 •

CVE-2020-16910 – Windows Security Feature Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2020-16910
16 Oct 2020 —
A security feature bypass vulnerability exists when Microsoft Windows fails to handle file creation permissions, which could allow an attacker to create files in a protected Unified Extensible Firmware Interface (UEFI) location.
To exploit this vulnerability, an attacker could run a specially crafted application to bypass Unified Extensible Firmware Interface (UEFI) variable security in Windows.
The security update addresses the vulnerability by correcting security feature behavior to enfor... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16910 • CWE-281: Improper Preservation of Permissions •

CVE-2020-16909 – Windows Error Reporting Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2020-16909
16 Oct 2020 —
An elevation of privilege vulnerability exists in Windows Error Reporting (WER) when WER handles and executes files. The vulnerability could allow elevation of privilege if an attacker can successfully exploit it.
An attacker who successfully exploited the vulnerability could gain greater access to sensitive information and system functionality. To exploit the vulnerability, an attacker could run a specially crafted application.
The security update addresses the vulnerability by correcting ... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16909 •

CVE-2020-16907 – Win32k Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2020-16907
16 Oct 2020 —
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16907 •

CVE-2020-16905 – Windows Error Reporting Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2020-16905
16 Oct 2020 —
An elevation of privilege vulnerability exists in Windows Error Reporting (WER) when WER handles and executes files. The vulnerability could allow elevation of privilege if an attacker can successfully exploit it.
An attacker who successfully exploited the vulnerability could gain greater access to sensitive information and system functionality. To exploit the vulnerability, an attacker could run a specially crafted application.
The security update addresses the vulnerability by correcting ... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16905 •

CVE-2020-16902 – Windows Installer Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2020-16902
16 Oct 2020 —
An elevation of privilege vulnerability exists in the Windows Installer when the Windows Installer fails to properly sanitize input leading to an insecure library loading behavior.
A locally authenticated attacker could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
The security update addresses the vulnerability by correcting the input sanitization error to preclude uni... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16902 • CWE-269: Improper Privilege Management •

CVE-2020-16899 – Windows TCP/IP Denial of Service Vulnerability
https://notcve.org/view.php?id=CVE-2020-16899
16 Oct 2020 —
A denial of service vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets. An attacker who successfully exploited this vulnerability could cause a target system to stop responding.
To exploit this vulnerability, an attacker would have to send specially crafted ICMPv6 Router Advertisement packets to a remote Windows computer. The vulnerability would not allow an attacker to execute code or to elevate user rights directly.
The update address... • https://github.com/advanced-threat-research/CVE-2020-16899 •

CVE-2020-16900 – Windows Event System Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2020-16900
16 Oct 2020 —
An elevation of privilege vulnerability exists when the Windows Event System improperly handles objects in memory.
To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.
The security update addresses the vulnerability by correcting how the Windows Event System handles objects in memory.
Se presenta una vulnerabilidad de escalada de privilegios cuando Windows Eve... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16900 •
CVE-2020-16897 – NetBT Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2020-16897
16 Oct 2020 —
An information disclosure vulnerability exists when NetBIOS over TCP (NBT) Extensions (NetBT) improperly handle objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.
To exploit this vulnerability, an attacker would have run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be u... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16897 •

CVE-2020-16898 – Windows TCP/IP Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2020-16898
16 Oct 2020 —
A remote code execution vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets. An attacker who successfully exploited this vulnerability could gain the ability to execute code on the target server or client.
To exploit this vulnerability, an attacker would have to send specially crafted ICMPv6 Router Advertisement packets to a remote Windows computer.
The update addresses the vulnerability by correcting how the Windows TCP/IP stack handles... • https://github.com/advanced-threat-research/CVE-2020-16898 •