Microsoft Patches Were Evaluated up to and Including CVE-2020-1191

Microsoft Patches Were Evaluated up to and Including CVE-2020-1191

Honeywell Commercial Security 2700 Blankenbaker Pkwy, Suite 150 Louisville, KY 40299 Phone: 1-502-297-5700 Phone: 1-800-323-4576 Fax: 1-502-666-7021 https://www.security.honeywell.com The purpose of this document is to identify the patches that have been delivered by Microsoft® which have been tested against Pro-Watch. All the below listed patches have been tested against the current shipping version of Pro-Watch with no adverse effects being observed. Microsoft Patches were evaluated up to and including CVE-2020-1191. Patches not listed below are not applicable to a Pro-Watch system. 2020 – Microsoft® Patches Tested with Pro-Watch CVE-2020-1191 Windows State Repository Service Elevation of Privilege Vulnerability CVE-2020-1190 Windows State Repository Service Elevation of Privilege Vulnerability CVE-2020-1189 Windows State Repository Service Elevation of Privilege Vulnerability CVE-2020-1188 Windows State Repository Service Elevation of Privilege Vulnerability CVE-2020-1187 Windows State Repository Service Elevation of Privilege Vulnerability CVE-2020-1186 Windows State Repository Service Elevation of Privilege Vulnerability CVE-2020-1185 Windows State Repository Service Elevation of Privilege Vulnerability CVE-2020-1184 Windows State Repository Service Elevation of Privilege Vulnerability CVE-2020-1179 Windows GDI Information Disclosure Vulnerability CVE-2020-1176 Jet Database Engine Remote Code Execution Vulnerability CVE-2020-1175 Jet Database Engine Remote Code Execution Vulnerability CVE-2020-1174 Jet Database Engine Remote Code Execution Vulnerability CVE-2020-1166 Windows Clipboard Service Elevation of Privilege Vulnerability CVE-2020-1165 Windows Clipboard Service Elevation of Privilege Vulnerability CVE-2020-1164 Windows Runtime Elevation of Privilege Vulnerability CVE-2020-1158 Windows Runtime Elevation of Privilege Vulnerability CVE-2020-1157 Windows Runtime Elevation of Privilege Vulnerability CVE-2020-1156 Windows Runtime Elevation of Privilege Vulnerability CVE-2020-1155 Windows Runtime Elevation of Privilege Vulnerability CVE-2020-1154 Windows Common Log File System Driver Elevation of Privilege Vulnerability CVE-2020-1153 Microsoft Graphics Components Remote Code Execution Vulnerability CVE-2020-1151 Windows Runtime Elevation of Privilege Vulnerability CVE-2020-1149 Windows Runtime Elevation of Privilege Vulnerability CVE-2020-1145 Windows GDI Information Disclosure Vulnerability CVE-2020-1144 Windows State Repository Service Elevation of Privilege Vulnerability CVE-2020-1143 Win32k Elevation of Privilege Vulnerability CVE-2020-1142 Windows GDI Elevation of Privilege Vulnerability CVE-2020-1141 Windows GDI Information Disclosure Vulnerability CVE-2020-1140 DirectX Elevation of Privilege Vulnerability CVE-2020-1139 Windows Runtime Elevation of Privilege Vulnerability CVE-2020-1138 Windows Storage Service Elevation of Privilege Vulnerability CVE-2020-1137 Windows Push Notification Service Elevation of Privilege Vulnerability CVE-2020-1136 Media Foundation Memory Corruption Vulnerability CVE-2020-1135 Windows Graphics Component Elevation of Privilege Vulnerability CVE-2020-1134 Windows State Repository Service Elevation of Privilege Vulnerability CVE-2020-1132 Windows Error Reporting Manager Elevation of Privilege Vulnerability Honeywell Commercial Security 2700 Blankenbaker Pkwy, Suite 150 Louisville, KY 40299 Phone: 1-502-297-5700 Phone: 1-800-323-4576 Fax: 1-502-666-7021 https://www.security.honeywell.com CVE-2020-1131 Windows State Repository Service Elevation of Privilege Vulnerability CVE-2020-1126 Media Foundation Memory Corruption Vulnerability CVE-2020-1125 Windows Runtime Elevation of Privilege Vulnerability CVE-2020-1124 Windows State Repository Service Elevation of Privilege Vulnerability CVE-2020-1123 Connected User Experiences and Telemetry Service Denial of Service Vulnerability CVE-2020-1121 Windows Clipboard Service Elevation of Privilege Vulnerability CVE-2020-1118 Microsoft Windows Transport Layer Security Denial of Service Vulnerability CVE-2020-1117 Microsoft Color Management Remote Code Execution Vulnerability CVE-2020-1116 Windows CSRSS Information Disclosure Vulnerability CVE-2020-1114 Windows Kernel Elevation of Privilege Vulnerability CVE-2020-1113 Windows Task Scheduler Security Feature Bypass Vulnerability CVE-2020-1112 Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability CVE-2020-1111 Windows Clipboard Service Elevation of Privilege Vulnerability CVE-2020-1110 Windows Update Stack Elevation of Privilege Vulnerability CVE-2020-1109 Windows Update Stack Elevation of Privilege Vulnerability CVE-2020-1108 .NET Core & .NET Framework Denial of Service Vulnerability CVE-2020-1096 Microsoft Edge PDF Remote Code Execution Vulnerability CVE-2020-1094 Windows Work Folder Service Elevation of Privilege Vulnerability CVE-2020-1093 VBScript Remote Code Execution Vulnerability CVE-2020-1092 Internet Explorer Memory Corruption Vulnerability CVE-2020-1090 Windows Runtime Elevation of Privilege Vulnerability CVE-2020-1088 Windows Error Reporting Elevation of Privilege Vulnerability CVE-2020-1087 Windows Kernel Elevation of Privilege Vulnerability CVE-2020-1086 Windows Runtime Elevation of Privilege Vulnerability CVE-2020-1084 Connected User Experiences and Telemetry Service Denial of Service Vulnerability CVE-2020-1082 Windows Error Reporting Elevation of Privilege Vulnerability CVE-2020-1081 Windows Printer Service Elevation of Privilege Vulnerability CVE-2020-1079 Microsoft Windows Elevation of Privilege Vulnerability CVE-2020-1078 Windows Installer Elevation of Privilege Vulnerability CVE-2020-1077 Windows Runtime Elevation of Privilege Vulnerability CVE-2020-1076 Windows Denial of Service Vulnerability CVE-2020-1075 Windows Subsystem for Linux Information Disclosure Vulnerability CVE-2020-1072 Windows Kernel Information Disclosure Vulnerability CVE-2020-1071 Windows Remote Access Common Dialog Elevation of Privilege Vulnerability CVE-2020-1070 Windows Print Spooler Elevation of Privilege Vulnerability CVE-2020-1068 Microsoft Windows Elevation of Privilege Vulnerability CVE-2020-1067 Windows Remote Code Execution Vulnerability CVE-2020-1065 Scripting Engine Memory Corruption Vulnerability CVE-2020-1064 MSHTML Engine Remote Code Execution Vulnerability CVE-2020-1062 Internet Explorer Memory Corruption Vulnerability CVE-2020-1061 Microsoft Script Runtime Remote Code Execution Vulnerability CVE-2020-1060 VBScript Remote Code Execution Vulnerability Honeywell Commercial Security 2700 Blankenbaker Pkwy, Suite 150 Louisville, KY 40299 Phone: 1-502-297-5700 Phone: 1-800-323-4576 Fax: 1-502-666-7021 https://www.security.honeywell.com CVE-2020-1059 Microsoft Edge Spoofing Vulnerability CVE-2020-1058 VBScript Remote Code Execution Vulnerability CVE-2020-1056 Microsoft Edge Elevation of Privilege Vulnerability CVE-2020-1055 Microsoft Active Directory Federation Services Cross-Site Scripting Vulnerability CVE-2020-1054 Win32k Elevation of Privilege Vulnerability CVE-2020-1051 Jet Database Engine Remote Code Execution Vulnerability CVE-2020-1048 Windows Print Spooler Elevation of Privilege Vulnerability CVE-2020-1037 Chakra Scripting Engine Memory Corruption Vulnerability CVE-2020-1035 VBScript Remote Code Execution Vulnerability Connected User Experiences and Telemetry Service Elevation of Privilege CVE-2020-1029 Vulnerability CVE-2020-1028 Media Foundation Memory Corruption Vulnerability CVE-2020-1027 Windows Kernel Elevation of Privilege Vulnerability CVE-2020-1021 Windows Error Reporting Elevation of Privilege Vulnerability CVE-2020-1020 Adobe Font Manager Library Remote Code Execution Vulnerability CVE-2020-1017 Windows Push Notification Service Elevation of Privilege Vulnerability CVE-2020-1016 Windows Push Notification Service Information Disclosure Vulnerability CVE-2020-1015 Windows Elevation of Privilege Vulnerability CVE-2020-1014 Microsoft Windows Update Client Elevation of Privilege Vulnerability CVE-2020-1011 Windows Elevation of Privilege Vulnerability CVE-2020-1010 Microsoft Windows Elevation of Privilege Vulnerability CVE-2020-1009 Windows Elevation of Privilege Vulnerability CVE-2020-1008 Jet Database Engine Remote Code Execution Vulnerability CVE-2020-1007 Windows Kernel Information Disclosure Vulnerability CVE-2020-1006 Windows Push Notification Service Elevation of Privilege Vulnerability CVE-2020-1005 Microsoft Graphics Component Information Disclosure Vulnerability CVE-2020-1004 Windows Graphics Component Elevation of Privilege Vulnerability CVE-2020-1003 Windows Kernel Elevation of Privilege Vulnerability CVE-2020-1001 Windows Push Notification Service Elevation of Privilege Vulnerability CVE-2020-1000 Windows Kernel Elevation of Privilege Vulnerability CVE-2020-0999 Jet Database Engine Remote Code Execution Vulnerability CVE-2020-0996 Windows Update Stack Elevation of Privilege Vulnerability CVE-2020-0995 Jet Database Engine Remote Code Execution Vulnerability CVE-2020-0994 Jet Database Engine Remote Code Execution Vulnerability CVE-2020-0993 Windows DNS Denial of Service Vulnerability CVE-2020-0992 Jet Database Engine Remote Code Execution Vulnerability CVE-2020-0988 Jet Database Engine Remote Code Execution Vulnerability CVE-2020-0987 Microsoft Graphics Component Information Disclosure Vulnerability CVE-2020-0985 Windows Update Stack Elevation of Privilege Vulnerability CVE-2020-0983 Windows Elevation of Privilege Vulnerability CVE-2020-0982 Microsoft Graphics Component Information Disclosure Vulnerability CVE-2020-0981 Windows Token Security Feature

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    53 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us