Microsoft is fixing 99 vulnerabilities in Windows |
Microsoft released a security patch in February that included fixes for a total of 99 vulnerabilities and the first free security update for Windows 7 users after support ended, while Adobe released five programs. Widely available a few hours after the security update.
Among the vulnerabilities that Microsoft addressed this month, Microsoft ranked the vulnerability in 10, 87, and 2. This includes an update to Internet Explorer (IE) that was released last month and that was named CVE-2020. -0674, included in active attacks.
The company warned of weaknesses last month, but it has not issued repairs to millions of affected users and the vulnerability has allowed attackers to persuade victims to open a pre-prepared website. Attack Microsoft browser and thus target your computer. Random code play and remote control.
All supported versions of Windows are facing CVE-2020-0662 issue which allows attackers to execute arbitrary code with elevated privileges on target system.
Remote Desktop Client Service has two main issues, CVE-2020-0681 and CVE-2020-0734, that can be used to track these issues and to compromise on weak servers if they are not approved to connect to malicious servers. Virus infected system.
There is a serious security vulnerability in the way Windows handles LNK files (CVE-2020-0729). This is a shortcut or link that Windows uses to refer to similar files, folders, or native applications on the platform. Macintosh. This vulnerability could allow an attacker to run arbitrary code. Remote control and control of the affected systems.
Another important issue is a memory corruption vulnerability in Internet Explorer, Edge, and Chakra Script Engine that could allow an unauthorized remote attacker to execute arbitrary code on the target system.
Please note that the serious problem poses a major threat to users (CVE-2020-0689). According to Microsoft, the vulnerability affects the safe trigger and the attacker can bypass the trigger. Secure and put unapproved software installed on the system.
This update also includes bug fixes that increase privileges, affect Windows OS versions, and allow attackers with low privileges to run random code in kernel mode.
The company strongly recommends that users install the latest security patches as quickly as possible to prevent cyber criminals from controlling their computers.