Syxscore Recommended<\/strong><\/td>\n<\/tr>\n\nCVE-2020-17132<\/td>\n Microsoft Exchange Remote Code Execution Vulnerability<\/td>\n Critical<\/td>\n 9.1<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n Yes<\/td>\n<\/tr>\n \nCVE-2020-17142<\/td>\n Microsoft Exchange Remote Code Execution Vulnerability<\/td>\n Critical<\/td>\n 9.1<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n Yes<\/td>\n<\/tr>\n \nCVE-2020-17152<\/td>\n Microsoft Dynamics 365 for Finance and Operations (on-premises) Remote Code Execution Vulnerability<\/td>\n Critical<\/td>\n 8.8<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n Yes<\/td>\n<\/tr>\n \nCVE-2020-17158<\/td>\n Microsoft Dynamics 365 for Finance and Operations (on-premises) Remote Code Execution Vulnerability<\/td>\n Critical<\/td>\n 8.8<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n Yes<\/td>\n<\/tr>\n \nCVE-2020-17121<\/td>\n Microsoft SharePoint Remote Code Execution Vulnerability<\/td>\n Critical<\/td>\n 8.8<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n Yes<\/td>\n<\/tr>\n \nCVE-2020-17143<\/td>\n Microsoft Exchange Information Disclosure Vulnerability<\/td>\n Important<\/td>\n 8.8<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n Yes<\/td>\n<\/tr>\n \nCVE-2020-17147<\/td>\n Dynamics CRM Web client Cross-site Scripting Vulnerability<\/td>\n Important<\/td>\n 8.7<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n Yes<\/td>\n<\/tr>\n \nCVE-2020-17095<\/td>\n Hyper-V Remote Code Execution Vulnerability<\/td>\n Critical<\/td>\n 8.5<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n Yes<\/td>\n<\/tr>\n \nCVE-2020-17141<\/td>\n Microsoft Exchange Remote Code Execution Vulnerability<\/td>\n Important<\/td>\n 8.4<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n Yes<\/td>\n<\/tr>\n \nCVE-2020-17144<\/td>\n Microsoft Exchange Remote Code Execution Vulnerability<\/td>\n Important<\/td>\n 8.4<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n Yes<\/td>\n<\/tr>\n \nCVE-2020-17118<\/td>\n Microsoft SharePoint Remote Code Execution Vulnerability<\/td>\n Critical<\/td>\n 8.1<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n Yes<\/td>\n<\/tr>\n \nCVE-2020-17140<\/td>\n Windows SMB Information Disclosure Vulnerability<\/td>\n Important<\/td>\n 8.1<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n Yes<\/td>\n<\/tr>\n \nCVE-2020-17115<\/td>\n Microsoft SharePoint Spoofing Vulnerability<\/td>\n Moderate<\/td>\n 8<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n Yes<\/td>\n<\/tr>\n \nCVE-2020-17117<\/td>\n Microsoft Exchange Remote Code Execution Vulnerability<\/td>\n Critical<\/td>\n 6.6<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n Yes<\/td>\n<\/tr>\n \nCVE-2020-17131<\/td>\n Chakra Scripting Engine Memory Corruption Vulnerability<\/td>\n Critical<\/td>\n 4.2<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n Yes<\/td>\n<\/tr>\n \nCVE-2020-17137<\/td>\n DirectX Graphics Kernel Elevation of Privilege Vulnerability<\/td>\n Important<\/td>\n 7.8<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17122<\/td>\n Microsoft Excel Remote Code Execution Vulnerability<\/td>\n Important<\/td>\n 7.8<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17123<\/td>\n Microsoft Excel Remote Code Execution Vulnerability<\/td>\n Important<\/td>\n 7.8<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17125<\/td>\n Microsoft Excel Remote Code Execution Vulnerability<\/td>\n Important<\/td>\n 7.8<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17127<\/td>\n Microsoft Excel Remote Code Execution Vulnerability<\/td>\n Important<\/td>\n 7.8<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17128<\/td>\n Microsoft Excel Remote Code Execution Vulnerability<\/td>\n Important<\/td>\n 7.8<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17129<\/td>\n Microsoft Excel Remote Code Execution Vulnerability<\/td>\n Important<\/td>\n 7.8<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17124<\/td>\n Microsoft PowerPoint Remote Code Execution Vulnerability<\/td>\n Important<\/td>\n 7.8<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17159<\/td>\n Visual Studio Code Java Extension Pack Remote Code Execution Vulnerability<\/td>\n Important<\/td>\n 7.8<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17150<\/td>\n Visual Studio Code Remote Code Execution Vulnerability<\/td>\n Important<\/td>\n 7.8<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17148<\/td>\n Visual Studio Code Remote Development Extension Remote Code Execution Vulnerability<\/td>\n Important<\/td>\n 7.8<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17156<\/td>\n Visual Studio Remote Code Execution Vulnerability<\/td>\n Important<\/td>\n 7.8<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-16958<\/td>\n Windows Backup Engine Elevation of Privilege Vulnerability<\/td>\n Important<\/td>\n 7.8<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-16959<\/td>\n Windows Backup Engine Elevation of Privilege Vulnerability<\/td>\n Important<\/td>\n 7.8<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-16960<\/td>\n Windows Backup Engine Elevation of Privilege Vulnerability<\/td>\n Important<\/td>\n 7.8<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-16961<\/td>\n Windows Backup Engine Elevation of Privilege Vulnerability<\/td>\n Important<\/td>\n 7.8<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-16962<\/td>\n Windows Backup Engine Elevation of Privilege Vulnerability<\/td>\n Important<\/td>\n 7.8<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-16963<\/td>\n Windows Backup Engine Elevation of Privilege Vulnerability<\/td>\n Important<\/td>\n 7.8<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-16964<\/td>\n Windows Backup Engine Elevation of Privilege Vulnerability<\/td>\n Important<\/td>\n 7.8<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17134<\/td>\n Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability<\/td>\n Important<\/td>\n 7.8<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17136<\/td>\n Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability<\/td>\n Important<\/td>\n 7.8<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17092<\/td>\n Windows Network Connections Service Elevation of Privilege Vulnerability<\/td>\n Important<\/td>\n 7.8<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17139<\/td>\n Windows Overlay Filter Security Feature Bypass Vulnerability<\/td>\n Important<\/td>\n 7.8<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17096<\/td>\n Windows NTFS Remote Code Execution Vulnerability<\/td>\n Important<\/td>\n 7.5<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17002<\/td>\n Azure SDK for C Security Feature Bypass Vulnerability<\/td>\n Important<\/td>\n 7.4<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17160<\/td>\n Azure Sphere Security Feature Bypass Vulnerability<\/td>\n Important<\/td>\n 7.4<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-16971<\/td>\n Azure SDK for Java Security Feature Bypass Vulnerability<\/td>\n Moderate<\/td>\n 7.4<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17089<\/td>\n Microsoft SharePoint Elevation of Privilege Vulnerability<\/td>\n Important<\/td>\n 7.1<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17103<\/td>\n Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability<\/td>\n Important<\/td>\n 7<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17099<\/td>\n Windows Lock Screen Security Feature Bypass Vulnerability<\/td>\n Important<\/td>\n 6.8<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-16996<\/td>\n Kerberos Security Feature Bypass Vulnerability<\/td>\n Important<\/td>\n 6.5<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17133<\/td>\n Microsoft Dynamics Business Central\/NAV Information Disclosure<\/td>\n Important<\/td>\n 6.5<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17130<\/td>\n Microsoft Excel Security Feature Bypass Vulnerability<\/td>\n Important<\/td>\n 6.5<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17119<\/td>\n Microsoft Outlook Information Disclosure Vulnerability<\/td>\n Important<\/td>\n 6.5<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17135<\/td>\n Azure DevOps Server Spoofing Vulnerability<\/td>\n Important<\/td>\n 6.4<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17126<\/td>\n Microsoft Excel Information Disclosure Vulnerability<\/td>\n Important<\/td>\n 5.5<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17094<\/td>\n Windows Error Reporting Information Disclosure Vulnerability<\/td>\n Important<\/td>\n 5.5<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17138<\/td>\n Windows Error Reporting Information Disclosure Vulnerability<\/td>\n Important<\/td>\n 5.5<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17098<\/td>\n Windows GDI+ Information Disclosure Vulnerability<\/td>\n Important<\/td>\n 5.5<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17145<\/td>\n Azure DevOps Server and Team Foundation Services Spoofing Vulnerability<\/td>\n Important<\/td>\n 5.4<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17120<\/td>\n Microsoft SharePoint Information Disclosure Vulnerability<\/td>\n Important<\/td>\n 5.3<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17153<\/td>\n Microsoft Edge for Android Spoofing Vulnerability<\/td>\n Moderate<\/td>\n 4.3<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n <\/td>\n<\/tr>\n \nCVE-2020-17097<\/td>\n Windows Digital Media Receiver Elevation of Privilege Vulnerability<\/td>\n Important<\/td>\n 3.3<\/td>\n No<\/td>\n No<\/td>\n No<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\nExperience the Power of Syxsense<\/p>\n
Syxsense is a cloud-based solution that helps organizations manage and secure their endpoints with ease. Automatically deploy OS and third-party patches as well as Windows 10 Feature Updates for Microsoft, Mac, and Linux devices.<\/p>\n
<\/p>\n","protected":false},"excerpt":{"rendered":"
December Patch Tuesday 2020 Fixes 58 Vulnerabilities December Patch Tuesday Arrives with 58 Fixes To end the year, Microsoft has remediated 58 bugs including\u00a09\u00a0Critical,\u00a046 Important […]<\/p>\n","protected":false},"author":4,"featured_media":7641,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[6,9,41],"tags":[42],"yoast_head":"\n
December Patch Tuesday 2020 Fixes 58 Vulnerabilities - Syxsense Inc<\/title>\n \n \n \n \n \n \n \n \n \n \n \n \n\t \n\t \n\t \n \n \n \n \n \n \n \n\t \n\t \n\t \n