{"id":6574,"date":"2020-11-12T15:07:38","date_gmt":"2020-11-12T15:07:38","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6574"},"modified":"2022-06-10T18:14:56","modified_gmt":"2022-06-10T17:14:56","slug":"november-2020-patch-tuesday-update-111-cve-numbers-addressed","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/fr\/blog\/november-2020-patch-tuesday-update-111-cve-numbers-addressed","title":{"rendered":"November 2020 Patch Tuesday Update: 111 CVE Numbers Addressed"},"content":{"rendered":"<p>This has been an interesting Patch Tuesday for me, mainly because this is the first month of using Microsoft\u2019s new version of its\u00a0<a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-us\" target=\"_blank\" rel=\"noopener noreferrer\">Security Update Guide<\/a>. The new system makes it incredibly easy to find the vulnerabilities that aren\u2019t rated as \u201cCritical,\u201d but are listed as \u201cExploitation Detected,\u201d or \u201cExploitation More Likely.\u201d The added vulnerability view lets you add columns to the data to find these hidden items. However, the descriptions and details aren\u2019t as in-depth as the previous version, so learning to navigate the new portal will take some time. As a result, content on this post may change slightly as I discover more information. If that happens, I\u2019ll include any updates to this post at the end. I appreciate your patience as I get use to the new update guide.<\/p>\n<p>This month brings us fixes for 112 vulnerabilities\u2014back to what has become a normal amount for this year after last month\u2019s lighter drop. Of these vulnerabilities, 16 are marked as \u201cCritical\u201d and 87 as \u201cImportant.\u201d These include some of the usual suspects, as well as one high-profile, zero-day vulnerability that was announced after last month\u2019s Patch Tuesday. As always, let\u2019s review the Criticals and some of the Importants that may warrant attention.<\/p>\n<h2>Operating system<\/h2>\n<p>There were surprisingly few \u201cCritical\u201d operating system vulnerabilities this month\u2014only two. First we have\u00a0<a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-17051\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-17051<\/a>, titled\u00a0<b>Windows Network File System Remote Code Execution Vulnerability<\/b>. This is a remote code vulnerability listed as \u201cExploitation More Likely.\u201d It has the highest CVSS rating (9.8) of the vulnerabilities this month. It\u2019s remotely exploitable and doesn\u2019t require any user interaction. This generally means any network exposed system is vulnerable\u2014and with no workarounds listed, this one should get primary attention this month. Make sure to install updates for Windows 7 up to the current version of Windows 10, including server versions.<\/p>\n<p>Next is a Windows\u00a0<b>Print Spooler Remote Code Execution Vulnerability,\u00a0<\/b><a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-17042\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-17042<\/a>. This vulnerability does require user interaction, but doesn\u2019t require special privileges to execute. Microsoft lists it as \u201cExploitation Less Likely,\u201d and it also affects Windows 7 up to Windows 10, including server versions.<\/p>\n<p>Besides those Criticals, there are several others to pay attention to on the operating system side.<\/p>\n<p>Let\u2019s focus on the previously announced zero-day vulnerability first.\u00a0<a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-17087\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-17087<\/a>\u00a0is a\u00a0<b>Windows Kernel Local Elevation of Privilege Vulnerability\u00a0<\/b>that was disclosed by Google\u2019s Project Zero,\u00a0<a class=\"ext\" href=\"https:\/\/techcrunch.com\/2020\/10\/30\/google-microsoft-windows-bug-attack\/\" target=\"_blank\" rel=\"noopener noreferrer\">as reported last month<\/a>. It\u2019s a privilege escalation vulnerability someone could use with another Chrome vulnerability (which has since been fixed). It\u2019s listed as \u201cExploitation Detected\u201d and affects Windows 7 up to Windows 10, including server versions.<\/p>\n<p>There\u2019s also another\u00a0<b>Windows Network File System Information Disclosure Vulnerability,\u00a0<\/b><a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-17056\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-17056<\/a>, that\u2019s listed as \u201cExploitation More Likely.\u201d However, this one requires access to the vulnerable system, meaning an attacker could use it as part of a chained attack after gaining access to the system. It would disclose information in memory. This vulnerability affects Windows 8.1 up to Windows 10, including server versions.<\/p>\n<p><a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-17088\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-17088<\/a>\u00a0is a\u00a0<b>Windows Common Log File System Driver Elevation of Privilege Vulnerability\u00a0<\/b>that Microsoft listed as \u201cExploitation More Likely\u201d with a low complexity and requires no user interaction.<\/p>\n<p>There is a\u00a0<b>Win32k Elevation of Privilege Vulnerability<\/b>,\u00a0<a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-17010\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-17010<\/a>, that also has a low complexity rating. It\u2019s listed as \u201cExploitation More Likely\u201d on all supported Windows 10 versions, including server.<\/p>\n<p>Finally,\u00a0<a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-16998\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-16998<\/a>\u00a0is a\u00a0<b>DirectX Elevation of Privilege Vulnerability\u00a0<\/b>that requires no user interaction and is listed as \u201cExploitation More Likely.\u201d<\/p>\n<h2>Browsers<\/h2>\n<p>Last month there were no browser vulnerabilities, and while I stated Microsoft may make up for it this month, there are still only four \u201cCritical\u201d browser vulnerabilities this month.<\/p>\n<p><a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-17052\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-17052<\/a>\u00a0is a\u00a0<b>Scripting Engine Memory Corruption Vulnerability\u00a0<\/b>in Internet Explorer 11 and the Edge-HTML version of Microsoft Edge<b>\u00a0<\/b>that appears to be related to malicious Exchange Web Service subscription notifications. It\u2019s listed as \u201cExploitation More Likely.\u201d It would grant the attacker access to the system and requires user interaction. There\u2019s a mitigation listed on the details, but it would block some important Exchange functions. At this time, there is no update available on the Exchange side, but Microsoft said it\u2019s planning one.<\/p>\n<p><a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-17048\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-17048\u00a0<\/a>is listed as \u201cExploitation Less Likely.\u201d It\u2019s a\u00a0<b>Chakra Scripting Engine Memory Corruption Vulnerability\u00a0<\/b>that requires user interaction and would grant the attacker access to the system. It\u2019s found in Internet Explorer 11 and the Edge-HTML version of Microsoft Edge as well.<\/p>\n<p>The\u00a0<b>Internet Explorer Memory Corruption Vulnerability\u00a0<\/b>labeled as\u00a0<a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-17053\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-17053<\/a>\u00a0is listed as \u201cExploitation Less Likely\u201d and does require a user to access a malicious URL. It would grant the attacker full control of the system. This vulnerability affects Internet Explorer 11.<\/p>\n<p>The last \u201cCritical\u201d browser vulnerability is\u00a0<a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-17058\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-17058<\/a>. It\u2019s titled\u00a0<b>Microsoft Browser Memory Corruption Vulnerability<\/b>, and it affects Internet Explorer 11 and the Edge-HTML version of Microsoft Edge browser. It\u2019s listed as \u201cExploitation Less Likely,\u201d and at this point there is only proof-of-concept code with no known exploits.<\/p>\n<h2>Other applications<\/h2>\n<p>While there are no other \u201cCritical\u201d vulnerabilities in the other applications list, there is one SharePoint vulnerability that warrants extra attention.\u00a0<a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-17061\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-17061<\/a>\u00a0is a\u00a0<b>Microsoft SharePoint Remote Code Execution Vulnerability\u00a0<\/b>that is a low complexity attack\u2014this is likely why it\u2019s listed as \u201cExploitation More Likely.\u201d<\/p>\n<p><b>Other notable vulnerabilities<\/b><\/p>\n<p>There are 10 vulnerabilities listed in the video extensions offered in the Windows App Store. While I won\u2019t list each one here, the Raw Image, HEVC Video, AV1, and HEIF Image extensions are all affected. According to Microsoft, they will apply the updates automatically; no action is required.<\/p>\n<p>There are several other applications this month that have fixes for vulnerabilities that are not listed as \u201cCritical\u201d or have any known exploits, but here are the highlights:<\/p>\n<ul>\n<li>Three other vulnerabilities in Microsoft SharePoint including spoofing and information disclosure<\/li>\n<li>Three vulnerabilities fixed in Microsoft Exchange 2013-2019, including remote code execution and denial of service<\/li>\n<li>The usual suspects of Excel, Office, and Visual Studio<\/li>\n<li>Eight vulnerability fixes for Azure Sphere, and one for Azure DevOps server<\/li>\n<\/ul>\n<h2>Summary<\/h2>\n<p>With the vulnerability count back up above 100, there are plenty of vulnerabilities to fix this month. I recommend starting with critical servers and then your workstations to address both the disclosed zero-day vulnerability from last month and the remotely exploitable\u00a0<b>Windows Network File System Remote Code Execution Vulnerability\u00a0<\/b>that has a 9.8 CVSS score. Then turn attention to Exchange and SharePoint servers if you\u2019re still running on-premises versions. With Microsoft regularly announcing Exchange vulnerabilities, consider moving to Microsoft 365 to lessen the amount of systems you have to regularly pay attention to each month for \u201cpatch duty.\u201d Finally, make sure your Office installations are up-to-date.<\/p>\n<p>Again, we\u2019ll likely see these Patch Tuesday blogs evolve as I learn to better interpret and consolidate the information from the new guide format.<\/p>\n<p>Until next time, let\u2019s stay safe out there!<\/p>\n<p><em>Gill Langston is head security nerd for SolarWinds MSP. You can follow Gill on Twitter at\u00a0<a class=\"ext\" href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener noreferrer\">@cybersec_nerd<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Gill Langston navigates Microsoft\u2019s new Security Update Guide to bring you details on 112 vulnerabilities, of which 16 are marked as \u201cCritical\u201d and 87 are \u201cImportant.\u201d<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6574","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>November 2020 Patch Tuesday Update: 111 CVE Numbers Addressed - N-able<\/title>\n<meta name=\"description\" content=\"Gill Langston navigates Microsoft\u2019s new Security Update Guide to bring you details on 112 vulnerabilities, of which 16 are marked as \u201cCritical\u201d and 87 are \u201cImportant.\u201d\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/fr\/blog\/november-2020-patch-tuesday-update-111-cve-numbers-addressed\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"November 2020 Patch Tuesday Update: 111 CVE Numbers Addressed - N-able\" \/>\n<meta property=\"og:description\" content=\"Gill Langston navigates Microsoft\u2019s new Security Update Guide to bring you details on 112 vulnerabilities, of which 16 are marked as \u201cCritical\u201d and 87 are \u201cImportant.\u201d\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/fr\/blog\/november-2020-patch-tuesday-update-111-cve-numbers-addressed\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-12T15:07:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-10T17:14:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gill Langston\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gill Langston\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/november-2020-patch-tuesday-update-111-cve-numbers-addressed#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/november-2020-patch-tuesday-update-111-cve-numbers-addressed\"},\"author\":{\"name\":\"Gill Langston\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/ccb02e43837727da6ab962f5357e872a\"},\"headline\":\"November 2020 Patch Tuesday Update: 111 CVE Numbers Addressed\",\"datePublished\":\"2020-11-12T15:07:38+00:00\",\"dateModified\":\"2022-06-10T17:14:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/november-2020-patch-tuesday-update-111-cve-numbers-addressed\"},\"wordCount\":1173,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\",\"Security\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/november-2020-patch-tuesday-update-111-cve-numbers-addressed\",\"url\":\"https:\/\/www.n-able.com\/fr\/blog\/november-2020-patch-tuesday-update-111-cve-numbers-addressed\",\"name\":\"November 2020 Patch Tuesday Update: 111 CVE Numbers Addressed - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr#website\"},\"datePublished\":\"2020-11-12T15:07:38+00:00\",\"dateModified\":\"2022-06-10T17:14:56+00:00\",\"description\":\"Gill Langston navigates Microsoft\u2019s new Security Update Guide to bring you details on 112 vulnerabilities, of which 16 are marked as \u201cCritical\u201d and 87 are \u201cImportant.\u201d\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/november-2020-patch-tuesday-update-111-cve-numbers-addressed#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/fr\/blog\/november-2020-patch-tuesday-update-111-cve-numbers-addressed\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/november-2020-patch-tuesday-update-111-cve-numbers-addressed#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/fr\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"November 2020 Patch Tuesday Update: 111 CVE Numbers Addressed\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/fr#website\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/fr#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/ccb02e43837727da6ab962f5357e872a\",\"name\":\"Gill Langston\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g\",\"caption\":\"Gill Langston\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"November 2020 Patch Tuesday Update: 111 CVE Numbers Addressed - N-able","description":"Gill Langston navigates Microsoft\u2019s new Security Update Guide to bring you details on 112 vulnerabilities, of which 16 are marked as \u201cCritical\u201d and 87 are \u201cImportant.\u201d","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/fr\/blog\/november-2020-patch-tuesday-update-111-cve-numbers-addressed","og_locale":"fr_FR","og_type":"article","og_title":"November 2020 Patch Tuesday Update: 111 CVE Numbers Addressed - N-able","og_description":"Gill Langston navigates Microsoft\u2019s new Security Update Guide to bring you details on 112 vulnerabilities, of which 16 are marked as \u201cCritical\u201d and 87 are \u201cImportant.\u201d","og_url":"https:\/\/www.n-able.com\/fr\/blog\/november-2020-patch-tuesday-update-111-cve-numbers-addressed","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-11-12T15:07:38+00:00","article_modified_time":"2022-06-10T17:14:56+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"Gill Langston","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"\u00c9crit par":"Gill Langston","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/fr\/blog\/november-2020-patch-tuesday-update-111-cve-numbers-addressed#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/november-2020-patch-tuesday-update-111-cve-numbers-addressed"},"author":{"name":"Gill Langston","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/ccb02e43837727da6ab962f5357e872a"},"headline":"November 2020 Patch Tuesday Update: 111 CVE Numbers Addressed","datePublished":"2020-11-12T15:07:38+00:00","dateModified":"2022-06-10T17:14:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/november-2020-patch-tuesday-update-111-cve-numbers-addressed"},"wordCount":1173,"publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"articleSection":["Head Nerds","Patch Management","Security"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/fr\/blog\/november-2020-patch-tuesday-update-111-cve-numbers-addressed","url":"https:\/\/www.n-able.com\/fr\/blog\/november-2020-patch-tuesday-update-111-cve-numbers-addressed","name":"November 2020 Patch Tuesday Update: 111 CVE Numbers Addressed - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr#website"},"datePublished":"2020-11-12T15:07:38+00:00","dateModified":"2022-06-10T17:14:56+00:00","description":"Gill Langston navigates Microsoft\u2019s new Security Update Guide to bring you details on 112 vulnerabilities, of which 16 are marked as \u201cCritical\u201d and 87 are \u201cImportant.\u201d","breadcrumb":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/november-2020-patch-tuesday-update-111-cve-numbers-addressed#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/fr\/blog\/november-2020-patch-tuesday-update-111-cve-numbers-addressed"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/fr\/blog\/november-2020-patch-tuesday-update-111-cve-numbers-addressed#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/fr\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"November 2020 Patch Tuesday Update: 111 CVE Numbers Addressed"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/fr#website","url":"https:\/\/www.n-able.com\/fr","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/fr#organization","name":"N-able","url":"https:\/\/www.n-able.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/ccb02e43837727da6ab962f5357e872a","name":"Gill Langston","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g","caption":"Gill Langston"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/6574","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/comments?post=6574"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/6574\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/media?parent=6574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}