Microsoft has released an emergency security updates for critical vulnerabilities that allow attackers to execute arbitrary code on the vulnerable machine.
The updates patched 87 vulnerabilities that include 12 are classified as Critical, and 74 are classified as Important, and one as moderate.
The October security release includes security updates for the following software:
The update also fixes the RCE flaws with several Microsoft products including Excel, Outlook, the Windows Graphics component, and the Windows TCP/IP stack.
Out of the one’s patches, the severe one is an RCE issue tracked as CVE-2020-16898, it resides in Windows TCP/IP stack, the vulnerability can be exploited by an attacker to take over the Windows systems by sending malicious packets.
Another important flaw tracked as CVE-2020-16947, resides in the MS Outlook that can be exploited by attackers by making victims opening a specially crafted file.
Following are some notable vulnerabilities
Microsoft strongly recommended installing these security updates for all the windows users to avoid the security risk and protect your Windows.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.
Also Read
Microsoft Released a Largest-Ever Security Patch with the Fixes For 129 Vulnerabilities – Update Now
Microsoft Defender ATP Antivirus is now Available For Android Users in Public Preview
A new project has exposed a critical attack vector that exploits protocol vulnerabilities to disrupt…
A threat actor known as #LongNight has reportedly put up for sale remote code execution…
Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager Mobile…
Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular application…
The European Union has escalated its response to Russia’s ongoing campaign of hybrid threats, announcing…
Venice.ai has rapidly emerged as a disruptive force in the AI landscape, positioning itself as…