{"id":11626,"date":"2020-02-12T15:19:26","date_gmt":"2020-02-12T07:19:26","guid":{"rendered":"http:\/\/hteknologi.com\/blog\/?p=11626"},"modified":"2020-02-12T15:20:31","modified_gmt":"2020-02-12T07:20:31","slug":"kemaskini-windows-10-februari-2020","status":"publish","type":"post","link":"https:\/\/hteknologi.com\/blog\/kemaskini-windows-10-februari-2020\/","title":{"rendered":"Kemaskini Windows 10 terbaru untuk Februari 2020 diterbitkan, baiki 99 Masalah Kerentanan Keselamatan"},"content":{"rendered":"<p>Microsoft hari ini telah menerbitkan kemaskini keselamatan <strong>February 2020 Patch Tuesday<\/strong>. Kemaskini bulan ini menyertakan pembaikan untuk 99 masalah kerentanan, menjadikan kemaskini <strong>Patch Tuesday<\/strong> terbesar Microsoft setakat ini.<\/p>\n<p>Sorotan utama adalah pada pembaikan keselamatan untuk <span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0674\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0674<\/a><\/strong><\/span>, kerentanan hari sifar (zero day) di dalam Internet Explorer.<\/p>\n<p>Pada 17 Januari lalu, Microsoft telah memaklumkan mengenai serangan yang dilakukan oleh penggodam melalui kerentanan yang terdapat pada Internet Explorer tersebut. Pembaikan untuk masalah tersebut turut disertakan bersama-sama dalam kemaskini terbaru ini.<\/p>\n<p>Untuk baki 98 pembaikan lagi, 11 daripadanya dikategorikan sebagai pembaikan kritikal dan memerlukan perhatian segera.<\/p>\n<p>Kebanyakan dari kerentanan kritikal berkenaan adalah kod pelaksana kawalan jauh (remote code execution). Selain itu, kerentanan perosak memori (memory corruption) pada perkhidmatan-perkhidmatan seperti enjin penskripan IE (IE scripting engine), perkhidmatan Remote Desktop Protocol, fail-fail LNK dan komponen Media Foundation.<\/p>\n<p>Kemaskini Patch Tuesday pada kebiasaannya dihantar dalam bentuk pukal (bulk) dan pemasangan kemaskini ini secara automatiknya akan memasang pembaikan untuk 99 kerentanan keselamatan berkenaan.<\/p>\n<h2><strong>Berikut adalah senarai bagi pembaikan-pembaikan yang disertakan di dalam kemaskini Windows 10 February 2020 Patch Tuesday<\/strong><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Tag<\/th>\n<th>CVE ID<\/th>\n<th>CVE Title<\/th>\n<\/tr>\n<tr>\n<td>Adobe Flash Player<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV200003\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">ADV200003<\/a><\/td>\n<td>February 2020 Adobe Flash Security Update<\/td>\n<\/tr>\n<tr>\n<td>Internet Explorer<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0674\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0674<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Internet Explorer<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0673\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0673<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0663\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0663<\/a><\/td>\n<td>Microsoft Edge Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0706\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0706<\/a><\/td>\n<td>Microsoft Browser Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Exchange Server<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0692\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0692<\/a><\/td>\n<td>Microsoft Exchange Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Exchange Server<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0688\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0688<\/a><\/td>\n<td>Microsoft Exchange Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Exchange Server<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0696\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0696<\/a><\/td>\n<td>Microsoft Outlook Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0744\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0744<\/a><\/td>\n<td>Windows GDI Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0745\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0745<\/a><\/td>\n<td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0714\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0714<\/a><\/td>\n<td>DirectX Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0715\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0715<\/a><\/td>\n<td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0746\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0746<\/a><\/td>\n<td>Microsoft Graphics Components Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0709\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0709<\/a><\/td>\n<td>DirectX Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0792\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0792<\/a><\/td>\n<td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Malware Protection Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0733\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0733<\/a><\/td>\n<td>Windows Malicious Software Removal Tool Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0697\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0697<\/a><\/td>\n<td>Microsoft Office Tampering Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0759\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0759<\/a><\/td>\n<td>Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0695\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0695<\/a><\/td>\n<td>Microsoft Office Online Server Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office SharePoint<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0694\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0694<\/a><\/td>\n<td>Microsoft Office SharePoint XSS Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office SharePoint<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0693\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0693<\/a><\/td>\n<td>Microsoft Office SharePoint XSS Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0713\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0713<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0711\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0711<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0710\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0710<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0712\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0712<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0767\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0767<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0741\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0741<\/a><\/td>\n<td>Connected Devices Platform Service Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0742\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0742<\/a><\/td>\n<td>Connected Devices Platform Service Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0740\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0740<\/a><\/td>\n<td>Connected Devices Platform Service Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0658\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0658<\/a><\/td>\n<td>Windows Common Log File System Driver Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0737\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0737<\/a><\/td>\n<td>Windows Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0659\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0659<\/a><\/td>\n<td>Windows Data Sharing Service Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0739\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0739<\/a><\/td>\n<td>Windows Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0757\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0757<\/a><\/td>\n<td>Windows SSH Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0732\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0732<\/a><\/td>\n<td>DirectX Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0753\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0753<\/a><\/td>\n<td>Windows Error Reporting Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0755\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0755<\/a><\/td>\n<td>Windows Key Isolation Service Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0754\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0754<\/a><\/td>\n<td>Windows Error Reporting Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0657\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0657<\/a><\/td>\n<td>Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0667\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0667<\/a><\/td>\n<td>Windows Search Indexer Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0743\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0743<\/a><\/td>\n<td>Connected Devices Platform Service Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0666\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0666<\/a><\/td>\n<td>Windows Search Indexer Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0748\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0748<\/a><\/td>\n<td>Windows Key Isolation Service Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0747\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0747<\/a><\/td>\n<td>Windows Data Sharing Service Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0668\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0668<\/a><\/td>\n<td>Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0704\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0704<\/a><\/td>\n<td>Windows Wireless Network Manager Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0685\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0685<\/a><\/td>\n<td>Windows COM Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0676\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0676<\/a><\/td>\n<td>Windows Key Isolation Service Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0678\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0678<\/a><\/td>\n<td>Windows Error Reporting Manager Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0703\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0703<\/a><\/td>\n<td>Windows Backup Service Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0680\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0680<\/a><\/td>\n<td>Windows Function Discovery Service Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0679\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0679<\/a><\/td>\n<td>Windows Function Discovery Service Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0681\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0681<\/a><\/td>\n<td>Remote Desktop Client Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0677\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0677<\/a><\/td>\n<td>Windows Key Isolation Service Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0682\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0682<\/a><\/td>\n<td>Windows Function Discovery Service Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0756\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0756<\/a><\/td>\n<td>Windows Key Isolation Service Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0670\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0670<\/a><\/td>\n<td>Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0675\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0675<\/a><\/td>\n<td>Windows Key Isolation Service Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0669\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0669<\/a><\/td>\n<td>Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0727\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0727<\/a><\/td>\n<td>Connected User Experiences and Telemetry Service Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0671\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0671<\/a><\/td>\n<td>Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0672\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0672<\/a><\/td>\n<td>Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0698\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0698<\/a><\/td>\n<td>Windows Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0701\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0701<\/a><\/td>\n<td>Windows Client License Service Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows Search Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0735\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0735<\/a><\/td>\n<td>Windows Search Indexer Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Remote Desktop Client<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0734\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0734<\/a><\/td>\n<td>Remote Desktop Client Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Secure Boot<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0689\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0689<\/a><\/td>\n<td>Microsoft Secure Boot Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0618\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0618<\/a><\/td>\n<td>Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Authentication Methods<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0665\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0665<\/a><\/td>\n<td>Active Directory Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows COM<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0752\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0752<\/a><\/td>\n<td>Windows Search Indexer Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows COM<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0749\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0749<\/a><\/td>\n<td>Connected Devices Platform Service Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows COM<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0750\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0750<\/a><\/td>\n<td>Connected Devices Platform Service Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Hyper-V<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0751\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0751<\/a><\/td>\n<td>Windows Hyper-V Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Hyper-V<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0662\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0662<\/a><\/td>\n<td>Windows Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Hyper-V<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0661\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0661<\/a><\/td>\n<td>Windows Hyper-V Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Installer<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0686\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0686<\/a><\/td>\n<td>Windows Installer Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Installer<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0683\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0683<\/a><\/td>\n<td>Windows Installer Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Installer<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0728\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0728<\/a><\/td>\n<td>Windows Modules Installer Service Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0722\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0722<\/a><\/td>\n<td>Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0721\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0721<\/a><\/td>\n<td>Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0719\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0719<\/a><\/td>\n<td>Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0720\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0720<\/a><\/td>\n<td>Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0723\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0723<\/a><\/td>\n<td>Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0731\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0731<\/a><\/td>\n<td>Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0726\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0726<\/a><\/td>\n<td>Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0724\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0724<\/a><\/td>\n<td>Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0725\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0725<\/a><\/td>\n<td>Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0717\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0717<\/a><\/td>\n<td>Win32k Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0736\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0736<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0716\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0716<\/a><\/td>\n<td>Win32k Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel-Mode Drivers<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0691\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0691<\/a><\/td>\n<td>Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Media<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0738\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0738<\/a><\/td>\n<td>Media Foundation Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows NDIS<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0705\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0705<\/a><\/td>\n<td>Windows Network Driver Interface Specification (NDIS) Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows RDP<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0660\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0660<\/a><\/td>\n<td>Windows Remote Desktop Protocol (RDP) Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Shell<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0702\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0702<\/a><\/td>\n<td>Surface Hub Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Shell<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0655\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0655<\/a><\/td>\n<td>Remote Desktop Services Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Shell<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0730\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0730<\/a><\/td>\n<td>Windows User Profile Service Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Shell<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0729\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0729<\/a><\/td>\n<td>LNK Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Shell<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0707\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0707<\/a><\/td>\n<td>Windows IME Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Update Stack<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0708\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CVE-2020-0708<\/a><\/td>\n<td>Windows Imaging Library Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft hari ini telah menerbitkan kemaskini keselamatan February 2020 Patch Tuesday. Kemaskini bulan ini menyertakan pembaikan untuk 99 masalah kerentanan, menjadikan kemaskini Patch Tuesday terbesar Microsoft setakat ini. Sorotan utama adalah pada pembaikan keselamatan untuk CVE-2020-0674, kerentanan hari sifar (zero day) di dalam Internet Explorer. Pada 17 Januari lalu, Microsoft telah memaklumkan mengenai serangan yang [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":11628,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"tdm_status":"","tdm_grid_status":"","_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1011,1112,2387],"tags":[1167,1492,647,1203],"class_list":["post-11626","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-komputer","category-sistem-operasi","category-windows-sistem-operasi","tag-internet-explorer","tag-kemaskini","tag-microsoft","tag-windows-10"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Kemaskini Windows 10 terbaru untuk Februari 2020 diterbitkan, baiki 99 Masalah Kerentanan Keselamatan<\/title>\n<meta name=\"description\" content=\"Microsoft hari ini telah menerbitkan kemaskini keselamatan February 2020 Patch Tuesday. Kemaskini bulan ini menyertakan pembaikan untuk 99\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hteknologi.com\/blog\/kemaskini-windows-10-februari-2020\/\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Kemaskini Windows 10 terbaru untuk Februari 2020 diterbitkan, baiki 99 Masalah Kerentanan Keselamatan\" \/>\n<meta name=\"twitter:description\" content=\"Microsoft hari ini telah menerbitkan kemaskini keselamatan February 2020 Patch Tuesday. Kemaskini bulan ini menyertakan pembaikan untuk 99\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/i0.wp.com\/hteknologi.com\/blog\/wp-content\/uploads\/2020\/02\/Microsot-Patch-Tuesday-Feb-2020.jpg?fit=700%2C381&ssl=1\" \/>\n<meta name=\"twitter:creator\" content=\"@hteknologimy\" \/>\n<meta name=\"twitter:site\" content=\"@hteknologimy\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Shahrul Yusof\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minit\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/kemaskini-windows-10-februari-2020\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/kemaskini-windows-10-februari-2020\\\/\"},\"author\":{\"name\":\"Shahrul Yusof\",\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/#\\\/schema\\\/person\\\/91a8bad1580f1480c180b9502c0f6d25\"},\"headline\":\"Kemaskini Windows 10 terbaru untuk Februari 2020 diterbitkan, baiki 99 Masalah Kerentanan Keselamatan\",\"datePublished\":\"2020-02-12T07:19:26+00:00\",\"dateModified\":\"2020-02-12T07:20:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/kemaskini-windows-10-februari-2020\\\/\"},\"wordCount\":1253,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/kemaskini-windows-10-februari-2020\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/hteknologi.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/Microsot-Patch-Tuesday-Feb-2020.jpg?fit=700%2C381&ssl=1\",\"keywords\":[\"internet explorer\",\"kemaskini\",\"microsoft\",\"windows 10\"],\"articleSection\":[\"Komputer\",\"Sistem Operasi\",\"Windows\"],\"inLanguage\":\"ms-MY\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/hteknologi.com\\\/blog\\\/kemaskini-windows-10-februari-2020\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/kemaskini-windows-10-februari-2020\\\/\",\"url\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/kemaskini-windows-10-februari-2020\\\/\",\"name\":\"Kemaskini Windows 10 terbaru untuk Februari 2020 diterbitkan, baiki 99 Masalah Kerentanan Keselamatan\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/kemaskini-windows-10-februari-2020\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/kemaskini-windows-10-februari-2020\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/hteknologi.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/Microsot-Patch-Tuesday-Feb-2020.jpg?fit=700%2C381&ssl=1\",\"datePublished\":\"2020-02-12T07:19:26+00:00\",\"dateModified\":\"2020-02-12T07:20:31+00:00\",\"description\":\"Microsoft hari ini telah menerbitkan kemaskini keselamatan February 2020 Patch Tuesday. Kemaskini bulan ini menyertakan pembaikan untuk 99\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/kemaskini-windows-10-februari-2020\\\/#breadcrumb\"},\"inLanguage\":\"ms-MY\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/hteknologi.com\\\/blog\\\/kemaskini-windows-10-februari-2020\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ms-MY\",\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/kemaskini-windows-10-februari-2020\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/hteknologi.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/Microsot-Patch-Tuesday-Feb-2020.jpg?fit=700%2C381&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/hteknologi.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/Microsot-Patch-Tuesday-Feb-2020.jpg?fit=700%2C381&ssl=1\",\"width\":700,\"height\":381},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/kemaskini-windows-10-februari-2020\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Utama\",\"item\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Kemaskini Windows 10 terbaru untuk Februari 2020 diterbitkan, baiki 99 Masalah Kerentanan Keselamatan\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/\",\"name\":\"Harian Teknologi\",\"description\":\"Berita Teknologi di Malaysia dan Dunia Terkini\",\"publisher\":{\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ms-MY\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/#organization\",\"name\":\"Harian Teknologi\",\"url\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ms-MY\",\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Harian-Teknologi-Favicon-1.png\",\"contentUrl\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Harian-Teknologi-Favicon-1.png\",\"width\":500,\"height\":500,\"caption\":\"Harian Teknologi\"},\"image\":{\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/HarianTeknologi\\\/\",\"https:\\\/\\\/x.com\\\/hteknologimy\",\"https:\\\/\\\/www.instagram.com\\\/harian_teknologi\\\/\",\"https:\\\/\\\/youtube.com\\\/channel\\\/UCKIL4apJm-3TUxKKGle9S5w\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/#\\\/schema\\\/person\\\/91a8bad1580f1480c180b9502c0f6d25\",\"name\":\"Shahrul Yusof\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ms-MY\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed0a46520e4b039b00ef5a648983c7786720403f027d137d1ad3c99dde335b?s=96&d=wavatar&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed0a46520e4b039b00ef5a648983c7786720403f027d137d1ad3c99dde335b?s=96&d=wavatar&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed0a46520e4b039b00ef5a648983c7786720403f027d137d1ad3c99dde335b?s=96&d=wavatar&r=g\",\"caption\":\"Shahrul Yusof\"},\"description\":\"Penulis berpengalaman di dalam bidang teknologi maklumat selama 12 tahun dan kerap mengikuti perkembangan teknologi semasa baik di dalam Malaysia mahupun di luar negara. Penulis boleh dihubungi melalui Twitter\",\"sameAs\":[\"http:\\\/\\\/hteknologi.com\\\/blog\",\"https:\\\/\\\/www.facebook.com\\\/shahrulyusof85\",\"https:\\\/\\\/www.instagram.com\\\/shahrul_yusof\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/shahrul-yusof-4a119a113\\\/\",\"https:\\\/\\\/x.com\\\/hteknologimy\",\"https:\\\/\\\/youtube.com\\\/channel\\\/UCKIL4apJm-3TUxKKGle9S5w\"],\"url\":\"https:\\\/\\\/hteknologi.com\\\/blog\\\/author\\\/sylarius\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Kemaskini Windows 10 terbaru untuk Februari 2020 diterbitkan, baiki 99 Masalah Kerentanan Keselamatan","description":"Microsoft hari ini telah menerbitkan kemaskini keselamatan February 2020 Patch Tuesday. Kemaskini bulan ini menyertakan pembaikan untuk 99","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hteknologi.com\/blog\/kemaskini-windows-10-februari-2020\/","twitter_card":"summary_large_image","twitter_title":"Kemaskini Windows 10 terbaru untuk Februari 2020 diterbitkan, baiki 99 Masalah Kerentanan Keselamatan","twitter_description":"Microsoft hari ini telah menerbitkan kemaskini keselamatan February 2020 Patch Tuesday. Kemaskini bulan ini menyertakan pembaikan untuk 99","twitter_image":"https:\/\/i0.wp.com\/hteknologi.com\/blog\/wp-content\/uploads\/2020\/02\/Microsot-Patch-Tuesday-Feb-2020.jpg?fit=700%2C381&ssl=1","twitter_creator":"@hteknologimy","twitter_site":"@hteknologimy","twitter_misc":{"Written by":"Shahrul Yusof","Est. reading time":"6 minit"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hteknologi.com\/blog\/kemaskini-windows-10-februari-2020\/#article","isPartOf":{"@id":"https:\/\/hteknologi.com\/blog\/kemaskini-windows-10-februari-2020\/"},"author":{"name":"Shahrul Yusof","@id":"https:\/\/hteknologi.com\/blog\/#\/schema\/person\/91a8bad1580f1480c180b9502c0f6d25"},"headline":"Kemaskini Windows 10 terbaru untuk Februari 2020 diterbitkan, baiki 99 Masalah Kerentanan Keselamatan","datePublished":"2020-02-12T07:19:26+00:00","dateModified":"2020-02-12T07:20:31+00:00","mainEntityOfPage":{"@id":"https:\/\/hteknologi.com\/blog\/kemaskini-windows-10-februari-2020\/"},"wordCount":1253,"commentCount":0,"publisher":{"@id":"https:\/\/hteknologi.com\/blog\/#organization"},"image":{"@id":"https:\/\/hteknologi.com\/blog\/kemaskini-windows-10-februari-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/hteknologi.com\/blog\/wp-content\/uploads\/2020\/02\/Microsot-Patch-Tuesday-Feb-2020.jpg?fit=700%2C381&ssl=1","keywords":["internet explorer","kemaskini","microsoft","windows 10"],"articleSection":["Komputer","Sistem Operasi","Windows"],"inLanguage":"ms-MY","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/hteknologi.com\/blog\/kemaskini-windows-10-februari-2020\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/hteknologi.com\/blog\/kemaskini-windows-10-februari-2020\/","url":"https:\/\/hteknologi.com\/blog\/kemaskini-windows-10-februari-2020\/","name":"Kemaskini Windows 10 terbaru untuk Februari 2020 diterbitkan, baiki 99 Masalah Kerentanan Keselamatan","isPartOf":{"@id":"https:\/\/hteknologi.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hteknologi.com\/blog\/kemaskini-windows-10-februari-2020\/#primaryimage"},"image":{"@id":"https:\/\/hteknologi.com\/blog\/kemaskini-windows-10-februari-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/hteknologi.com\/blog\/wp-content\/uploads\/2020\/02\/Microsot-Patch-Tuesday-Feb-2020.jpg?fit=700%2C381&ssl=1","datePublished":"2020-02-12T07:19:26+00:00","dateModified":"2020-02-12T07:20:31+00:00","description":"Microsoft hari ini telah menerbitkan kemaskini keselamatan February 2020 Patch Tuesday. Kemaskini bulan ini menyertakan pembaikan untuk 99","breadcrumb":{"@id":"https:\/\/hteknologi.com\/blog\/kemaskini-windows-10-februari-2020\/#breadcrumb"},"inLanguage":"ms-MY","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hteknologi.com\/blog\/kemaskini-windows-10-februari-2020\/"]}]},{"@type":"ImageObject","inLanguage":"ms-MY","@id":"https:\/\/hteknologi.com\/blog\/kemaskini-windows-10-februari-2020\/#primaryimage","url":"https:\/\/i0.wp.com\/hteknologi.com\/blog\/wp-content\/uploads\/2020\/02\/Microsot-Patch-Tuesday-Feb-2020.jpg?fit=700%2C381&ssl=1","contentUrl":"https:\/\/i0.wp.com\/hteknologi.com\/blog\/wp-content\/uploads\/2020\/02\/Microsot-Patch-Tuesday-Feb-2020.jpg?fit=700%2C381&ssl=1","width":700,"height":381},{"@type":"BreadcrumbList","@id":"https:\/\/hteknologi.com\/blog\/kemaskini-windows-10-februari-2020\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Utama","item":"https:\/\/hteknologi.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Kemaskini Windows 10 terbaru untuk Februari 2020 diterbitkan, baiki 99 Masalah Kerentanan Keselamatan"}]},{"@type":"WebSite","@id":"https:\/\/hteknologi.com\/blog\/#website","url":"https:\/\/hteknologi.com\/blog\/","name":"Harian Teknologi","description":"Berita Teknologi di Malaysia dan Dunia Terkini","publisher":{"@id":"https:\/\/hteknologi.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hteknologi.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ms-MY"},{"@type":"Organization","@id":"https:\/\/hteknologi.com\/blog\/#organization","name":"Harian Teknologi","url":"https:\/\/hteknologi.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"ms-MY","@id":"https:\/\/hteknologi.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/hteknologi.com\/blog\/wp-content\/uploads\/2024\/05\/Harian-Teknologi-Favicon-1.png","contentUrl":"https:\/\/hteknologi.com\/blog\/wp-content\/uploads\/2024\/05\/Harian-Teknologi-Favicon-1.png","width":500,"height":500,"caption":"Harian Teknologi"},"image":{"@id":"https:\/\/hteknologi.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/HarianTeknologi\/","https:\/\/x.com\/hteknologimy","https:\/\/www.instagram.com\/harian_teknologi\/","https:\/\/youtube.com\/channel\/UCKIL4apJm-3TUxKKGle9S5w"]},{"@type":"Person","@id":"https:\/\/hteknologi.com\/blog\/#\/schema\/person\/91a8bad1580f1480c180b9502c0f6d25","name":"Shahrul Yusof","image":{"@type":"ImageObject","inLanguage":"ms-MY","@id":"https:\/\/secure.gravatar.com\/avatar\/21ed0a46520e4b039b00ef5a648983c7786720403f027d137d1ad3c99dde335b?s=96&d=wavatar&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/21ed0a46520e4b039b00ef5a648983c7786720403f027d137d1ad3c99dde335b?s=96&d=wavatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/21ed0a46520e4b039b00ef5a648983c7786720403f027d137d1ad3c99dde335b?s=96&d=wavatar&r=g","caption":"Shahrul Yusof"},"description":"Penulis berpengalaman di dalam bidang teknologi maklumat selama 12 tahun dan kerap mengikuti perkembangan teknologi semasa baik di dalam Malaysia mahupun di luar negara. Penulis boleh dihubungi melalui Twitter","sameAs":["http:\/\/hteknologi.com\/blog","https:\/\/www.facebook.com\/shahrulyusof85","https:\/\/www.instagram.com\/shahrul_yusof\/","https:\/\/www.linkedin.com\/in\/shahrul-yusof-4a119a113\/","https:\/\/x.com\/hteknologimy","https:\/\/youtube.com\/channel\/UCKIL4apJm-3TUxKKGle9S5w"],"url":"https:\/\/hteknologi.com\/blog\/author\/sylarius\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/hteknologi.com\/blog\/wp-content\/uploads\/2020\/02\/Microsot-Patch-Tuesday-Feb-2020.jpg?fit=700%2C381&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p5oWzh-31w","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/hteknologi.com\/blog\/wp-json\/wp\/v2\/posts\/11626","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hteknologi.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hteknologi.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hteknologi.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hteknologi.com\/blog\/wp-json\/wp\/v2\/comments?post=11626"}],"version-history":[{"count":0,"href":"https:\/\/hteknologi.com\/blog\/wp-json\/wp\/v2\/posts\/11626\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hteknologi.com\/blog\/wp-json\/wp\/v2\/media\/11628"}],"wp:attachment":[{"href":"https:\/\/hteknologi.com\/blog\/wp-json\/wp\/v2\/media?parent=11626"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hteknologi.com\/blog\/wp-json\/wp\/v2\/categories?post=11626"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hteknologi.com\/blog\/wp-json\/wp\/v2\/tags?post=11626"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}