Microsoft August 2023 Patch Tue warn 2 0 days, 87 flaws

Microsoft August 2023 Patch Tue warn 2 0 days, 87 flaws
tag CVE ID CVE address Danger NET Core CVE-2023-38178 NET Core and Visual Studio Denial for poor service Important NET Core CVE-2023-35390 A remote code execution vulnerability for .NET and Visual Studio Important .net framework CVE-2023-36873 .NET Framework spoofing vulnerability Important ASP.NET CVE-2023-38180 .NET and Visual Studio refused for poor service Important ASP.NET CVE-2023-36899 ASP.NET’s rise in privilege weakness Important ASP.NET and Visual Studio CVE-2023-35391 ASP.NET Core SignalR and Visual Studio information disclosure vulnerability Important Azure Ark CVE-2023-38176 Arch-enabled Azure servers increased privilege vulnerability Important Azure DevOps CVE-2023-36869 An Azure DevOps server impersonation vulnerability Important Azure HDInsights CVE-2023-38188 Azure Apache Hadoop impersonation vulnerability Important Azure HDInsights CVE-2023-35393 Azure Apache hive impersonation vulnerability Important Azure HDInsights CVE-2023-35394 An Azure HDInsight Jupyter Notebook spoofing vulnerability Important Azure HDInsights CVE-2023-36881 Azure Apache Ambari impersonation vulnerability Important Azure HDInsights CVE-2023-36877 Azure Apache Oozie impersonation vulnerability Important Dynamics Business Central Control CVE-2023-38167 Microsoft Dynamics Business Central Elevation of Privilege Wulnerability Important Sailor CVE-2023-35945 unknown unknown Memory integrity system readiness check tool ADV230004 Defending the Memory Integration System Readiness Check Tool in Update Depth Moderate Microsoft Dynamics CVE-2023-35389 Remote code execution vulnerability in Microsoft Dynamics 365 On-Premises Important Microsoft Edge (chrome-based) CVE-2023-38157 The Microsoft Edge (Chromium-based) security feature bypassed the vulnerability Moderate Microsoft Edge (chrome-based) CVE-2023-4068 Chromium: CVE-2023-4068 Type confusion in v8 unknown Microsoft Edge (chrome-based) CVE-2023-4072 Chromium: CVE-2023-4072 out of bounds, read and write in WebGL unknown Microsoft Edge (chrome-based) CVE-2023-4071 Chrome: CVE-2023-4071 Buffer overrun in visualizations unknown Microsoft Edge (chrome-based) CVE-2023-4073 Chrome: CVE-2023-4073 Memory access out of bounds in ANGLE unknown Microsoft Edge (chrome-based) CVE-2023-4075 Chromium: CVE-2023-4075 Use it for free in the cast unknown Microsoft Edge (chrome-based) CVE-2023-4074 Chromium: CVE-2023-4074 Use it for free on the Blink Task Scheduler unknown Microsoft Edge (chrome-based) CVE-2023-4076 Chromium: CVE-2023-4076 Use it for free at WebRTC unknown Microsoft Edge (chrome-based) CVE-2023-4077 Chromium: CVE-2023-4077 Insufficient data validation in extensions unknown Microsoft Edge (chrome-based) CVE-2023-4078 Chromium: CVE-2023-4078 Improper implementation in extensions unknown Microsoft Edge (chrome-based) CVE-2023-4070 Chromium: CVE-2023-4070 Type confusion in v8 unknown Microsoft Edge (chrome-based) CVE-2023-4069 Chromium: CVE-2023-4069 Type confusion in v8 unknown Microsoft Exchange server CVE-2023-38185 A Microsoft Exchange Server remote code execution vulnerability Important Microsoft Exchange server CVE-2023-35388 A Microsoft Exchange Server remote code execution vulnerability Important Microsoft Exchange server CVE-2023-35368 A Microsoft Exchange remote code execution vulnerability Important Microsoft Exchange server CVE-2023-38181 A security vulnerability in Microsoft Exchange server impersonation Important Microsoft Exchange server CVE-2023-38182 A Microsoft Exchange Server remote code execution vulnerability Important Microsoft Exchange server CVE-2023-21709 Elevated security vulnerability in Microsoft Exchange server Important Microsoft Office ADV230003 Microsoft Office Defense In Depth Update Moderate Microsoft Office CVE-2023-36897 Visual Studio Tools for Office Runtime Spoofing Vulnerabilities Important Microsoft Office Excel CVE-2023-36896 A remote Microsoft Excel code execution vulnerability Important Microsoft Office Excel CVE-2023-35371 A security vulnerability in remote Microsoft Office code execution Important Microsoft Office Outlook CVE-2023-36893 A security vulnerability in Microsoft Outlook impersonation Important Microsoft Office Outlook CVE-2023-36895 A security vulnerability in Microsoft Outlook remote code execution very important Microsoft Office SharePoint CVE-2023-36891 A Microsoft SharePoint Server impersonation vulnerability Important Microsoft Office SharePoint CVE-2023-36894 A security vulnerability in Microsoft SharePoint server information disclosure Important Microsoft Office SharePoint CVE-2023-36890 A security vulnerability in Microsoft SharePoint server information disclosure Important Microsoft Office SharePoint CVE-2023-36892 A Microsoft SharePoint Server impersonation vulnerability Important Microsoft Office Visio CVE-2023-35372 A security vulnerability in Microsoft Office Visio code execution Important Microsoft Office Visio CVE-2023-36865 A security vulnerability in Microsoft Office Visio code execution Important Microsoft Office Visio CVE-2023-36866 A security vulnerability in Microsoft Office Visio code execution Important Microsoft Teams CVE-2023-29328 A security vulnerability in Microsoft Teams remote code execution very important Microsoft Teams CVE-2023-29330 A security vulnerability in Microsoft Teams remote code execution very important Microsoft WDAC OLE DB Provider for SQL CVE-2023-36882 The Microsoft WDAC OLE DB Provider has a code execution vulnerability for SQL Server Important Microsoft Windows CVE-2023-20569 AMD: CVE-2023-20569 Return Address Expectation Important Microsoft Windows Codecs Library CVE-2023-38170 HEVC video extensions remote code execution vulnerability Important Reliability analysis metrics calculation engine CVE-2023-36876 Calculate the reliability analysis (RacTask) measures of vulnerability height Important Role: Windows Hyper-V CVE-2023-36908 Windows Hyper-V information disclosure vulnerability Important database server CVE-2023-38169 A security vulnerability in Microsoft OLE DB remote code execution Important Windows tablet user interface CVE-2023-36898 Windows Tablet user interface The underlying security vulnerability is in remote code execution Important Windows Bluetooth A2DP Driver CVE-2023-35387 Windows Bluetooth A2DP driver elevated privilege vulnerability Important Windows Cloud Files Mini Filter Driver CVE-2023-36904 Windows Cloud Files Mini Filter Driver Raised privilege vulnerability Important Common Windows registry file system driver CVE-2023-36900 The Windows Generic Log File System driver raised a privilege vulnerability Important Windows Cryptographic Services CVE-2023-36907 A security vulnerability in the Windows Cryptographic Services information disclosure Important Windows Cryptographic Services CVE-2023-36906 A security vulnerability in the Windows Cryptographic Services information disclosure Important Windows Defender CVE-2023-38175 Raise Microsoft Windows Defender for vulnerability to privilege Important Windows Fax and Scan Service CVE-2023-35381 A security vulnerability in Windows Remote Fax Service code execution Important Windows Group Policy CVE-2023-36889 Bypassing the Windows Group Policy security feature vulnerability Important Windows HTML platform CVE-2023-35384 The core Windows HTML security feature is bypassing vulnerabilities Important Windows kernel CVE-2023-35359 Windows Kernel Elevation of Privilege Governance Important Windows kernel CVE-2023-38154 Windows Kernel Elevation of Privilege Governance Important Windows kernel CVE-2023-35382 Windows Kernel Elevation of Privilege Governance Important Windows kernel CVE-2023-35386 Windows Kernel Elevation of Privilege Governance Important Windows kernel CVE-2023-35380 Windows Kernel Elevation of Privilege Governance Important Windows LDAP – Lightweight Directory Access Protocol CVE-2023-38184 Windows Lightweight Directory Access Protocol (LDAP) is a remote code execution vulnerability Important Windows Message Queuing CVE-2023-36909 Microsoft Message Queuing denied service due to a security vulnerability Important Windows Message Queuing CVE-2023-35376 Microsoft Message Queuing denied service due to a security vulnerability Important Windows Message Queuing CVE-2023-38172 Microsoft Message Queuing denied service due to a security vulnerability Important Windows Message Queuing CVE-2023-35385 A remote Microsoft Message Queuing code execution vulnerability very important Windows Message Queuing CVE-2023-35383 A security vulnerability in Microsoft Message Queuing information disclosure Important Windows Message Queuing CVE-2023-36913 A security vulnerability in Microsoft Message Queuing information disclosure Important Windows Message Queuing CVE-2023-35377 Microsoft Message Queuing denied service due to a security vulnerability Important Windows Message Queuing CVE-2023-38254 Microsoft Message Queuing denied service due to a security vulnerability Important Windows Message Queuing CVE-2023-36911 A remote Microsoft Message Queuing code execution vulnerability very important Windows Message Queuing CVE-2023-36910 A remote Microsoft Message Queuing code execution vulnerability very important Windows Message Queuing CVE-2023-36912 Microsoft Message Queuing denied service due to a security vulnerability Important Windows Mobile device management CVE-2023-38186 Elevated vulnerability in Windows Mobile device management Important Projected Windows file system CVE-2023-35378 Windows Projected File System to fix security vulnerabilities Important Windows reliability analysis metrics calculation engine CVE-2023-35379 Reliability Analysis Metrics Calculation Engine (RACEng) Rise Double Privilege Important Windows Smart Card CVE-2023-36914 Windows Smart Card Resource Management Server Security feature bypassing the vulnerability Important Windows System Assessment Tool CVE-2023-36903 Windows System Assessment Tool, Privilege Vulnerability Elevation Important Windows Wireless Wide Area Network Service CVE-2023-36905 Information disclosure vulnerability in Windows Wireless Area Network Service (WwanSvc) Important

Leave a Reply

Your email address will not be published. Required fields are marked *