tag |
CVE ID |
CVE address |
Danger |
NET Core |
CVE-2023-38178 |
NET Core and Visual Studio Denial for poor service |
Important |
NET Core |
CVE-2023-35390 |
A remote code execution vulnerability for .NET and Visual Studio |
Important |
.net framework |
CVE-2023-36873 |
.NET Framework spoofing vulnerability |
Important |
ASP.NET |
CVE-2023-38180 |
.NET and Visual Studio refused for poor service |
Important |
ASP.NET |
CVE-2023-36899 |
ASP.NET’s rise in privilege weakness |
Important |
ASP.NET and Visual Studio |
CVE-2023-35391 |
ASP.NET Core SignalR and Visual Studio information disclosure vulnerability |
Important |
Azure Ark |
CVE-2023-38176 |
Arch-enabled Azure servers increased privilege vulnerability |
Important |
Azure DevOps |
CVE-2023-36869 |
An Azure DevOps server impersonation vulnerability |
Important |
Azure HDInsights |
CVE-2023-38188 |
Azure Apache Hadoop impersonation vulnerability |
Important |
Azure HDInsights |
CVE-2023-35393 |
Azure Apache hive impersonation vulnerability |
Important |
Azure HDInsights |
CVE-2023-35394 |
An Azure HDInsight Jupyter Notebook spoofing vulnerability |
Important |
Azure HDInsights |
CVE-2023-36881 |
Azure Apache Ambari impersonation vulnerability |
Important |
Azure HDInsights |
CVE-2023-36877 |
Azure Apache Oozie impersonation vulnerability |
Important |
Dynamics Business Central Control |
CVE-2023-38167 |
Microsoft Dynamics Business Central Elevation of Privilege Wulnerability |
Important |
Sailor |
CVE-2023-35945 |
unknown |
unknown |
Memory integrity system readiness check tool |
ADV230004 |
Defending the Memory Integration System Readiness Check Tool in Update Depth |
Moderate |
Microsoft Dynamics |
CVE-2023-35389 |
Remote code execution vulnerability in Microsoft Dynamics 365 On-Premises |
Important |
Microsoft Edge (chrome-based) |
CVE-2023-38157 |
The Microsoft Edge (Chromium-based) security feature bypassed the vulnerability |
Moderate |
Microsoft Edge (chrome-based) |
CVE-2023-4068 |
Chromium: CVE-2023-4068 Type confusion in v8 |
unknown |
Microsoft Edge (chrome-based) |
CVE-2023-4072 |
Chromium: CVE-2023-4072 out of bounds, read and write in WebGL |
unknown |
Microsoft Edge (chrome-based) |
CVE-2023-4071 |
Chrome: CVE-2023-4071 Buffer overrun in visualizations |
unknown |
Microsoft Edge (chrome-based) |
CVE-2023-4073 |
Chrome: CVE-2023-4073 Memory access out of bounds in ANGLE |
unknown |
Microsoft Edge (chrome-based) |
CVE-2023-4075 |
Chromium: CVE-2023-4075 Use it for free in the cast |
unknown |
Microsoft Edge (chrome-based) |
CVE-2023-4074 |
Chromium: CVE-2023-4074 Use it for free on the Blink Task Scheduler |
unknown |
Microsoft Edge (chrome-based) |
CVE-2023-4076 |
Chromium: CVE-2023-4076 Use it for free at WebRTC |
unknown |
Microsoft Edge (chrome-based) |
CVE-2023-4077 |
Chromium: CVE-2023-4077 Insufficient data validation in extensions |
unknown |
Microsoft Edge (chrome-based) |
CVE-2023-4078 |
Chromium: CVE-2023-4078 Improper implementation in extensions |
unknown |
Microsoft Edge (chrome-based) |
CVE-2023-4070 |
Chromium: CVE-2023-4070 Type confusion in v8 |
unknown |
Microsoft Edge (chrome-based) |
CVE-2023-4069 |
Chromium: CVE-2023-4069 Type confusion in v8 |
unknown |
Microsoft Exchange server |
CVE-2023-38185 |
A Microsoft Exchange Server remote code execution vulnerability |
Important |
Microsoft Exchange server |
CVE-2023-35388 |
A Microsoft Exchange Server remote code execution vulnerability |
Important |
Microsoft Exchange server |
CVE-2023-35368 |
A Microsoft Exchange remote code execution vulnerability |
Important |
Microsoft Exchange server |
CVE-2023-38181 |
A security vulnerability in Microsoft Exchange server impersonation |
Important |
Microsoft Exchange server |
CVE-2023-38182 |
A Microsoft Exchange Server remote code execution vulnerability |
Important |
Microsoft Exchange server |
CVE-2023-21709 |
Elevated security vulnerability in Microsoft Exchange server |
Important |
Microsoft Office |
ADV230003 |
Microsoft Office Defense In Depth Update |
Moderate |
Microsoft Office |
CVE-2023-36897 |
Visual Studio Tools for Office Runtime Spoofing Vulnerabilities |
Important |
Microsoft Office Excel |
CVE-2023-36896 |
A remote Microsoft Excel code execution vulnerability |
Important |
Microsoft Office Excel |
CVE-2023-35371 |
A security vulnerability in remote Microsoft Office code execution |
Important |
Microsoft Office Outlook |
CVE-2023-36893 |
A security vulnerability in Microsoft Outlook impersonation |
Important |
Microsoft Office Outlook |
CVE-2023-36895 |
A security vulnerability in Microsoft Outlook remote code execution |
very important |
Microsoft Office SharePoint |
CVE-2023-36891 |
A Microsoft SharePoint Server impersonation vulnerability |
Important |
Microsoft Office SharePoint |
CVE-2023-36894 |
A security vulnerability in Microsoft SharePoint server information disclosure |
Important |
Microsoft Office SharePoint |
CVE-2023-36890 |
A security vulnerability in Microsoft SharePoint server information disclosure |
Important |
Microsoft Office SharePoint |
CVE-2023-36892 |
A Microsoft SharePoint Server impersonation vulnerability |
Important |
Microsoft Office Visio |
CVE-2023-35372 |
A security vulnerability in Microsoft Office Visio code execution |
Important |
Microsoft Office Visio |
CVE-2023-36865 |
A security vulnerability in Microsoft Office Visio code execution |
Important |
Microsoft Office Visio |
CVE-2023-36866 |
A security vulnerability in Microsoft Office Visio code execution |
Important |
Microsoft Teams |
CVE-2023-29328 |
A security vulnerability in Microsoft Teams remote code execution |
very important |
Microsoft Teams |
CVE-2023-29330 |
A security vulnerability in Microsoft Teams remote code execution |
very important |
Microsoft WDAC OLE DB Provider for SQL |
CVE-2023-36882 |
The Microsoft WDAC OLE DB Provider has a code execution vulnerability for SQL Server |
Important |
Microsoft Windows |
CVE-2023-20569 |
AMD: CVE-2023-20569 Return Address Expectation |
Important |
Microsoft Windows Codecs Library |
CVE-2023-38170 |
HEVC video extensions remote code execution vulnerability |
Important |
Reliability analysis metrics calculation engine |
CVE-2023-36876 |
Calculate the reliability analysis (RacTask) measures of vulnerability height |
Important |
Role: Windows Hyper-V |
CVE-2023-36908 |
Windows Hyper-V information disclosure vulnerability |
Important |
database server |
CVE-2023-38169 |
A security vulnerability in Microsoft OLE DB remote code execution |
Important |
Windows tablet user interface |
CVE-2023-36898 |
Windows Tablet user interface The underlying security vulnerability is in remote code execution |
Important |
Windows Bluetooth A2DP Driver |
CVE-2023-35387 |
Windows Bluetooth A2DP driver elevated privilege vulnerability |
Important |
Windows Cloud Files Mini Filter Driver |
CVE-2023-36904 |
Windows Cloud Files Mini Filter Driver Raised privilege vulnerability |
Important |
Common Windows registry file system driver |
CVE-2023-36900 |
The Windows Generic Log File System driver raised a privilege vulnerability |
Important |
Windows Cryptographic Services |
CVE-2023-36907 |
A security vulnerability in the Windows Cryptographic Services information disclosure |
Important |
Windows Cryptographic Services |
CVE-2023-36906 |
A security vulnerability in the Windows Cryptographic Services information disclosure |
Important |
Windows Defender |
CVE-2023-38175 |
Raise Microsoft Windows Defender for vulnerability to privilege |
Important |
Windows Fax and Scan Service |
CVE-2023-35381 |
A security vulnerability in Windows Remote Fax Service code execution |
Important |
Windows Group Policy |
CVE-2023-36889 |
Bypassing the Windows Group Policy security feature vulnerability |
Important |
Windows HTML platform |
CVE-2023-35384 |
The core Windows HTML security feature is bypassing vulnerabilities |
Important |
Windows kernel |
CVE-2023-35359 |
Windows Kernel Elevation of Privilege Governance |
Important |
Windows kernel |
CVE-2023-38154 |
Windows Kernel Elevation of Privilege Governance |
Important |
Windows kernel |
CVE-2023-35382 |
Windows Kernel Elevation of Privilege Governance |
Important |
Windows kernel |
CVE-2023-35386 |
Windows Kernel Elevation of Privilege Governance |
Important |
Windows kernel |
CVE-2023-35380 |
Windows Kernel Elevation of Privilege Governance |
Important |
Windows LDAP – Lightweight Directory Access Protocol |
CVE-2023-38184 |
Windows Lightweight Directory Access Protocol (LDAP) is a remote code execution vulnerability |
Important |
Windows Message Queuing |
CVE-2023-36909 |
Microsoft Message Queuing denied service due to a security vulnerability |
Important |
Windows Message Queuing |
CVE-2023-35376 |
Microsoft Message Queuing denied service due to a security vulnerability |
Important |
Windows Message Queuing |
CVE-2023-38172 |
Microsoft Message Queuing denied service due to a security vulnerability |
Important |
Windows Message Queuing |
CVE-2023-35385 |
A remote Microsoft Message Queuing code execution vulnerability |
very important |
Windows Message Queuing |
CVE-2023-35383 |
A security vulnerability in Microsoft Message Queuing information disclosure |
Important |
Windows Message Queuing |
CVE-2023-36913 |
A security vulnerability in Microsoft Message Queuing information disclosure |
Important |
Windows Message Queuing |
CVE-2023-35377 |
Microsoft Message Queuing denied service due to a security vulnerability |
Important |
Windows Message Queuing |
CVE-2023-38254 |
Microsoft Message Queuing denied service due to a security vulnerability |
Important |
Windows Message Queuing |
CVE-2023-36911 |
A remote Microsoft Message Queuing code execution vulnerability |
very important |
Windows Message Queuing |
CVE-2023-36910 |
A remote Microsoft Message Queuing code execution vulnerability |
very important |
Windows Message Queuing |
CVE-2023-36912 |
Microsoft Message Queuing denied service due to a security vulnerability |
Important |
Windows Mobile device management |
CVE-2023-38186 |
Elevated vulnerability in Windows Mobile device management |
Important |
Projected Windows file system |
CVE-2023-35378 |
Windows Projected File System to fix security vulnerabilities |
Important |
Windows reliability analysis metrics calculation engine |
CVE-2023-35379 |
Reliability Analysis Metrics Calculation Engine (RACEng) Rise Double Privilege |
Important |
Windows Smart Card |
CVE-2023-36914 |
Windows Smart Card Resource Management Server Security feature bypassing the vulnerability |
Important |
Windows System Assessment Tool |
CVE-2023-36903 |
Windows System Assessment Tool, Privilege Vulnerability Elevation |
Important |
Windows Wireless Wide Area Network Service |
CVE-2023-36905 |
Information disclosure vulnerability in Windows Wireless Area Network Service (WwanSvc) |
Important |