Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-5996
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-5996 WebAudio에서 UaF(Use after free)
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-5859
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-5859 PIP(화면 속 화면)에서 잘못된 보안 UI
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-5858
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-5858 WebApp Provider에서 부적절한 구현
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-5857
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-5857 다운로드에서 부적절한 구현
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-5856
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-5856 가로 패널에서 UaF(Use after free)
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-5855
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-5855 읽기 모드에서 UaF(Use after free)
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-5854
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-5854 프로필에서 UaF(Use after free)
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-5853
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-5853 다운로드에서 잘못된 보안 UI
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-5852
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-5852 인쇄에서 UaF(Use after free)
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-5851
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-5851 다운로드에서 부적절한 구현
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-5850
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-5850 다운로드에서 잘못된 보안 UI
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-5849
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-5849 USB에서 정수 오버플로
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-5487
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-5487 전체화면에서 부적절한 구현
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-5486
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-5486 입력에서 부적절한 구현
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-5485
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-5485 자동 채우기에서 부적절한 구현
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-5484
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-5484 탐색에서 부적절한 구현
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-5483
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-5483 Intents에서 부적절한 구현
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-5482
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-5482 USB에서 불충분한 데이터 유효성 검사
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-5481
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-5481 다운로드에서 부적절한 구현
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-5480
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-5480 결제에서 부적절한 구현
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-5479
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-5479 확장 API에서 부적절한 구현
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-5478
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-5478 자동 채우기에서 부적절한 구현
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-5477
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-5477 설치 관리자에서 부적절한 구현
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-5476
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-5476 Blink History에서 UaF(Use after free)
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-5475
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-5475 DevTools에서 부적절한 구현
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-5474
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-5474 PDF에서 힙 버퍼 오버플로
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-5473
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-5473 캐스팅에서 UaF(Use after free)
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-5472
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-5472: 프로필에서 UaF(Use after free)
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-5218
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-5218 사이트 격리에서 UaF(Use after free)
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-5217
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-5217 libvpx의 vp8 인코딩에서 힙 버퍼 오버플로
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-4863
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-4863 WebP에서 힙 버퍼 오버플로
|
<
p class=”1″ style=”text-align: center;”>HTTP/2
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-44487
|
<
p class=”1″ style=”text-align: center;”>MITRE: CVE-2023-44487 HTTP/2 고속 초기화 공격
|
<
p class=”1″ style=”text-align: center;”>Adobe
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-44323
|
<
p class=”1″ style=”text-align: center;”>Adobe: CVE-2023-44323 Adobe PDF 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Layer 2 Tunneling Protocol
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-41765
|
<
p class=”1″ style=”text-align: center;”>L2TP(Layer 2 Tunneling Protocol) 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows cURL Implementation
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-38545
|
<
p class=”1″ style=”text-align: center;”>Hackerone: CVE-2023-38545 SOCKS5 힙 버퍼 오버플로
|
<
p class=”1″ style=”text-align: center;”>Windows Mobile Device Management
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-38186
|
<
p class=”1″ style=”text-align: center;”>Windows 모바일 장치 관리 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Office SharePoint
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-38177
|
<
p class=”1″ style=”text-align: center;”>Microsoft SharePoint Server 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft QUIC
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-38171
|
<
p class=”1″ style=”text-align: center;”>Microsoft QUIC 서비스 거부 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Dynamics
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-38164
|
<
p class=”1″ style=”text-align: center;”>Microsoft Dynamics 365(온–프레미스) 교차–사이트 스크립팅 취약성
|
<
p class=”1″ style=”text-align: center;”>Azure
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-38151
|
<
p class=”1″ style=”text-align: center;”>Microsoft Host Integration Server 2020 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows cURL Implementation
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-38039
|
<
p class=”1″ style=”text-align: center;”>Hackerone: CVE-2023-38039 HTTP 헤더가 모든 메모리 소모
|
<
p class=”1″ style=”text-align: center;”>Windows Message Queuing
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36913
|
<
p class=”1″ style=”text-align: center;”>Microsoft 메시지 큐 정보 유출 취약성
|
<
p class=”1″ style=”text-align: center;”>Role: Windows Hyper-V
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36908
|
<
p class=”1″ style=”text-align: center;”>Windows Hyper-V 정보 유출 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Cryptographic Services
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36907
|
<
p class=”1″ style=”text-align: center;”>Windows 암호화 서비스 정보 공개 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Cryptographic Services
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36906
|
<
p class=”1″ style=”text-align: center;”>Windows 암호화 서비스 정보 공개 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Wireless Wide Area Network Service
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36905
|
<
p class=”1″ style=”text-align: center;”>Windows WwanSvc(Wireless Wide Area Network Service) 정보 공개 취약성
|
<
p class=”1″ style=”text-align: center;”>ASP.NET
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36899
|
<
p class=”1″ style=”text-align: center;”>ASP.NET 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Dynamics
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36886
|
<
p class=”1″ style=”text-align: center;”>Microsoft Dynamics 365(온–프레미스) 교차–사이트 스크립팅 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Windows Search Component
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36884
|
<
p class=”1″ style=”text-align: center;”>Windows Search 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>.NET Framework
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36873
|
<
p class=”1″ style=”text-align: center;”>.NET Framework 스푸핑 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Dynamics Finance & Operations
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36800
|
<
p class=”1″ style=”text-align: center;”>Dynamics 금융 및 운영 교차–사이트 스크립팅 취약성
|
<
p class=”1″ style=”text-align: center;”>.NET Core & Visual Studio
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36799
|
<
p class=”1″ style=”text-align: center;”>.NET Core 및 Visual Studio 서비스 거부 취약성
|
<
p class=”1″ style=”text-align: center;”>.NET and Visual Studio
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36796
|
<
p class=”1″ style=”text-align: center;”>Visual Studio 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>.NET and Visual Studio
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36794
|
<
p class=”1″ style=”text-align: center;”>Visual Studio 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>.NET and Visual Studio
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36793
|
<
p class=”1″ style=”text-align: center;”>Visual Studio 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>.NET and Visual Studio
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36792
|
<
p class=”1″ style=”text-align: center;”>Visual Studio 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>.NET Framework
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36788
|
<
p class=”1″ style=”text-align: center;”>.NET Framework 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Office Word
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36761
|
<
p class=”1″ style=”text-align: center;”>Microsoft Word 정보 유출 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36741
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge(Chromium 기반) 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>SQL Server
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36728
|
<
p class=”1″ style=”text-align: center;”>Microsoft SQL Server 서비스 거부 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Windows Speech
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36719
|
<
p class=”1″ style=”text-align: center;”>Microsoft SAPI(Speech Application Programming Interface) 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Installer
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36705
|
<
p class=”1″ style=”text-align: center;”>Windows Installer 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Kernel
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36698
|
<
p class=”1″ style=”text-align: center;”>Windows 커널 보안 기능 우회 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Message Queuing
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36697
|
<
p class=”1″ style=”text-align: center;”>Microsoft 메시지 큐 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Remote Procedure Call
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36596
|
<
p class=”1″ style=”text-align: center;”>원격 프로시저 호출 정보 공개 취약성
|
<
p class=”1″ style=”text-align: center;”>ASP.NET
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36560
|
<
p class=”1″ style=”text-align: center;”>ASP.NET 보안 기능 바이패스 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36559
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge(Chromium 기반) 스푸핑 취약성
|
<
p class=”1″ style=”text-align: center;”>ASP.NET
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36558
|
<
p class=”1″ style=”text-align: center;”>ASP.NET Core – 보안 기능 바이패스 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Exchange Server
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36439
|
<
p class=”1″ style=”text-align: center;”>Microsoft Exchange Server 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Azure DevOps
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36437
|
<
p class=”1″ style=”text-align: center;”>Azure DevOps Server 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows HTML Platform
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36436
|
<
p class=”1″ style=”text-align: center;”>Windows MSHTML 플랫폼 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft QUIC
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36435
|
<
p class=”1″ style=”text-align: center;”>Microsoft QUIC 서비스 거부 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Authentication Methods
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36428
|
<
p class=”1″ style=”text-align: center;”>Microsoft LSASS(Local Security Authority Subsystem Service) 정보 공개 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Hyper-V
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36427
|
<
p class=”1″ style=”text-align: center;”>Windows Hyper-V 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Distributed File System (DFS)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36425
|
<
p class=”1″ style=”text-align: center;”>Windows DFS(분산 파일 시스템) 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Common Log File System Driver
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36424
|
<
p class=”1″ style=”text-align: center;”>Windows 공용 로그 파일 시스템 드라이버 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Remote Registry Service
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36423
|
<
p class=”1″ style=”text-align: center;”>Microsoft 원격 레지스트리 서비스 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Defender
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36422
|
<
p class=”1″ style=”text-align: center;”>Microsoft Windows Defender 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>SQL Server
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36420
|
<
p class=”1″ style=”text-align: center;”>SQL Server용 Microsoft ODBC 드라이버 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>SQL Server
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36417
|
<
p class=”1″ style=”text-align: center;”>Microsoft SQL OLE DB 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Azure SDK
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36415
|
<
p class=”1″ style=”text-align: center;”>Azure Identity SDK 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Azure SDK
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36414
|
<
p class=”1″ style=”text-align: center;”>Azure Identity SDK 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Office
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36413
|
<
p class=”1″ style=”text-align: center;”>Microsoft Office 보안 기능 우회 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Dynamics
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36410
|
<
p class=”1″ style=”text-align: center;”>Microsoft Dynamics 365(온–프레미스) 교차–사이트 스크립팅 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36409
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge(Chromium 기반) 정보 공개 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Hyper-V
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36408
|
<
p class=”1″ style=”text-align: center;”>Windows Hyper-V 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Hyper-V
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36407
|
<
p class=”1″ style=”text-align: center;”>Windows Hyper-V 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Hyper-V
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36406
|
<
p class=”1″ style=”text-align: center;”>Windows Hyper-V 정보 유출 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Kernel
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36405
|
<
p class=”1″ style=”text-align: center;”>Windows 커널 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Kernel
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36404
|
<
p class=”1″ style=”text-align: center;”>Windows 커널 정보 유출 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Kernel
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36403
|
<
p class=”1″ style=”text-align: center;”>Windows 커널 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft WDAC OLE DB provider for SQL
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36402
|
<
p class=”1″ style=”text-align: center;”>SQL Server용 Microsoft WDAC OLE DB 공급자 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Remote Registry Service
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36401
|
<
p class=”1″ style=”text-align: center;”>Microsoft 원격 레지스트리 서비스 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows HMAC Key Derivation
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36400
|
<
p class=”1″ style=”text-align: center;”>Windows HMAC 키 파생 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Storage
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36399
|
<
p class=”1″ style=”text-align: center;”>Windows 저장소 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows NTFS
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36398
|
<
p class=”1″ style=”text-align: center;”>Windows NTFS 정보 유출 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Internet Connection Sharing (ICS)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36397
|
<
p class=”1″ style=”text-align: center;”>Windows PGM(Pragmatic General Multicast) 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Compressed Folder
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36396
|
<
p class=”1″ style=”text-align: center;”>Windows Compressed Folder 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Deployment Services
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36395
|
<
p class=”1″ style=”text-align: center;”>Windows 배포 서비스 서비스 거부 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Windows Search Component
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36394
|
<
p class=”1″ style=”text-align: center;”>Windows 검색 서비스 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Tablet Windows User Interface
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36393
|
<
p class=”1″ style=”text-align: center;”>Windows User Interface Application Core 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows DHCP Server
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36392
|
<
p class=”1″ style=”text-align: center;”>DHCP Server Service 서비스 거부 취약성
|
<
p class=”1″ style=”text-align: center;”>Azure
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36052
|
<
p class=”1″ style=”text-align: center;”>Azure CLI REST 명령 정보 공개 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Exchange Server
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36050
|
<
p class=”1″ style=”text-align: center;”>Microsoft Exchange Server 스푸핑 취약성
|
<
p class=”1″ style=”text-align: center;”>.NET Framework
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36049
|
<
p class=”1″ style=”text-align: center;”>.NET, .NET Framework, Visual Studio 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Authentication Methods
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36047
|
<
p class=”1″ style=”text-align: center;”>Windows 인증 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Authentication Methods
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36046
|
<
p class=”1″ style=”text-align: center;”>Windows 인증 서비스 거부 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Office
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36045
|
<
p class=”1″ style=”text-align: center;”>Microsoft Office 그래픽 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Open Management Infrastructure
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36043
|
<
p class=”1″ style=”text-align: center;”>오픈 관리 인프라 정보 공개 취약성
|
<
p class=”1″ style=”text-align: center;”>Visual Studio
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36042
|
<
p class=”1″ style=”text-align: center;”>Visual Studio 서비스 거부 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Office Excel
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36041
|
<
p class=”1″ style=”text-align: center;”>Microsoft Excel 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Exchange Server
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36039
|
<
p class=”1″ style=”text-align: center;”>Microsoft Exchange Server 스푸핑 취약성
|
<
p class=”1″ style=”text-align: center;”>ASP.NET
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36038
|
<
p class=”1″ style=”text-align: center;”>ASP.NET Core 서비스 거부 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Office Excel
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36037
|
<
p class=”1″ style=”text-align: center;”>Microsoft Excel 보안 기능 우회 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Cloud Files Mini Filter Driver
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36036
|
<
p class=”1″ style=”text-align: center;”>Windows 클라우드 파일 미니 필터 드라이버 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Exchange Server
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36035
|
<
p class=”1″ style=”text-align: center;”>Microsoft Exchange Server 스푸핑 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36034
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge(Chromium 기반) 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows DWM Core Library
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36033
|
<
p class=”1″ style=”text-align: center;”>Windows DWM 핵심 라이브러리 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Dynamics
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36031
|
<
p class=”1″ style=”text-align: center;”>Microsoft Dynamics 365(온–프레미스) 교차–사이트 스크립팅 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Dynamics 365 Sales
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36030
|
<
p class=”1″ style=”text-align: center;”>Microsoft Dynamics 365 판매 스푸핑 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36029
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge(Chromium 기반) 스푸핑 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Protected EAP (PEAP)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36028
|
<
p class=”1″ style=”text-align: center;”>Microsoft PEAP(Protected Extensible Authentication Protocol) 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36027
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge(Chromium 기반) 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows SmartScreen
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36025
|
<
p class=”1″ style=”text-align: center;”>Windows SmartScreen 보안 기능 우회 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36024
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge(Chromium 기반) 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36022
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge(Chromium 기반) 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Azure
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36021
|
<
p class=”1″ style=”text-align: center;”>Microsoft 온–프레미스 데이터 게이트웨이 보안 기능 바이패스 취약성
|
<
p class=”1″ style=”text-align: center;”>Visual Studio Code
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36018
|
<
p class=”1″ style=”text-align: center;”>Visual Studio Code Jupyter 확장 스푸핑 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Scripting
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36017
|
<
p class=”1″ style=”text-align: center;”>Windows 스크립팅 엔진 메모리 손상 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Dynamics
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36016
|
<
p class=”1″ style=”text-align: center;”>Microsoft Dynamics 365(온–프레미스) 교차–사이트 스크립팅 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36014
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge(Chromium 기반) 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Dynamics
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36007
|
<
p class=”1″ style=”text-align: center;”>Microsoft Send Customer Voice survey from Dynamics 365 Spoofing Vulnerability
|
<
p class=”1″ style=”text-align: center;”>ASP.NET and Visual Studio
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-35391
|
<
p class=”1″ style=”text-align: center;”>ASP.NET Core SignalR 및 Visual Studio 정보 공개 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Message Queuing
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-35383
|
<
p class=”1″ style=”text-align: center;”>Microsoft 메시지 큐 정보 유출 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows RDP
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-29348
|
<
p class=”1″ style=”text-align: center;”>Windows RD 게이트웨이(원격 데스크톱 게이트웨이) 정보 공개 취약성
|
<
p class=”1″ style=”text-align: center;”>SysInternals
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-29343
|
<
p class=”1″ style=”text-align: center;”>Windows용 SysInternals Sysmon 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Bluetooth Driver
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-24023
|
<
p class=”1″ style=”text-align: center;”>Mitre: CVE-2023-24023 Bluetooth 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Message Queuing
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-21537
|
<
p class=”1″ style=”text-align: center;”>Microsoft MSMQ(메시지 큐) 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Windows Codecs Library
|
<
p class=”2″ style=”text-align: center;”>CVE-2022-44687
|
<
p class=”1″ style=”text-align: center;”>Raw Image Extension Remote Code Execution Vulnerability
|
<
p class=”1″ style=”text-align: center;”>Microsoft Graphics Component
|
<
p class=”2″ style=”text-align: center;”>CVE-2022-41113
|
<
p class=”1″ style=”text-align: center;”>Windows Win32 커널 하위 시스템 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Accessibility Insights for Web
|
<
p class=”2″ style=”text-align: center;”>CVE-2021-31936
|
<
p class=”1″ style=”text-align: center;”>Microsoft 웹용 접근성 인사이트 정보 유출 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Exchange Server
|
<
p class=”2″ style=”text-align: center;”>CVE-2021-31207
|
<
p class=”1″ style=”text-align: center;”>Microsoft Exchange Server 보안 기능 우회 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows SMB
|
<
p class=”2″ style=”text-align: center;”>CVE-2021-31205
|
<
p class=”1″ style=”text-align: center;”>Windows SMB 클라이언트 보안 기능 우회 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Windows Codecs Library
|
<
p class=”2″ style=”text-align: center;”>CVE-2021-31192
|
<
p class=”1″ style=”text-align: center;”>Windows Media Foundation Core 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Exchange Server
|
<
p class=”2″ style=”text-align: center;”>CVE-2021-1730
|
<
p class=”1″ style=”text-align: center;”>Microsoft Exchange Server 스푸핑 취약성
|