제품 카테고리
|
CVE 번호
|
CVE 제목
|
Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-6512
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-6512 웹 브라우저 UI에서 부적절한 구현
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-6511
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-6511 자동 채우기에서 부적절한 구현
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-6510
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-6510 Media Capture에서 UaF(Use after free)
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-6509
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-6509 가로 패널 검색에서 UaF(Use after free)
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-6508
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-6508 미디어 스트림에서 UaF(Use after free)
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-6351
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-6351 Use after free in libavif
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-6350
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-6350 Out of bounds memory access in libavif
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-6348
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-6348 Type Confusion in Spellcheck
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-6347
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-6347 Use after free in Mojo
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-6346
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-6346 Use after free in WebAudio
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-6345
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-6345 Integer overflow in Skia
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-6112
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-6112 Use after free in Navigation
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-5997
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2023-5997 Use after free in Garbage Collection
|
<
p class=”1″ style=”text-align: center;”>Windows Defender
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-38175
|
<
p class=”1″ style=”text-align: center;”>Microsoft Windows Defender 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-38174
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge(Chromium 기반) 정보 공개 취약성
|
<
p class=”1″ style=”text-align: center;”>Azure HDInsights
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-38156
|
<
p class=”1″ style=”text-align: center;”>Azure HDInsight Apache Ambari JDBC Injection 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36880
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge(Chromium 기반) 정보 공개 취약성
|
<
p class=”1″ style=”text-align: center;”>.NET and Visual Studio
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36796
|
<
p class=”1″ style=”text-align: center;”>Visual Studio 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>.NET and Visual Studio
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36794
|
<
p class=”1″ style=”text-align: center;”>Visual Studio 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>.NET and Visual Studio
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36793
|
<
p class=”1″ style=”text-align: center;”>Visual Studio 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>.NET and Visual Studio
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36792
|
<
p class=”1″ style=”text-align: center;”>Visual Studio 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Cloud Files Mini Filter Driver
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36696
|
<
p class=”1″ style=”text-align: center;”>Windows 클라우드 파일 미니 필터 드라이버 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows UPnP Device Host
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36585
|
<
p class=”1″ style=”text-align: center;”>Windows upnphost.dll Denial of Service Vulnerability
|
<
p class=”1″ style=”text-align: center;”>ASP.NET
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36560
|
<
p class=”1″ style=”text-align: center;”>ASP.NET 보안 기능 바이패스 취약성
|
<
p class=”1″ style=”text-align: center;”>ASP.NET
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36558
|
<
p class=”1″ style=”text-align: center;”>ASP.NET Core – 보안 기능 바이패스 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Remote Registry Service
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36423
|
<
p class=”1″ style=”text-align: center;”>Microsoft 원격 레지스트리 서비스 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Azure
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36419
|
<
p class=”1″ style=”text-align: center;”>Azure HDInsight Apache Oozie Workflow Scheduler XXE 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Local Security Authority Subsystem Service (LSASS)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36391
|
<
p class=”1″ style=”text-align: center;”>Local Security Authority Subsystem Service 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>.NET Framework
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36049
|
<
p class=”1″ style=”text-align: center;”>.NET, .NET Framework, Visual Studio 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Exchange Server
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36035
|
<
p class=”1″ style=”text-align: center;”>Microsoft Exchange Server 스푸핑 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36026
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge(Chromium 기반) 스푸핑 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows SmartScreen
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36025
|
<
p class=”1″ style=”text-align: center;”>Windows SmartScreen 보안 기능 우회 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Dynamics
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36020
|
<
p class=”1″ style=”text-align: center;”>Microsoft Dynamics 365(온–프레미스) 교차–사이트 스크립팅 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Power Platform Connector
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36019
|
<
p class=”1″ style=”text-align: center;”>Microsoft Power Platform Connector 스푸핑 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft PowerShell
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36013
|
<
p class=”1″ style=”text-align: center;”>PowerShell Information Disclosure Vulnerability
|
<
p class=”1″ style=”text-align: center;”>Windows DHCP Server
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36012
|
<
p class=”1″ style=”text-align: center;”>DHCP Server Service 정보 공개 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Win32K
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36011
|
<
p class=”1″ style=”text-align: center;”>Win32k 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Defender
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36010
|
<
p class=”1″ style=”text-align: center;”>Microsoft Defender 서비스 거부 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Office Word
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36009
|
<
p class=”1″ style=”text-align: center;”>Microsoft Word 정보 유출 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36008
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge(Chromium 기반) 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft WDAC OLE DB provider for SQL
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36006
|
<
p class=”1″ style=”text-align: center;”>SQL Server용 Microsoft WDAC OLE DB 공급자 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Telephony Server
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36005
|
<
p class=”1″ style=”text-align: center;”>Windows 전화 통신 서버 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows DPAPI (Data Protection Application Programming Interface)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36004
|
<
p class=”1″ style=”text-align: center;”>Windows DPAPI(Data Protection Application Programming Interface) 스푸핑 취약성
|
<
p class=”1″ style=”text-align: center;”>XAML Diagnostics
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36003
|
<
p class=”1″ style=”text-align: center;”>XAML Diagnostics 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Kernel-Mode Drivers
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-35644
|
<
p class=”1″ style=”text-align: center;”>Windows Sysmain Service 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows DHCP Server
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-35643
|
<
p class=”1″ style=”text-align: center;”>DHCP Server Service 정보 공개 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Internet Connection Sharing (ICS)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-35642
|
<
p class=”1″ style=”text-align: center;”>ICS(인터넷 연결 공유) 서비스 거부 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Internet Connection Sharing (ICS)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-35641
|
<
p class=”1″ style=”text-align: center;”>ICS(인터넷 연결 공유) 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows ODBC Driver
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-35639
|
<
p class=”1″ style=”text-align: center;”>Microsoft ODBC 드라이버 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows DHCP Server
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-35638
|
<
p class=”1″ style=”text-align: center;”>DHCP Server Service 서비스 거부 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Office Outlook
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-35636
|
<
p class=”1″ style=”text-align: center;”>Microsoft Outlook 정보 유출 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Kernel
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-35635
|
<
p class=”1″ style=”text-align: center;”>Windows 커널 서비스 거부 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Bluetooth Driver
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-35634
|
<
p class=”1″ style=”text-align: center;”>Windows Bluetooth 드라이버 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Kernel
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-35633
|
<
p class=”1″ style=”text-align: center;”>Windows 커널 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Internet Connection Sharing (ICS)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-35632
|
<
p class=”1″ style=”text-align: center;”>WinSock용 Windows 보조 기능 드라이버 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Win32K
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-35631
|
<
p class=”1″ style=”text-align: center;”>Win32k 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Internet Connection Sharing (ICS)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-35630
|
<
p class=”1″ style=”text-align: center;”>ICS(인터넷 연결 공유) 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows USB Mass Storage Class Driver
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-35629
|
<
p class=”1″ style=”text-align: center;”>Microsoft USBHUB 3.0 장치 드라이버 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows MSHTML Platform
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-35628
|
<
p class=”1″ style=”text-align: center;”>Windows MSHTML 플랫폼 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Azure Machine Learning
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-35625
|
<
p class=”1″ style=”text-align: center;”>SDK 사용자용 Azure Machine Learning 컴퓨팅 인스턴스 정보 공개 취약성
|
<
p class=”1″ style=”text-align: center;”>Azure Connected Machine Agent
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-35624
|
<
p class=”1″ style=”text-align: center;”>Azure Connected Machine 에이전트 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Windows DNS
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-35622
|
<
p class=”1″ style=”text-align: center;”>Windows DNS 스푸핑 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Dynamics
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-35621
|
<
p class=”1″ style=”text-align: center;”>Microsoft Dynamics 365 금융 및 운영 서비스 거부 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Office Outlook
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-35619
|
<
p class=”1″ style=”text-align: center;”>Mac용 Microsoft Outlook 스푸핑 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-35618
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge(Chromium 기반) 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Azure DevOps
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-21751
|
<
p class=”1″ style=”text-align: center;”>Azure DevOps Server 스푸핑 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Media
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-21740
|
<
p class=”1″ style=”text-align: center;”>Windows Media 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Chipsets
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-20588
|
<
p class=”1″ style=”text-align: center;”>AMD: CVE-2023-20588 AMD 추측성 유출 보안 알림
|
<
p class=”1″ style=”text-align: center;”>Microsoft Exchange Server
|
<
p class=”2″ style=”text-align: center;”>CVE-2022-24477
|
<
p class=”1″ style=”text-align: center;”>Microsoft Exchange Server 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Apps
|
<
p class=”2″ style=”text-align: center;”>CVE-2021-43890
|
<
p class=”1″ style=”text-align: center;”>Windows AppX 설치 관리자 스푸핑 취약성
|