제품 카테고리
|
CVE 번호
|
CVE 제목
|
Microsoft WDAC OLE DB provider for SQL
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21420
|
<
p class=”1″ style=”text-align: center;”>SQL Server용 Microsoft WDAC OLE DB 공급자 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Office
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21413
|
<
p class=”1″ style=”text-align: center;”>Microsoft Outlook 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Internet Shortcut Files
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21412
|
<
p class=”1″ style=”text-align: center;”>인터넷 바로가기 파일 보안 기능 바이패스 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Exchange Server
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21410
|
<
p class=”1″ style=”text-align: center;”>Microsoft Exchange Server 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Windows
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21406
|
<
p class=”1″ style=”text-align: center;”>Windows 인쇄 서비스 스푸핑 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Message Queuing
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21405
|
<
p class=”1″ style=”text-align: center;”>Microsoft MSMQ(메시지 큐) 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>.NET
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21404
|
<
p class=”1″ style=”text-align: center;”>.NET 서비스 거부 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Azure Kubernetes Service
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21403
|
<
p class=”1″ style=”text-align: center;”>Microsoft Azure Kubernetes Service Confidential Container 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Office Outlook
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21402
|
<
p class=”1″ style=”text-align: center;”>Microsoft Outlook 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Azure Active Directory
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21401
|
<
p class=”1″ style=”text-align: center;”>Microsoft Entra Jira Single-Sign-On 플러그인 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21399
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge(Chromium 기반) 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Azure File Sync
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21397
|
<
p class=”1″ style=”text-align: center;”>Microsoft Azure 파일 동기화 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Dynamics
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21396
|
<
p class=”1″ style=”text-align: center;”>Dynamics 365 Sales 스푸핑 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Dynamics
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21395
|
<
p class=”1″ style=”text-align: center;”>Microsoft Dynamics 365(온–프레미스) 교차–사이트 스크립팅 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Dynamics
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21394
|
<
p class=”1″ style=”text-align: center;”>Dynamics 365 현장 서비스 스푸핑 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Dynamics
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21393
|
<
p class=”1″ style=”text-align: center;”>Microsoft Dynamics 365(온–프레미스) 교차–사이트 스크립팅 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft WDAC OLE DB provider for SQL
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21391
|
<
p class=”1″ style=”text-align: center;”>SQL Server용 Microsoft WDAC OLE DB 공급자 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Dynamics
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21389
|
<
p class=”1″ style=”text-align: center;”>Microsoft Dynamics 365(온–프레미스) 교차–사이트 스크립팅 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21388
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge(Chromium 기반) 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge for Android
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21387
|
<
p class=”1″ style=”text-align: center;”>Android용 Microsoft Edge 스푸핑 취약성
|
<
p class=”1″ style=”text-align: center;”>.NET
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21386
|
<
p class=”1″ style=”text-align: center;”>.NET 서비스 거부 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21385
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge(Chromium 기반) 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Office OneNote
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21384
|
<
p class=”1″ style=”text-align: center;”>Microsoft Office OneNote 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21383
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge(Chromium 기반) 스푸핑 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge for Android
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21382
|
<
p class=”1″ style=”text-align: center;”>Android용Microsoft Edge 정보 유출 취약성
|
<
p class=”1″ style=”text-align: center;”>Azure Active Directory
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21381
|
<
p class=”1″ style=”text-align: center;”>Microsoft Azure Active Directory B2C 스푸핑 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Dynamics
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21380
|
<
p class=”1″ style=”text-align: center;”>Microsoft Dynamics Business Central/NAV 정보 공개 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Office Word
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21379
|
<
p class=”1″ style=”text-align: center;”>Microsoft Word 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Office Outlook
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21378
|
<
p class=”1″ style=”text-align: center;”>Microsoft Outlook 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Windows DNS
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21377
|
<
p class=”1″ style=”text-align: center;”>Windows DNS 정보 유출 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Azure Kubernetes Service
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21376
|
<
p class=”1″ style=”text-align: center;”>Microsoft Azure Kubernetes Service Confidential Container 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft WDAC OLE DB provider for SQL
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21375
|
<
p class=”1″ style=”text-align: center;”>SQL Server용 Microsoft WDAC OLE DB 공급자 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Teams for Android
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21374
|
<
p class=”1″ style=”text-align: center;”>Android용 Microsoft Teams 정보 공개 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows OLE
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21372
|
<
p class=”1″ style=”text-align: center;”>Windows OLE 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Kernel
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21371
|
<
p class=”1″ style=”text-align: center;”>Windows 커널 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft WDAC OLE DB provider for SQL
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21370
|
<
p class=”1″ style=”text-align: center;”>SQL Server용 Microsoft WDAC OLE DB 공급자 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft WDAC OLE DB provider for SQL
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21369
|
<
p class=”1″ style=”text-align: center;”>SQL Server용 Microsoft WDAC OLE DB 공급자 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft WDAC OLE DB provider for SQL
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21368
|
<
p class=”1″ style=”text-align: center;”>SQL Server용 Microsoft WDAC OLE DB 공급자 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft WDAC OLE DB provider for SQL
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21367
|
<
p class=”1″ style=”text-align: center;”>SQL Server용 Microsoft WDAC OLE DB 공급자 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft WDAC OLE DB provider for SQL
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21366
|
<
p class=”1″ style=”text-align: center;”>SQL Server용 Microsoft WDAC OLE DB 공급자 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft WDAC OLE DB provider for SQL
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21365
|
<
p class=”1″ style=”text-align: center;”>SQL Server용 Microsoft WDAC OLE DB 공급자 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Azure Site Recovery
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21364
|
<
p class=”1″ style=”text-align: center;”>Microsoft Azure Site Recovery 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Message Queuing
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21363
|
<
p class=”1″ style=”text-align: center;”>MSMQ(Microsoft 메시지 큐) 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Kernel
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21362
|
<
p class=”1″ style=”text-align: center;”>Windows 커널 보안 기능 우회 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft WDAC OLE DB provider for SQL
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21361
|
<
p class=”1″ style=”text-align: center;”>SQL Server용 Microsoft WDAC OLE DB 공급자 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft WDAC OLE DB provider for SQL
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21360
|
<
p class=”1″ style=”text-align: center;”>SQL Server용 Microsoft WDAC OLE DB 공급자 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft WDAC OLE DB provider for SQL
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21359
|
<
p class=”1″ style=”text-align: center;”>SQL Server용 Microsoft WDAC OLE DB 공급자 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft WDAC OLE DB provider for SQL
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21358
|
<
p class=”1″ style=”text-align: center;”>SQL Server용 Microsoft WDAC OLE DB 공급자 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Internet Connection Sharing (ICS)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21357
|
<
p class=”1″ style=”text-align: center;”>Windows PGM(Pragmatic General Multicast) 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows LDAP – Lightweight Directory Access Protocol
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21356
|
<
p class=”1″ style=”text-align: center;”>Windows LDAP(Lightweight Directory Access Protocol) 서비스 거부 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Message Queuing
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21355
|
<
p class=”1″ style=”text-align: center;”>Microsoft MSMQ(메시지 큐) 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Message Queuing
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21354
|
<
p class=”1″ style=”text-align: center;”>Microsoft MSMQ(메시지 큐) 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft WDAC ODBC Driver
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21353
|
<
p class=”1″ style=”text-align: center;”>Microsoft WDAC ODBC 드라이버 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft WDAC OLE DB provider for SQL
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21352
|
<
p class=”1″ style=”text-align: center;”>SQL Server용 Microsoft WDAC OLE DB 공급자 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows SmartScreen
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21351
|
<
p class=”1″ style=”text-align: center;”>Windows SmartScreen 보안 기능 우회 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft WDAC OLE DB provider for SQL
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21350
|
<
p class=”1″ style=”text-align: center;”>SQL Server용 Microsoft WDAC OLE DB 공급자 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft ActiveX
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21349
|
<
p class=”1″ style=”text-align: center;”>Microsoft ActiveX Data Objects 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Internet Connection Sharing (ICS)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21348
|
<
p class=”1″ style=”text-align: center;”>Internet Connection Sharing (ICS) Denial of Service Vulnerability
|
<
p class=”1″ style=”text-align: center;”>SQL Server
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21347
|
<
p class=”1″ style=”text-align: center;”>Microsoft ODBC 드라이버 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Win32K – ICOMP
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21346
|
<
p class=”1″ style=”text-align: center;”>Win32k 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Kernel
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21345
|
<
p class=”1″ style=”text-align: center;”>Windows 커널 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Internet Connection Sharing (ICS)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21344
|
<
p class=”1″ style=”text-align: center;”>Windows NAT(Network Address Translation) 서비스 거부 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Internet Connection Sharing (ICS)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21343
|
<
p class=”1″ style=”text-align: center;”>Windows NAT(Network Address Translation) 서비스 거부 취약성
|
<
p class=”1″ style=”text-align: center;”>Role: DNS Server
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21342
|
<
p class=”1″ style=”text-align: center;”>Windows DNS 클라이언트 서비스 거부 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Kernel
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21341
|
<
p class=”1″ style=”text-align: center;”>Windows 커널 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Kernel
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21340
|
<
p class=”1″ style=”text-align: center;”>Windows 커널 정보 유출 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows USB Serial Driver
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21339
|
<
p class=”1″ style=”text-align: center;”>Windows USB Generic Parent Driver 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Kernel
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21338
|
<
p class=”1″ style=”text-align: center;”>Windows 커널 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21337
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge(Chromium 기반) 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21336
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge(Chromium 기반) 스푸핑 취약성
|
<
p class=”1″ style=”text-align: center;”>Azure Connected Machine Agent
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21329
|
<
p class=”1″ style=”text-align: center;”>Azure Connected Machine 에이전트 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Dynamics
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21328
|
<
p class=”1″ style=”text-align: center;”>Dynamics 365 Sales 스푸핑 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Dynamics
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21327
|
<
p class=”1″ style=”text-align: center;”>Microsoft Dynamics 365 Customer Engagement 교차 사이트 스크립팅 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21326
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge(Chromium 기반) 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Defender for Endpoint
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21315
|
<
p class=”1″ style=”text-align: center;”>엔드포인트용 Microsoft Defender 보호 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>.NET Framework
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21312
|
<
p class=”1″ style=”text-align: center;”>.NET Framework 서비스 거부 취약성
|
<
p class=”1″ style=”text-align: center;”>Trusted Compute Base
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-21304
|
<
p class=”1″ style=”text-align: center;”>Trusted Compute Base Elevation of Privilege Vulnerability
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-20721
|
<
p class=”1″ style=”text-align: center;”>Adobe Systems Incorporated: CVE-2024-20721 부적절한 입력 유효성 검사 서비스 거부 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-20709
|
<
p class=”1″ style=”text-align: center;”>Adobe Systems Incorporated: CVE-2024-20709 Javascript 구현 PDF 취약성
|
<
p class=”1″ style=”text-align: center;”>Skype for Business
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-20695
|
<
p class=”1″ style=”text-align: center;”>비즈니스용 Skype 정보 유출 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Hyper-V
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-20684
|
<
p class=”1″ style=”text-align: center;”>Windows Hyper-V 서비스 거부 취약성
|
<
p class=”1″ style=”text-align: center;”>Azure Stack
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-20679
|
<
p class=”1″ style=”text-align: center;”>Azure Stack Hub 스푸핑 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Office
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-20677
|
<
p class=”1″ style=”text-align: center;”>Microsoft Office 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-20675
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge(Chromium 기반) 보안 기능 우회 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Authentication Methods
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-20674
|
<
p class=”1″ style=”text-align: center;”>Windows Kerberos 보안 기능 바이패스 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Office
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-20673
|
<
p class=”1″ style=”text-align: center;”>Microsoft Office 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Azure DevOps
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-20667
|
<
p class=”1″ style=”text-align: center;”>Azure DevOps Server 원격 코드 실행 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows BitLocker
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-20666
|
<
p class=”1″ style=”text-align: center;”>BitLocker 보안 기능 우회 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Virtual Hard Drive
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-20658
|
<
p class=”1″ style=”text-align: center;”>Microsoft 가상 하드 디스크 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-1284
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2024-1284 Mojo에서 UaF(Use after free)
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-1283
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2024-1283 Skia에서 힙 버퍼 오버플로
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-1077
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2024-1077 네트워크에서 UaF(Use after free)
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-1060
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2024-1060 캔버스에서 UaF(Use after free)
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-1059
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2024-1059 WebRTC에서 UaF(Use after free)
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-0814
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2024-0814 결제에서 잘못된 보안 UI
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-0813
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2024-0813 읽기 모드에서 UaF(Use after free)
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-0812
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2024-0812 접근성에서 부적절한 구현
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-0811
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2024-0811 확장 API에서 부적절한 구현
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-0810
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2024-0810 DevTools에서 불충분한 정책 적용
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-0809
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2024-0809 자동 채우기에서 부적절한 구현
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-0808
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2024-0808 WebUI에서 정수 언더플로
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-0807
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2024-0807 WebAudio에서 UaF(Use after free)
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-0806
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2024-0806 Passwords에서 UaF(Use after free)
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-0805
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2024-0805 다운로드에서 부적절한 구현
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-0804
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2024-0804 iOS Security UI에서 불충분한 정책 적용
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-0519
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2024-0519 V8에서 범위를 벗어난 메모리 액세스
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-0518
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2024-0518 V8에서 유형 혼란
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-0517
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2024-0517 V8에서 범위를 벗어난 쓰기
|
<
p class=”1″ style=”text-align: center;”>Microsoft Edge (Chromium-based)
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-0333
|
<
p class=”1″ style=”text-align: center;”>Chromium: CVE-2024-0333 확장에서 불충분한 데이터 유효성 검사
|
<
p class=”1″ style=”text-align: center;”>.NET and Visual Studio
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-0057
|
<
p class=”1″ style=”text-align: center;”>.NET, .NET Framework, Visual Studio 보안 기능 바이패스 취약성
|
<
p class=”1″ style=”text-align: center;”>SQL Server
|
<
p class=”2″ style=”text-align: center;”>CVE-2024-0056
|
<
p class=”1″ style=”text-align: center;”>Microsoft.Data.SqlClient 및 System.Data.SqlClient SQL 데이터 공급자 보안 기능 바이패스 취약성
|
<
p class=”1″ style=”text-align: center;”>Role: DNS Server
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-50387
|
<
p class=”1″ style=”text-align: center;”>MITRE: CVE-2023-50387 DNS RRSIG 및 DNSKEY 유효성 검사를 악용하여 DNS 서버 리소스를 원격으로 이용할 수 있습니다.
|
<
p class=”1″ style=”text-align: center;”>ASP.NET
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36558
|
<
p class=”1″ style=”text-align: center;”>ASP.NET Core – 보안 기능 바이패스 취약성
|
<
p class=”1″ style=”text-align: center;”>.NET Framework
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36049
|
<
p class=”1″ style=”text-align: center;”>.NET, .NET Framework, Visual Studio 권한 상승 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Power Platform Connector
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36019
|
<
p class=”1″ style=”text-align: center;”>Microsoft Power Platform Connector 스푸핑 취약성
|
<
p class=”1″ style=”text-align: center;”>Visual Studio Code
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-36018
|
<
p class=”1″ style=”text-align: center;”>Visual Studio Code Jupyter 확장 스푸핑 취약성
|
<
p class=”1″ style=”text-align: center;”>Windows Secure Boot
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-24932
|
<
p class=”1″ style=”text-align: center;”>보안 부팅 보안 기능 우회 취약성
|
<
p class=”1″ style=”text-align: center;”>Microsoft Bluetooth Driver
|
<
p class=”2″ style=”text-align: center;”>CVE-2023-24023
|
<
p class=”1″ style=”text-align: center;”>Mitre: CVE-2023-24023 Bluetooth 취약성
|
<
p class=”1″ style=”text-align: center;”>Apps
|
<
p class=”2″ style=”text-align: center;”>CVE-2021-43890
|
<
p class=”1″ style=”text-align: center;”>Windows AppX 설치 관리자 스푸핑 취약성
|