Description
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to cause denial of service, gain privileges, obtain sensitive information, bypass security restrictions, execute arbitrary code.
Below is a complete list of vulnerabilities:
- A denial of service vulnerability in Windows TCP/IP can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
- An information disclosure vulnerability in DHCP Server Service can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows GDI can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows TCP/IP can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
- A denial of service vulnerability in DHCP Server Service can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Cloud Files Mini Filter Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Microsoft Streaming Service Proxy can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in Windows MSHTML Platform can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Windows Miracast Wireless Display can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Internet Connection Sharing (ICS) can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Themes can be exploited remotely to execute arbitrary code.
- A heap buffer overflow vulnerability in WebP can be exploited to cause denial of service.
Original advisories
- CVE-2023-35355
- CVE-2023-38141
- CVE-2023-36802
- CVE-2023-36804
- CVE-2023-38160
- CVE-2023-38143
- CVE-2023-38144
- CVE-2023-38150
- CVE-2023-38152
- CVE-2023-38142
- CVE-2023-38149
- CVE-2023-36803
- CVE-2023-36805
- CVE-2023-38140
- CVE-2023-38147
- CVE-2023-36801
- CVE-2023-38148
- CVE-2023-38146
- CVE-2023-38161
- CVE-2023-38139
- CVE-2023-4863
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
- Microsoft-Windows-11
CVE list
- CVE-2023-4863 critical
- CVE-2023-38149 critical
- CVE-2023-38141 critical
- CVE-2023-36801 high
- CVE-2023-36804 critical
- CVE-2023-38160 high
- CVE-2023-38143 critical
- CVE-2023-38144 critical
- CVE-2023-38152 high
- CVE-2023-38161 critical
- CVE-2023-38142 critical
- CVE-2023-38139 critical
- CVE-2023-38162 critical
- CVE-2023-35355 critical
- CVE-2023-36802 critical
- CVE-2023-38150 critical
- CVE-2023-36803 high
- CVE-2023-36805 high
- CVE-2023-38140 high
- CVE-2023-38147 critical
- CVE-2023-38148 critical
- CVE-2023-38146 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!