Description
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to cause denial of service, gain privileges, obtain sensitive information, bypass security restrictions.
Below is a complete list of vulnerabilities:
- A denial of service vulnerability in Windows TCP/IP can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
- An information disclosure vulnerability in DHCP Server Service can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows GDI can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows TCP/IP can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in Windows MSHTML Platform can be exploited remotely to bypass security restrictions.
- A denial of service vulnerability in DHCP Server Service can be exploited remotely to cause denial of service.
Fiches de renseignement originales
- CVE-2023-38141
- CVE-2023-36801
- CVE-2023-36804
- CVE-2023-38160
- CVE-2023-38143
- CVE-2023-38144
- CVE-2023-38152
- CVE-2023-38161
- CVE-2023-38142
- CVE-2023-38139
- CVE-2023-36805
- CVE-2023-38162
Exploitation
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Produits associés
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-Server-2008
Liste CVE
- CVE-2023-38149 critical
- CVE-2023-38141 critical
- CVE-2023-36801 high
- CVE-2023-36804 critical
- CVE-2023-38160 high
- CVE-2023-38143 critical
- CVE-2023-38144 critical
- CVE-2023-38152 high
- CVE-2023-38161 critical
- CVE-2023-38142 critical
- CVE-2023-38139 critical
- CVE-2023-38162 critical
- CVE-2023-36805 high
Liste KB
En savoir plus
Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com
Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !