Дата обнаружения
|
10/10/2023 |
Уровень угрозы
|
Critical |
Описание
|
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions, obtain sensitive information, gain privileges. Below is a complete list of vulnerabilities:
|
Эксплуатация
|
Public exploits exist for this vulnerability. Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details. |
Пораженные продукты
|
Windows Server 2008 for x64-based Systems Service Pack 2 |
Решение
|
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel) |
Первичный источник обнаружения
|
CVE-2023-36722 CVE-2023-41770 CVE-2023-36591 CVE-2023-36582 CVE-2023-36585 CVE-2023-35349 CVE-2023-36564 CVE-2023-36438 CVE-2023-36570 CVE-2023-36571 CVE-2023-36732 CVE-2023-41766 CVE-2023-36583 CVE-2023-36434 CVE-2023-36731 CVE-2023-41773 CVE-2023-41774 CVE-2023-36697 CVE-2023-36578 CVE-2023-36593 CVE-2023-36724 CVE-2023-36573 CVE-2023-36572 CVE-2023-36589 CVE-2023-36590 CVE-2023-36602 CVE-2023-36436 CVE-2023-36726 CVE-2023-36702 CVE-2023-36575 CVE-2023-36776 CVE-2023-38166 CVE-2023-36703 CVE-2023-29348 CVE-2023-36584 CVE-2023-36431 CVE-2023-36598 CVE-2023-36713 CVE-2023-41765 CVE-2023-36743 CVE-2023-36579 CVE-2023-36790 CVE-2023-36574 CVE-2023-41769 CVE-2023-36563 CVE-2023-36710 CVE-2023-36606 CVE-2023-36594 CVE-2023-36706 CVE-2023-41768 CVE-2023-41767 CVE-2023-36577 CVE-2023-36581 CVE-2023-36712 CVE-2023-36567 CVE-2023-41771 CVE-2023-36592 CVE-2023-36729 CVE-2023-36596 CVE-2023-36701 CVE-2023-36707 CVE-2023-36711 |
Оказываемое влияние
?
|
ACE
[?]
OSI
[?]
DoS
[?]
SB
[?]
PE
[?]
|
Связанные продукты
|
Microsoft Windows Microsoft Windows Server Microsoft Windows Server 2012 Microsoft Windows Server 2008 |
CVE-IDS
|
CVE-2023-365827.3High
CVE-2023-365857.5Critical CVE-2023-353499.8Critical CVE-2023-365646.5High CVE-2023-365717.3High CVE-2023-364387.5Critical CVE-2023-367327.8Critical CVE-2023-365837.3High CVE-2023-367317.8Critical CVE-2023-417748.1Critical CVE-2023-367245.5High CVE-2023-365907.3High CVE-2023-366027.5Critical CVE-2023-364367.8Critical CVE-2023-367037.5Critical CVE-2023-381668.1Critical CVE-2023-293486.5High CVE-2023-417658.1Critical CVE-2023-367437.8Critical CVE-2023-365797.5Critical CVE-2023-367017.8Critical CVE-2023-365778.8Critical CVE-2023-365817.5Critical CVE-2023-367127.8Critical CVE-2023-365677.5Critical CVE-2023-417718.1Critical CVE-2023-367224.4Warning CVE-2023-367297.8Critical CVE-2023-417708.1Critical CVE-2023-367117.8Critical CVE-2023-365707.3High CVE-2023-417667.8Critical CVE-2023-364349.8Critical CVE-2023-417738.1Critical CVE-2023-366976.8High CVE-2023-365937.8Critical CVE-2023-365787.3High CVE-2023-365737.3High CVE-2023-365727.3High CVE-2023-365897.3High CVE-2023-367267.8Critical CVE-2023-367027.8Critical CVE-2023-365757.3High CVE-2023-367076.5High CVE-2023-367767.0High CVE-2023-365845.4High CVE-2023-364317.5Critical CVE-2023-367135.5High CVE-2023-365987.8Critical CVE-2023-365747.3High CVE-2023-417698.1Critical CVE-2023-365636.5High CVE-2023-367107.8Critical CVE-2023-366067.5Critical CVE-2023-365947.8Critical CVE-2023-367066.5High CVE-2023-365967.5Critical CVE-2023-417688.1Critical CVE-2023-417678.1Critical CVE-2023-365917.3High CVE-2023-365927.3High CVE-2023-367907.8Critical |
KB list
|
5031407 |