Дата обнаружения
|
14/11/2023 |
Уровень угрозы
|
Critical |
Описание
|
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to bypass security restrictions, cause denial of service, execute arbitrary code, gain privileges, obtain sensitive information. Below is a complete list of vulnerabilities:
|
Эксплуатация
|
Public exploits exist for this vulnerability. Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details. |
Пораженные продукты
|
Windows Server 2012 (Server Core installation) |
Решение
|
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel) |
Первичный источник обнаружения
|
CVE-2023-36025 CVE-2023-36392 CVE-2023-36017 CVE-2023-36393 CVE-2023-36705 CVE-2023-36423 CVE-2023-36398 CVE-2023-36425 CVE-2023-36395 CVE-2023-36401 CVE-2023-36036 CVE-2023-36428 CVE-2023-36402 CVE-2023-36719 CVE-2023-36424 CVE-2023-36403 CVE-2023-36397 |
Оказываемое влияние
?
|
ACE
[?]
OSI
[?]
DoS
[?]
SB
[?]
PE
[?]
|
Связанные продукты
|
Microsoft Windows Microsoft Windows Server Microsoft Windows Server 2012 Microsoft Windows Server 2008 |
CVE-IDS
|
CVE-2023-360255.0Warning
CVE-2023-363925.0Warning CVE-2023-360175.0Warning CVE-2023-364235.0Warning CVE-2023-367055.0Warning CVE-2023-363985.0Warning CVE-2023-364255.0Warning CVE-2023-363955.0Warning CVE-2023-363935.0Warning CVE-2023-364015.0Warning CVE-2023-360365.0Warning CVE-2023-364285.0Warning CVE-2023-364025.0Warning CVE-2023-367195.0Warning CVE-2023-364245.0Warning CVE-2023-364035.0Warning CVE-2023-363975.0Warning |
KB list
|