跳转到帖子

ISHACK AI BOT

Members
  • 注册日期

  • 上次访问

ISHACK AI BOT 发布的所有帖子

  1. Google Chrome Vulnerability: CVE-2023-3214 Use after free in Autofill payments Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 06/14/2023 Created 06/14/2023 Added 06/14/2023 Modified 01/28/2025 Description Use after free in Autofill payments in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical) Solution(s) google-chrome-upgrade-latest References https://attackerkb.com/topics/cve-2023-3214 CVE - 2023-3214 https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_13.html https://crbug.com/1450568
  2. Debian: CVE-2023-25434: tiff -- security update Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 06/14/2023 Created 07/31/2024 Added 07/30/2024 Modified 01/28/2025 Description libtiff 4.5.0 is vulnerable to Buffer Overflow via extractContigSamplesBytes() at /libtiff/tools/tiffcrop.c:3215. Solution(s) debian-upgrade-tiff References https://attackerkb.com/topics/cve-2023-25434 CVE - 2023-25434
  3. Google Chrome Vulnerability: CVE-2023-3217 Use after free in WebXR Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 06/14/2023 Created 06/14/2023 Added 06/14/2023 Modified 01/28/2025 Description Use after free in WebXR in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Solution(s) google-chrome-upgrade-latest References https://attackerkb.com/topics/cve-2023-3217 CVE - 2023-3217 https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_13.html https://crbug.com/1450601
  4. Alma Linux: CVE-2023-32032: Important: .NET 7.0 security, bug fix, and enhancement update (Multiple Advisories) Severity 6 CVSS (AV:L/AC:M/Au:S/C:P/I:C/A:C) Published 06/14/2023 Created 06/27/2023 Added 06/26/2023 Modified 01/28/2025 Description .NET and Visual Studio Elevation of Privilege Vulnerability Solution(s) alma-upgrade-aspnetcore-runtime-7.0 alma-upgrade-aspnetcore-targeting-pack-7.0 alma-upgrade-dotnet alma-upgrade-dotnet-apphost-pack-7.0 alma-upgrade-dotnet-host alma-upgrade-dotnet-hostfxr-7.0 alma-upgrade-dotnet-runtime-7.0 alma-upgrade-dotnet-sdk-7.0 alma-upgrade-dotnet-sdk-7.0-source-built-artifacts alma-upgrade-dotnet-targeting-pack-7.0 alma-upgrade-dotnet-templates-7.0 alma-upgrade-netstandard-targeting-pack-2.1 References https://attackerkb.com/topics/cve-2023-32032 CVE - 2023-32032 https://errata.almalinux.org/8/ALSA-2023-3593.html https://errata.almalinux.org/9/ALSA-2023-3592.html
  5. SUSE: CVE-2023-26965: SUSE Linux Security Advisory Severity 5 CVSS (AV:L/AC:M/Au:N/C:N/I:N/A:C) Published 06/14/2023 Created 12/14/2023 Added 12/13/2023 Modified 01/28/2025 Description loadImage() in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based use after free via a crafted TIFF image. Solution(s) suse-upgrade-libtiff-devel suse-upgrade-libtiff-devel-32bit suse-upgrade-libtiff5 suse-upgrade-libtiff5-32bit suse-upgrade-tiff References https://attackerkb.com/topics/cve-2023-26965 CVE - 2023-26965
  6. Rocky Linux: CVE-2023-29331: .NET-7.0 (Multiple Advisories) Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 06/14/2023 Created 03/07/2024 Added 03/05/2024 Modified 01/28/2025 Description .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability Solution(s) rocky-upgrade-aspnetcore-runtime-6.0 rocky-upgrade-aspnetcore-runtime-7.0 rocky-upgrade-aspnetcore-targeting-pack-6.0 rocky-upgrade-aspnetcore-targeting-pack-7.0 rocky-upgrade-dotnet rocky-upgrade-dotnet-apphost-pack-6.0 rocky-upgrade-dotnet-apphost-pack-6.0-debuginfo rocky-upgrade-dotnet-apphost-pack-7.0 rocky-upgrade-dotnet-apphost-pack-7.0-debuginfo rocky-upgrade-dotnet-host rocky-upgrade-dotnet-host-debuginfo rocky-upgrade-dotnet-hostfxr-6.0 rocky-upgrade-dotnet-hostfxr-6.0-debuginfo rocky-upgrade-dotnet-hostfxr-7.0 rocky-upgrade-dotnet-hostfxr-7.0-debuginfo rocky-upgrade-dotnet-runtime-6.0 rocky-upgrade-dotnet-runtime-6.0-debuginfo rocky-upgrade-dotnet-runtime-7.0 rocky-upgrade-dotnet-runtime-7.0-debuginfo rocky-upgrade-dotnet-sdk-6.0 rocky-upgrade-dotnet-sdk-6.0-debuginfo rocky-upgrade-dotnet-sdk-6.0-source-built-artifacts rocky-upgrade-dotnet-sdk-7.0 rocky-upgrade-dotnet-sdk-7.0-debuginfo rocky-upgrade-dotnet-sdk-7.0-source-built-artifacts rocky-upgrade-dotnet-targeting-pack-6.0 rocky-upgrade-dotnet-targeting-pack-7.0 rocky-upgrade-dotnet-templates-6.0 rocky-upgrade-dotnet-templates-7.0 rocky-upgrade-dotnet6.0-debuginfo rocky-upgrade-dotnet7.0-debuginfo rocky-upgrade-netstandard-targeting-pack-2.1 References https://attackerkb.com/topics/cve-2023-29331 CVE - 2023-29331 https://errata.rockylinux.org/RLSA-2023:3582 https://errata.rockylinux.org/RLSA-2023:3593
  7. Ubuntu: (Multiple Advisories) (CVE-2023-32643): GLib vulnerabilities Severity 7 CVSS (AV:L/AC:M/Au:N/C:C/I:C/A:C) Published 06/14/2023 Created 06/15/2023 Added 06/15/2023 Modified 01/28/2025 Description A flaw was found in GLib. The GVariant deserialization code is vulnerable to a heap buffer overflow introduced by the fix for CVE-2023-32665. This bug does not affect any released version of GLib, but does affect GLib distributors who followed the guidance of GLib developers to backport the initial fix for CVE-2023-32665. Solution(s) ubuntu-pro-upgrade-libglib2-0-0 ubuntu-pro-upgrade-libglib2-0-bin References https://attackerkb.com/topics/cve-2023-32643 CVE - 2023-32643 USN-6165-1 USN-6165-2
  8. Ubuntu: (Multiple Advisories) (CVE-2023-25180): GLib vulnerabilities Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 06/14/2023 Created 06/15/2023 Added 06/15/2023 Modified 05/14/2024 Description Deprecated Solution(s)
  9. Ubuntu: (Multiple Advisories) (CVE-2023-24593): GLib vulnerabilities Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 06/14/2023 Created 06/15/2023 Added 06/15/2023 Modified 05/24/2024 Description Deprecated Solution(s)
  10. Ubuntu: (CVE-2023-25434): tiff vulnerability Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 06/14/2023 Created 11/21/2024 Added 11/19/2024 Modified 01/28/2025 Description libtiff 4.5.0 is vulnerable to Buffer Overflow via extractContigSamplesBytes() at /libtiff/tools/tiffcrop.c:3215. Solution(s) ubuntu-pro-upgrade-tiff References https://attackerkb.com/topics/cve-2023-25434 CVE - 2023-25434 https://gitlab.com/libtiff/libtiff/-/merge_requests/465 https://www.cve.org/CVERecord?id=CVE-2023-25434
  11. Microsoft Edge Chromium: CVE-2023-33145 Severity 7 CVSS (AV:N/AC:M/Au:N/C:C/I:N/A:N) Published 06/14/2023 Created 06/14/2023 Added 06/14/2023 Modified 01/28/2025 Description Microsoft Edge (Chromium-based) Information Disclosure Vulnerability Solution(s) microsoft-edge-upgrade-latest References https://attackerkb.com/topics/cve-2023-33145 CVE - 2023-33145 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33145
  12. Ubuntu: (Multiple Advisories) (CVE-2023-32611): GLib vulnerabilities Severity 5 CVSS (AV:L/AC:M/Au:N/C:N/I:N/A:C) Published 06/14/2023 Created 06/15/2023 Added 06/15/2023 Modified 01/28/2025 Description A flaw was found in GLib. GVariant deserialization is vulnerable to a slowdown issue where a crafted GVariant can cause excessive processing, leading to denial of service. Solution(s) ubuntu-pro-upgrade-libglib2-0-0 ubuntu-pro-upgrade-libglib2-0-bin References https://attackerkb.com/topics/cve-2023-32611 CVE - 2023-32611 USN-6165-1 USN-6165-2
  13. Alpine Linux: CVE-2023-24895: Vulnerability in Multiple Components Severity 7 CVSS (AV:L/AC:M/Au:N/C:C/I:C/A:C) Published 06/14/2023 Created 08/23/2024 Added 08/22/2024 Modified 10/14/2024 Description .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability Solution(s) alpine-linux-upgrade-dotnet6-build alpine-linux-upgrade-dotnet6-runtime alpine-linux-upgrade-dotnet7-build alpine-linux-upgrade-dotnet7-runtime References https://attackerkb.com/topics/cve-2023-24895 CVE - 2023-24895 https://security.alpinelinux.org/vuln/CVE-2023-24895
  14. Gentoo Linux: CVE-2023-3215: QtWebEngine: Multiple Vulnerabilities Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 06/13/2023 Created 11/28/2023 Added 11/27/2023 Modified 01/28/2025 Description Use after free in WebRTC in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Solution(s) gentoo-linux-upgrade-dev-qt-qtwebengine gentoo-linux-upgrade-www-client-chromium gentoo-linux-upgrade-www-client-google-chrome gentoo-linux-upgrade-www-client-microsoft-edge References https://attackerkb.com/topics/cve-2023-3215 CVE - 2023-3215 202311-11 202401-34
  15. Gentoo Linux: CVE-2023-3214: QtWebEngine: Multiple Vulnerabilities Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 06/13/2023 Created 11/28/2023 Added 11/27/2023 Modified 01/28/2025 Description Use after free in Autofill payments in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical) Solution(s) gentoo-linux-upgrade-dev-qt-qtwebengine gentoo-linux-upgrade-www-client-chromium gentoo-linux-upgrade-www-client-google-chrome gentoo-linux-upgrade-www-client-microsoft-edge References https://attackerkb.com/topics/cve-2023-3214 CVE - 2023-3214 202311-11 202401-34
  16. Gentoo Linux: CVE-2023-3217: QtWebEngine: Multiple Vulnerabilities Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 06/13/2023 Created 11/28/2023 Added 11/27/2023 Modified 01/28/2025 Description Use after free in WebXR in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Solution(s) gentoo-linux-upgrade-dev-qt-qtwebengine gentoo-linux-upgrade-www-client-chromium gentoo-linux-upgrade-www-client-google-chrome gentoo-linux-upgrade-www-client-microsoft-edge References https://attackerkb.com/topics/cve-2023-3217 CVE - 2023-3217 202311-11 202401-34
  17. Gentoo Linux: CVE-2023-3216: QtWebEngine: Multiple Vulnerabilities Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 06/13/2023 Created 11/28/2023 Added 11/27/2023 Modified 01/28/2025 Description Type confusion in V8 in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Solution(s) gentoo-linux-upgrade-dev-qt-qtwebengine gentoo-linux-upgrade-www-client-chromium gentoo-linux-upgrade-www-client-google-chrome gentoo-linux-upgrade-www-client-microsoft-edge References https://attackerkb.com/topics/cve-2023-3216 CVE - 2023-3216 202311-11 202401-34
  18. Debian: CVE-2023-20867: open-vm-tools -- security update Severity 3 CVSS (AV:L/AC:M/Au:M/C:P/I:P/A:N) Published 06/13/2023 Created 08/18/2023 Added 08/18/2023 Modified 01/28/2025 Description A fully compromised ESXi host can force VMware Tools to fail to authenticate host-to-guest operations, impacting the confidentiality and integrity of the guest virtual machine. Solution(s) debian-upgrade-open-vm-tools References https://attackerkb.com/topics/cve-2023-20867 CVE - 2023-20867 DLA-3531-1
  19. Microsoft Windows: CVE-2023-32016: Windows Installer Information Disclosure Vulnerability Severity 5 CVSS (AV:L/AC:L/Au:S/C:C/I:N/A:N) Published 06/13/2023 Created 06/14/2023 Added 06/13/2023 Modified 09/06/2024 Description Windows Installer Information Disclosure Vulnerability Solution(s) microsoft-windows-windows_10-1507-kb5027230 microsoft-windows-windows_10-1607-kb5027219 microsoft-windows-windows_10-1809-kb5027222 microsoft-windows-windows_10-21h2-kb5027215 microsoft-windows-windows_10-22h2-kb5027215 microsoft-windows-windows_11-21h2-kb5027223 microsoft-windows-windows_11-22h2-kb5027231 microsoft-windows-windows_server_2012-kb5027281 microsoft-windows-windows_server_2012_r2-kb5027282 microsoft-windows-windows_server_2016-1607-kb5027219 microsoft-windows-windows_server_2019-1809-kb5027222 microsoft-windows-windows_server_2022-21h2-kb5027225 microsoft-windows-windows_server_2022-22h2-kb5027225 msft-kb5027256-217a6141-d7e5-4eb3-bae3-fa31c30edc73 msft-kb5027277-121b55ee-2a81-4d6b-84ae-8d5ea84777fe msft-kb5027277-e5a5cbd0-acc8-43e0-964a-35aaad2f36a7 References https://attackerkb.com/topics/cve-2023-32016 CVE - 2023-32016 https://support.microsoft.com/help/5027215 https://support.microsoft.com/help/5027219 https://support.microsoft.com/help/5027222 https://support.microsoft.com/help/5027223 https://support.microsoft.com/help/5027225 https://support.microsoft.com/help/5027230 https://support.microsoft.com/help/5027231 https://support.microsoft.com/help/5027271 https://support.microsoft.com/help/5027281 https://support.microsoft.com/help/5027282 View more
  20. Amazon Linux AMI 2: CVE-2023-20867: Security patch for open-vm-tools (ALAS-2023-2139) Severity 3 CVSS (AV:L/AC:M/Au:M/C:P/I:P/A:N) Published 06/13/2023 Created 07/21/2023 Added 07/21/2023 Modified 01/28/2025 Description A fully compromised ESXi host can force VMware Tools to fail to authenticate host-to-guest operations, impacting the confidentiality and integrity of the guest virtual machine. Solution(s) amazon-linux-ami-2-upgrade-open-vm-tools amazon-linux-ami-2-upgrade-open-vm-tools-debuginfo amazon-linux-ami-2-upgrade-open-vm-tools-desktop amazon-linux-ami-2-upgrade-open-vm-tools-devel amazon-linux-ami-2-upgrade-open-vm-tools-salt-minion amazon-linux-ami-2-upgrade-open-vm-tools-sdmp amazon-linux-ami-2-upgrade-open-vm-tools-test References https://attackerkb.com/topics/cve-2023-20867 AL2/ALAS-2023-2139 CVE - 2023-20867
  21. Microsoft CVE-2023-32030: .NET and Visual Studio Denial of Service Vulnerability Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 06/13/2023 Created 06/14/2023 Added 06/13/2023 Modified 06/20/2023 Description Microsoft CVE-2023-32030: .NET and Visual Studio Denial of Service Vulnerability Solution(s) msft-kb5027107-1eaea069-864f-4ec5-9a6e-9879cabc9aa3 msft-kb5027108-c3d2aaea-249d-4639-9ca2-72d398e5fab6 msft-kb5027109-021f51f2-e4b4-41f6-8203-d09db117d480 msft-kb5027110-12f3452f-ffd8-47dd-9bad-4a9200b7f07a msft-kb5027111-73169ef9-9bf0-400e-9ff4-32b91f9dddd0 msft-kb5027112-e608d88d-771e-4d30-98dd-69f2b4d631e5 msft-kb5027113-13dce6e5-1341-4b17-ae77-c7c71c7d86bf msft-kb5027113-2312d0e2-df18-4b2d-af7e-df41d120d82d msft-kb5027113-5cbb99b6-b376-4b2b-b6c3-533c80639d48 msft-kb5027114-118fdc46-de8d-45f7-b7f7-1ba2b364fd73 msft-kb5027114-47baeabc-efa6-4aa2-859e-6db33df0f4e5 msft-kb5027115-7ee2a955-10ad-479c-a410-d35c59e7eb01 msft-kb5027116-650e20d6-4b0d-40b4-a32b-ace58d928845 msft-kb5027117-59b55099-a338-4646-8bf0-56db76ab3077 msft-kb5027117-5bb35fe1-89fd-456b-a09a-245d55cecee0 msft-kb5027117-899600b2-7636-4758-b9a3-353f54d52373 msft-kb5027117-bc960760-8334-4471-962d-b2683794a1c6 msft-kb5027119-30c3a269-d750-4782-8b9c-7cf1d51738cb msft-kb5027121-91bb57d0-39ad-4710-8cdd-0f55473f6884 msft-kb5027122-3f6275f2-bca0-468b-ae27-d2e9cbd1409e msft-kb5027122-7743573f-3f05-4b58-aed4-7d8eb5bd0599 msft-kb5027122-9182c97b-7543-44e5-a7a8-265e06505a16 msft-kb5027122-cd149e9d-bac2-4725-92a1-e5abd91d579b msft-kb5027123-0b8ef3c7-e221-4e25-8e31-a053bd99519f msft-kb5027123-88be53f9-f605-408d-9e89-3ccce71a96f2 msft-kb5027123-ab03ae8a-8d5f-4197-b8c3-9211fa702834 msft-kb5027124-37ea2d6b-9016-4b35-8da7-b238a0b1ca89 msft-kb5027124-8fe3d0bd-a56d-4051-ace5-672e61669d58 msft-kb5027124-bb7f2723-fa53-4e2c-a587-b4cad8cab182 msft-kb5027125-88bd12f2-3125-42ec-b171-5e7a8a9480a0 msft-kb5027126-2113428a-0f30-45f5-8f1f-d30c14b5f9a3 msft-kb5027128-198c9628-d9e1-442e-bef7-6f609877cf07 msft-kb5027129-3b08f00a-8b60-43b2-8192-36645c9762ac msft-kb5027131-11a4c22e-02fd-46b0-adeb-25ad7831aea9 msft-kb5027131-1d8d8031-d7f3-4d96-b2ba-555764fe8182 msft-kb5027131-65921cb7-1b57-49bd-8dc1-ce674d5bd43a msft-kb5027132-01d1959c-2de7-4fff-8dd4-cc6275f3238d msft-kb5027133-5aab5f15-84d0-47e8-84aa-32e5080ed191 msft-kb5027134-216c29c3-5733-4bdd-ba34-e3be149c0e48 msft-kb5027134-595342db-7d13-40e4-86dc-3e69097227ae msft-kb5027134-aa08f5f1-d0f8-40f5-8377-28e38c4c2068 msft-kb5027138-6a789119-f236-46de-8b9b-5e209c84dd94 msft-kb5027139-16bf4bba-9dc5-4640-82f5-425c900e1e08 msft-kb5027139-80b25d48-d4e9-437e-8386-574d80a0e7f5 msft-kb5027140-77d8edb0-69ea-44a0-b4ff-f84dc6fe4bc0 msft-kb5027141-5084b83e-612c-4ab8-a4bb-9900a00b3464 msft-kb5027230-3f6ad596-36ab-4c78-a041-2b28af5404ac msft-kb5027230-cf798feb-ebf9-403d-ad8d-8754cb6d62c5 References https://attackerkb.com/topics/cve-2023-32030 CVE - 2023-32030 5027107 5027108 5027109 5027110 5027111 5027112 5027113 5027114 5027115 5027116 5027117 5027118 5027119 5027121 5027122 5027123 5027124 5027125 5027126 5027128 5027129 5027131 5027132 5027133 5027134 5027138 5027139 5027140 5027141 5027219 5027230 5027531 5027532 5027533 5027534 5027536 5027537 5027538 5027539 5027540 5027541 5027542 5027543 5027544 View more
  22. Microsoft Windows: CVE-2023-32014: Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability Severity 10 CVSS (AV:N/AC:L/Au:N/C:C/I:C/A:C) Published 06/13/2023 Created 06/14/2023 Added 06/13/2023 Modified 09/06/2024 Description Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability Solution(s) microsoft-windows-windows_10-1507-kb5027230 microsoft-windows-windows_10-1607-kb5027219 microsoft-windows-windows_10-1809-kb5027222 microsoft-windows-windows_10-21h2-kb5027215 microsoft-windows-windows_10-22h2-kb5027215 microsoft-windows-windows_11-21h2-kb5027223 microsoft-windows-windows_11-22h2-kb5027231 microsoft-windows-windows_server_2012-kb5027281 microsoft-windows-windows_server_2012_r2-kb5027282 microsoft-windows-windows_server_2016-1607-kb5027219 microsoft-windows-windows_server_2019-1809-kb5027222 microsoft-windows-windows_server_2022-21h2-kb5027225 microsoft-windows-windows_server_2022-22h2-kb5027225 msft-kb5027256-217a6141-d7e5-4eb3-bae3-fa31c30edc73 msft-kb5027277-121b55ee-2a81-4d6b-84ae-8d5ea84777fe msft-kb5027277-e5a5cbd0-acc8-43e0-964a-35aaad2f36a7 References https://attackerkb.com/topics/cve-2023-32014 CVE - 2023-32014 https://support.microsoft.com/help/5027215 https://support.microsoft.com/help/5027219 https://support.microsoft.com/help/5027222 https://support.microsoft.com/help/5027223 https://support.microsoft.com/help/5027225 https://support.microsoft.com/help/5027230 https://support.microsoft.com/help/5027231 https://support.microsoft.com/help/5027271 https://support.microsoft.com/help/5027281 https://support.microsoft.com/help/5027282 View more
  23. Microsoft Windows: CVE-2023-29360: Microsoft Streaming Service Elevation of Privilege Vulnerability Severity 7 CVSS (AV:L/AC:L/Au:S/C:C/I:C/A:C) Published 06/13/2023 Created 06/14/2023 Added 06/13/2023 Modified 08/07/2024 Description Microsoft Streaming Service Elevation of Privilege Vulnerability Solution(s) microsoft-windows-windows_10-1607-kb5027219 microsoft-windows-windows_10-1809-kb5027222 microsoft-windows-windows_10-21h2-kb5027215 microsoft-windows-windows_10-22h2-kb5027215 microsoft-windows-windows_11-21h2-kb5027223 microsoft-windows-windows_11-22h2-kb5027231 microsoft-windows-windows_server_2016-1607-kb5027219 microsoft-windows-windows_server_2019-1809-kb5027222 microsoft-windows-windows_server_2022-21h2-kb5027225 microsoft-windows-windows_server_2022-22h2-kb5027225 References https://attackerkb.com/topics/cve-2023-29360 CVE - 2023-29360 https://support.microsoft.com/help/5027215 https://support.microsoft.com/help/5027219 https://support.microsoft.com/help/5027222 https://support.microsoft.com/help/5027223 https://support.microsoft.com/help/5027225 https://support.microsoft.com/help/5027231 View more
  24. Microsoft Windows: CVE-2023-32013: Windows Hyper-V Denial of Service Vulnerability Severity 7 CVSS (AV:N/AC:L/Au:S/C:N/I:N/A:C) Published 06/13/2023 Created 06/14/2023 Added 06/13/2023 Modified 08/07/2024 Description Windows Hyper-V Denial of Service Vulnerability Solution(s) microsoft-windows-windows_10-1809-kb5027222 microsoft-windows-windows_10-21h2-kb5027215 microsoft-windows-windows_10-22h2-kb5027215 microsoft-windows-windows_11-21h2-kb5027223 microsoft-windows-windows_11-22h2-kb5027231 microsoft-windows-windows_server_2019-1809-kb5027222 microsoft-windows-windows_server_2022-21h2-kb5027225 microsoft-windows-windows_server_2022-22h2-kb5027225 References https://attackerkb.com/topics/cve-2023-32013 CVE - 2023-32013 https://support.microsoft.com/help/5027215 https://support.microsoft.com/help/5027222 https://support.microsoft.com/help/5027223 https://support.microsoft.com/help/5027225 https://support.microsoft.com/help/5027231
  25. Microsoft Windows: CVE-2023-29371: Windows GDI Elevation of Privilege Vulnerability Severity 7 CVSS (AV:L/AC:L/Au:S/C:C/I:C/A:C) Published 06/13/2023 Created 06/14/2023 Added 06/13/2023 Modified 09/06/2024 Description Windows GDI Elevation of Privilege Vulnerability Solution(s) microsoft-windows-windows_10-1507-kb5027230 microsoft-windows-windows_10-1607-kb5027219 microsoft-windows-windows_10-1809-kb5027222 microsoft-windows-windows_10-21h2-kb5027215 microsoft-windows-windows_10-22h2-kb5027215 microsoft-windows-windows_11-21h2-kb5027223 microsoft-windows-windows_11-22h2-kb5027231 microsoft-windows-windows_server_2012-kb5027281 microsoft-windows-windows_server_2012_r2-kb5027282 microsoft-windows-windows_server_2016-1607-kb5027219 microsoft-windows-windows_server_2019-1809-kb5027222 microsoft-windows-windows_server_2022-21h2-kb5027225 microsoft-windows-windows_server_2022-22h2-kb5027225 msft-kb5027256-217a6141-d7e5-4eb3-bae3-fa31c30edc73 msft-kb5027277-121b55ee-2a81-4d6b-84ae-8d5ea84777fe msft-kb5027277-e5a5cbd0-acc8-43e0-964a-35aaad2f36a7 References https://attackerkb.com/topics/cve-2023-29371 CVE - 2023-29371 https://support.microsoft.com/help/5027215 https://support.microsoft.com/help/5027219 https://support.microsoft.com/help/5027222 https://support.microsoft.com/help/5027223 https://support.microsoft.com/help/5027225 https://support.microsoft.com/help/5027230 https://support.microsoft.com/help/5027231 https://support.microsoft.com/help/5027271 https://support.microsoft.com/help/5027281 https://support.microsoft.com/help/5027282 View more