Saturday, November 18, 2023
HomeCyber SecurityA November rain of patches from Microsoft – Sophos Information

A November rain of patches from Microsoft – Sophos Information


Microsoft on Tuesday launched patches for 57 vulnerabilities, together with 31 for Home windows. Eleven different product teams are additionally affected. Of the 57 CVEs addressed, simply 3 are thought of Essential in severity; 2 of these are in Home windows, whereas the third falls in Azure. One CVE, an Essential-severity elevation-of-privilege situation (CVE-2023-36049), impacts each .NET and Visible Studio; one other Essential-severity EoP impacts .NET, Visible Studio, and likewise ASP.NET.

At press time, three Home windows points are identified to be beneath exploit within the wild. (Or, relying on the way you depend these items, there are 4, as we’ll focus on within the Notable November Updates part under.) A further 10 vulnerabilities in Home windows, Alternate, Workplace, and SharePoint are by the corporate’s estimation extra more likely to be exploited within the subsequent 30 days, with the Workplace vulnerability (CVE-2023-36413, a safety characteristic bypass) publicly disclosed already.

Along with the 57 CVEs, Microsoft lists one official advisory, ADV990001, which covers their newest servicing stack updates. Nevertheless, the record of information-only advisories is intensive this month. Along with 21 CVEs affecting Edge/Chromium (six of these Edge-specific), there may be data on an industry-wide situation affecting BlueTooth; an HTTP/2-related situation, at present beneath energetic exploit within the wild, touching Home windows, ASP.NET, .NET and Visible Studio; 5 CBL-Mariner-related issued lined by CVEs from Kubernetes, Crimson Hat, and MITRE; 17 Adobe-issued patches for Acrobat Reader, and 7 extra patches from Adobe for ColdFusion.

We don’t embrace these 53 points within the CVE counts and graphics under, however we’ll present data on every thing in an appendix on the finish of the article. We’re as standard together with on the finish of this publish three appendices itemizing all Microsoft’s patches, sorted by severity, by predicted exploitability, and by product household.

Along with all of this, Home windows Server 2022, 23H2 Version (Server Core set up) is launched as a part of this replace.

By the numbers

  • Whole Microsoft CVEs: 57
  • Whole Microsoft advisories delivery in replace: 1
  • Whole different advisory points lined in replace: 52
  • Publicly disclosed: 3
  • Exploited: 3 plus one in non-Microsoft advisory situation
  • Severity
    • Essential: 3
    • Essential: 54
  • Influence
    • Elevation of Privilege: 17
    • Distant Code Execution: 16
    • Spoofing: 9
    • Info Disclosure: 6
    • Safety Function Bypass: 5
    • Denial of Service: 4

A bar chart showing the impact and severity of November 2023's patches; the same information is given in the text

Determine 1: This month elevation of privilege points have been barely extra prevalent than distant code execution for a change; spoofing additionally makes a robust exhibiting

Merchandise

  • Home windows: 31
  • Dynamics 365: 5
  • Alternate: 4
  • Workplace: 4
  • Visible Studio: 4, together with one shared with .NET and one shared with ASP.NET and .NET
  • ASP.NET: 3, together with one shared with .NET and Visible Studio
  • Azure: 3
  • .NET: 2 (one shared with Visible Studio and one shared with ASP.NET and Visible Studio)
  • Defender: 1
  • Host Integration Server: 1
  • On-Premises Information Gateway: 1
  • SharePoint: 1

A bar chart showing the products affected by November 2023's patches; the same information is given in the text

Determine 2: Home windows as standard takes the lion’s share of patches in November, however there’s a reasonably vast number of extra specialised merchandise affected. (Within the case of patches touching a couple of product, every occasion is represented on this chart; as an illustration, CVE-2023-36049, which impacts each Visible Studio and .NET, is counted as soon as for every of the 2)

Notable November updates

Along with the problems mentioned above, a number of fascinating objects current themselves.

CVE-2023-36025 — Home windows SmartScreen Safety Function Bypass Vulnerability

There are three Home windows CVEs this month for which energetic exploitation has been detected within the wild. (Or 4; extra on that in a minute.) This one, an Essential-class safety characteristic bypass, has the very best CVSS base and temporal scores (Base 8.8 / Temporal 8.2) of the trio. All it takes is a malicious URL, and the attacker is ready to bypass Home windows Defender SmartScreen checks and the prompts the person would anticipate to see with these.

CVE-2023-36397 — Home windows Pragmatic Basic Multicast (PGM) Distant Code Execution Vulnerability

Is message queuing enabled in your system? This vulnerability, which will be triggered by an attacker sending a maliciously crafted file over the community, is critical-severity (CVSS 3.1 9.8/8.5) and might result in RCE. Along with the opposite protections launched for this, Microsoft notes that customers can verify their publicity by checking to see if the service known as Message Queuing is working, and if TCP port 1801 is in listening mode.

CVE-2020-8554, CVE-2023-46753, CVE-2023-46316, CVE-2020-14343, CVE-2020-1747 (5 CVEs)

These 5 CVEs aren’t a part of Microsoft’s official launch, however nobody utilizing Microsoft’s CBL-Mariner (Widespread Base Linux Mariner) ought to sleep on them. CBL-Mariner is Microsoft’s personal Linux distro; first developed in-house for inner improvement and Azure administration. The distro was quietly made publicly out there to the general public final 12 months. Not one of the three CVEs are instantly from Microsoft, however from Kubernetes (CVE-2020-8554), Crimson Hat (CVE-2020-14343, CVE-2020-1747), and MITRE (CVE-2023-46316, CVE-2023-46753). Because of the obvious age of a number of of those CVEs and their severity – three of the 5 have a CVSS base rating of 9.8 out of 10 – customers are inspired to maintain themselves updated.

CVE-2023-24023 — MITRE: CVE-2023-24023 Bluetooth Spoofing Vulnerability
CVE-2023-44487 — MITRE: CVE-2023-44487 HTTP/2 Fast Reset Assault

Talking of MITRE, the group options in two extra CVEs about which Microsoft is publishing data. As one would anticipate, the MITRE CVEs are relevant for a lot of corporations, not solely Microsoft. CVE-2023-24023 covers an important-severity spoofing vulnerability reported to BlueTooth’s governing physique. As for CVE-2023-44487, this CVE makes an uncommon repeat look on the Patch Tuesday roster; readers might keep in mind that we mentioned this Fast Reset situation in final month’s roundup. It impacts Home windows, ASP.NET, .NET, and Visible Studio.

A bar chart showing the cumulative totals of Microsoft's 2023 patches

Determine 3: With one month to go in 2023, the tally of distant code execution patches releases reaches 300. In the meantime, it’s barely seen, however the 12 months’s first critical-level information-disclosure situation reveals on the chart

Sophos protections

CVE Sophos Intercept X/Endpoint IPS Sophos XGS Firewall
CVE-2023-36033 Exp/2336033-A Exp/2336033-A
CVE-2023-36036 Exp/2336036-A Exp/2336036-A
CVE-2023-36394 Exp/2336394 Exp/2336394
CVE-2023-36399 Exp/2336399-A Exp/2336399-A
CVE-2023-36413 sid:2309050 sid:2309050
CVE-2023-36424 Exp/2336424-A Exp/2336424-A

 

As you’ll be able to each month, in case you don’t wish to wait in your system to tug down Microsoft’s updates itself, you’ll be able to obtain them manually from the Home windows Replace Catalog web site. Run the winver.exe software to find out which construct of Home windows 10 or 11 you’re working, then obtain the Cumulative Replace package deal in your particular system’s structure and construct quantity.

Appendix A: Vulnerability Influence and Severity

It is a record of November’s patches sorted by impression, then sub-sorted by severity. Every record is additional organized by CVE.

Elevation of Privilege (17 CVEs)

Essential severity
CVE-2023-36400 Home windows HMAC Key Derivation Elevation of Privilege Vulnerability
Essential severity
CVE-2023-36033 Home windows DWM Core Library Elevation of Privilege Vulnerability
CVE-2023-36036 Home windows Cloud Information Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2023-36047 Home windows Authentication Elevation of Privilege Vulnerability
CVE-2023-36049 .NET, .NET Framework, and Visible Studio Elevation of Privilege Vulnerability
CVE-2023-36394 Home windows Search Service Elevation of Privilege Vulnerability
CVE-2023-36399 Home windows Storage Elevation of Privilege Vulnerability
CVE-2023-36403 Home windows Kernel Elevation of Privilege Vulnerability
CVE-2023-36405 Home windows Kernel Elevation of Privilege Vulnerability
CVE-2023-36407 Home windows Hyper-V Elevation of Privilege Vulnerability
CVE-2023-36408 Home windows Hyper-V Elevation of Privilege Vulnerability
CVE-2023-36422 Microsoft Home windows Defender Elevation of Privilege Vulnerability
CVE-2023-36424 Home windows Widespread Log File System Driver Elevation of Privilege Vulnerability
CVE-2023-36427 Home windows Hyper-V Elevation of Privilege Vulnerability
CVE-2023-36558 ASP.NET Core – Safety Function Bypass Vulnerability
CVE-2023-36705 Home windows Installer Elevation of Privilege Vulnerability
CVE-2023-36719 Microsoft Speech Software Programming Interface (SAPI) Elevation of Privilege Vulnerability

 

Distant Code Execution (16 CVEs)

Essential severity
CVE-2023-36397 Home windows Pragmatic Basic Multicast (PGM) Distant Code Execution Vulnerability
Essential severity
CVE-2023-36017 Home windows Scripting Engine Reminiscence Corruption Vulnerability
CVE-2023-36028 Microsoft Protected Extensible Authentication Protocol (PEAP) Distant Code Execution Vulnerability
CVE-2023-36041 Microsoft Excel Distant Code Execution Vulnerability
CVE-2023-36042 Visible Studio Denial of Service Vulnerability
CVE-2023-36045 Microsoft Workplace Graphics Distant Code Execution Vulnerability
CVE-2023-36393 Home windows Consumer Interface Software Core Distant Code Execution Vulnerability
CVE-2023-36396 Home windows Compressed Folder Distant Code Execution Vulnerability
CVE-2023-36401 Microsoft Distant Registry Service Distant Code Execution Vulnerability
CVE-2023-36402 Microsoft WDAC OLE DB supplier for SQL Server Distant Code Execution Vulnerability
CVE-2023-36423 Microsoft Distant Registry Service Distant Code Execution Vulnerability
CVE-2023-36425 Home windows Distributed File System (DFS) Distant Code Execution Vulnerability
CVE-2023-36437 Azure DevOps Server Distant Code Execution Vulnerability
CVE-2023-36439 Microsoft Alternate Server Distant Code Execution Vulnerability
CVE-2023-38151 Microsoft Host Integration Server 2020 Distant Code Execution Vulnerability
CVE-2023-38177 Microsoft SharePoint Server Distant Code Execution Vulnerability

 

Spoofing (9 CVEs)

Essential severity
CVE-2023-36007 Microsoft Ship Buyer Voice survey from Dynamics 365 Spoofing Vulnerability
CVE-2023-36016 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
CVE-2023-36018 Visible Studio Code Jupyter Extension Spoofing Vulnerability
CVE-2023-36030 Microsoft Dynamics 365 Gross sales Spoofing Vulnerability
CVE-2023-36031 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
CVE-2023-36035 Microsoft Alternate Server Spoofing Vulnerability
CVE-2023-36039 Microsoft Alternate Server Spoofing Vulnerability
CVE-2023-36050 Microsoft Alternate Server Spoofing Vulnerability
CVE-2023-36410 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

 

Info Disclosure (6 CVEs)

Essential severity
CVE-2023-36052 Azure CLI REST Command Info Disclosure Vulnerability
Essential severity
CVE-2023-36043 Open Administration Infrastructure Info Disclosure Vulnerability
CVE-2023-36398 Home windows NTFS Info Disclosure Vulnerability
CVE-2023-36404 Home windows Kernel Info Disclosure Vulnerability
CVE-2023-36406 Home windows Hyper-V Info Disclosure Vulnerability
CVE-2023-36428 Microsoft Native Safety Authority Subsystem Service Info Disclosure Vulnerability

 

Safety Function Bypass (5 CVEs)

Essential severity
CVE-2023-36021 Microsoft Host Integration Server 2020 Safety Function Bypass Vulnerability
CVE-2023-36025 Home windows SmartScreen Safety Function Bypass Vulnerability
CVE-2023-36037 Microsoft Excel Safety Function Bypass Vulnerability
CVE-2023-36413 Microsoft Workplace Safety Function Bypass Vulnerability
CVE-2023-36560 ASP.NET Safety Function Bypass Vulnerability

 

Denial of Service (4 CVE)

Essential severity
CVE-2023-36038 ASP.NET Core Denial of Service Vulnerability
CVE-2023-36046 Home windows Authentication Denial of Service Vulnerability
CVE-2023-36392 DHCP Server Service Denial of Service Vulnerability
CVE-2023-36395 Home windows Deployment Providers Denial of Service Vulnerability

 

 

Appendix B: Exploitability

It is a record of the November CVEs judged by Microsoft to be extra more likely to be exploited within the wild throughout the first 30 days post-release, in addition to these already identified to be beneath exploit. Every record is additional organized by CVE.

Exploitation detected
CVE-2023-36025 Home windows SmartScreen Safety Function Bypass Vulnerability
CVE-2023-36033 Home windows DWM Core Library Elevation of Privilege Vulnerability
CVE-2023-36036 Home windows Cloud Information Mini Filter Driver Elevation of Privilege Vulnerability
Exploitation extra doubtless inside 30 days
CVE-2023-36017 Home windows Scripting Engine Reminiscence Corruption Vulnerability
CVE-2023-36035 Microsoft Alternate Server Spoofing Vulnerability
CVE-2023-36039 Microsoft Alternate Server Spoofing Vulnerability
CVE-2023-36050 Microsoft Alternate Server Spoofing Vulnerability
CVE-2023-36394 Home windows Search Service Elevation of Privilege Vulnerability
CVE-2023-36399 Home windows Storage Elevation of Privilege Vulnerability
CVE-2023-36413 Microsoft Workplace Safety Function Bypass Vulnerability
CVE-2023-36424 Home windows Widespread Log File System Driver Elevation of Privilege Vulnerability
CVE-2023-36439 Microsoft Alternate Server Distant Code Execution Vulnerability
CVE-2023-38177 Microsoft SharePoint Server Distant Code Execution Vulnerability

 

 

Appendix C: Merchandise Affected

It is a record of November’s patches sorted by product household, then sub-sorted by severity. Every record is additional organized by CVE. Patches which might be shared amongst a number of product households are listed a number of instances, as soon as for every product household.

Home windows (29 CVEs)

Essential severity
CVE-2023-36397 Home windows Pragmatic Basic Multicast (PGM) Distant Code Execution Vulnerability
CVE-2023-36400 Home windows HMAC Key Derivation Elevation of Privilege Vulnerability
Essential severity
CVE-2023-36017 Home windows Scripting Engine Reminiscence Corruption Vulnerability
CVE-2023-36025 Home windows SmartScreen Safety Function Bypass Vulnerability
CVE-2023-36028 Microsoft Protected Extensible Authentication Protocol (PEAP) Distant Code Execution Vulnerability
CVE-2023-36033 Home windows DWM Core Library Elevation of Privilege Vulnerability
CVE-2023-36036 Home windows Cloud Information Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2023-36046 Home windows Authentication Denial of Service Vulnerability
CVE-2023-36047 Home windows Authentication Elevation of Privilege Vulnerability
CVE-2023-36392 DHCP Server Service Denial of Service Vulnerability
CVE-2023-36393 Home windows Consumer Interface Software Core Distant Code Execution Vulnerability
CVE-2023-36394 Home windows Search Service Elevation of Privilege Vulnerability
CVE-2023-36395 Home windows Deployment Providers Denial of Service Vulnerability
CVE-2023-36396 Home windows Compressed Folder Distant Code Execution Vulnerability
CVE-2023-36398 Home windows NTFS Info Disclosure Vulnerability
CVE-2023-36399 Home windows Storage Elevation of Privilege Vulnerability
CVE-2023-36401 Microsoft Distant Registry Service Distant Code Execution Vulnerability
CVE-2023-36402 Microsoft WDAC OLE DB supplier for SQL Server Distant Code Execution Vulnerability
CVE-2023-36403 Home windows Kernel Elevation of Privilege Vulnerability
CVE-2023-36404 Home windows Kernel Info Disclosure Vulnerability
CVE-2023-36405 Home windows Kernel Elevation of Privilege Vulnerability
CVE-2023-36406 Home windows Hyper-V Info Disclosure Vulnerability
CVE-2023-36407 Home windows Hyper-V Elevation of Privilege Vulnerability
CVE-2023-36408 Home windows Hyper-V Elevation of Privilege Vulnerability
CVE-2023-36423 Microsoft Distant Registry Service Distant Code Execution Vulnerability
CVE-2023-36424 Home windows Widespread Log File System Driver Elevation of Privilege Vulnerability
CVE-2023-36425 Home windows Distributed File System (DFS) Distant Code Execution Vulnerability
CVE-2023-36427 Home windows Hyper-V Elevation of Privilege Vulnerability
CVE-2023-36428 Microsoft Native Safety Authority Subsystem Service Info Disclosure Vulnerability

 

Dynamics 365 (5 CVEs)

Essential severity
CVE-2023-36007 Microsoft Ship Buyer Voice survey from Dynamics 365 Spoofing Vulnerability
CVE-2023-36016 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
CVE-2023-36030 Microsoft Dynamics 365 Gross sales Spoofing Vulnerability
CVE-2023-36031 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
CVE-2023-36410 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

 

Alternate (4 CVEs)

Essential severity
CVE-2023-36035 Microsoft Alternate Server Spoofing Vulnerability
CVE-2023-36039 Microsoft Alternate Server Spoofing Vulnerability
CVE-2023-36050 Microsoft Alternate Server Spoofing Vulnerability
CVE-2023-36439 Microsoft Alternate Server Distant Code Execution Vulnerability

 

Workplace (4 CVEs)

Essential severity
CVE-2023-36037 Microsoft Excel Safety Function Bypass Vulnerability
CVE-2023-36041 Microsoft Excel Distant Code Execution Vulnerability
CVE-2023-36045 Microsoft Workplace Graphics Distant Code Execution Vulnerability
CVE-2023-36413 Microsoft Workplace Safety Function Bypass Vulnerability

 

Visible Studio (4 CVEs)

Essential severity
CVE-2023-36018 Visible Studio Code Jupyter Extension Spoofing Vulnerability
CVE-2023-36042 Visible Studio Denial of Service Vulnerability
CVE-2023-36049 .NET, .NET Framework, and Visible Studio Elevation of Privilege Vulnerability
CVE-2023-36558 ASP.NET Core – Safety Function Bypass Vulnerability

 

ASP.NET (3 CVEs)

Essential severity
CVE-2023-36038 ASP.NET Core Denial of Service Vulnerability
CVE-2023-36560 ASP.NET Safety Function Bypass Vulnerability
CVE-2023-36558 ASP.NET Core – Safety Function Bypass Vulnerability

 

Azure (3 CVEs)

Essential severity
CVE-2023-36052 Azure CLI REST Command Info Disclosure Vulnerability
Essential severity
CVE-2023-36043 Open Administration Infrastructure Info Disclosure Vulnerability
CVE-2023-36437 Azure DevOps Server Distant Code Execution Vulnerability

 

.NET (2 CVEs)

Essential severity
CVE-2023-36049 .NET, .NET Framework, and Visible Studio Elevation of Privilege Vulnerability
CVE-2023-36558 ASP.NET Core – Safety Function Bypass Vulnerability

 

Defender (1 CVE)

Essential severity
CVE-2023-36422 Microsoft Home windows Defender Elevation of Privilege Vulnerability

 

Host Integration Server (1 CVE)

Essential severity
CVE-2023-38151 Microsoft Host Integration Server 2020 Distant Code Execution Vulnerability

 

On-Premises Information Gateway (1 CVE)

Essential severity
CVE-2023-36021 Microsoft Host Integration Server 2020 Safety Function Bypass Vulnerability

 

SharePoint (1 CVE)

Essential severity
CVE-2023-38177 Microsoft SharePoint Server Distant Code Execution Vulnerability

 

 

Appendix D: Different Merchandise

It is a record of advisories and data on different related CVEs within the November Microsoft launch, sorted by product.

Microsoft Servicing Stack Updates

ADV990001 Newest Servicing Stack Updates

Adobe Acrobat Reader Bulletin APSB23-54: Safety updates out there for Acrobat Reader (17 CVEs)

CVE-2023-44336 Use After Free (CWE-416)
CVE-2023-44337 Out-of-bounds Learn (CWE-125)
CVE-2023-44338 Out-of-bounds Learn (CWE-125)
CVE-2023-44339 Out-of-bounds Learn (CWE-125)
CVE-2023-44340 Out-of-bounds Learn (CWE-125)
CVE-2023-44348 Out-of-bounds Learn (CWE-125)
CVE-2023-44356 Out-of-bounds Learn (CWE-125)
CVE-2023-44357 Out-of-bounds Learn (CWE-125)
CVE-2023-44358 Out-of-bounds Learn (CWE-125)
CVE-2023-44359 Use After Free (CWE-416)
CVE-2023-44360 Out-of-bounds Learn (CWE-125)
CVE-2023-44361 Use After Free (CWE-416)
CVE-2023-44365 Entry of Uninitialized Pointer (CWE-824)
CVE-2023-44366 Out-of-bounds Write (CWE-787)
CVE-2023-44367 Use After Free (CWE-416)
CVE-2023-44371 Use After Free (CWE-416)
CVE-2023-44372 Use After Free (CWE-416)

 

Adobe ColdFusion Bulletin APSB23-52: Safety updates out there for Adobe ColdFusion (7 CVEs)

CVE-2023-44347 Improper Entry Management (CWE-284)
CVE-2023-44350 Deserialization of Untrusted Information (CWE-502)
CVE-2023-44351 Deserialization of Untrusted Information (CWE-502)
CVE-2023-44352 Cross-site Scripting (Mirrored XSS) (CWE-79)
CVE-2023-44353 Deserialization of Untrusted Information (CWE-502)
CVE-2023-44354 Improper Authentication (CWE-287)
CVE-2023-44355 Improper Enter Validation (CWE-20)

 

Related MITRE releases (2 CVEs)

CVE-2023-24023 MITRE: CVE-2023-24023 Bluetooth Spoofing Vulnerability
CVE-2023-44487 MITRE: CVE-2023-44487 HTTP/2 Fast Reset Assault

 

Related to CBL-Mariner (5 CVEs)

CVE-2020-8554 Kubernetes man within the center utilizing LoadBalancer or ExternalIPs
CVE-2023-46753 [FRRouting issue; no title provided]
CVE-2023-46316 [traceroute issue; no title provided]
CVE-2020-14343 [PyYAML library issue; no title provided]
CVE-2020-1747 [PyYAML library issue; no title provided]

 

Related to Edge / Chromium (21 CVEs)

CVE-2023-36014 Microsoft Edge (Chromium-based) Distant Code Execution Vulnerability
CVE-2023-36022 Microsoft Edge (Chromium-based) Distant Code Execution Vulnerability
CVE-2023-36024 Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
CVE-2023-36027 Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
CVE-2023-36029 Microsoft Edge (Chromium-based) Spoofing Vulnerability
CVE-2023-36034 Microsoft Edge (Chromium-based) Distant Code Execution Vulnerability
CVE-2023-5346 Chromium: CVE-2023-5346 Kind Confusion in V8
CVE-2023-5480 Chromium: CVE-2023-5480 Inappropriate implementation in Funds
CVE-2023-5482 Chromium: CVE-2023-5482 Inadequate knowledge validation in USB
CVE-2023-5849 Chromium: CVE-2023-5849 Integer overflow in USB
CVE-2023-5850 Chromium: CVE-2023-5850 Incorrect safety UI in Downloads
CVE-2023-5851 Chromium: CVE-2023-5851 Inappropriate implementation in Downloads
CVE-2023-5852 Chromium: CVE-2023-5852 Use after free in Printing
CVE-2023-5853 Chromium: CVE-2023-5853 Incorrect safety UI in Downloads
CVE-2023-5854 Chromium: CVE-2023-5854 Use after free in Profiles
CVE-2023-5855 Chromium: CVE-2023-5855 Use after free in Studying Mode
CVE-2023-5856 Chromium: CVE-2023-5856 Use after free in Aspect Panel
CVE-2023-5857 Chromium: CVE-2023-5857 Inappropriate implementation in Downloads
CVE-2023-5858 Chromium: CVE-2023-5858 Inappropriate implementation in WebApp Supplier
CVE-2023-5859 Chromium: CVE-2023-5859 Incorrect safety UI in Image In Image
CVE-2023-5996 Chromium: CVE-2023-5996 Use after free in WebAudio

 



Supply hyperlink

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments