- Buy Microsoft Visio Professional or Microsoft Project Professional 2024 for just $80
- Get Microsoft Office Pro and Windows 11 Pro for 87% off with this bundle
- Buy or gift a Babbel subscription for 78% off to learn a new language - new low price
- Join BJ's Wholesale Club for just $20 right now to save on holiday shopping
- This $28 'magic arm' makes taking pictures so much easier (and it's only $20 for Black Friday)
Tripwire Patch Priority Index for November 2023
Tripwire’s November 2023 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft.
First on the patch priority are patches for Microsoft Edge (Chromium-based) that resolve elevation of privilege, remote code execution, and spoofing vulnerabilities.
Next on the patch priority list this month are patches for Microsoft Office and Excel that resolve 3 remote code execution and security feature bypass vulnerabilities.
Next are patches that affect components of the core Windows operating system. These patches resolve over 25 vulnerabilities, including elevation of privilege, information disclosure, and remote code execution vulnerabilities. These vulnerabilities affect core Windows, Kernel, Installer, Bluetooth, Speech Application Programming Interface, NTFS, Authentication, Distributed File System, and others.
Up next are patches for .NET, ASP.NET, Visual Studio and Visual Studio Code that resolve 6 vulnerabilities including security feature bypass, denial of service, elevation of privilege, and spoofing vulnerabilities.
Lastly, administrators should focus on server-side patches for Azure DevOps Server, Dynamics, DHCP Server, SharePoint, Hyper-V, and Exchange. These patches resolve numerous issues including remote code execution, spoofing, cross site scripting, elevation of privilege, and information disclosure vulnerabilities.
BULLETIN |
CVE |
CVE-2023-36024, CVE-2023-36027, CVE-2023-36034, CVE-2023-36014, CVE-2023-36022, CVE-2023-36029 |
|
CVE-2023-36045, CVE-2023-36413 |
|
CVE-2023-36041, CVE-2023-36037 |
|
CVE-2023-36705, CVE-2023-36395, CVE-2023-36400, CVE-2023-36393, CVE-2023-36396, CVE-2023-36425, CVE-2023-36028, CVE-2023-36401, CVE-2023-36423, CVE-2023-36036, CVE-2023-36405, CVE-2023-36403, CVE-2023-36404, CVE-2023-24023, CVE-2023-36394, CVE-2023-36033, CVE-2023-36422, CVE-2023-36397, CVE-2023-36025, CVE-2023-36017, CVE-2023-36402, CVE-2023-36719, CVE-2023-36428, CVE-2023-36046, CVE-2023-36047, CVE-2023-36399, CVE-2023-36424, CVE-2023-36398 |
|
CVE-2023-36558, CVE-2023-36038, CVE-2023-36560, CVE-2023-36049 |
|
CVE-2023-36018, CVE-2023-36042 |
|
CVE-2023-36439, CVE-2023-36035, CVE-2023-36039, CVE-2023-36050 |
|
CVE-2023-36392 |
|
CVE-2023-36437 |
|
CVE-2023-36031, CVE-2023-36410, CVE-2023-36016, CVE-2023-36007 |
|
CVE-2023-36408, CVE-2023-36407, CVE-2023-36427, CVE-2023-36406 |
|
CVE-2023-38177 |