- Is classic Outlook crashing when you start or reply to an email? A fix is on the way
- Samsung will still give you $50 for reserving a Galaxy S25 preorder within the next few hours
- Preparing for the PCI 4.0 Implementation in the Retail environment
- Securing Election Integrity In 2024: Navigating the Complex Landscape of Modern Threats
- Simplifying Zero Trust Security for the Modern Workplace
Tripwire Patch Priority Index for November 2023
Tripwire’s November 2023 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft.
First on the patch priority are patches for Microsoft Edge (Chromium-based) that resolve elevation of privilege, remote code execution, and spoofing vulnerabilities.
Next on the patch priority list this month are patches for Microsoft Office and Excel that resolve 3 remote code execution and security feature bypass vulnerabilities.
Next are patches that affect components of the core Windows operating system. These patches resolve over 25 vulnerabilities, including elevation of privilege, information disclosure, and remote code execution vulnerabilities. These vulnerabilities affect core Windows, Kernel, Installer, Bluetooth, Speech Application Programming Interface, NTFS, Authentication, Distributed File System, and others.
Up next are patches for .NET, ASP.NET, Visual Studio and Visual Studio Code that resolve 6 vulnerabilities including security feature bypass, denial of service, elevation of privilege, and spoofing vulnerabilities.
Lastly, administrators should focus on server-side patches for Azure DevOps Server, Dynamics, DHCP Server, SharePoint, Hyper-V, and Exchange. These patches resolve numerous issues including remote code execution, spoofing, cross site scripting, elevation of privilege, and information disclosure vulnerabilities.
BULLETIN |
CVE |
CVE-2023-36024, CVE-2023-36027, CVE-2023-36034, CVE-2023-36014, CVE-2023-36022, CVE-2023-36029 |
|
CVE-2023-36045, CVE-2023-36413 |
|
CVE-2023-36041, CVE-2023-36037 |
|
CVE-2023-36705, CVE-2023-36395, CVE-2023-36400, CVE-2023-36393, CVE-2023-36396, CVE-2023-36425, CVE-2023-36028, CVE-2023-36401, CVE-2023-36423, CVE-2023-36036, CVE-2023-36405, CVE-2023-36403, CVE-2023-36404, CVE-2023-24023, CVE-2023-36394, CVE-2023-36033, CVE-2023-36422, CVE-2023-36397, CVE-2023-36025, CVE-2023-36017, CVE-2023-36402, CVE-2023-36719, CVE-2023-36428, CVE-2023-36046, CVE-2023-36047, CVE-2023-36399, CVE-2023-36424, CVE-2023-36398 |
|
CVE-2023-36558, CVE-2023-36038, CVE-2023-36560, CVE-2023-36049 |
|
CVE-2023-36018, CVE-2023-36042 |
|
CVE-2023-36439, CVE-2023-36035, CVE-2023-36039, CVE-2023-36050 |
|
CVE-2023-36392 |
|
CVE-2023-36437 |
|
CVE-2023-36031, CVE-2023-36410, CVE-2023-36016, CVE-2023-36007 |
|
CVE-2023-36408, CVE-2023-36407, CVE-2023-36427, CVE-2023-36406 |
|
CVE-2023-38177 |