- The 25+ best Black Friday Nintendo Switch deals 2024
- Why there could be a new AI chatbot champ by the time you read this
- The 70+ best Black Friday TV deals 2024: Save up to $2,000
- This AI image generator that went viral for its realistic images gets a major upgrade
- One of the best cheap Android phones I've tested is not a Motorola or Samsung
Tripwire Patch Priority Index for November 2023
Tripwire’s November 2023 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft.
First on the patch priority are patches for Microsoft Edge (Chromium-based) that resolve elevation of privilege, remote code execution, and spoofing vulnerabilities.
Next on the patch priority list this month are patches for Microsoft Office and Excel that resolve 3 remote code execution and security feature bypass vulnerabilities.
Next are patches that affect components of the core Windows operating system. These patches resolve over 25 vulnerabilities, including elevation of privilege, information disclosure, and remote code execution vulnerabilities. These vulnerabilities affect core Windows, Kernel, Installer, Bluetooth, Speech Application Programming Interface, NTFS, Authentication, Distributed File System, and others.
Up next are patches for .NET, ASP.NET, Visual Studio and Visual Studio Code that resolve 6 vulnerabilities including security feature bypass, denial of service, elevation of privilege, and spoofing vulnerabilities.
Lastly, administrators should focus on server-side patches for Azure DevOps Server, Dynamics, DHCP Server, SharePoint, Hyper-V, and Exchange. These patches resolve numerous issues including remote code execution, spoofing, cross site scripting, elevation of privilege, and information disclosure vulnerabilities.
BULLETIN |
CVE |
CVE-2023-36024, CVE-2023-36027, CVE-2023-36034, CVE-2023-36014, CVE-2023-36022, CVE-2023-36029 |
|
CVE-2023-36045, CVE-2023-36413 |
|
CVE-2023-36041, CVE-2023-36037 |
|
CVE-2023-36705, CVE-2023-36395, CVE-2023-36400, CVE-2023-36393, CVE-2023-36396, CVE-2023-36425, CVE-2023-36028, CVE-2023-36401, CVE-2023-36423, CVE-2023-36036, CVE-2023-36405, CVE-2023-36403, CVE-2023-36404, CVE-2023-24023, CVE-2023-36394, CVE-2023-36033, CVE-2023-36422, CVE-2023-36397, CVE-2023-36025, CVE-2023-36017, CVE-2023-36402, CVE-2023-36719, CVE-2023-36428, CVE-2023-36046, CVE-2023-36047, CVE-2023-36399, CVE-2023-36424, CVE-2023-36398 |
|
CVE-2023-36558, CVE-2023-36038, CVE-2023-36560, CVE-2023-36049 |
|
CVE-2023-36018, CVE-2023-36042 |
|
CVE-2023-36439, CVE-2023-36035, CVE-2023-36039, CVE-2023-36050 |
|
CVE-2023-36392 |
|
CVE-2023-36437 |
|
CVE-2023-36031, CVE-2023-36410, CVE-2023-36016, CVE-2023-36007 |
|
CVE-2023-36408, CVE-2023-36407, CVE-2023-36427, CVE-2023-36406 |
|
CVE-2023-38177 |