CVE-2023-21816 – Windows Active Directory Domain Services API Denial of Service Vulnerability
https://notcve.org/view.php?id=CVE-2023-21816
Windows Active Directory Domain Services API Denial of Service Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21816 • CWE-20: Improper Input Validation •
CVE-2023-21813 – Windows Secure Channel Denial of Service Vulnerability
https://notcve.org/view.php?id=CVE-2023-21813
Windows Secure Channel Denial of Service Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21813 • CWE-126: Buffer Over-read •
CVE-2023-21812 – Windows Common Log File System Driver Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2023-21812
Windows Common Log File System Driver Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21812 • CWE-122: Heap-based Buffer Overflow •
CVE-2023-21811 – Windows iSCSI Service Denial of Service Vulnerability
https://notcve.org/view.php?id=CVE-2023-21811
Windows iSCSI Service Denial of Service Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21811 • CWE-126: Buffer Over-read •
CVE-2023-21805 – Windows MSHTML Platform Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2023-21805
Windows MSHTML Platform Remote Code Execution Vulnerability This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of certain image file types that can contain script tags. Under limited circumstances, crafted data in an image can lead to execution of untrusted script. An attacker can leverage this vulnerability to execute code in the context of the current process. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21805 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •