
CVE-2023-36425 – Windows Distributed File System (DFS) Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2023-36425
14 Nov 2023 — Windows Distributed File System (DFS) Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código del sistema de archivos distribuido (DFS) de Windows. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36425 • CWE-122: Heap-based Buffer Overflow •

CVE-2023-36427 – Windows Hyper-V Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2023-36427
14 Nov 2023 — Windows Hyper-V Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios de Windows Hyper-V. • https://github.com/tandasat/CVE-2023-36427 •

CVE-2023-36428 – Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2023-36428
14 Nov 2023 — Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability Vulnerabilidad de divulgación de información del servicio del subsistema de la autoridad de seguridad local de Microsoft. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36428 • CWE-125: Out-of-bounds Read •

CVE-2023-36705 – Windows Installer Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2023-36705
14 Nov 2023 — Windows Installer Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios del instalador de Windows. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36705 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2023-36719 – Microsoft Speech Application Programming Interface (SAPI) Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2023-36719
14 Nov 2023 — Microsoft Speech Application Programming Interface (SAPI) Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios de Microsoft Speech Application Programming Interface (SAPI). • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36719 • CWE-20: Improper Input Validation •

CVE-2023-38545 – curl: heap based buffer overflow in the SOCKS5 proxy handshake
https://notcve.org/view.php?id=CVE-2023-38545
11 Oct 2023 — This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake. When curl is asked to pass along the host name to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length that host name can be is 255 bytes. If the host name is detected to be longer, curl switches to local name resolving and instead passes on the resolved address only. Due to this bug, the local variable that means "let the host resolve the name" could get the wrong ... • https://github.com/d0rb/CVE-2023-38545 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-787: Out-of-bounds Write •

CVE-2023-36743 – Win32k Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2023-36743
10 Oct 2023 — Win32k Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios en Win32k • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36743 • CWE-416: Use After Free •

CVE-2023-36776 – Win32k Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2023-36776
10 Oct 2023 — Win32k Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios en Win32k • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36776 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-416: Use After Free •

CVE-2023-38159 – Windows Graphics Component Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2023-38159
10 Oct 2023 — Windows Graphics Component Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios en Windows Graphics Component This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of GPU mapped memory. The issue results from the lack of proper locking when perfor... • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38159 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-591: Sensitive Data Storage in Improperly Locked Memory •

CVE-2023-38166 – Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2023-38166
10 Oct 2023 — Layer 2 Tunneling Protocol Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código en Layer 2 Tunneling Protocol • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38166 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-416: Use After Free •