CVE-2023-35382 – Windows Kernel Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2023-35382
Windows Kernel Elevation of Privilege Vulnerability Microsoft Windows Kernel renaming layered keys does not reference count security descriptors, leading to a use-after-free condition. • http://packetstormsecurity.com/files/174450/Microsoft-Windows-Kernel-Use-After-Free.html https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35382 • CWE-416: Use After Free •
CVE-2023-35381 – Windows Fax Service Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2023-35381
Windows Fax Service Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35381 • CWE-190: Integer Overflow or Wraparound •
CVE-2023-35380 – Windows Kernel Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2023-35380
Windows Kernel Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35380 • CWE-416: Use After Free •
CVE-2023-35378 – Windows Projected File System Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2023-35378
Windows Projected File System Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35378 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •
CVE-2023-35377 – Microsoft Message Queuing Denial of Service Vulnerability
https://notcve.org/view.php?id=CVE-2023-35377
Microsoft Message Queuing Denial of Service Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35377 • CWE-20: Improper Input Validation •