CVE编号 | 公告标题 | 最高严重等级和漏洞影响 | 受影响的软件 |
CVE-2023-36884 | Office and Windows远程代码执行漏洞 | 重要 远程代码执行 | Server 2022 Server 2019 Server 2012 Server 2008 Server 2016 Office LTSC 2021 Server 2012 R2 Windows 10 Windows 11 Office 2019 Word 2013 Word 2016 |
CVE-2023-32046 | Windows MSHTML Platform权限提升漏洞 | 重要 特权提升 | Server 2022 Server 2019 Server 2012 Server 2008 Server 2016 Windows 10 Windows 11 |
CVE-2023-32049 | Windows SmartScreen安全功能绕过漏洞 | 重要 安全功能绕过 | Server 2022 Server 2019 Server 2016 Windows 10 Windows 11 |
CVE-2023-36874 | Windows Error Reporting Service权限提升漏洞 | 重要 特权提升 | Server 2022 Server 2019 Server 2012 Server 2008 Server 2016 Server 2012 R2 Windows 10 Windows 11 |
CVE-2023-35311 | Microsoft Outlook安全功能绕过漏洞 | 严重 安全功能绕过 | 365 Apps for Enterprise Office LTSC 2021 Outlook 2013 RT Outlook 2013 Outlook 2016 Office 2019 Outlook 2016 |
CVE-2023-33157 | Microsoft SharePoint远程代码执行漏洞 | 严重 远程代码执行 | SharePoint Server Subscription Edition SharePoint Server 2019 SharePoint Enterprise Server 2016 |
CVE-2023-33160 | Microsoft SharePoint Server远程代码执行漏洞 | 严重 远程代码执行 | SharePoint Server Subscription Edition SharePoint Server 2019 SharePoint Enterprise Server 2016 |
CVE-2023-32057 | Microsoft Message Queuing远程代码执行漏洞 | 严重 远程代码执行 | Server 2022 Server 2019 Server 2008 Server 2016 Windows 10 Windows 11 |
CVE-2023-35297 | Windows Pragmatic General Multicast (PGM)远程代码执行漏洞 | 重要 远程代码执行 | Server 2022 Server 2019 Server 2012 Server 2008 Server 2016 Server 2012 R2 Windows 10 Windows 11 |
CVE-2023-21526 | Windows Netlogon信息泄露漏洞 | 重要 信息泄露 | Server 2022 Server 2019 Server 2012 Server 2008 Server 2016 Server 2012 R2 Windows 10 |
CVE-2023-33134 | Microsoft SharePoint Server远程代码执行漏洞 | 重要 远程代码执行 | SharePoint Server Subscription Edition SharePoint Server 2019 SharePoint Enterprise Server 2016 |