# MS 7월 보안 위협에 따른 정기 보안 업데이트 권고\[2023-07]

## MS 7월 보안 위협에 따른 정기 보안 업데이트 권고&#x20;

### □ 7 월 보안업데이트 개요 (총 16 종 )

o 등급 : 긴급 (Critical) 9 종 , 중요 (Important) 7 종&#x20;

o 발표일 : 2023.7.11.(화)&#x20;

o 업데이트 내용

| 제품군                                   | 중요도 | 영향         |
| ------------------------------------- | --- | ---------- |
| Windows 11 v22H2                      | 긴급  | 권한 상승      |
| Windows 11 v21H2                      | 긴급  | 권한 상승      |
| Windows 10 22H2, Windows 10 21H2      | 긴급  | 권한 상승      |
| Windows Server 2022                   | 긴급  | 권한상승       |
| Windows Server 2019                   | 긴급  | 권한상승       |
| Windows Server 2016                   | 긴급  | 권한상승       |
| Windows Server 2012 R2                | 긴급  | 원격 코드 실행   |
| Windows Server 2012                   | 긴급  | 원격 코드 실행   |
| Microsoft Office                      | 중요  | 원격 코드 실행   |
| Microsoft SharePoint                  | 긴급  | 원격 코드 실행   |
| Microsoft .NET                        | 중요  | 보안 기능 바이패스 |
| Microsoft Visual Studio               | 중요  | 권한 상승      |
| Microsoft Dynamics 365                | 중요  | 스푸핑        |
| <p>Microsoft Azure 관련</p><p>소프트웨어</p> | 중요  | 정보 공개      |
| Windows Admin Center                  | 중요  | 스푸핑        |
| Windows Malware Protection Engine     | 중요  | 권한 상승      |

### \[참고 사이트 ]&#x20;

\[1] (한글) <https://portal.msrc.microsoft.com/ko-kr/security-guidance&#x20>;

\[2] (영문) <https://portal.msrc.microsoft.com/en-us/security-guidance&#x20>;

\[3] <https://msrc.microsoft.com/update-guide/releaseNote/2023-Jul&#x20>;

\[4] <https://msrc.microsoft.com/update-guide>

### o 취약점 요약 정보

<table><thead><tr><th width="251">제품 카테고리</th><th width="186.33333333333331">CVE  번호</th><th>CVE  제목</th></tr></thead><tbody><tr><td>Microsoft Office</td><td>CVE-2023-36884</td><td>Office and Windows HTML Remote Code Execution Vulnerability</td></tr><tr><td>Windows Error Reporting</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36874">CVE-2023-36874</a></td><td>Windows 오류 보고 서비스 권한 상승 취약성</td></tr><tr><td>Microsoft Windows Codecs Library</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36872">CVE-2023-36872</a></td><td>VP9 비디오 확장 정보 유출 취약성</td></tr><tr><td>Azure Active Directory</td><td>CVE-2023-36871</td><td>Azure Active Directory 보안 기능 바이패스 취약성</td></tr><tr><td>Service Fabric</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36868">CVE-2023-36868</a></td><td>Azure Service Fabric on Windows 정보 공개 취약성</td></tr><tr><td>Visual Studio Code</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36867">CVE-2023-36867</a></td><td>Visual Studio Code GitHub 끌어오기 요청 및 문제 확장 원격 코드 실행 취약성</td></tr><tr><td>Paint 3D</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35374">CVE-2023-35374</a></td><td>Paint 3D 원격 코드 실행 취약성</td></tr><tr><td>Mono Authenticode</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35373">CVE-2023-35373</a></td><td>Mono Authenticode 유효성 검사 스푸핑 취약성</td></tr><tr><td>Windows Routing and Remote Access Service (RRAS)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35367">CVE-2023-35367</a></td><td>Windows RRAS(Routing and Remote Access Service) 원격 코드 실행 취약성</td></tr><tr><td>Windows Routing and Remote Access Service (RRAS)</td><td>CVE-2023-35366</td><td>Windows RRAS(Routing and Remote Access Service) 원격 코드 실행 취약성</td></tr><tr><td>Windows Routing and Remote Access Service (RRAS)</td><td>CVE-2023-35365</td><td>Windows RRAS(Routing and Remote Access Service) 원격 코드 실행 취약성</td></tr><tr><td>Windows NT OS Kernel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35364">CVE-2023-35364</a></td><td>Windows 커널 권한 상승 취약성</td></tr><tr><td>Windows Kernel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35363">CVE-2023-35363</a></td><td>Windows 커널 권한 상승 취약성</td></tr><tr><td>Windows Clip Service</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35362">CVE-2023-35362</a></td><td>Windows Clip Service 권한 상승 취약성</td></tr><tr><td>Windows NT OS Kernel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35361">CVE-2023-35361</a></td><td>Windows 커널 권한 상승 취약성</td></tr><tr><td>Windows NT OS Kernel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35360">CVE-2023-35360</a></td><td>Windows 커널 권한 상승 취약성</td></tr><tr><td>Windows Kernel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35358">CVE-2023-35358</a></td><td>Windows 커널 권한 상승 취약성</td></tr><tr><td>Windows Kernel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35357">CVE-2023-35357</a></td><td>Windows 커널 권한 상승 취약성</td></tr><tr><td>Windows Kernel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35356">CVE-2023-35356</a></td><td>Windows 커널 권한 상승 취약성</td></tr><tr><td>Windows Connected User Experiences and Telemetry</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35353">CVE-2023-35353</a></td><td>연결된 사용자 환경 및 원격 분석 권한 상승 취약성</td></tr><tr><td>Windows Remote Desktop</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35352">CVE-2023-35352</a></td><td>Windows 원격 데스크톱 보안 기능 우회 취약성</td></tr><tr><td>Windows Active Directory Certificate Services</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35351">CVE-2023-35351</a></td><td>Windows AD CS(Active Directory 인증서 서비스) 원격 코드 실행 취약성</td></tr><tr><td>Windows Active Directory Certificate Services</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35350">CVE-2023-35350</a></td><td>Windows AD CS(Active Directory 인증서 서비스) 원격 코드 실행 취약성</td></tr><tr><td>Azure Active Directory</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35348">CVE-2023-35348</a></td><td>Active Directory Federation Service 보안 기능 바이패스 취약성</td></tr><tr><td>Windows App Store</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35347">CVE-2023-35347</a></td><td>Microsoft Install Service Elevation of Privilege Vulnerability</td></tr><tr><td>Role: DNS Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35346">CVE-2023-35346</a></td><td>Windows DNS 서버 원격 코드 실행 취약성</td></tr><tr><td>Role: DNS Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35345">CVE-2023-35345</a></td><td>Windows DNS 서버 원격 코드 실행 취약성</td></tr><tr><td>Role: DNS Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35344">CVE-2023-35344</a></td><td>Windows DNS 서버 원격 코드 실행 취약성</td></tr><tr><td>Windows Geolocation Service</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35343">CVE-2023-35343</a></td><td>Windows 지리적 위치 서비스 원격 코드 실행 취약성</td></tr><tr><td>Windows Image Acquisition</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35342">CVE-2023-35342</a></td><td>Windows 이미지 획득 권한 상승 취약성</td></tr><tr><td>Windows Media</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35341">CVE-2023-35341</a></td><td>Microsoft DirectMusic 정보 공개 취약성</td></tr><tr><td>Windows CNG Key Isolation Service</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35340">CVE-2023-35340</a></td><td>Windows CNG 키 격리 서비스 권한 상승 취약성</td></tr><tr><td>Windows CryptoAPI</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35339">CVE-2023-35339</a></td><td>Windows CryptoAPI 서비스 거부 취약성</td></tr><tr><td>Windows Peer Name Resolution Protocol</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35338">CVE-2023-35338</a></td><td>Windows 피어 이름 확인 프로토콜 서비스 거부 취약성</td></tr><tr><td>Windows Win32K</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35337">CVE-2023-35337</a></td><td>Win32k 권한 상승 취약성</td></tr><tr><td>Windows MSHTML Platform</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35336">CVE-2023-35336</a></td><td>Windows MSHTML 플랫폼 보안 기능 바이패스 취약성</td></tr><tr><td>Microsoft Dynamics</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35335">CVE-2023-35335</a></td><td>Microsoft Dynamics 365(온-프레미스) 교차-사이트 스크립팅 취약성</td></tr><tr><td>Microsoft Media-Wiki Extensions</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35333">CVE-2023-35333</a></td><td>MediaWiki PandocUpload 확장 원격 코드 실행 취약성</td></tr><tr><td>Windows Remote Desktop</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35332">CVE-2023-35332</a></td><td>Windows 원격 데스크톱 프로토콜 보안 기능 바이패스</td></tr><tr><td>Windows Local Security Authority (LSA)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35331">CVE-2023-35331</a></td><td>Windows LSA(로컬 보안 기관) 서비스 거부 취약성</td></tr><tr><td>Windows SPNEGO Extended Negotiation</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35330">CVE-2023-35330</a></td><td>Windows Extended Negotiation 서비스 거부 취약성</td></tr><tr><td>Windows Authentication Methods</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35329">CVE-2023-35329</a></td><td>Windows 인증 서비스 거부 취약성</td></tr><tr><td>Windows Transaction Manager</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35328">CVE-2023-35328</a></td><td>Windows 트랜잭션 관리자 권한 상승 취약성</td></tr><tr><td>Windows CDP User Components</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35326">CVE-2023-35326</a></td><td>Windows CDP User Components 정보 공개 취약성</td></tr><tr><td>Windows Print Spooler Components</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35325">CVE-2023-35325</a></td><td>Windows 인쇄 스풀러 정보 유출 취약성</td></tr><tr><td>Microsoft Printer Drivers</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35324">CVE-2023-35324</a></td><td>Microsoft PostScript 및 PCL6 Class 프린터 드라이버 정보 공개 취약성</td></tr><tr><td>Windows Online Certificate Status Protocol (OCSP) SnapIn</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35323">CVE-2023-35323</a></td><td>Windows OLE 원격 코드 실행 취약성</td></tr><tr><td>Windows Deployment Services</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35322">CVE-2023-35322</a></td><td>Windows Deployment Services 원격 코드 실행 취약성</td></tr><tr><td>Windows Deployment Services</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35321">CVE-2023-35321</a></td><td>Windows 배포 서비스 서비스 거부 취약성</td></tr><tr><td>Windows Connected User Experiences and Telemetry</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35320">CVE-2023-35320</a></td><td>연결된 사용자 환경 및 원격 분석 권한 상승 취약성</td></tr><tr><td>Windows Remote Procedure Call</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35319">CVE-2023-35319</a></td><td>원격 프로시저 호출 런타임 서비스 거부 취약성</td></tr><tr><td>Windows Remote Procedure Call</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35318">CVE-2023-35318</a></td><td>원격 프로시저 호출 런타임 서비스 거부 취약성</td></tr><tr><td>Windows Server Update Service</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35317">CVE-2023-35317</a></td><td>WSUS(Windows Server Update Service) 권한 상승 취약성</td></tr><tr><td>Windows Remote Procedure Call</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35316">CVE-2023-35316</a></td><td>원격 프로시저 호출 런타임 정보 공개 취약성</td></tr><tr><td>Windows Layer-2 Bridge Network Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35315">CVE-2023-35315</a></td><td>Windows Layer-2 Bridge Network Driver 원격 코드 실행 취약성</td></tr><tr><td>Windows Remote Procedure Call</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35314">CVE-2023-35314</a></td><td>원격 프로시저 호출 런타임 서비스 거부 취약성</td></tr><tr><td>Windows Online Certificate Status Protocol (OCSP) SnapIn</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35313">CVE-2023-35313</a></td><td>Windows OCSP(온라인 인증서 상태 프로토콜) SnapIn 원격 코드 실행 취약성</td></tr><tr><td>Windows VOLSNAP.SYS</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35312">CVE-2023-35312</a></td><td>Microsoft VOLSNAP.SYS 권한 상승 취약성</td></tr><tr><td>Microsoft Office Outlook</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35311">CVE-2023-35311</a></td><td>Microsoft Outlook 보안 기능 바이패스 취약성</td></tr><tr><td>Role: DNS Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35310">CVE-2023-35310</a></td><td>Windows DNS 서버 원격 코드 실행 취약성</td></tr><tr><td>Windows Message Queuing</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35309">CVE-2023-35309</a></td><td>Microsoft 메시지 큐 원격 코드 실행 취약성</td></tr><tr><td>Windows MSHTML Platform</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35308">CVE-2023-35308</a></td><td>Windows MSHTML 플랫폼 보안 기능 바이패스 취약성</td></tr><tr><td>Microsoft Printer Drivers</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35306">CVE-2023-35306</a></td><td>Microsoft PostScript 및 PCL6 Class 프린터 드라이버 정보 공개 취약성</td></tr><tr><td>Windows Kernel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35305">CVE-2023-35305</a></td><td>Windows 커널 권한 상승 취약성</td></tr><tr><td>Windows Kernel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35304">CVE-2023-35304</a></td><td>Windows 커널 권한 상승 취약성</td></tr><tr><td>Microsoft Windows Codecs Library</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35303">CVE-2023-35303</a></td><td>USB Audio Class System Driver 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Printer Drivers</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35302">CVE-2023-35302</a></td><td>Microsoft PostScript 및 PCL6 Class 프린터 드라이버 원격 코드 실행 취약성</td></tr><tr><td>Windows Remote Procedure Call</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35300">CVE-2023-35300</a></td><td>원격 프로시저 호출 런타임 원격 코드 실행 취약성</td></tr><tr><td>Windows Common Log File System Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35299">CVE-2023-35299</a></td><td>Windows 공용 로그 파일 시스템 드라이버 권한 상승 취약성</td></tr><tr><td>Windows HTTP.sys</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35298">CVE-2023-35298</a></td><td>HTTP.sys 서비스 거부 취약성</td></tr><tr><td>Windows PGM</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35297">CVE-2023-35297</a></td><td>Windows PGM(Pragmatic General Multicast) 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Printer Drivers</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35296">CVE-2023-35296</a></td><td>Microsoft PostScript 및 PCL6 Class 프린터 드라이버 정보 공개 취약성</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3422">CVE-2023-3422</a></td><td>Chromium: CVE-2023-3422 게스트 보기에서 UaF(Use after free)</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3421">CVE-2023-3421</a></td><td>Chromium: CVE-2023-3421 미디어에서 UaF(Use after free)</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3420">CVE-2023-3420</a></td><td>Chromium: CVE-2023-3420 V8에서 유형 혼란</td></tr><tr><td>Windows Cryptographic Services</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33174">CVE-2023-33174</a></td><td>Windows 암호화 정보 공개 취약성</td></tr><tr><td>Windows Remote Procedure Call</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33173">CVE-2023-33173</a></td><td>원격 프로시저 호출 런타임 서비스 거부 취약성</td></tr><tr><td>Windows Remote Procedure Call</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33172">CVE-2023-33172</a></td><td>원격 프로시저 호출 런타임 서비스 거부 취약성</td></tr><tr><td>Microsoft Dynamics</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33171">CVE-2023-33171</a></td><td>Microsoft Dynamics 365(온-프레미스) 교차-사이트 스크립팅 취약성</td></tr><tr><td>ASP.NET and Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33170">CVE-2023-33170</a></td><td>ASP.NET 및 Visual Studio 보안 기능 바이패스 취약성</td></tr><tr><td>Windows Remote Procedure Call</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33169">CVE-2023-33169</a></td><td>원격 프로시저 호출 런타임 서비스 거부 취약성</td></tr><tr><td>Windows Remote Procedure Call</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33168">CVE-2023-33168</a></td><td>원격 프로시저 호출 런타임 서비스 거부 취약성</td></tr><tr><td>Windows Remote Procedure Call</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33167">CVE-2023-33167</a></td><td>원격 프로시저 호출 런타임 서비스 거부 취약성</td></tr><tr><td>Windows Remote Procedure Call</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33166">CVE-2023-33166</a></td><td>원격 프로시저 호출 런타임 서비스 거부 취약성</td></tr><tr><td>Microsoft Office SharePoint</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33165">CVE-2023-33165</a></td><td>Microsoft SharePoint Server 보안 기능 바이패스 취약성</td></tr><tr><td>Windows Remote Procedure Call</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33164">CVE-2023-33164</a></td><td>원격 프로시저 호출 런타임 서비스 거부 취약성</td></tr><tr><td>Windows Network Load Balancing</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33163">CVE-2023-33163</a></td><td>Windows 네트워크 부하 분산 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Office Excel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33162">CVE-2023-33162</a></td><td>Microsoft Excel 정보 유출 취약성</td></tr><tr><td>Microsoft Office Excel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33161">CVE-2023-33161</a></td><td>Microsoft Excel 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Office SharePoint</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33160">CVE-2023-33160</a></td><td>Microsoft SharePoint Server 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Office SharePoint</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33159">CVE-2023-33159</a></td><td>Microsoft SharePoint Server 스푸핑 취약성</td></tr><tr><td>Microsoft Office Excel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33158">CVE-2023-33158</a></td><td>Microsoft Excel 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Office SharePoint</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33157">CVE-2023-33157</a></td><td>Microsoft SharePoint 원격 코드 실행 취약성</td></tr><tr><td>Windows Defender</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33156">CVE-2023-33156</a></td><td>Microsoft Defender 권한 상승 취약성</td></tr><tr><td>Windows Cloud Files Mini Filter Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33155">CVE-2023-33155</a></td><td>Windows 클라우드 파일 미니 필터 드라이버 권한 상승 취약성</td></tr><tr><td>Windows Partition Management Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33154">CVE-2023-33154</a></td><td>Windows 파티션 관리 드라이버 권한 상승 취약성</td></tr><tr><td>Microsoft Office Outlook</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33153">CVE-2023-33153</a></td><td>Microsoft Outlook 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Office Access</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33152">CVE-2023-33152</a></td><td>Microsoft ActiveX 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Office Outlook</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33151">CVE-2023-33151</a></td><td>Microsoft Outlook 스푸핑 취약성</td></tr><tr><td>Microsoft Office</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33150">CVE-2023-33150</a></td><td>Microsoft Office 보안 기능 우회 취약성</td></tr><tr><td>Microsoft Graphics Component</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33149">CVE-2023-33149</a></td><td>Microsoft Office 그래픽 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Office</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33148">CVE-2023-33148</a></td><td>Microsoft Office 권한 상승 취약성</td></tr><tr><td>Microsoft Office</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33146">CVE-2023-33146</a></td><td>Microsoft Office 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33145">CVE-2023-33145</a></td><td>Microsoft Edge(Chromium 기반) 정보 공개 취약성</td></tr><tr><td>Visual Studio Code</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33144">CVE-2023-33144</a></td><td>Visual Studio Code 스푸핑 취약성</td></tr><tr><td>Microsoft Office SharePoint</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33142">CVE-2023-33142</a></td><td>Microsoft SharePoint Server 권한 상승 취약성</td></tr><tr><td>ASP .NET</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33141">CVE-2023-33141</a></td><td>YARP(Yet Another Reverse Proxy) 서비스 거부 취약성</td></tr><tr><td>Microsoft Office OneNote</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33140">CVE-2023-33140</a></td><td>Microsoft OneNote 스푸핑 취약성</td></tr><tr><td>Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33139">CVE-2023-33139</a></td><td>Visual Studio 정보 유출 취약성</td></tr><tr><td>Microsoft Office Excel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33137">CVE-2023-33137</a></td><td>Microsoft Excel 원격 코드 실행 취약성</td></tr><tr><td>.NET and Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33135">CVE-2023-33135</a></td><td>.NET 및 Visual Studio 권한 상승 취약성</td></tr><tr><td>Microsoft Office SharePoint</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33134">CVE-2023-33134</a></td><td>Microsoft SharePoint Server 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Office Excel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33133">CVE-2023-33133</a></td><td>Microsoft Excel 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Office SharePoint</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33132">CVE-2023-33132</a></td><td>Microsoft SharePoint Server 스푸핑 취약성</td></tr><tr><td>Microsoft Office Outlook</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33131">CVE-2023-33131</a></td><td>Microsoft Outlook 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Office SharePoint</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33130">CVE-2023-33130</a></td><td>Microsoft SharePoint Server 스푸핑 취약성</td></tr><tr><td>Microsoft Office SharePoint</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33129">CVE-2023-33129</a></td><td>Microsoft SharePoint 서비스 거부 취약성</td></tr><tr><td>.NET and Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33128">CVE-2023-33128</a></td><td>.NET 및 Visual Studio 원격 코드 실행 취약성</td></tr><tr><td>.NET and Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33127">CVE-2023-33127</a></td><td>.NET 및 Visual Studio 권한 상승 취약성</td></tr><tr><td>.NET and Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33126">CVE-2023-33126</a></td><td>.NET 및 Visual Studio 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3217">CVE-2023-3217</a></td><td>Chromium: CVE-2023-3217 WebXR에서 UaF(Use after free)</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3216">CVE-2023-3216</a></td><td>Chromium: CVE-2023-3216 V8에서 유형 혼란</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3215">CVE-2023-3215</a></td><td>Chromium: CVE-2023-3215 WebRTC에서 UaF(Use after free)</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-3214">CVE-2023-3214</a></td><td>Chromium: CVE-2023-3214 결제 자동 완성에서 UaF(Use after free)</td></tr><tr><td>Microsoft Printer Drivers</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32085">CVE-2023-32085</a></td><td>Microsoft PostScript 및 PCL6 Class 프린터 드라이버 정보 공개 취약성</td></tr><tr><td>Windows HTTP.sys</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32084">CVE-2023-32084</a></td><td>HTTP.sys 서비스 거부 취약성</td></tr><tr><td>Windows Failover Cluster</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32083">CVE-2023-32083</a></td><td>Microsoft 장애 조치(Failover) 클러스터 정보 공개 취약성</td></tr><tr><td>Windows Message Queuing</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32057">CVE-2023-32057</a></td><td>Microsoft 메시지 큐 원격 코드 실행 취약성</td></tr><tr><td>Windows Server Update Service</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32056">CVE-2023-32056</a></td><td>WSUS(Windows Server Update Service) 권한 상승 취약성</td></tr><tr><td>Windows Active Template Library</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32055">CVE-2023-32055</a></td><td>액티브 템플릿 라이브러리 권한 상승 취약성</td></tr><tr><td>Windows Volume Shadow Copy</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32054">CVE-2023-32054</a></td><td>볼륨 섀도 복사본 권한 상승 취약성</td></tr><tr><td>Windows Installer</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32053">CVE-2023-32053</a></td><td>Windows Installer 권한 상승 취약성</td></tr><tr><td>Microsoft Power Apps</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32052">CVE-2023-32052</a></td><td>Microsoft Power Apps (online) Spoofing Vulnerability</td></tr><tr><td>Microsoft Windows Codecs Library</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32051">CVE-2023-32051</a></td><td>Raw Image Extension Remote Code Execution Vulnerability</td></tr><tr><td>Windows Installer</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32050">CVE-2023-32050</a></td><td>Windows Installer 권한 상승 취약성</td></tr><tr><td>Windows SmartScreen</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32049">CVE-2023-32049</a></td><td>Windows SmartScreen 보안 기능 우회 취약성</td></tr><tr><td>Paint 3D</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32047">CVE-2023-32047</a></td><td>Paint 3D 원격 코드 실행 취약성</td></tr><tr><td>Windows MSHTML Platform</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32046">CVE-2023-32046</a></td><td>Windows MSHTML Platform 권한 상승 취약성</td></tr><tr><td>Windows Message Queuing</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32045">CVE-2023-32045</a></td><td>Microsoft 메시지 큐 서비스 거부 취약성</td></tr><tr><td>Windows Message Queuing</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32044">CVE-2023-32044</a></td><td>Microsoft 메시지 큐 서비스 거부 취약성</td></tr><tr><td>Windows Remote Desktop</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32043">CVE-2023-32043</a></td><td>Windows 원격 데스크톱 보안 기능 우회 취약성</td></tr><tr><td>Windows OLE</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32042">CVE-2023-32042</a></td><td>OLE Automation 정보 공개 취약성</td></tr><tr><td>Windows Update Orchestrator Service</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32041">CVE-2023-32041</a></td><td>Windows 업데이트 오케스트레이터 서비스 정보 공개 취약성</td></tr><tr><td>Microsoft Printer Drivers</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32040">CVE-2023-32040</a></td><td>Microsoft PostScript 및 PCL6 Class 프린터 드라이버 정보 공개 취약성</td></tr><tr><td>Microsoft Printer Drivers</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32039">CVE-2023-32039</a></td><td>Microsoft PostScript 및 PCL6 Class 프린터 드라이버 정보 공개 취약성</td></tr><tr><td>Windows ODBC Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32038">CVE-2023-32038</a></td><td>Microsoft ODBC 드라이버 원격 코드 실행 취약성</td></tr><tr><td>Windows Layer 2 Tunneling Protocol</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32037">CVE-2023-32037</a></td><td>Windows Layer-2 Bridge Network Driver 정보 공개 취약성</td></tr><tr><td>Windows Remote Procedure Call</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32035">CVE-2023-32035</a></td><td>원격 프로시저 호출 런타임 서비스 거부 취약성</td></tr><tr><td>Windows Remote Procedure Call</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32034">CVE-2023-32034</a></td><td>원격 프로시저 호출 런타임 서비스 거부 취약성</td></tr><tr><td>Windows Cluster Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32033">CVE-2023-32033</a></td><td>Microsoft 장애 조치(Failover) 클러스터 원격 코드 실행 취약성</td></tr><tr><td>.NET and Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32032">CVE-2023-32032</a></td><td>.NET 및 Visual Studio 권한 상승 취약성</td></tr><tr><td>Microsoft Exchange Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32031">CVE-2023-32031</a></td><td>Microsoft Exchange Server 원격 코드 실행 취약성</td></tr><tr><td>.NET and Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32030">CVE-2023-32030</a></td><td>.NET 및 Visual Studio 서비스 거부 취약성</td></tr><tr><td>Microsoft Office Excel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32029">CVE-2023-32029</a></td><td>Microsoft Excel 원격 코드 실행 취약성</td></tr><tr><td>SQL Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32028">CVE-2023-32028</a></td><td>Microsoft OLE DB 원격 코드 실행 취약성</td></tr><tr><td>SQL Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32027">CVE-2023-32027</a></td><td>SQL Server용 Microsoft ODBC 드라이버 원격 코드 실행 취약성</td></tr><tr><td>SQL Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32026">CVE-2023-32026</a></td><td>SQL Server용 Microsoft ODBC 드라이버 원격 코드 실행 취약성</td></tr><tr><td>SQL Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32025">CVE-2023-32025</a></td><td>SQL Server용 Microsoft ODBC 드라이버 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Power Apps</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32024">CVE-2023-32024</a></td><td>Microsoft Power Apps 스푸핑 취약성</td></tr><tr><td>Windows Server Service</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32022">CVE-2023-32022</a></td><td>Windows Server Service 보안 기능 바이패스 취약성</td></tr><tr><td>Windows SMB</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32021">CVE-2023-32021</a></td><td>Windows SMB Witness Service 보안 기능 바이패스 취약성</td></tr><tr><td>Role: DNS Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32020">CVE-2023-32020</a></td><td>Windows DNS 스푸핑 취약성</td></tr><tr><td>Windows Kernel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32019">CVE-2023-32019</a></td><td>Windows 커널 정보 유출 취약성</td></tr><tr><td>Windows Hello</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32018">CVE-2023-32018</a></td><td>Windows Hello 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Printer Drivers</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32017">CVE-2023-32017</a></td><td>Microsoft 포스트스크립트 프린터 드라이버 원격 코드 실행 취약성</td></tr><tr><td>Windows Installer</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32016">CVE-2023-32016</a></td><td>Windows 설치 관리자 정보 유출 취약성</td></tr><tr><td>Windows PGM</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32015">CVE-2023-32015</a></td><td>Windows PGM(Pragmatic General Multicast) 원격 코드 실행 취약성</td></tr><tr><td>Windows PGM</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32014">CVE-2023-32014</a></td><td>Windows PGM(Pragmatic General Multicast) 원격 코드 실행 취약성</td></tr><tr><td>Windows Hyper-V</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32013">CVE-2023-32013</a></td><td>Windows Hyper-V 서비스 거부 취약성</td></tr><tr><td>Windows Container Manager Service</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32012">CVE-2023-32012</a></td><td>Windows 컨테이너 관리자 서비스 권한 상승 취약성</td></tr><tr><td>Windows iSCSI</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32011">CVE-2023-32011</a></td><td>Windows iSCSI Discovery Service 서비스 거부 취약성</td></tr><tr><td>Windows Bus Filter Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32010">CVE-2023-32010</a></td><td>Windows Bus Filter Driver 권한 상승 취약성</td></tr><tr><td>Windows Collaborative Translation Framework</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32009">CVE-2023-32009</a></td><td>Windows Collaborative Translation Framework 권한 상승 취약성</td></tr><tr><td>Windows Resilient File System (ReFS)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32008">CVE-2023-32008</a></td><td>Windows ReFS(복원 파일 시스템) 원격 코드 실행 취약성</td></tr><tr><td>Windows ODBC Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29373">CVE-2023-29373</a></td><td>Microsoft ODBC 드라이버 원격 코드 실행 취약성</td></tr><tr><td>Microsoft WDAC OLE DB provider for SQL</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29372">CVE-2023-29372</a></td><td>SQL Server용 Microsoft WDAC OLE DB 공급자 원격 코드 실행 취약성</td></tr><tr><td>Windows Win32K</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29371">CVE-2023-29371</a></td><td>Windows GDI 권한 상승 취약성</td></tr><tr><td>Microsoft Windows Codecs Library</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29370">CVE-2023-29370</a></td><td>Windows Media 원격 코드 실행 취약성</td></tr><tr><td>Windows Remote Procedure Call Runtime</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29369">CVE-2023-29369</a></td><td>원격 프로시저 호출 런타임 서비스 거부 취약성</td></tr><tr><td>Windows Filtering</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29368">CVE-2023-29368</a></td><td>Windows 필터링 플랫폼 권한 상승 취약성</td></tr><tr><td>Windows OLE</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29367">CVE-2023-29367</a></td><td>iSCSI Target WMI Provider 원격 코드 실행 취약성</td></tr><tr><td>Windows Geolocation Service</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29366">CVE-2023-29366</a></td><td>Windows 지리적 위치 서비스 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Windows Codecs Library</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29365">CVE-2023-29365</a></td><td>Windows Media 원격 코드 실행 취약성</td></tr><tr><td>Windows Authentication Methods</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29364">CVE-2023-29364</a></td><td>Windows 인증 권한 상승 취약성</td></tr><tr><td>Windows PGM</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29363">CVE-2023-29363</a></td><td>Windows PGM(Pragmatic General Multicast) 원격 코드 실행 취약성</td></tr><tr><td>Remote Desktop Client</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29362">CVE-2023-29362</a></td><td>원격 데스크톱 클라이언트 원격 코드 실행 취약성</td></tr><tr><td>Windows Cloud Files Mini Filter Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29361">CVE-2023-29361</a></td><td>Windows 클라우드 파일 미니 필터 드라이버 권한 상승 취약성</td></tr><tr><td>Windows TPM Device Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29360">CVE-2023-29360</a></td><td>Windows TPM Device Driver 권한 상승 취약성</td></tr><tr><td>Windows Win32K</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29359">CVE-2023-29359</a></td><td>GDI 권한 상승 취약성</td></tr><tr><td>Windows GDI</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29358">CVE-2023-29358</a></td><td>Windows GDI 권한 상승 취약성</td></tr><tr><td>Microsoft Office SharePoint</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29357">CVE-2023-29357</a></td><td>Microsoft SharePoint Server 권한 상승 취약성</td></tr><tr><td>SQL Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29356">CVE-2023-29356</a></td><td>SQL Server용 Microsoft ODBC 드라이버 원격 코드 실행 취약성</td></tr><tr><td>Windows DHCP Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29355">CVE-2023-29355</a></td><td>DHCP Server Service 정보 공개 취약성</td></tr><tr><td>SysInternals</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29353">CVE-2023-29353</a></td><td>Windows용 Sysinternals Process Monitor 서비스 거부 취약성</td></tr><tr><td>Remote Desktop Client</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29352">CVE-2023-29352</a></td><td>Windows 원격 데스크톱 보안 기능 우회 취약성</td></tr><tr><td>Windows Group Policy</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29351">CVE-2023-29351</a></td><td>Windows 그룹 정책 권한 상승 취약성</td></tr><tr><td>SQL Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29349">CVE-2023-29349</a></td><td>Microsoft ODBC 및 OLE DB 원격 코드 실행 취약성</td></tr><tr><td>Windows Admin Center</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29347">CVE-2023-29347</a></td><td>Windows 관리 센터 스푸핑 취약성</td></tr><tr><td>Windows NTFS</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29346">CVE-2023-29346</a></td><td>NTFS 권한 상승 취약성</td></tr><tr><td>NuGet Client</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29337">CVE-2023-29337</a></td><td>NuGet 클라이언트 원격 코드 실행 취약성</td></tr><tr><td>.NET Core</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29331">CVE-2023-29331</a></td><td>.NET, .NET Framework, Visual Studio 서비스 거부 취약성</td></tr><tr><td>.NET Framework</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29326">CVE-2023-29326</a></td><td>.NET Framework 원격 코드 실행 취약성</td></tr><tr><td>Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29012">CVE-2023-29012</a></td><td>GitHub: CVE-2023-29012 Git CMD가 현재 디렉터리에 있는 경우 'doskey.exe'를 잘못 실행함</td></tr><tr><td>Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29011">CVE-2023-29011</a></td><td>GitHub: CVE-2023-29011 `connect.exe`의 구성 파일이 악의적인 배치에 취약함</td></tr><tr><td>Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29007">CVE-2023-29007</a></td><td>GitHub: CVE-2023-29007 `git submodule deinit`를 통한 임의 구성 삽입</td></tr><tr><td>Microsoft Exchange Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28310">CVE-2023-28310</a></td><td>Microsoft Exchange Server 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28301">CVE-2023-28301</a></td><td>Microsoft Edge (Chromium-based) Tampering Vulnerability</td></tr><tr><td>Microsoft Office SharePoint</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28288">CVE-2023-28288</a></td><td>Microsoft SharePoint Server 스푸핑 취약성</td></tr><tr><td>Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28263">CVE-2023-28263</a></td><td>Visual Studio 정보 유출 취약성</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28261">CVE-2023-28261</a></td><td>Microsoft Edge(Chromium 기반) 권한 상승 취약성</td></tr><tr><td>Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-27911">CVE-2023-27911</a></td><td>AutoDesk: CVE-2023-27911 Autodesk® FBX® SDK 2020 또는 이전 버전에서 힙 버퍼 오버플로 취약성</td></tr><tr><td>Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-27910">CVE-2023-27910</a></td><td>AutoDesk: CVE-2023-27910 Autodesk® FBX® SDK 2020 또는 이전 버전에서 스택 버퍼 오버플로 취약성</td></tr><tr><td>Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-27909">CVE-2023-27909</a></td><td>AutoDesk: CVE-2023-27909 Autodesk® FBX® SDK 2020 또는 이전 버전에서 범위를 벗어난 쓰기 취약성</td></tr><tr><td>Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-25815">CVE-2023-25815</a></td><td>GitHub: CVE-2023-25815 Git이 권한이 없는 위치에서 현지화된 메시지를 찾음</td></tr><tr><td>Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-25652">CVE-2023-25652</a></td><td>GitHub: CVE-2023-25652 "git apply --reject" 부분적으로 제어되는 임의 파일 쓰기</td></tr><tr><td>Windows CryptoAPI</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24938">CVE-2023-24938</a></td><td>Windows CryptoAPI 서비스 거부 취약성</td></tr><tr><td>Windows CryptoAPI</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24937">CVE-2023-24937</a></td><td>Windows CryptoAPI 서비스 거부 취약성</td></tr><tr><td>.NET and Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24936">CVE-2023-24936</a></td><td>.NET, .NET Framework, Visual Studio 권한 상승 취약성</td></tr><tr><td>Windows Secure Boot</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24932">CVE-2023-24932</a></td><td>보안 부팅 보안 기능 우회 취약성</td></tr><tr><td>Microsoft Dynamics</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24921">CVE-2023-24921</a></td><td>Microsoft Dynamics 365(온-프레미스) 교차-사이트 스크립팅 취약성</td></tr><tr><td>.NET and Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24897">CVE-2023-24897</a></td><td>.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability</td></tr><tr><td>Microsoft Dynamics</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24896">CVE-2023-24896</a></td><td>Dynamics 365 Finance 스푸핑 취약성</td></tr><tr><td>.NET and Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24895">CVE-2023-24895</a></td><td>.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability</td></tr><tr><td>Windows SmartScreen</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24880">CVE-2023-24880</a></td><td>Windows SmartScreen 보안 기능 우회 취약성</td></tr><tr><td>Microsoft PostScript Printer Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24856">CVE-2023-24856</a></td><td>Microsoft PostScript 및 PCL6 Class 프린터 드라이버 정보 공개 취약성</td></tr><tr><td>Windows Cryptographic Services</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23416">CVE-2023-23416</a></td><td>Windows 암호화 서비스 원격 코드 실행 취약성</td></tr><tr><td>Azure</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23408">CVE-2023-23408</a></td><td>Azure Apache Ambari 스푸핑 취약성</td></tr><tr><td>Microsoft Office Excel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23398">CVE-2023-23398</a></td><td>Microsoft Excel 스푸핑 취약성</td></tr><tr><td>Microsoft Office Excel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23396">CVE-2023-23396</a></td><td>Microsoft Excel 서비스 거부 취약성</td></tr><tr><td>Service Fabric</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23383">CVE-2023-23383</a></td><td>Service Fabric Explorer 스푸핑 취약성</td></tr><tr><td>Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23381">CVE-2023-23381</a></td><td>Visual Studio 원격 코드 실행 취약성</td></tr><tr><td>Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21815">CVE-2023-21815</a></td><td>Visual Studio 원격 코드 실행 취약성</td></tr><tr><td>.NET and Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21808">CVE-2023-21808</a></td><td>.NET 및 Visual Studio 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Graphics Component</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21756">CVE-2023-21756</a></td><td>Windows Win32k 권한 상승 취약성</td></tr><tr><td>Azure DevOps</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21569">CVE-2023-21569</a></td><td>Azure DevOps Server 스푸핑 취약성</td></tr><tr><td>Azure DevOps</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21565">CVE-2023-21565</a></td><td>Azure DevOps Server 스푸핑 취약성</td></tr><tr><td>Windows Netlogon</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21526">CVE-2023-21526</a></td><td>Windows Netlogon 정보 유출 취약성</td></tr><tr><td>.NET Framework</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41089">CVE-2022-41089</a></td><td>.NET Framework 원격 코드 실행 취약성</td></tr><tr><td>Windows Netlogon</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38023">CVE-2022-38023</a></td><td>Netlogon RPC 권한 상승 취약성</td></tr><tr><td>Windows Kerberos</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37967">CVE-2022-37967</a></td><td>Windows Kerberos 권한 상승 취약성</td></tr><tr><td>Windows Print Spooler Components</td><td>CVE-2021-34527</td><td>Windows 인쇄 스풀러 원격 코드 실행 취약성</td></tr></tbody></table>

### □ 작성 : \[KISA] 취약점분석팀

## 출처 : [KISA 바로가기](https://www.krcert.or.kr/kr/bbs/view.do?searchCnd=\&bbsId=B0000133\&searchWrd=\&menuNo=205020\&pageIndex=1\&categoryCode=\&nttId=71124)

{% embed url="<https://doc.skill.or.kr>" %}
NHN Cloud 정보 사이트&#x20;
{% endembed %}

{% embed url="<https://ssv.skill.or.kr>" %}
취약점 진단 분석 평가 방법 사이트&#x20;
{% endembed %}
