Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-29353— Sysinternals Process Monitor for Windows Denial of Service Vulnerability

CVSS 5.5 · Medium EPSS 0.19% · P41
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-29353

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Sysinternals Process Monitor for Windows Denial of Service Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
Sysinternals Process Monitor for Windows Denial of Service Vulnerability
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
输入验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft SysInternals 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft SysInternals是美国微软(Microsoft)公司的由Mark Russinovich于 1996 年创建,用于托管他的高级系统实用程序和技术信息。无论您是 IT 专业人员还是开发人员,您都会发现 Sysinternals 实用程序可以帮助您管理、排除故障和诊断您的 Windows 系统和应用程序。 Microsoft SysInternals存在安全漏洞。攻击者利用该漏洞导致系统拒绝服务。以下产品和版本受到影响:Sysinternals Suite,Windows Sysi
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
MicrosoftWindows Sysinternals Process Monitor 1.0 ~ 3.94 -
MicrosoftSysinternals Suite 3.0.0 ~ 2023.6 -

II. Public POCs for CVE-2023-29353

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-29353

登录查看更多情报信息。

Same Patch Batch · Microsoft · 2023-06-13 · 58 CVEs total

CVE-2023-320159.8 CRITICALWindows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
CVE-2023-320149.8 CRITICALWindows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
CVE-2023-293639.8 CRITICALWindows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
CVE-2023-293579.8 CRITICALMicrosoft SharePoint Server Elevation of Privilege Vulnerability
CVE-2023-293628.8 HIGHRemote Desktop Client Remote Code Execution Vulnerability
CVE-2023-331318.8 HIGHMicrosoft Outlook Remote Code Execution Vulnerability
CVE-2023-320098.8 HIGHWindows Collaborative Translation Framework Elevation of Privilege Vulnerability
CVE-2023-293728.8 HIGHMicrosoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2023-293738.8 HIGHMicrosoft ODBC Driver Remote Code Execution Vulnerability
CVE-2023-293608.4 HIGHMicrosoft Streaming Service Elevation of Privilege Vulnerability
CVE-2023-293518.1 HIGHWindows Group Policy Elevation of Privilege Vulnerability
CVE-2023-293717.8 HIGHWindows GDI Elevation of Privilege Vulnerability
CVE-2023-293667.8 HIGHWindows Geolocation Service Remote Code Execution Vulnerability
CVE-2023-320087.8 HIGHWindows Resilient File System (ReFS) Remote Code Execution Vulnerability
CVE-2023-293707.8 HIGHWindows Media Remote Code Execution Vulnerability
CVE-2023-320187.8 HIGHWindows Hello Remote Code Execution Vulnerability
CVE-2023-320177.8 HIGHMicrosoft PostScript Printer Driver Remote Code Execution Vulnerability
CVE-2023-320127.8 HIGHWindows Container Manager Service Elevation of Privilege Vulnerability
CVE-2023-293677.8 HIGHiSCSI Target WMI Provider Remote Code Execution Vulnerability
CVE-2023-331337.8 HIGHMicrosoft Excel Remote Code Execution Vulnerability

Showing top 20 of 58 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2023-29353

No comments yet


Leave a comment