Visual Studio Remote Code Execution Vulnerability
References
Link | Resource |
---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36792 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
|
Configuration 10 (hide)
|
History
14 Sep 2023, 20:21
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
References | (MISC) https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36792 - Patch, Vendor Advisory | |
First Time |
Microsoft visual Studio 2022
Microsoft windows 11 22h2 Microsoft Microsoft windows Server 2008 Microsoft .net Microsoft windows 10 1607 Microsoft visual Studio 2019 Microsoft visual Studio 2017 Microsoft .net Framework Microsoft windows Server 2012 Microsoft windows 10 21h2 Microsoft windows Server 2016 Microsoft windows 10 1809 Microsoft windows Server 2019 Microsoft windows 10 22h2 Microsoft windows 11 21h2 Microsoft windows Server 2022 |
|
CPE | cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:* cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:* cpe:2.3:a:microsoft:.net:6.0.0:-:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* cpe:2.3:a:microsoft:.net:7.0.0:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:* cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:* cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:* cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:* cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:* cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:*:* cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:* cpe:2.3:a:microsoft:.net_framework:4.8.1:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:*:* cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:* cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:* cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:* cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:* |
12 Sep 2023, 19:38
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-12 17:15
Updated : 2023-12-10 15:14
NVD link : CVE-2023-36792
Mitre link : CVE-2023-36792
CVE.ORG link : CVE-2023-36792
JSON object : View
Products Affected
microsoft
- windows_10_21h2
- visual_studio_2019
- windows_10_1809
- .net_framework
- visual_studio_2022
- windows_10_1607
- windows_server_2016
- visual_studio_2017
- windows_11_21h2
- windows_server_2019
- windows_server_2022
- windows_11_22h2
- .net
- windows_server_2008
- windows_server_2012
- windows_10_22h2
CWE